Name
Affiliation
Papers
ANDREA LANZI
Eurecom, Biot, France
41
Collaborators
Citations 
PageRank 
81
845
40.99
Referers 
Referees 
References 
2031
1105
547
Search Limit
1001000
Title
Citations
PageRank
Year
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks00.342021
POW-HOW: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes00.342021
Editorial: Advanced Techniques for Memory Forensics Analysis.00.342020
Towards a Theory of Special-Purpose Program Obfuscation00.342020
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework00.342019
BootKeeper - Validating Software Integrity Properties on Boot Firmware Images.00.342019
Detecting (absent) app-to-app authentication on cross-device short-distance channels00.342019
Security Evaluation of a Banking Fraud Analysis System.00.342018
Epic: A Methodology For Evaluating Privacy Violation Risk In Cybersecurity Systems00.342018
The Privacy Implications of Cyber Security Systems: A Technological Survey.70.462018
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android.00.342018
Prometheus: Analyzing WebInject-based information stealers.30.412017
Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study -.00.342017
Scholarly Digital Libraries as a Platform for Malware Distribution.00.342017
A Security Game Model for Remote Software Protection00.342016
Micro-Virtualization Memory Tracing To Detect And Prevent Spraying Attacks00.342016
Measuring the Role of Greylisting and Nolisting in Fighting Spam10.372016
Subverting Operating System Properties Through Evolutionary DKOM Attacks.50.472016
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence120.552015
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment90.532014
Improving Mac OS X security through gray box fuzzing technique10.632014
Hypervisor Memory Forensics30.412013
PeerRush: Mining for unwanted P2P traffic.200.902013
A quantitative study of accuracy in system call-based malware detection531.502012
Thwarting real-time dynamic unpacking20.412011
Operating system interface obfuscation and the revealing of hidden operations110.592011
AccessMiner: using system-centric models for malware protection712.612010
G-Free: defeating return-oriented programming through gadget-less binaries1083.982010
K-Tracer: A System for Extracting Kernel Malware Behavior562.292009
Automatic Reverse Engineering of Malware Emulators872.952009
Secure in-VM monitoring using hardware virtualization1314.402009
Impeding Malware Analysis Using Conditional Code Obfuscation912.662008
System Call API Obfuscation (Extended Abstract)80.512008
LISABETH: automated content-based signature generator for zero-day polymorphic worms201.012008
Classification of packed executables for accurate computer virus detection683.132008
An Efficient Technique For Preventing Mimicry And Impossible Paths Execution Attacks80.532007
Diversified Process Replicae For Defeating Memory Error Exploits301.412007
A Smart Fuzzer for x86 Executables131.082007
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks10.352007
A protocol for anonymous and accurate e-polling40.852005
Replay Attack in TCG Specification and Solution221.282005