Lorenzo Cavallaro

According to our database1, Lorenzo Cavallaro authored at least 41 papers between 2000 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Anomaly-based exploratory analysis and detection of exploits in android mediaserver.
IET Information Security, 2018

Reprint of "You can't touch this: Consumer-centric android application repackaging detection".
Future Generation Comp. Syst., 2018

BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2017
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting.
IEEE Trans. Information Forensics and Security, 2017

The Evolution of Android Malware and Android Analysis Techniques.
ACM Comput. Surv., 2017

Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Transcend: Detecting Concept Drift in Malware Classification Models.
Proceedings of the 26th USENIX Security Symposium, 2017

Stack Bounds Protection with Low Fat Pointers.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

Understanding Android app piggybacking.
Proceedings of the 39th International Conference on Software Engineering, 2017

DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

Modular Synthesis of Heap Exploits.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

2016
You can't touch this: Consumer-centric android application repackaging detection.
Future Generation Comp. Syst., 2016

DroidScribe: Classifying Android Malware Based on Runtime Behavior.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

2015
Conformal Clustering and Its Application to Botnet Traffic.
Proceedings of the Statistical Learning and Data Sciences - Third International Symposium, 2015

CopperDroid: Automatic Reconstruction of Android Malware Behaviors.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Phoenix: DGA-Based Botnet Tracking and Intelligence.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

2013
Practical automated vulnerability monitoring using program state invariants.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Peering into the Muddy Waters of Pastebin.
ERCIM News, 2012

Memory Errors: The Past, the Present, and the Future.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

When hardware meets software: a bulletproof solution to forensic memory acquisition.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Taint-Enhanced Anomaly Detection.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Sandnet: network traffic analysis of malicious software.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
MINIX 3: Status Report and Current Research.
;login:, 2010

Live and Trustworthy Forensic Analysis of Commodity Production Systems.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

We Crashed, Now What?
Proceedings of the Sixth Workshop on Hot Topics in System Dependability, 2010

Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype.
Proceedings of the Detection of Intrusions and Malware, 2010

Organizing Large Scale Hacking Competitions.
Proceedings of the Detection of Intrusions and Malware, 2010

PAriCheck: an efficient pointer arithmetic checker for C programs.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Your botnet is my botnet: analysis of a botnet takeover.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Anomalous Taint Detection.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

LISABETH: automated content-based signature generator for zero-day polymorphic worms.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008

A Parallel Architecture for Stateful, High-Speed Intrusion Detection.
Proceedings of the Information Systems Security, 4th International Conference, 2008

On the Limits of Information Flow Techniques for Malware Analysis and Containment.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
Diversified Process Replicæ for Defeating Memory Error Exploits.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks.
Proceedings of the Detection of Intrusions and Malware, 2007

2005
Replay Attack in TCG Specification and Solution.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2000
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000


  Loading...