Andrea Lanzi

According to our database1, Andrea Lanzi authored at least 42 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Editorial: Advanced Techniques for Memory Forensics Analysis.
Mob. Networks Appl., 2020

2019
Game Bot Detection on Massive Multiplayer Online Role-Playing Games (MMORPGs) Systems.
Proceedings of the Encyclopedia of Computer Graphics and Games., 2019

Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework.
IEEE Access, 2019

BootKeeper: Validating Software Integrity Properties on Boot Firmware Images.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Detecting (absent) app-to-app authentication on cross-device short-distance channels.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Security Evaluation of a Banking Fraud Analysis System.
ACM Trans. Priv. Secur., 2018

EPIC: a Methodology for Evaluating Privacy Violation Risk in Cybersecurity Systems.
Trans. Data Priv., 2018

The Privacy Implications of Cyber Security Systems: A Technological Survey.
ACM Comput. Surv., 2018

Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Prometheus: Analyzing WebInject-based information stealers.
J. Comput. Secur., 2017

Scholarly Digital Libraries as a Platform for Malware Distribution.
Proceedings of the A Systems Approach to Cyber Security, 2017

Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study -.
Proceedings of the Integrated Formal Methods - 13th International Conference, 2017

2016
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.
Proceedings of the 25th USENIX Security Symposium, 2016

Measuring the Role of Greylisting and Nolisting in Fighting Spam.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Subverting Operating System Properties Through Evolutionary DKOM Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

A Security Game Model for Remote Software Protection.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Hypervisor-based malware protection with AccessMiner.
Comput. Secur., 2015

Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
PeerRush: Mining for unwanted P2P traffic.
J. Inf. Secur. Appl., 2014

Improving Mac OS X security through gray box fuzzing technique.
Proceedings of the Seventh European Workshop on System Security, 2014

On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Hypervisor Memory Forensics.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
A quantitative study of accuracy in system call-based malware detection.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

2011
Thwarting real-time dynamic unpacking.
Proceedings of the Fourth European Workshop on System Security, 2011

Operating System Interface Obfuscation and the Revealing of Hidden Operations.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

2010
AccessMiner: using system-centric models for malware protection.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

G-Free: defeating return-oriented programming through gadget-less binaries.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Automatic Reverse Engineering of Malware Emulators.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

K-Tracer: A System for Extracting Kernel Malware Behavior.
Proceedings of the Network and Distributed System Security Symposium, 2009

Secure in-VM monitoring using hardware virtualization.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Classification of packed executables for accurate computer virus detection.
Pattern Recognit. Lett., 2008

System Call API Obfuscation (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Impeding Malware Analysis Using Conditional Code Obfuscation.
Proceedings of the Network and Distributed System Security Symposium, 2008

LISABETH: automated content-based signature generator for zero-day polymorphic worms.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008

McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Diversified Process Replicæ for Defeating Memory Error Exploits.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

A Smart Fuzzer for x86 Executables.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks.
Proceedings of the Detection of Intrusions and Malware, 2007

2005
A Protocol for Anonymous and Accurate E-Polling.
Proceedings of the E-Government: Towards Electronic Democracy, International Conference, 2005

Replay Attack in TCG Specification and Solution.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005


  Loading...