A simple pre-factor for contaminant biodegradation potential and its application to pesticides risk assessment | 0 | 0.34 | 2020 |
Detecting Insecure Code Patterns in Industrial Robot Programs | 0 | 0.34 | 2020 |
Influential sources of uncertainty in glyphosate biochemical degradation in soil | 0 | 0.34 | 2020 |
Security of controlled manufacturing systems in the connected factory: the case of industrial robots | 1 | 0.37 | 2019 |
BRTSim, a general-purpose computational solver for hydrological, biogeochemical, and ecosystem dynamics. | 0 | 0.34 | 2019 |
Security Evaluation of a Banking Fraud Analysis System. | 0 | 0.34 | 2018 |
Investigating Web Defacement Campaigns at Large. | 1 | 0.39 | 2018 |
Fraudbuster: Temporal Analysis And Detection Of Advanced Financial Frauds | 0 | 0.34 | 2018 |
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks. | 5 | 0.54 | 2017 |
An Experimental Security Analysis of an Industrial Robot Controller | 10 | 0.80 | 2017 |
fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations. | 0 | 0.34 | 2017 |
Prometheus: Analyzing WebInject-based information stealers. | 3 | 0.41 | 2017 |
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing. | 0 | 0.34 | 2017 |
Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks | 1 | 0.39 | 2017 |
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery. | 0 | 0.34 | 2017 |
On the Privacy and Security of the Ultrasound Ecosystem. | 3 | 0.48 | 2017 |
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology. | 5 | 0.45 | 2017 |
ShieldFS: a self-healing, ransomware-aware filesystem. | 31 | 1.53 | 2016 |
DroydSeuss: A Mobile Banking Trojan Tracker (Short Paper). | 0 | 0.34 | 2016 |
On-chip system call tracing: A feasibility study and open prototype. | 0 | 0.34 | 2016 |
GreatEatlon: Fast, Static Detection of Mobile Ransomware. | 0 | 0.34 | 2016 |
Xss Peeker: Dissecting The Xss Exploitation Techniques And Fuzzing Mechanisms Of Blackbox Web Application Scanners | 1 | 0.35 | 2016 |
BankSealer: A decision support system for online banking fraud analysis and investigation | 7 | 0.51 | 2015 |
Scalable Testing of Mobile Antivirus Applications | 1 | 0.35 | 2015 |
Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software | 4 | 0.40 | 2015 |
HelDroid: Dissecting and Detecting Mobile Ransomware. | 37 | 2.34 | 2015 |
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications | 6 | 0.41 | 2015 |
Face/Off: Preventing Privacy Leakage From Photos in Social Networks | 24 | 0.76 | 2015 |
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries | 5 | 0.41 | 2015 |
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication | 7 | 0.47 | 2014 |
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications. | 11 | 0.51 | 2014 |
Black-box forensic and antiforensic characteristics of solid-state drives. | 0 | 0.34 | 2014 |
Stranger danger: exploring the ecosystem of ad-based URL shortening services | 16 | 0.83 | 2014 |
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned | 0 | 0.34 | 2014 |
A Practical Attack Against a KNX-based Building Automation System | 1 | 0.36 | 2014 |
Phoenix: Dga-Based Botnet Tracking And Intelligence | 47 | 1.58 | 2014 |
Andradar: Fast Discovery Of Android Applications In Alternative Markets | 22 | 0.92 | 2014 |
BitIodine: Extracting Intelligence from the Bitcoin Network. | 18 | 1.47 | 2014 |
Two years of short URLs internet measurement: security threats and countermeasures | 23 | 1.11 | 2013 |
Tracking and Characterizing Botnets Using Automatically Generated Domains. | 8 | 0.62 | 2013 |
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth. | 2 | 0.37 | 2013 |
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives | 3 | 0.44 | 2013 |
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors | 22 | 1.02 | 2013 |
Lines of malicious code: insights into the malicious software industry | 19 | 0.70 | 2012 |
All your face are belong to us: breaking Facebook's social authentication | 15 | 0.79 | 2012 |
A social-engineering-centric data collection initiative to study phishing | 1 | 0.36 | 2011 |
Finding non-trivial malware naming inconsistencies | 16 | 1.03 | 2011 |
BURN: baring unknown rogue networks. | 7 | 0.47 | 2011 |
Systems Security Research at Politecnico di Milano | 0 | 0.34 | 2011 |
Poster: fast, automatic iPhone shoulder surfing | 6 | 0.72 | 2011 |