Marco Cova
Marco Cova
Lastline, Inc.
Email verificata su lastline.com - Home page
TitoloCitata daAnno
Your botnet is my botnet: Analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communicationsá…, 2009
7182009
Detection and analysis of drive-by-download attacks and malicious JavaScript code
M Cova, C Kruegel, G Vigna
Proceedings of the 19th international conference on World wide web, 281-290, 2010
6542010
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
Security and Privacy, 2008. SP 2008. IEEE Symposium on, 387-401, 2008
4172008
Prophiler: A fast filter for the large-scale detection of malicious web pages
D Canali, M Cova, G Vigna, C Kruegel
Proceedings of the 20th international conference on World wide web, 197-206, 2011
3352011
Why Johnny can’t pentest: an analysis of black-box web vulnerability scanners
A DoupÚ, M Cova, G Vigna
Detection of Intrusions and Malware, and Vulnerability Assessment, 111-131, 2010
2362010
Efficient Detection of Split Personalities in Malware.
D Balzarotti, M Cova, C Karlberger, E Kirda, C Kruegel, G Vigna
NDSS, 2010
2082010
Swaddler: An approach for the anomaly-based detection of state violations in web applications
M Cova, D Balzarotti, V Felmetsger, G Vigna
Recent Advances in Intrusion Detection, 63-86, 2007
1842007
EVILSEED: A Guided Approach to Finding Malicious Web Pages
L Invernizzi, S Benvenuti, M Cova, PM Comparetti, C Kruegel, G Vigna
IEEE Symposium on Security and Privacy, 2012
1642012
Multi-module vulnerability analysis of web-based applications
D Balzarotti, M Cova, VV Felmetsger, G Vigna
Proceedings of the 14th ACM conference on Computer and communicationsá…, 2007
1302007
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware
A Kapravelos, Y Shoshitaishvili, M Cova, C Kruegel, G Vigna
USENIX Security Symposium, 2013
1292013
SNOOZE: toward a Stateful NetwOrk prOtocol fuzZEr
G Banks, M Cova, V Felmetsger, K Almeroth, R Kemmerer, G Vigna
International Conference on Information Security, 343-358, 2006
1152006
Clearshot: Eavesdropping on keyboard input from video
D Balzarotti, M Cova, G Vigna
Security and Privacy, 2008. SP 2008. IEEE Symposium on, 170-183, 2008
972008
Analysis of a botnet takeover
B Stone-Gross, M Cova, B Gilbert, R Kemmerer, C Kruegel, G Vigna
IEEE Security & Privacy 9 (1), 64-72, 2011
862011
Analyzing and detecting malicious Flash advertisements
S Ford, M Cova, C Kruegel, G Vigna
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 363-372, 2009
862009
Symbolic string verification: An automata-based approach
F Yu, T Bultan, M Cova, OH Ibarra
International SPIN Workshop on Model Checking of Software, 306-324, 2008
832008
Static detection of vulnerabilities in x86 executables
M Cova, V Felmetsger, G Banks, G Vigna
Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, 269-278, 2006
832006
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits.
M Cova, C Kruegel, G Vigna
Workshop on Offensive Technologies (WOOT) 8, 1-8, 2008
822008
An analysis of rogue AV campaigns
M Cova, C Leita, O Thonnard, A Keromytis, M Dacier
Recent Advances in Intrusion Detection, 442-463, 2010
712010
An experience in testing the security of real-world electronic voting systems
D Balzarotti, G Banks, M Cova, V Felmetsger, R Kemmerer, W Robertson, ...
IEEE transactions on software engineering 36 (4), 453-473, 2010
532010
Organizing large scale hacking competitions
N Childers, B Boe, L Cavallaro, L Cavedon, M Cova, M Egele, G Vigna
International Conference on Detection of Intrusions and Malware, andá…, 2010
482010
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20