Name
Affiliation
Papers
GIOVANNI VIGNA
Politecnico di Milano, Milan, Italy
229
Collaborators
Citations 
PageRank 
316
7121
507.72
Referers 
Referees 
References 
11527
3890
2903
Search Limit
1001000
Title
Citations
PageRank
Year
DECOMPERSON: How Humans Decompile and What We Can Learn From It00.342022
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships00.342022
Regulator: Dynamic Analysis to Detect ReDoS00.342022
Toward a secure crowdsourced location tracking system10.402021
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses00.342021
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware00.342021
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?00.342020
On the Security of Application Installers and Online Software Repositories.00.342020
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features50.472020
SYMBION: Interleaving Symbolic with Concrete Execution00.342020
Exploring Abstraction Functions in Fuzzing00.342020
SPIDER: Enabling Fast Patch Propagation In Related Software Repositories10.352020
Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis00.342019
Toward The Analysis Of Embedded Firmware Through Automated Re-Hosting00.342019
BootKeeper - Validating Software Integrity Properties on Boot Firmware Images.00.342019
Mechanical Phish: Resilient Autonomous Hacking.20.392018
Measuring E-mail header injections on the world wide web.20.372018
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.140.912018
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones20.392018
Detecting Deceptive Reviews Using Generative Adversarial Networks40.382018
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.90.482017
Demystifying DDoS as a Service.00.342017
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games00.342017
POISED: Spotting Twitter Spam Off the Beaten Paths.70.452017
Dr. Checker: A Soundy Analysis For Linux Kernel Drivers10.352017
Piston: Uncooperative Remote Runtime Patching.10.392017
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis.641.822016
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.240.732016
BareDroid: Large-Scale Analysis of Android Apps on Real Devices220.712015
Towards Detecting Compromised Accounts on Social Networks.240.812015
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users60.412015
Meerkat: detecting website defacements through image-based object recognition70.602015
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android140.582015
Framing Dependencies Introduced by Underground Commoditization.10.352015
What the App is That? Deception and Countermeasures in the Android User Interface441.402015
Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines60.442014
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.30.412014
Ten Years of iCTF: The Good, The Bad, and The Ugly.151.392014
Extracting probable command and control signatures for detecting botnets120.702014
Rippler: Delay injection for service dependency detection80.522014
Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection.30.382014
Stranger danger: exploring the ecosystem of ad-based URL shortening services160.832014
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting1124.532013
Formulating Cyber-Security as Convex Optimization Problems20.652013
Two years of short URLs internet measurement: security threats and countermeasures231.112013
Message in a bottle: sailing past censorship150.662013
COMPA: Detecting Compromised Accounts on Social Networks.231.002013
Shady paths: leveraging surfing crowds to detect malicious web pages431.312013
Steal this movie - automatically bypassing DRM protection in streaming media services90.572013
PUBCRAWL: protecting users and businesses from CRAWLers130.662012
  • 1
  • 2