Name
Affiliation
Papers
LORENZO CAVALLARO
Department of Computer Science, University of California at Santa Barbara, USA
54
Collaborators
Citations 
PageRank 
118
886
52.85
Referers 
Referees 
References 
2261
1554
883
Search Limit
1001000
Title
Citations
PageRank
Year
Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift00.342022
Dos and Don'ts of Machine Learning in Computer Security00.342022
INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion Detection30.372021
Investigating Labelless Drift Adaptation for Malware Detection10.352021
Probabilistic Naming of Functions in Stripped Binaries.00.342020
On The Dissection Of Evasive Malware00.342020
Intriguing Properties of Adversarial ML Attacks in the Problem Space90.572020
SoK - Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed).40.422019
Tesseract: Eliminating Experimental Bias In Malware Classification Across Space And Time10.372018
Session details: Session 8D: Binary Defenses 200.342018
Enabling Fair ML Evaluations for Security00.342018
Anomaly-based exploratory analysis and detection of exploits in android mediaserver.00.342018
Reprint of "You can't touch this: Consumer-centric android application repackaging detection".00.342018
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware.240.802017
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable.00.342017
Understanding Android app piggybacking.60.422017
Transcend: Detecting Concept Drift In Malware Classification Models90.442017
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting381.002017
Stack Object Protection with Low Fat Pointers.00.342017
POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection.00.342017
Modular Synthesis of Heap Exploits.00.342017
Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware.70.512017
The Evolution of Android Malware and Android Analysis Techniques.451.562017
You can't touch this: Consumer-centric android application repackaging detection.40.422016
Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection.60.422016
DroidScribe: Classifying Android Malware Based on Runtime Behavior290.852016
CopperDroid: Automatic Reconstruction of Android Malware Behaviors.00.342015
Conformal Clustering and Its Application to Botnet Traffic.10.432015
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications.110.512014
Phoenix: Dga-Based Botnet Tracking And Intelligence471.582014
Tracking and Characterizing Botnets Using Automatically Generated Domains.80.622013
Practical automated vulnerability monitoring using program state invariants50.392013
Peering Into The Muddy Waters Of Pastebin20.392012
When hardware meets software: a bulletproof solution to forensic memory acquisition150.582012
Memory errors: the past, the present, and the future471.762012
Taint-enhanced anomaly detection20.362011
Systems Security at VU University Amsterdam10.352011
Sandnet: network traffic analysis of malicious software422.272011
PAriCheck: an efficient pointer arithmetic checker for C programs431.402010
MINIX 3: Status report and current research00.342010
Take a deep breath: a stealthy, resilient and cost-effective botnet using skype130.632010
We crashed, now what?40.462010
Organizing large scale hacking competitions171.902010
Live and trustworthy forensic analysis of commodity production systems261.052010
Your botnet is my botnet: analysis of a botnet takeover25314.702009
Anomalous Taint Detection50.432008
LISABETH: automated content-based signature generator for zero-day polymorphic worms201.012008
On the Limits of Information Flow Techniques for Malware Analysis and Containment643.242008
A Parallel Architecture for Stateful, High-Speed Intrusion Detection100.702008
An Efficient Technique For Preventing Mimicry And Impossible Paths Execution Attacks80.532007
  • 1
  • 2