Marco Cova

According to our database1, Marco Cova authored at least 31 papers between 2005 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2014
Command & Control: Understanding, Denying and Detecting.
CoRR, 2014

2013
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
EvilSeed: A Guided Approach to Finding Malicious Web Pages.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent.
Proceedings of the Security and Privacy in Communication Networks, 2012

2011
Analysis of a Botnet Takeover.
IEEE Secur. Priv., 2011

Prophiler: a fast filter for the large-scale detection of malicious web pages.
Proceedings of the 20th International Conference on World Wide Web, 2011

Peering through the iframe.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Escape from Monkey Island: Evading High-Interaction Honeyclients.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

System Security Research at Birmingham: Current Status and Some Future Work.
Proceedings of the First SysSec Workshop 2011, 2011

HARMUR: storing and analyzing historic data on malicious domains.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
An Experience in Testing the Security of Real-World Electronic Voting Systems.
IEEE Trans. Software Eng., 2010

Detection and analysis of drive-by-download attacks and malicious JavaScript code.
Proceedings of the 19th International Conference on World Wide Web, 2010

An Analysis of Rogue AV Campaigns.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Efficient Detection of Split Personalities in Malware.
Proceedings of the Network and Distributed System Security Symposium, 2010

Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners.
Proceedings of the Detection of Intrusions and Malware, 2010

Organizing Large Scale Hacking Competitions.
Proceedings of the Detection of Intrusions and Malware, 2010

2009
Your botnet is my botnet: analysis of a botnet takeover.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Analyzing and Detecting Malicious Flash Advertisements.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits.
Proceedings of the 2nd USENIX Workshop on Offensive Technologies, 2008

Symbolic String Verification: An Automata-Based Approach.
Proceedings of the Model Checking Software, 2008

ClearShot: Eavesdropping on Keyboard Input from Video.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Are your votes <i>really</i> counted?: testing the security of real-world electronic voting systems.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008

2007
Vulnerability Analysis of Web-based Applications.
Proceedings of the Test and Analysis of Web Services, 2007

Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Multi-module vulnerability analysis of web-based applications.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr.
Proceedings of the Information Security, 9th International Conference, 2006

Static Detection of Vulnerabilities in x86 Executables.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Shared lexicon for distributed annotations on the Web.
Proceedings of the 14th international conference on World Wide Web, 2005

Language Games: Solving the Vocabulary Problem in Multi-Case-Base Reasoning.
Proceedings of the Case-Based Reasoning, 2005


  Loading...