Lorenzo Cavallaro

Orcid: 0000-0002-3878-2680

Affiliations:
  • University College London, UK


According to our database1, Lorenzo Cavallaro authored at least 77 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
How to Train your Antivirus: RL-based Hardening through the Problem-Space.
CoRR, 2024

Unraveling the Key of Machine Learning Solutions for Android Malware Detection.
CoRR, 2024

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version).
CoRR, 2024

2023
Are Machine Learning Models for Malware Detection Ready for Prime Time?
IEEE Secur. Priv., 2023

Lessons Learned on Machine Learning for Computer Security.
IEEE Secur. Priv., 2023

Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses.
CoRR, 2023

Symmetry-Preserving Program Representations for Learning Code Semantics.
CoRR, 2023

Do you still need a manual smart contract audit?
CoRR, 2023

Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

ROPfuscator: Robust Obfuscation with ROP.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Is It Overkill? Analyzing Feature-Space Concept Drift in Malware Detectors.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Locate and Verify: A Two-Stream Network for Improved Deepfake Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Cross-Modal and Multi-Attribute Face Recognition: A Benchmark.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Poster: RPAL-Recovering Malware Classifiers from Data Poisoning using Active Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Drift Forensics of Malware Classifiers.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
Dos and Don'ts of Machine Learning in Computer Security.
Proceedings of the 31st USENIX Security Symposium, 2022

Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Designing a Provenance Analysis for SGX Enclaves.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
User-Centered Design and Development of the Modular TWIN Lower Limb Exoskeleton.
Frontiers Neurorobotics, 2021

Universal Adversarial Perturbations for Malware.
CoRR, 2021

Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets.
CoRR, 2021

Investigating Labelless Drift Adaptation for Malware Detection.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion Detection.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

2020
On the Dissection of Evasive Malware.
IEEE Trans. Inf. Forensics Secur., 2020

Intertwining ROP Gadgets and Opaque Predicates for Robust Obfuscation.
CoRR, 2020

Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation.
CoRR, 2020

Intriguing Properties of Adversarial ML Attacks in the Problem Space.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Probabilistic Naming of Functions in Stripped Binaries.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists.
CoRR, 2019

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time.
Proceedings of the 28th USENIX Security Symposium, 2019

SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed).
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Anomaly-based exploratory analysis and detection of exploits in android mediaserver.
IET Inf. Secur., 2018

Reprint of "You can't touch this: Consumer-centric android application repackaging detection".
Future Gener. Comput. Syst., 2018

BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Enabling Fair ML Evaluations for Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting.
IEEE Trans. Inf. Forensics Secur., 2017

The Evolution of Android Malware and Android Analysis Techniques.
ACM Comput. Surv., 2017

Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Transcend: Detecting Concept Drift in Malware Classification Models.
Proceedings of the 26th USENIX Security Symposium, 2017

Stack Bounds Protection with Low Fat Pointers.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

Understanding Android app piggybacking.
Proceedings of the 39th International Conference on Software Engineering, 2017

DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Modular Synthesis of Heap Exploits.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

2016
You can't touch this: Consumer-centric android application repackaging detection.
Future Gener. Comput. Syst., 2016

DroidScribe: Classifying Android Malware Based on Runtime Behavior.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

2015
Conformal Clustering and Its Application to Botnet Traffic.
Proceedings of the Statistical Learning and Data Sciences - Third International Symposium, 2015

CopperDroid: Automatic Reconstruction of Android Malware Behaviors.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications.
CoRR, 2014

Phoenix: DGA-Based Botnet Tracking and Intelligence.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

2013
Tracking and Characterizing Botnets Using Automatically Generated Domains.
CoRR, 2013

Practical automated vulnerability monitoring using program state invariants.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Peering into the Muddy Waters of Pastebin.
ERCIM News, 2012

Memory Errors: The Past, the Present, and the Future.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

When hardware meets software: a bulletproof solution to forensic memory acquisition.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Taint-Enhanced Anomaly Detection.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Systems Security at VU University Amsterdam.
Proceedings of the First SysSec Workshop 2011, 2011

Sandnet: network traffic analysis of malicious software.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
MINIX 3: Status Report and Current Research.
login Usenix Mag., 2010

Live and Trustworthy Forensic Analysis of Commodity Production Systems.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

We Crashed, Now What?
Proceedings of the Sixth Workshop on Hot Topics in System Dependability, 2010

Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype.
Proceedings of the Detection of Intrusions and Malware, 2010

Organizing Large Scale Hacking Competitions.
Proceedings of the Detection of Intrusions and Malware, 2010

PAriCheck: an efficient pointer arithmetic checker for C programs.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Your botnet is my botnet: analysis of a botnet takeover.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Anomalous Taint Detection.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

LISABETH: automated content-based signature generator for zero-day polymorphic worms.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008

A Parallel Architecture for Stateful, High-Speed Intrusion Detection.
Proceedings of the Information Systems Security, 4th International Conference, 2008

On the Limits of Information Flow Techniques for Malware Analysis and Containment.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
Diversified Process Replicæ for Defeating Memory Error Exploits.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks.
Proceedings of the Detection of Intrusions and Malware, 2007

2005
Replay Attack in TCG Specification and Solution.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2000
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000


  Loading...