Lorenzo Cavallaro
Lorenzo Cavallaro
Email verificata su kcl.ac.uk - Home page
TitoloCitata daAnno
Your botnet is my botnet: Analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communicationsá…, 2009
CopperDroid: Automatic Reconstruction of Android Malware Behaviors.
K Tam, SJ Khan, A Fattori, L Cavallaro
Ndss, 2015
A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors
A Reina, A Fattori, L Cavallaro
EuroSec, April, 2013
On the limits of information flow techniques for malware analysis and containment
L Cavallaro, P Saxena, R Sekar
International conference on Detection of Intrusions and Malware, andá…, 2008
Memory errors: The past, the present, and the future
V Van der Veen, L Cavallaro, H Bos
International Workshop on Recent Advances in Intrusion Detection, 86-106, 2012
Phoenix: DGA-based botnet tracking and intelligence
S Schiavoni, F Maggi, L Cavallaro, S Zanero
International Conference on Detection of Intrusions and Malware, andá…, 2014
The Evolution of Android Malware and Android Analysis Techniques
K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro
ACM Computing Surveys (CSUR) 49 (4), 76, 2017
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets andá…, 2011
DroidScribe: Classifying Android Malware Based on Runtime Behavior
SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ...
Security and Privacy Workshops (SPW), 2016 IEEE, 252-261, 2016
PAriCheck: an efficient pointer arithmetic checker for C programs
Y Younan, P Philippaerts, L Cavallaro, R Sekar, F Piessens, W Joosen
Proceedings of the 5th ACM Symposium on Information, Computer andá…, 2010
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting
L Li, D Li, TF BissyandÚ, J Klein, Y Le Traon, D Lo, L Cavallaro
IEEE Transactions on Information Forensics and Security 12 (6), 1269-1284, 2017
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware
G Suarez-Tangil, SK Dash, M Ahmadi, J Kinder, G Giacinto, L Cavallaro
ACM Conference on Data and Application Security and Privacy (CODASPY), 2017
Diversified Process Replic├ ┬Ž for Defeating Memory Error Exploits
D Bruschi, L Cavallaro, A Lanzi
Performance, Computing, and Communications Conference, 2007. IPCCC 2007á…, 2007
Replay attack in TCG specification and solution
D Bruschi, L Cavallaro, A Lanzi, M Monga
21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005
Live and trustworthy forensic analysis of commodity production systems
L Martignoni, A Fattori, R Paleari, L Cavallaro
International Workshop on Recent Advances in Intrusion Detection, 297-316, 2010
Live and trustworthy forensic analysis of commodity production systems
Recent advances in intrusion detection: 13th international symposium, RAIDá…, 2010
LISABETH: automated content-based signature generator for zero-day polymorphic worms
L Cavallaro, A Lanzi, L Mayer, M Monga
Proceedings of the fourth international workshop on Software engineering forá…, 2008
Organizing large scale hacking competitions
N Childers, B Boe, L Cavallaro, L Cavedon, M Cova, M Egele, G Vigna
International Conference on Detection of Intrusions and Malware, andá…, 2010
Transcend: Detecting Concept Drift in Malware Classification Models
R Jordaney, K Sharad, SK Dash, Z Wang, D Papini, I Nouretdinov, ...
USENIX Security Symposium, 2017
Anti-taint-analysis: Practical evasion techniques against information flow based malware defense
L Cavallaro, P Saxena, R Sekar
Secure Systems Lab at Stony Brook University, Tech. Rep, 1-18, 2007
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20