Balduzzi Marco
Balduzzi Marco
Senior Research Scientist at Trend Micro
Email verificata su - Home page
TitoloCitata daAnno
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
L Bilge, E Kirda, C Kruegel, M Balduzzi
Ndss, 1-17, 2011
Abusing social networks for automated user profiling
M Balduzzi, C Platzer, T Holz, E Kirda, D Balzarotti, C Kruegel
International Workshop on Recent Advances in Intrusion Detection, 422-441, 2010
A security analysis of amazon's elastic compute cloud service
M Balduzzi, J Zaddach, D Balzarotti, E Kirda, S Loureiro
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 1427-1434, 2012
Reverse social engineering attacks in online social networks
D Irani, M Balduzzi, D Balzarotti, E Kirda, C Pu
International conference on detection of intrusions and malware, andá…, 2011
A solution for the automated detection of clickjacking attacks
M Balduzzi, M Egele, E Kirda, D Balzarotti, C Kruegel
Proceedings of the 5th ACM Symposium on Information, Computer andá…, 2010
A security evaluation of AIS automated identification system
M Balduzzi, A Pasta, K Wilhoit
Proceedings of the 30th annual computer security applications conferenceá…, 2014
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications.
M Balduzzi, CT Gimenez, D Balzarotti, E Kirda
NDSS, 2011
Take a deep breath: a stealthy, resilient and cost-effective botnet using skype
A Nappa, A Fattori, M Balduzzi, M Dell’Amico, L Cavallaro
International Conference on Detection of Intrusions and Malware, andá…, 2010
Soundsquatting: Uncovering the use of homophones in domain squatting
N Nikiforakis, M Balduzzi, L Desmet, F Piessens, W Joosen
International Conference on Information Security, 291-308, 2014
Ink jet head, method for inspecting actuator, method for manufacturing ink jet head, and ink jet recording apparatus
H Matsuo, T Nakano, K Ikeda, A Sogami, M Tatekawa
US Patent 6,986,564, 2006
Exposing the lack of privacy in file hosting services
N Nikiforakis, M Balduzzi, S Van Acker, W Joosen, D Balzarotti
Usenix Workshop on Large-scale Exploits and Emergent Threats, Date: 2011/03á…, 2011
Below the Surface: Exploring the Deep Web [Technical Report]
V Ciancaglini, M Balduzzi, R McArdle, M R÷sler
Trend Micro, 2015
Deepweb and Cybercrime
V Ciancaglini, M Balduzzi, M Goncharov, R McArdle
Trend Micro Report 9, 2013
The role of phone numbers in understanding cyber-crime schemes
A Costin, J Isacenkova, M Balduzzi, A Francillon, D Balzarotti
2013 Eleventh Annual Conference on Privacy, Security and Trust, 213-220, 2013
Automatic extraction of indicators of compromise for web applications
O Catakoglu, M Balduzzi, D Balzarotti
Proceedings of the 25th International Conference on World Wide Web, 333-343, 2016
Mobipot: Understanding mobile telephony threats with honeycards
M Balduzzi, P Gupta, L Gu, D Gao, M Ahamad
Proceedings of the 11th ACM on Asia Conference on Computer andá…, 2016
Targeted attacks detection with spunge
M Balduzzi, V Ciangaglini, R McArdle
2013 Eleventh Annual Conference on Privacy, Security and Trust, 185-194, 2013
A Security Evaluation of AIS [Technical Report]
M Balduzzi, K Wilhoit, A Pasta
Trend Micro, 2014
Real-time detection of malware downloads via large-scale URL-> file-> machine graph mining
B Rahbarinia, M Balduzzi, R Perdisci
Proceedings of the 11th ACM on Asia Conference on Computer andá…, 2016
Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
S Matic, C Troncoso, J Caballero
Network and Distributed Systems Security Symposium, 1-15, 2017
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20