"Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data" Cristalli Stefano,
Vignati Edoardo,
Bruschi Danilo, Lanzi Andrea
International Symposium on Research in Attacks, Intrusions, and Defenses (pp. 445-464). Springer, Cham.
2017
"Dissecting Tor Bridges: a Security Evaluation of their Private and Public Infrastructures"
Srdjan Matic, Carmela Troncoso, Juan Caballero
Proceedings of the Network and Distributed System Security Symposium, February 2017. To appear.
"Prometheus: Analyzing WebInject-based information stealers"
Andrea Continella, Michele Carminati, Mario Polino, Andrea Lanzi, Stefano Zanero, Federico Maggi
Journal of Computer Security, vol. Preprint, no. Preprint, pp. 1-21, 2017
2016
"A Security Game Model for Remote Software Protection"
Nicola Basilico, Andrea Lanzi, Mattia Monga
2016 11th International Conference on Availability, Reliability and Security (ARES)
"Subverting Operating System Properties Through Evolutionary DKOM Attacks"
Mariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti
Detection of Intrusions and Malware, and Vulnerability Assessment, 3-24
"Measuring the Role of Greylisting and Nolisting in Fighting Spam"
Fabio Pagani, Matteo De Astis, Mariano Graziano, Andrea Lanzi, Davide Balzarotti
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
"Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks" Stefano Cristalli,
Mattia Pagnozzi, Mariano Graziano, Andrea Lanzi, Davide Balzarotti
25th USENIX Security Symposium (USENIX Security 16)
2015
"Caronte: Detecting Location Leaks for Deanonymizing Tor Hidden Services"
Srdjan Matic, Platon Kotzias, Juan Caballero (CCS 2015) 22nd ACM Conference on Computer and Communications Security
"Certified PUP: Abuse in Authenticode Code Signing"
Platon Kotzias, Srdjan Matic, Richard Rivera, Juan Caballero (CCS 2015) 22nd ACM Conference on Computer and Communications Security
"Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence"
Graziano M, Canali D, Bilge L, Lanzi A, Balzarotti D. (USENIX 2015) 24th USENIX Security Symposium (USENIX Security 15)
"CopperDroid: Automatic Reconstruction of Android Malware Behaviors"
Kimberly Tam, Salahuddin J Khan, Aristide Fattori, Lorenzo Cavallaro (NDSS 2015) Proc. of the Symposium on Network and Distributed System Security (NDSS)
"Hypervisor-based malware protection with AccessMiner"
Aristide Fattori, Andrea Lanzi, Davide Balzarotti, Engin Kirda Journal of Computers & Security, 2015
2014
"Improving Mac OS X Security Through Gray Box Fuzzing Technique"
Stefano Bianchi Mazzone, Mattia Pagnozzi, Aristide Fattori, Alessandro Reina, Andrea Lanzi, Danilo Bruschi (EuroSec '14) Proceedings of the Seventh European Workshop on System Security, Amsterdam.
"On the Feasibility of Software Attacks on Commodity Virtual Machine Monitors via Direct Device Assignment"
Gábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon , Christoph Neumann (AsiaCCS '14) Proceedings of the 9th ACM symposium on Information, computer and communications security
PeerRush: Mining for Unwanted P2P Traffic
Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li (Journal of Information Security and Applications)
2013
"A methodology for testing cpu emulators"
Roberto Paleari, Lorenzo Martignoni, Alessandro Reina, Giampaolo Fresi Roglia, Danilo Bruschi ACM Transactions on Software Engineering and Methodology (TOSEM)
"A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors"
Alessandro Reina, Aristide Fattori, Lorenzo Cavallaro (EuroSec '13) Proceedings of the 6th European Workshop on System Security
"On the Privacy of Real-World Friend-Finder Services"
Aristide Fattori, Alessandro Reina, Andrea Gerino, Sergio Mascetti
(MDM '13) Proceedings of the 14th International Conference on Mobile Data Management
2010-2012
"When Hardware Meets Software: a Bulletproof Solution to Forensic Memory Acquisition"
Alessandro Reina, Aristide Fattori, Fabio Pagani, Lorenzo Cavallaro, Danilo Bruschi (ACSAC '12) Proceedings of the 28th Annual Computer Security Applications Conference
"Dynamic and transparent analysis of commodity production systems"
Aristide Fattori, Roberto Paleari, Lorenzo Martignoni, Mattia Monga (ASE '10) Proceedings of the 25th International Conference on Automated Software Engineering
"Live and Trustworthy Forensic Analysis of Commodity Production Systems"
Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro (RAID '10) In Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection
"Automatic Generation of Remediation Procedures for Malware Infections"
Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jon Giffin, Somesh Jha (USENIX '10) In Proceedings of the 19th USENIX Security Symposium
"Testing system virtual machines"
Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, Danilo Bruschi. (ISSTA 2010) In Proceedings of the 2010 International Symposium on Testing and Analysis (ISSTA)
"N-version disassembly: differential testing of x86 disassemblers"
Roberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, Danilo Bruschi (ISSTA '10) In Proceedings of the 2010 International Symposium on Testing and Analysis
"Conqueror: tamper-proof code execution on legacy systems"
Lorenzo Martignoni and Roberto Paleari and Danilo Bruschi (DIMVA 2010) Proceedings of the 7th Conference on Detection of Intrusions and Malware and Vulnerability Assessment
"Take a Deep Breath: a Stealthy, Resilient and Cost-Effective Botnet Using Skype"
Antonio Nappa, Aristide Fattori, Marco Balduzzi, Matteo Dell'Amico, Lorenzo Cavallaro (DIMVA 2010) Proceedings of the 7th Conference on Detection of Intrusions and Malware & Vulnerability Assessment
2007-2009
"Surgically returning to randomized lib(c)"
Giampaolo Fresi Roglia, Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi (ACSAC '09) Proceedings of the 25th Annual Computer Security Applications Conference
"A fistful of red-pills: how to automatically generate procedures to detect CPU emulators"
Roberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, Danilo Bruschi (WOOT '09) In Proceedings of the 3rd USENIX Workshop on Offensive Technologies
"Testing CPU emulators"
Lorenzo Martignoni and Roberto Paleari and Giampaolo Fresi Roglia and Danilo Bruschi (ISSTA'09) Proceedings of the 2009 International Conference on Software Testing and Analysis (ISSTA)
"How good are malware detectors at remediating infected systems?"
Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni (DIMVA '09) In Proceedings of the 6th Conference on Detection of Intrusions and Malware and Vulnerability Assessment
"Automatic Reverse Engineering of Malware Emulators"
Monirul Sharif, Andrea Lanzi, Jonathon Giffin, and Wenke Lee (Oakland '09)In Proceedings of The 2009 IEEE Symposium on Security and Privacy
"K-Tracer: A System for Extracting Kernel Malware Behavior"
Andrea Lanzi, Monirul Sharif and Wenke Lee (NDSS '08) In the Proceedings of the 16th Annual Network and Distributed System Security Symposium
"Impeding Malware Analysis Using Conditional Code Obfuscation"
Monirul Sharif, Andrea Lanzi, Jonathon Giffin and Wenke Lee (NDSS '08) In the Proceedings of the 15th Annual Network and Distributed System Security Symposium
"Fluxor: detecting and monitoring fast-flux service networks"
Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, Danilo Bruschi (DIMVA '08) Proceedings of the 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, DIMVA
"On race vulnerabilities in web applications"
Roberto Paleari, Davide Marrone, Danilo Bruschi and Mattia Monga (DIMVA '08) Proceedings of the 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, DIMVA
"On the Limits of Information Flow Techniques for Malware Analysis and Containment"
Lorenzo Cavallaro and Prateek Saxena and R. Sekar (DIMVA '08) Proceedings of the 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, DIMVA
"OmniUnpack: Fast, Generic, and Safe Unpacking of Malware"
Lorenzo Martignoni, Mihai Christodorescu, Somesh Jha (ACSAC '07) Proceedings of the 21st Annual Computer Security Applications Conference
"A smart fuzzer for x86 executables" Andrea Lanzi, Lorenzo Martignoni, Mattia Monga, Roberto Paleari (SESS '07) Proceedings of the 3rd International Workshop on Software Engineering for Secure Systems