Name
Affiliation
Papers
DAVIDE BALZAROTTI
Institute Eurecom Sophia Antipolis, France
104
Collaborators
Citations 
PageRank 
163
2040
113.64
Referers 
Referees 
References 
4656
2312
1373
Search Limit
1001000
Title
Citations
PageRank
Year
When Sally Met Trackers: Web Tracking From the Users' Perspective00.342022
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships00.342022
How Machine Learning Is Solving the Binary Function Similarity Problem00.342022
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs00.342022
In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics00.342022
LibAFL: A Framework to Build Modular and Reusable Fuzzers00.342022
RE-Mind: a First Look Inside the Mind of a Reverse Engineer00.342022
Does Every Second Count? Time-Based Evolution Of Malware Behavior In Sandboxes10.352021
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization00.342021
When Malware Changed Its Mind - An Empirical Study of Variable Program Behaviors in the Real World.00.342021
Lost in the Loader - The Many Faces of the Windows PE File Format.10.352021
The evidence beyond the wall: Memory forensics in SGX environments00.342021
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem20.372020
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features50.472020
SoK: Cyber Insurance – Technical Challenges and a System Security Roadmap10.352020
Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web00.342020
The Tangled Genealogy of IoT Malware.30.392020
Introducing the Temporal Dimension to Memory Forensics.00.342019
Back To The Whiteboard: A Principled Approach For The Assessment And Design Of Memory Forensic Techniques00.342019
Toward The Analysis Of Embedded Firmware Through Automated Re-Hosting00.342019
BakingTimer: privacy analysis of server-side request processing time00.342019
Can I Opt Out Yet? - GDPR and the Global Illusion of Cookie Control.50.422019
Understanding Linux Malware50.452018
A Close Look at a Daily Dataset of Malware Samples.00.342018
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.20.352018
Clock Around the Clock: Time-Based Device Fingerprinting.40.402018
Deception Techniques in Computer Security: A Research Perspective.20.392018
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis.10.362018
A Lustrum of Malware Network Communication: Evolution and Insights120.592017
Attacks landscape in the dark side of the web.30.432017
Extension Breakdown: Security Analysis Of Browsers Extension Resources Control Policies70.512017
The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services.50.562017
Evaluation of Deception-Based Web Attacks Detection.00.342017
Micro-Virtualization Memory Tracing To Detect And Prevent Spraying Attacks00.342016
Google Dorks: Analysis, Creation, and New Defenses.30.422016
PhishEye: Live Monitoring of Sandboxed Phishing Kits.210.692016
Measuring the Role of Greylisting and Nolisting in Fighting Spam10.372016
Subverting Operating System Properties Through Evolutionary DKOM Attacks.50.472016
ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks.40.472016
Automatic Extraction of Indicators of Compromise for Web Applications.110.582016
RAMBO: Run-Time Packer Analysis with Multiple Branch Observation.10.352016
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence120.552015
Cutting the gordian knot: A look under the hood of ransomware attacks573.022015
PIE: Parser identification in embedded systems70.472015
The role of cloud services in malicious software: Trends and insights20.372015
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers300.902015
The impact of GPU-assisted malware on memory forensics10.372015
On the effectiveness of risk prediction based on users browsing behavior130.772014
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment90.532014
Optical Delusions: A Study of Malicious QR Codes in the Wild90.682014
  • 1
  • 2