Leonardo Regano

Orcid: 0000-0002-9259-5157

According to our database1, Leonardo Regano authored at least 23 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Automatic Selection of Protections to Mitigate Risks Against Software Applications.
CoRR, June, 2025

On the Feasibility of Android Stegomalware: A Detection Study.
Proceedings of the Joint National Conference on Cybersecurity (ITASEC & SERICS 2025), 2025

Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data Sets.
Proceedings of the Joint National Conference on Cybersecurity (ITASEC & SERICS 2025), 2025

Analysis and Detection of Android Stegomalware: the Impact of the Loading Stage.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2025

2024
Security at the Edge for Resource-Limited IoT Devices.
Sensors, January, 2024

Exploring the Robustness of AI-Driven Tools in Digital Forensics: A Preliminary Study.
CoRR, 2024

Automated Intel SGX Integration for Enhanced Application Security.
IEEE Access, 2024

A Privacy-Preserving Approach for Vulnerability Scanning Detection.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

2023
Design, implementation, and automation of a risk management approach for man-at-the-End software protection.
Comput. Secur., September, 2023

A Model for Automated Cybersecurity Threat Remediation and Sharing.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

2022
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection.
Comput. Electr. Eng., 2022

A model of capabilities of Network Security Functions.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

Computer-Aided Reverse Engineering of Protected Software.
Proceedings of the Digital Sovereignty in Cyber Security: New Challenges in Future Vision, 2022

2020
Empirical assessment of the effort needed to attack programs protected with client/server code splitting.
Empir. Softw. Eng., 2020

Software Protection as a Risk Analysis Process.
CoRR, 2020

Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning.
IEEE Access, 2020

2019
An Expert System for Automatic Software Protection.
PhD thesis, 2019

A meta-model for software protections and reverse engineering attacks.
J. Syst. Softw., 2019

2017
Ethical issues of ISPs in the modern web.
CoRR, 2017

Estimating Software Obfuscation Potency with Artificial Neural Networks.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Towards Optimally Hiding Protected Assets in Software Applications.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
Towards Automatic Risk Analysis and Mitigation of Software Applications.
Proceedings of the Information Security Theory and Practice, 2016

Assessment of Source Code Obfuscation Techniques.
Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, 2016


  Loading...