Toward automated detection of logic vulnerabilities in web applications V Felmetsger, L Cavedon, C Kruegel, G Vigna USENIX Security Symposium 58, 2010 | 191 | 2010 |
Hulk: Eliciting malicious behavior in browser extensions A Kapravelos, C Grier, N Chachra, C Kruegel, G Vigna, V Paxson 23rd {USENIX} Security Symposium ({USENIX} Security 14), 641-654, 2014 | 124 | 2014 |
Enemy of the state: A state-aware black-box web vulnerability scanner A Doupé, L Cavedon, C Kruegel, G Vigna Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012 | 106 | 2012 |
Organizing large scale hacking competitions N Childers, B Boe, L Cavallaro, L Cavedon, M Cova, M Egele, G Vigna International Conference on Detection of Intrusions and Malware, and …, 2010 | 51 | 2010 |
Hit'em where it hurts: a live security exercise on cyber situational awareness A Doupé, M Egele, B Caillat, G Stringhini, G Yakin, A Zand, L Cavedon, ... Proceedings of the 27th Annual Computer Security Applications Conference, 51-61, 2011 | 46 | 2011 |
Methods and systems for malware detection based on environment-dependent behavior C Kolbitsch, PM Comparetti, L Cavedon US Patent 9,361,459, 2016 | 16 | 2016 |
Methods and systems for reciprocal generation of watch-lists and malware signatures C Kolbitsch, PM Comparetti, L Cavedon US Patent 8,910,285, 2014 | 10 | 2014 |
Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams. L Cavedon, L Foschini, G Vigna WOOT, 37-45, 2011 | 7 | 2011 |
Are BGP routers open to attack? an experiment L Cavedon, C Kruegel, G Vigna Open Research Problems in Network Security, 88-103, 2011 | 7 | 2011 |
Organizing large scale hacking competitions B Boe, L Cavallaro, L Cavedon, N Childers, M Cova, M Egele, G Vigna DIMVA 2010, July 8-9, 2010, Paris, France, 2010 | 1 | 2010 |
Design and validation of a methodology for distributed relay service for NAT traversal in a peer-to-peer VoIP network LM Cavedon | | 2007 |