Davide Balzarotti
Davide Balzarotti
Professor, Eurecom
Adresse e-mail validée de eurecom.fr - Page d'accueil
Titre
Citée par
Citée par
Année
All your contacts are belong to us: automated identity theft attacks on social networks
L Bilge, T Strufe, D Balzarotti, E Kirda
Proceedings of the 18th international conference on World wide web, 551-560, 2009
6762009
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008
4562008
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks
A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2015
3432015
A large-scale analysis of the security of embedded firmwares
A Costin, J Zaddach, A Francillon, D Balzarotti
23rd {USENIX} Security Symposium ({USENIX} Security 14), 95-110, 2014
3162014
G-Free: defeating return-oriented programming through gadget-less binaries
K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda
Proceedings of the 26th Annual Computer Security Applications Conference, 49-58, 2010
3162010
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
2592012
A view on current malware behaviors
U Bayer, I Habibi, D Balzarotti, E Kirda, C Kruegel
Proceedings of the 2nd USENIX conference on Large-scale exploits and …, 2009
245*2009
Testing network-based intrusion detection signatures using mutant exploits
G Vigna, W Robertson, D Balzarotti
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2442004
Efficient Detection of Split Personalities in Malware.
D Balzarotti, M Cova, C Karlberger, E Kirda, C Kruegel, G Vigna
NDSS, 2010
2322010
Swaddler: An approach for the anomaly-based detection of state violations in web applications
M Cova, D Balzarotti, V Felmetsger, G Vigna
International Workshop on Recent Advances in Intrusion Detection, 63-86, 2007
2062007
Exposure: A passive dns analysis service to detect and report malicious domains
L Bilge, S Sen, D Balzarotti, E Kirda, C Kruegel
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-28, 2014
2052014
Abusing social networks for automated user profiling
M Balduzzi, C Platzer, T Holz, E Kirda, D Balzarotti, C Kruegel
Recent Advances in Intrusion Detection, 422-441, 2010
2042010
Accessminer: using system-centric models for malware protection
A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2012010
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
J Zaddach, L Bruno, A Francillon, D Balzarotti
NDSS 14, 1-16, 2014
1842014
A security analysis of amazon's elastic compute cloud service
M Balduzzi, J Zaddach, D Balzarotti, E Kirda, S Loureiro
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 1427-1434, 2012
1572012
Reverse social engineering attacks in online social networks
D Irani, M Balduzzi, D Balzarotti, E Kirda, C Pu
International conference on detection of intrusions and malware, and …, 2011
1512011
Multi-module vulnerability analysis of web-based applications
D Balzarotti, M Cova, VV Felmetsger, G Vigna
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1442007
A quantitative study of accuracy in system call-based malware detection
D Canali, A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
1412012
Clearshot: Eavesdropping on keyboard input from video
D Balzarotti, M Cova, G Vigna
2008 IEEE Symposium on Security and Privacy (sp 2008), 170-183, 2008
1322008
A solution for the automated detection of clickjacking attacks
M Balduzzi, M Egele, E Kirda, D Balzarotti, C Kruegel
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1062010
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20