Davide Maiorca

Orcid: 0000-0003-2640-4663

According to our database1, Davide Maiorca authored at least 37 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhancing android malware detection explainability through function call graph APIs.
J. Inf. Secur. Appl., February, 2024

2023
Can you See me? On the Visibility of NOPs against Android Malware Detectors.
CoRR, 2023

A Targeted Assessment of Cross-Site Scripting Detection Tools.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

Cybersecurity and AI: The PRALab Research Experience.
Proceedings of the Italia Intelligenza Artificiale, 2023

2022
Do gradient-based explanations tell anything about adversarial robustness to android malware?
Int. J. Mach. Learn. Cybern., 2022

A Longitudinal Study of Cryptographic API: A Decade of Android Malware.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Explaining the Use of Cryptographic API in Android Malware.
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022

Reach Me if You Can: On Native Vulnerability Reachability in Android Apps.
Proceedings of the Computer Security - ESORICS 2022, 2022

Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

2021
PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis.
Proceedings of the Italian Conference on Cybersecurity, 2021

2020
On the Feasibility of Adversarial Sample Creation Using the Android System API.
Inf., 2020

Adversarial Detection of Flash Malware: Limitations and Open Issues.
Comput. Secur., 2020

2019
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2019

Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware.
IEEE Secur. Priv., 2019

Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks.
ACM Comput. Surv., 2019

On the effectiveness of system API-related information for Android ransomware detection.
Comput. Secur., 2019

PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Towards Robust Detection of Adversarial Infection Vectors: Lessons Learned in PDF Malware.
CoRR, 2018

R-PackDroid: Practical On-Device Detection of Android Ransomware.
CoRR, 2018

Explaining Black-box Android Malware Detection.
Proceedings of the 26th European Signal Processing Conference, 2018

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
Adversarial Detection of Flash Malware: Limitations and Open Issues.
CoRR, 2017

R-PackDroid: API package-based characterization and detection of mobile ransomware.
Proceedings of the Symposium on Applied Computing, 2017

Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API Analysis.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

2016
Design and implementation of robust systems for secure malware detection.
PhD thesis, 2016

AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack.
CoRR, 2016

Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Stealth attacks: An extended insight into the obfuscation effects on Android malware.
Comput. Secur., 2015

Clustering android malware families by http traffic.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

An Evasion Resilient Approach to the Detection of Malicious PDF Files.
Proceedings of the Information Systems Security and Privacy, 2015

A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files.
Proceedings of the ICISSP 2015, 2015

On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Security Evaluation of Support Vector Machines in Adversarial Environments.
CoRR, 2014

Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
Evasion Attacks against Machine Learning at Test Time.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013

Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
A Pattern Recognition System for Malicious PDF Files Detection.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2012


  Loading...