Suivre
Ludovico Cavedon
Ludovico Cavedon
Adresse e-mail validée de cs.ucsb.edu
Titre
Citée par
Citée par
Année
Toward automated detection of logic vulnerabilities in web applications
V Felmetsger, L Cavedon, C Kruegel, G Vigna
19th USENIX Security Symposium (USENIX Security 10), 2010
2562010
Enemy of the State: A {State-Aware}{Black-Box} Web Vulnerability Scanner
A Doupé, L Cavedon, C Kruegel, G Vigna
21st USENIX Security Symposium (USENIX Security 12), 523-538, 2012
2222012
Organizing large scale hacking competitions
N Childers, B Boe, L Cavallaro, L Cavedon, M Cova, M Egele, G Vigna
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010
682010
Hit'em where it hurts: a live security exercise on cyber situational awareness
A Doupé, M Egele, B Caillat, G Stringhini, G Yakin, A Zand, L Cavedon, ...
Proceedings of the 27th Annual Computer Security Applications Conference, 51-61, 2011
632011
Methods and systems for reciprocal generation of watch-lists and malware signatures
C Kolbitsch, PM Comparetti, L Cavedon
US Patent 8,910,285, 2014
262014
Methods and systems for malware detection based on environment-dependent behavior
C Kolbitsch, PM Comparetti, L Cavedon
US Patent 9,361,459, 2016
162016
Getting the face behind the squares: Reconstructing pixelized video streams
L Cavedon, L Foschini, G Vigna
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
152011
Are BGP routers open to attack? an experiment
L Cavedon, C Kruegel, G Vigna
Open Research Problems in Network Security: IFIP WG 11.4 International …, 2011
92011
Organizing large scale hacking competitions
B Boe, L Cavallaro, L Cavedon, N Childers, M Cova, M Egele, G Vigna
DIMVA 2010, July 8-9, 2010, Paris, France, 2010
12010
Design and validation of a methodology for distributed relay service for NAT traversal in a peer-to-peer VoIP network
LM Cavedon
2007
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–10