Follow
Giancarlo Pellegrino
Giancarlo Pellegrino
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
SentiNet: Detecting Localized Universal Attack Against Deep Learning Systems
E Chou, F Tramèr, G Pellegrino
arXiv preprint arXiv:1812.00292, 2018
3662018
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1442012
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification
B Stock, G Pellegrino, C Rossow, M Johns, M Backes
25th USENIX Security Symposium, USENIX Security 16, 1015--1032, 2016
1382016
Toward Black-Box Detection of Logic Flaws in Web Applications
G Pellegrino, D Balzarotti
NDSS Symposium 2014, 2014
1072014
Didn’t you hear me?—Towards more successful Web vulnerability notifications
B Stock, G Pellegrino, F Li, M Backes, C Rossow
NDSS Symposium 2018, 2018
1032018
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti
Computers & Security 33, 41-58, 2013
992013
The rise of the citizen developer: Assessing the security impact of online app generators
M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ...
2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018
982018
Deemon: Detecting CSRF with dynamic analysis and property graphs
G Pellegrino, M Johns, S Koch, M Backes, C Rossow
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
842017
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
F Tramèr, P Dupré, R Gili, G Pellegrino, D Boneh
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
812019
Fidelius: Protecting User Secrets from Compromised Browsers
S Eskandarian, J Cogan, S Birnbaum, PCW Brandon, D Franke, F Fraser, ...
2019 IEEE Symposium on Security and Privacy (SP), 611-627, 2019
692019
Black Widow: Blackbox Data-driven Web Scanning
B Eriksson, G Pellegrino, A Sabelfeld
Proceedings of IEEE SSP 2021, 2021
642021
Security validation of business processes via model-checking
W Arsac, L Compagna, G Pellegrino, SE Ponta
International Symposium on Engineering Secure Software and Systems, 29-42, 2011
622011
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
G Pellegrino, C Tschürtz, E Bodden, C Rossow
The 18th International Symposium on Research in Attacks, Intrusions and Defenses, 2015
592015
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
Q Zhao, C Zuo, G Pellegrino, L Zhiqiang
CISPA, 2019
482019
From multiple credentials to browser-based single sign-on: Are we more secure?
A Armando, R Carbone, L Compagna, J Cuellar, G Pellegrino, A Sorniotti
IFIP International Information Security Conference, 68-79, 2011
452011
JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals
S Khodayari, G Pellegrino
30th USENIX Security Symposium, USENIX Security 21, 2021
432021
Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals
M Simeonovski, G Pellegrino, C Rossow, M Backes
Proceedings of the 26th International World Wide Web Conference, 2017 (WWW 2017), 2017
432017
Model-checking driven security testing of web-based applications
A Armando, R Carbone, L Compagna, K Li, G Pellegrino
2010 Third International Conference on Software Testing, Verification, and …, 2010
422010
Automatic uncovering of hidden behaviors from input validation in mobile apps
Q Zhao, C Zuo, B Dolan-Gavitt, G Pellegrino, Z Lin
2020 IEEE Symposium on Security and Privacy (SP), 1106-1120, 2020
412020
From model-checking to automated testing of security protocols: Bridging the gap
A Armando, G Pellegrino, R Carbone, A Merlo, D Balzarotti
International Conference on Tests and Proofs, 3-18, 2012
402012
The system can't perform the operation now. Try again later.
Articles 1–20