Name
Affiliation
Papers
YANICK FRATANTONIO
Politecnico di Milano, Italy
33
Collaborators
Citations 
PageRank 
74
638
27.12
Referers 
Referees 
References 
1681
782
380
Search Limit
1001000
Title
Citations
PageRank
Year
RE-Mind: a First Look Inside the Mind of a Reverse Engineer00.342022
On The Insecurity Of Sms One-Time Password Messages Against Local Attackers In Modern Mobile Devices10.372021
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization00.342021
Preventing And Detecting State Inference Attacks On Android10.352021
Tarnhelm - Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.10.352021
Toward The Analysis Of Embedded Firmware Through Automated Re-Hosting00.342019
Exploring Syscall-Based Semantics Reconstruction Of Android Applications00.342019
Understanding Linux Malware50.452018
Phishing Attacks on Modern Android.20.362018
Broken Fingers: On the Usage of the Fingerprint API in Android.20.362018
Guardion: Practical Mitigation Of Dma-Based Rowhammer Attacks On Arm140.532018
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.90.482017
Bootstomp: On The Security Of Bootloaders In Mobile Devices40.512017
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop140.582017
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.10.352017
On the Privacy and Security of the Ultrasound Ecosystem.30.482017
RETracer: triaging crashes by reverse execution from partial memory dumps.120.492016
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.240.732016
TriggerScope: Towards Detecting Logic Bombs in Android Applications290.802016
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.712.022016
BareDroid: Large-Scale Analysis of Android Apps on Real Devices220.712015
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users60.412015
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android140.582015
What the App is That? Deception and Countermeasures in the Android User Interface441.402015
CLAPP: characterizing loops in Android applications (invited talk)00.342015
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications60.412015
CLAPP: characterizing loops in Android applications110.572015
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.581.342015
Ten Years of iCTF: The Good, The Bad, and The Ugly.151.392014
ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors110.762014
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.1042.992014
An empirical study of cryptographic misuse in android applications1475.152013
Shellzer: a tool for the dynamic analysis of malicious shellcode70.502011