CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks | 0 | 0.34 | 2022 |
Quantum algorithms for SVD-based data representation and analysis | 0 | 0.34 | 2022 |
Apícula: Static detection of API calls in generic streams of bytes | 0 | 0.34 | 2022 |
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network | 3 | 0.40 | 2021 |
SyML - Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning. | 0 | 0.34 | 2021 |
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems. | 5 | 0.41 | 2020 |
Detecting Insecure Code Patterns in Industrial Robot Programs | 0 | 0.34 | 2020 |
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis | 0 | 0.34 | 2019 |
Security of controlled manufacturing systems in the connected factory: the case of industrial robots | 1 | 0.37 | 2019 |
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network | 1 | 0.38 | 2019 |
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots | 1 | 0.36 | 2019 |
Security Evaluation of a Banking Fraud Analysis System. | 0 | 0.34 | 2018 |
Extended Abstract: Toward Systematically Exploring Antivirus Engines | 0 | 0.34 | 2018 |
Elisa: Eliciting Isa Of Raw Binaries For Fine-Grained Code And Data Separation | 2 | 0.36 | 2018 |
Fraudbuster: Temporal Analysis And Detection Of Advanced Financial Frauds | 0 | 0.34 | 2018 |
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks. | 5 | 0.54 | 2017 |
Cyber-Physical Systems. | 0 | 0.34 | 2017 |
An Experimental Security Analysis of an Industrial Robot Controller | 10 | 0.80 | 2017 |
Prometheus: Analyzing WebInject-based information stealers. | 3 | 0.41 | 2017 |
ShieldFS: a self-healing, ransomware-aware filesystem. | 31 | 1.53 | 2016 |
On-chip system call tracing: A feasibility study and open prototype. | 0 | 0.34 | 2016 |
GreatEatlon: Fast, Static Detection of Mobile Ransomware. | 0 | 0.34 | 2016 |
Xss Peeker: Dissecting The Xss Exploitation Techniques And Fuzzing Mechanisms Of Blackbox Web Application Scanners | 1 | 0.35 | 2016 |
BankSealer: A decision support system for online banking fraud analysis and investigation | 7 | 0.51 | 2015 |
Scalable Testing of Mobile Antivirus Applications | 1 | 0.35 | 2015 |
HelDroid: Dissecting and Detecting Mobile Ransomware. | 37 | 2.34 | 2015 |
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications | 6 | 0.41 | 2015 |
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries | 5 | 0.41 | 2015 |
European Cyber-Security Research and Innovation. | 0 | 0.34 | 2015 |
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of "Crypto Wars" in Security Research. | 0 | 0.34 | 2014 |
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication | 7 | 0.47 | 2014 |
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications. | 11 | 0.51 | 2014 |
XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners. | 0 | 0.34 | 2014 |
Black-box forensic and antiforensic characteristics of solid-state drives. | 0 | 0.34 | 2014 |
Stranger danger: exploring the ecosystem of ad-based URL shortening services | 16 | 0.83 | 2014 |
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned | 0 | 0.34 | 2014 |
ZARATHUSTRA: Extracting Webinject signatures from banking trojans | 3 | 0.42 | 2014 |
A Practical Attack Against a KNX-based Building Automation System | 1 | 0.36 | 2014 |
Phoenix: Dga-Based Botnet Tracking And Intelligence | 47 | 1.58 | 2014 |
Andradar: Fast Discovery Of Android Applications In Alternative Markets | 22 | 0.92 | 2014 |
BitIodine: Extracting Intelligence from the Bitcoin Network. | 18 | 1.47 | 2014 |
Two years of short URLs internet measurement: security threats and countermeasures | 23 | 1.11 | 2013 |
Tracking and Characterizing Botnets Using Automatically Generated Domains. | 8 | 0.62 | 2013 |
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth. | 2 | 0.37 | 2013 |
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives | 3 | 0.44 | 2013 |
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors | 22 | 1.02 | 2013 |
Context-Based File Block Classification. | 4 | 0.38 | 2012 |
Lines of malicious code: insights into the malicious software industry | 19 | 0.70 | 2012 |
All your face are belong to us: breaking Facebook's social authentication | 15 | 0.79 | 2012 |
I-Code: Real-Time Malicious Code Identification | 0 | 0.34 | 2012 |