A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors A Reina, A Fattori, L Cavallaro EuroSec, April, 2013 | 290 | 2013 |
When Hardware Meets Software: a Bulletproof Solution to Forensic Memory Acquisition A Reina, A Fattori, F Pagani, L Cavallaro, DM Bruschi 28th Annual Computer Security Applications Conference (ACSAC 2012), 2012 | 64 | 2012 |
A methodology for testing CPU emulators L Martignoni, R Paleari, A Reina, GF Roglia, D Bruschi ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (4), 1-26, 2013 | 21 | 2013 |
A low-cost instrument for environmental particulate analysis based on optical scattering A Morpurgo, F Pedersini, A Reina 2012 IEEE International Instrumentation and Measurement Technology …, 2012 | 20 | 2012 |
CopperDroid: On the reconstruction of android malware behaviors A Fattori, K Tam, SJ Khan, A Reina, L Cavallaro Tech. Rep. MA-2014-01, 2014 | 10 | 2014 |
Improving mac os x security through gray box fuzzing technique SB Mazzone, M Pagnozzi, A Fattori, A Reina, A Lanzi, D Bruschi Proceedings of the Seventh European Workshop on System Security, 1-6, 2014 | 5 | 2014 |
On the privacy of real-world friend-finder services A Fattori, A Reina, A Gerino, S Mascetti 2013 IEEE 14th International Conference on Mobile Data Management 1, 331-334, 2013 | 5 | 2013 |
On the Reconstruction of Android Malware Behaviors A Fattori, K Tam, SJ Khan, L Cavallaro, A Reina This is pioneering work which uses Binder as a central component of an …, 2014 | 2 | 2014 |
Xcode ide for embedded avr software development A Reina | 2 | 2007 |
Discovering anomalous behaviors by advanced program analysis techniques A Reina Universitą degli Studi di Milano, 2014 | | 2014 |