Giuseppe Petracca

According to our database1, Giuseppe Petracca authored at least 24 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage.
CoRR, 2023

2021
A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications.
IEEE Commun. Surv. Tutorials, 2021

PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems.
CoRR, 2020

2019
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs.
Proceedings of the 28th USENIX Security Symposium, 2019

IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Regulating Access to System Sensors in Cooperating Programs.
CoRR, 2018

A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications.
CoRR, 2018

2017
A framework for application partitioning using trusted execution environments.
Concurr. Comput. Pract. Exp., 2017

AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.
Proceedings of the 26th USENIX Security Symposium, 2017

On Risk in Access Control Enforcement.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

2016
Aware: Controlling App Access to I/O Devices on Mobile Platforms.
CoRR, 2016

Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices.
CoRR, 2016

Agility maneuvers to mitigate inference attacks on sensed location data.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Analysis of Trusted Execution Environment usage in Samsung KNOX.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Pileus: protecting user resources from vulnerable cloud services.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Situational awareness through reasoning on network incidents.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Inevitable Failure: The Flawed Trust Assumption in the Cloud.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

2013
Adaptive data protection in distributed systems.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012

Adaptive data management for self-protecting objects in cloud computing systems.
Proceedings of the 8th International Conference on Network and Service Management, 2012

ReasONets: a fuzzy-based approach for reasoning on network incidents.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...