Alessandro Reina
Citata da
Citata da
A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors
A Reina, A Fattori, L Cavallaro
EuroSec, April, 2013
When Hardware Meets Software: a Bulletproof Solution to Forensic Memory Acquisition
A Reina, A Fattori, F Pagani, L Cavallaro, DM Bruschi
28th Annual Computer Security Applications Conference (ACSAC 2012), 2012
A low-cost instrument for environmental particulate analysis based on optical scattering
A Morpurgo, F Pedersini, A Reina
2012 IEEE International Instrumentation and Measurement Technology …, 2012
Dissecting tor bridges: a security evaluation of their private and public infrastructures
S Matic, C Troncoso, J Caballero
Network and Distributed Systems Security Symposium, 1-15, 2017
A methodology for testing CPU emulators
L Martignoni, R Paleari, A Reina, GF Roglia, D Bruschi
ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (4), 1-26, 2013
CopperDroid: On the reconstruction of android malware behaviors
A Fattori, K Tam, SJ Khan, A Reina, L Cavallaro
Tech. Rep. MA-2014-01, 2014
On the privacy of real-world friend-finder services
A Fattori, A Reina, A Gerino, S Mascetti
2013 IEEE 14th International Conference on Mobile Data Management 1, 331-334, 2013
Improving mac os x security through gray box fuzzing technique
SB Mazzone, M Pagnozzi, A Fattori, A Reina, A Lanzi, D Bruschi
Proceedings of the Seventh European Workshop on System Security, 1-6, 2014
On the Reconstruction of Android Malware Behaviors
A Fattori, K Tam, SJ Khan, L Cavallaro, A Reina
This is pioneering work which uses Binder as a central component of an …, 2014
Automatic reconstruction of android malware behaviors
K Tam, SJ Khan, A Fattori, L Cavallaro
ESORICS, Springer, 2013
Discovering anomalous behaviors by advanced program analysis techniques
A Reina
Università degli Studi di Milano, 2014
XCode IDE for Embedded AVR Software Development
A Reina
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–12