Your botnet is my botnet: Analysis of a botnet takeover B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ... Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 894 | 2009 |
Copperdroid: Automatic reconstruction of android malware behaviors K Tam, A Fattori, S Khan, L Cavallaro NDSS Symposium 2015, 1-15, 2015 | 418 | 2015 |
The Evolution of Android Malware and Android Analysis Techniques K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro ACM Computing Surveys (CSUR) 49 (4), 76, 2017 | 327 | 2017 |
A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors A Reina, A Fattori, L Cavallaro EuroSec, April, 2013 | 269 | 2013 |
Phoenix: DGA-based botnet tracking and intelligence S Schiavoni, F Maggi, L Cavallaro, S Zanero International Conference on Detection of Intrusions and Malware, and …, 2014 | 240 | 2014 |
On the limits of information flow techniques for malware analysis and containment L Cavallaro, P Saxena, R Sekar International conference on Detection of Intrusions and Malware, and …, 2008 | 205 | 2008 |
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware G Suarez-Tangil, SK Dash, M Ahmadi, J Kinder, G Giacinto, L Cavallaro ACM Conference on Data and Application Security and Privacy (CODASPY), 2017 | 200 | 2017 |
Memory errors: The past, the present, and the future V Veen, L Cavallaro, H Bos International Workshop on Recent Advances in Intrusion Detection, 86-106, 2012 | 198 | 2012 |
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time F Pendlebury, F Pierazzi, R Jordaney, J Kinder, L Cavallaro 28th {USENIX} Security Symposium ({USENIX} Security 19), 729-746, 2019 | 190 | 2019 |
Transcend: Detecting Concept Drift in Malware Classification Models R Jordaney, K Sharad, SK Dash, Z Wang, D Papini, I Nouretdinov, ... USENIX Security Symposium, 2017 | 190 | 2017 |
DroidScribe: Classifying Android Malware Based on Runtime Behavior SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ... Security and Privacy Workshops (SPW), 2016 IEEE, 252-261, 2016 | 179 | 2016 |
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting L Li, D Li, TF Bissyandé, J Klein, Y Le Traon, D Lo, L Cavallaro IEEE Transactions on Information Forensics and Security 12 (6), 1269-1284, 2017 | 156 | 2017 |
Sandnet: Network traffic analysis of malicious software C Rossow, CJ Dietrich, H Bos, L Cavallaro, M van Steen, FC Freiling, ... Proceedings of the First Workshop on Building Analysis Datasets and …, 2011 | 131 | 2011 |
PAriCheck: an efficient pointer arithmetic checker for C programs Y Younan, P Philippaerts, L Cavallaro, R Sekar, F Piessens, W Joosen Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 120 | 2010 |
Intriguing Properties of Adversarial ML Attacks in the Problem Space F Pierazzi, F Pendlebury, J Cortellazzi, L Cavallaro 2020 IEEE Symposium on Security and Privacy (SP), 1332-1349, 2020 | 94 | 2020 |
Stack Bounds Protection with Low Fat Pointers GJ Duck, RHC Yap, L Cavallaro NDSS, 2017 | 83* | 2017 |
Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware SKDLC Médéric Hurier, Tegawendé Bissyandé, Yves Le Traon, Jacques Klein ... 14th International Conference on Mining Software Repositories, 2017 | 72* | 2017 |
Live and trustworthy forensic analysis of commodity production systems L Martignoni, A Fattori, R Paleari, L Cavallaro International Workshop on Recent Advances in Intrusion Detection, 297-316, 2010 | 72 | 2010 |
Live and trustworthy forensic analysis of commodity production systems R PALEARI, A FATTORI, L MARTIGNONI, L CAVALLARO Recent advances in intrusion detection: 13th international symposium, RAID …, 2010 | 72* | 2010 |
Diversified Process Replicà ¦ for Defeating Memory Error Exploits D Bruschi, L Cavallaro, A Lanzi Performance, Computing, and Communications Conference, 2007. IPCCC 2007 …, 2007 | 72 | 2007 |