Andrea Continella

Orcid: 0000-0002-0329-1830

According to our database1, Andrea Continella authored at least 33 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
HoneyKube: Designing and Deploying a Microservices-based Web Honeypot.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Columbus: Android App Testing Through Systematic Callback Exploration.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

AoT - Attack on Things: A security analysis of IoT firmware updates.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Divak: Non-invasive Characterization of Out-of-Bounds Write Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

2022
A Systematical and longitudinal study of evasive behaviors in windows malware.
Comput. Secur., 2022

Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and Experimentation.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

DEEPCASE: Semi-Supervised Contextual Analysis of Security Events.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022

Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022

Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Toward a secure crowdsourced location tracking system.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020

Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

HeadPrint: detecting anomalous communications through header-based application fingerprinting.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network.
Proceedings of the 21st International Conference on Information Reuse and Integration for Data Science, 2020

SYMBION: Interleaving Symbolic with Concrete Execution.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Victim-Aware Adaptive Covert Channels.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
Defending from financially-motivated software abuses.
PhD thesis, 2018

Security Evaluation of a Banking Fraud Analysis System.
ACM Trans. Priv. Secur., 2018

Extended Abstract: Toward Systematically Exploring Antivirus Engines.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

SysTaint: Assisting Reversing of Malicious Network Communications.
Proceedings of the 8th Software Security, 2018

There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Prometheus: Analyzing WebInject-based information stealers.
J. Comput. Secur., 2017

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Measuring and Defeating Anti-Instrumentation-Equipped Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
ShieldFS: a self-healing, ransomware-aware filesystem.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2014
GASOLINE: a Cytoscape app for multiple local alignment of PPI networks.
F1000Research, 2014


  Loading...