Yanick Fratantonio

According to our database1, Yanick Fratantonio authored at least 39 papers between 2011 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
Proceedings of the 31st USENIX Security Symposium, 2022

How Machine Learning Is Solving the Binary Function Similarity Problem.
Proceedings of the 31st USENIX Security Symposium, 2022

RE-Mind: a First Look Inside the Mind of a Reverse Engineer.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Lost in the Loader: The Many Faces of the Windows PE File Format.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Preventing and Detecting State Inference Attacks on Android.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Proceedings of the Checkmate@CCS 2021, 2021

2020
Towards HTTPS Everywhere on Android: We Are Not There Yet.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
Exploring Syscall-Based Semantics Reconstruction of Android Applications.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Toward the Analysis of Embedded Firmware through Automated Re-hosting.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

2018
Understanding Linux Malware.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Broken Fingers: On the Usage of the Fingerprint API in Android.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Phishing Attacks on Modern Android.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
On the Privacy and Security of the Ultrasound Ecosystem.
Proc. Priv. Enhancing Technol., 2017

BootStomp: On the Security of Bootloaders in Mobile Devices.
Proceedings of the 26th USENIX Security Symposium, 2017

Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
TriggerScope: Towards Detecting Logic Bombs in Android Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

RETracer: triaging crashes by reverse execution from partial memory dumps.
Proceedings of the 38th International Conference on Software Engineering, 2016

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
What the App is That? Deception and Countermeasures in the Android User Interface.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

CLAPP: characterizing loops in Android applications (invited talk).
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015

CLAPP: characterizing loops in Android applications.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

BareDroid: Large-Scale Analysis of Android Apps on Real Devices.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Ten Years of iCTF: The Good, The Bad, and The Ugly.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

ANDRUBIS - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
An empirical study of cryptographic misuse in android applications.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011


  Loading...