Antonio Nappa

Orcid: 0000-0002-2692-7336

According to our database1, Antonio Nappa authored at least 22 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Autoencoder-Based Approach for Anomaly Detection of Machining Processes Using Acoustic Emission Signals.
Proceedings of the Engineering Applications of Neural Networks, 2024

2022
Scramblesuit: An effective timing side-channels framework for malware sandbox evasion.
J. Comput. Secur., 2022

2021
Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting.
IEEE Trans. Netw. Serv. Manag., 2021

ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices.
Proc. Priv. Enhancing Technol., 2021

POW-HOW: An enduring timing side-channel to evadeonline malware sandboxes.
CoRR, 2021

Deja-Vu: A Glimpse on Radioactive Soft-Error Consequences on Classical and Quantum Computations.
CoRR, 2021

VPN-Zero: A Privacy-Preserving Decentralized Virtual Private Network.
Proceedings of the IFIP Networking Conference, 2021

PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes.
Proceedings of the Computer Security - ESORICS 2021, 2021

2019
ZKSENSE: a Privacy-Preserving Mechanism for Bot Detection in Mobile Devices.
CoRR, 2019

VPN0: A Privacy-Preserving Decentralized Virtual Private Network.
CoRR, 2019

2016
Defending against cybercrime: advances in the detection of malicious servers and the analysis of client-side vulnerabilities.
PhD thesis, 2016

RevProbe: detecting silent reverse proxies in malicious server infrastructures.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
The MALICIA dataset: identification and analysis of drive-by download operations.
Int. J. Inf. Sec., 2015

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds.
Proceedings of the 2014 Internet Measurement Conference, 2014

AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

2012
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities.
Proceedings of the International Symposium on Software Testing and Analysis, 2012


2010
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype.
Proceedings of the Detection of Intrusions and Malware, 2010


  Loading...