Mariano Graziano

Orcid: 0009-0000-8842-9300

According to our database1, Mariano Graziano authored at least 18 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Uncovering the Role of Support Infrastructure in Clickbait PDF Campaigns.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
A Large-Scale Study of Phishing PDF Documents.
CoRR, 2023

From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
How Machine Learning Is Solving the Binary Function Similarity Problem.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
The evidence beyond the wall: Memory forensics in SGX environments.
Digit. Investig., 2021

Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Lost in the Loader: The Many Faces of the Windows PE File Format.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

SnakeGX: A Sneaky Attack Against SGX Enclaves.
Proceedings of the Applied Cryptography and Network Security, 2021

2019
A Close Look at a Daily Dataset of Malware Samples.
ACM Trans. Priv. Secur., 2019

2018
Understanding Linux Malware.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2016
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.
Proceedings of the 25th USENIX Security Symposium, 2016

Measuring the Role of Greylisting and Nolisting in Fighting Spam.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Subverting Operating System Properties Through Evolutionary DKOM Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
Through the Looking-Glass, and What Eve Found There.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

2013
Hypervisor Memory Forensics.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
Towards network containment in malware analysis systems.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012


  Loading...