Giovanni Vigna
#164,104
Most Influential Person Across History
Giovanni Vigna's AcademicInfluence.com Rankings
Giovanni Vignacriminal-justice Degrees
Criminal Justice
#163
Historical Rank
Cyber Security
#13
Historical Rank
Giovanni Vignacomputer-science Degrees
Computer Science
#5319
Historical Rank
Cybersecurity
#13
Historical Rank
Software Engineering
#144
Historical Rank
Database
#2316
Historical Rank
Download Badge
Criminal Justice Computer Science
Giovanni Vigna's Degrees
- PhD Computer Science University of California, Santa Barbara
- Masters Computer Science University of California, Santa Barbara
- Bachelors Computer Science University of California, Santa Barbara
Similar Degrees You Can Earn
Why Is Giovanni Vigna Influential?
(Suggest an Edit or Addition)Giovanni Vigna's Published Works
Published Works
- Understanding code mobility (1998) (1407)
- Detecting spammers on social networks (2010) (893)
- Driller: Augmenting Fuzzing Through Selective Symbolic Execution (2016) (750)
- SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016) (698)
- Your botnet is my botnet: analysis of a botnet takeover (2009) (696)
- Anomaly detection of web-based attacks (2003) (692)
- Detection and analysis of drive-by-download attacks and malicious JavaScript code (2010) (650)
- Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis (2007) (567)
- PiOS: Detecting Privacy Leaks in iOS Applications (2011) (555)
- Comprehensive approach to intrusion detection alert correlation (2004) (554)
- Intrusion detection: a brief history and overview (2002) (465)
- Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting (2013) (418)
- STATL: An Attack Language for State-Based Intrusion Detection (2002) (416)
- Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications (2008) (415)
- Polymorphic Worm Detection Using Structural Information of Executables (2005) (413)
- Prophiler: a fast filter for the large-scale detection of malicious web pages (2011) (393)
- Designing Distributed Applications with Mobile Code Paradigms (1997) (355)
- Noxes: a client-side solution for mitigating cross-site scripting attacks (2006) (352)
- Static Disassembly of Obfuscated Binaries (2004) (336)
- A Learning-Based Approach to the Detection of SQL Attacks (2005) (329)
- NetSTAT: a network-based intrusion detection approach (1998) (317)
- Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware (2015) (312)
- Anomalous system call detection (2006) (296)
- Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications (2014) (294)
- You are what you include: large-scale evaluation of remote javascript inclusions (2012) (288)
- Stateful intrusion detection for high-speed network's (2002) (285)
- COMPA: Detecting Compromised Accounts on Social Networks (2013) (281)
- A multi-model approach to the detection of web-based attacks (2005) (279)
- NetSTAT: A Network-based Intrusion Detection System (1999) (272)
- Drammer: Deterministic Rowhammer Attacks on Mobile Platforms (2016) (260)
- Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners (2010) (259)
- Cryptographic Traces for Mobile Agents (1998) (239)
- On the Detection of Anomalous System Call Arguments (2003) (229)
- Automating Mimicry Attacks Using Static Binary Analysis (2005) (215)
- Testing network-based intrusion detection signatures using mutant exploits (2004) (214)
- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications (2007) (213)
- Efficient Detection of Split Personalities in Malware (2010) (212)
- Architectures for an Event Notification Service Scalable to Wide-area Networks (2000) (211)
- BareCloud: Bare-metal Analysis-based Evasive Malware Detection (2014) (205)
- Detecting kernel-level rootkits through binary analysis (2004) (200)
- Toward Automated Detection of Logic Vulnerabilities in Web Applications (2010) (194)
- Intrusion Detection and Correlation - Challenges and Solutions (2004) (189)
- BotFinder: finding bots in network traffic without deep packet inspection (2012) (185)
- The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns (2011) (184)
- An intrusion detection tool for AODV-based ad hoc wireless networks (2004) (181)
- EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework (2015) (179)
- Follow the green: growth and dynamics in twitter follower markets (2013) (177)
- Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks (2006) (175)
- EvilSeed: A Guided Approach to Finding Malicious Web Pages (2012) (173)
- Detecting malicious JavaScript code in Mozilla (2005) (171)
- A stateful intrusion detection system for World-Wide Web servers (2003) (158)
- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr (2006) (153)
- What the App is That? Deception and Countermeasures in the Android User Interface (2015) (150)
- Revolver: An Automated Approach to the Detection of Evasive Web-based Malware (2013) (145)
- Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner (2012) (140)
- ClearShot: Eavesdropping on Keyboard Input from Video (2008) (137)
- Towards Detecting Compromised Accounts on Social Networks (2015) (131)
- Nazca: Detecting Malware Distribution in Large-Scale Networks (2014) (130)
- Protecting Mobile Agents through Tracing (1997) (130)
- Hulk: Eliciting Malicious Behavior in Browser Extensions (2014) (130)
- Analyzing Mobile Code Languages (1996) (129)
- Mobile Code Paradigms and Technologies: A Case Study (1997) (129)
- Shady paths: leveraging surfing crowds to detect malicious web pages (2013) (126)
- TriggerScope: Towards Detecting Logic Bombs in Android Applications (2016) (126)
- Multi-module vulnerability analysis of web-based applications (2007) (124)
- The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements (2014) (122)
- Understanding fraudulent activities in online ad exchanges (2011) (120)
- MalGene: Automatic Extraction of Malware Analysis Evasion Signature (2015) (114)
- DIFUZE: Interface Aware Fuzzing for Kernel Drivers (2017) (114)
- MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense (2018) (112)
- The STAT tool suite (2000) (111)
- An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems (2003) (109)
- Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy (2016) (106)
- Framing Dependencies Introduced by Underground Commoditization (2015) (105)
- Peer to Peer Hate: Hate Speech Instigators and Their Targets (2018) (104)
- Ramblr: Making Reassembly Great Again (2017) (100)
- Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis (2017) (98)
- There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits (2008) (97)
- Analyzing and Detecting Malicious Flash Advertisements (2009) (97)
- Analysis of a Botnet Takeover (2011) (96)
- Mobile Agents and Security (1998) (95)
- BareBox: efficient malware analysis on bare-metal (2011) (93)
- Static Enforcement of Web Application Integrity Through Strong Typing (2009) (91)
- Mobile agents: ten reasons for failure (2004) (88)
- Client-side cross-site scripting protection (2009) (86)
- Towards a software engineering approach to Web site development (1998) (85)
- Poultry markets: on the underground economy of twitter followers (2012) (84)
- BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments (2017) (81)
- Protecting a Moving Target: Addressing Web Application Concept Drift (2009) (81)
- Static Detection of Vulnerabilities in x86 Executables (2006) (80)
- When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features (2020) (78)
- DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers (2017) (78)
- Using Hidden Markov Models to Evaluate the Risks of Intrusions (2006) (78)
- Teaching Network Security Through Live Exercises (2003) (78)
- A Static, Packer-Agnostic Filter to Detect Similar Malware Samples (2012) (74)
- HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation (2020) (73)
- EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services (2015) (73)
- Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms (2007) (72)
- An Experience in Testing the Security of Real-World Electronic Voting Systems (2010) (70)
- A Large-Scale Study of Mobile Web App Security (2015) (68)
- Gossip (1863) (68)
- PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary (2019) (67)
- Delta: automatic identification of unknown web-based infection campaigns (2013) (66)
- Ten Years of iCTF: The Good, The Bad, and The Ugly (2014) (66)
- Designing a Web of Highly-Configurable Intrusion Detection Sensors (2001) (63)
- Toward the Analysis of Embedded Firmware through Automated Re-hosting (2019) (63)
- deDacota: toward preventing server-side XSS via automatic code and data separation (2013) (62)
- BareDroid: Large-Scale Analysis of Android Apps on Real Devices (2015) (61)
- Fear the EAR: discovering and mitigating execution after redirect vulnerabilities (2011) (61)
- Exploiting Execution Context for the Detection of Anomalous System Calls (2007) (60)
- SigMal: a static signal processing based malware triage (2013) (59)
- Hit 'em where it hurts: a live security exercise on cyber situational awareness (2011) (58)
- Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries (2009) (57)
- Organizing Large Scale Hacking Competitions (2010) (57)
- Challenges for Dynamic Analysis of iOS Applications (2011) (56)
- GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM (2018) (55)
- Meerkat: Detecting Website Defacements through Image-based Object Recognition (2015) (55)
- PUBCRAWL: Protecting Users and Businesses from CRAWLers (2012) (54)
- Stranger danger: exploring the ecosystem of ad-based URL shortening services (2014) (54)
- Two years of short URLs internet measurement: security threats and countermeasures (2013) (53)
- Using Alert Verification to Identify Successful Intrusion Attempts (2004) (52)
- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones (2006) (50)
- Detecting Deceptive Reviews Using Generative Adversarial Networks (2018) (50)
- Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability (2020) (49)
- EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing (2007) (48)
- Escape from Monkey Island: Evading High-Interaction Honeyclients (2011) (48)
- Vulnerability Analysis of MMS User Agents (2006) (48)
- Effective Anomaly Detection with Scarce Training Data (2010) (47)
- Designing and implementing a family of intrusion detection systems (2003) (47)
- POISED: Spotting Twitter Spam Off the Beaten Paths (2017) (47)
- BOTMAGNIFIER: Locating Spambots on the Internet (2011) (46)
- Understanding Security Issues in the NFT Ecosystem (2021) (44)
- B@bel: Leveraging Email Delivery for Spam Mitigation (2012) (44)
- The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape (2014) (44)
- NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android (2015) (43)
- Real-time intrusion detection alert correlation (2006) (43)
- Message in a bottle: sailing past censorship (2013) (42)
- Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services (2013) (42)
- BootStomp: On the Security of Bootloaders in Mobile Devices (2017) (41)
- Reverse Engineering of Network Signatures (2005) (41)
- Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance (2017) (40)
- Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates (2018) (40)
- Blacksheep: detecting compromised hosts in homogeneous crowds (2012) (40)
- On the Privacy and Security of the Ultrasound Ecosystem (2017) (37)
- Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware (2020) (37)
- CLAPP: characterizing loops in Android applications (2015) (35)
- Something from Nothing (There): Collecting Global IPv6 Datasets from DNS (2017) (35)
- Practical Attacks against the I2P Network (2013) (35)
- A Topological Characterization of TCP/IP Security (2003) (35)
- PExy: The Other Side of Exploit Kits (2014) (34)
- Sensor-based intrusion detection for intra-domain distance-vector routing (2002) (34)
- Is Code Still Moving Around? Looking Back at a Decade of Code Mobility (2007) (34)
- HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security (2018) (34)
- An anomaly-driven reverse proxy for web applications (2006) (33)
- Are your votes really counted?: testing the security of real-world electronic voting systems (2008) (33)
- Extracting probable command and control signatures for detecting botnets (2014) (33)
- Evaluating the Security of Three Java-Based Mobile Agent Systems (2001) (32)
- Neurlux: dynamic malware analysis without feature engineering (2019) (32)
- A Parallel Architecture for Stateful, High-Speed Intrusion Detection (2008) (31)
- Jarhead analysis and detection of malicious Java applets (2012) (31)
- Nexat: a history-based approach to predict attacker actions (2011) (31)
- Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones (2018) (31)
- Hi-DRA: Intrusion Detection for Internet Security (2005) (30)
- Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications (2015) (30)
- Mobile Code Technologies, Paradigms, and Applications (1997) (30)
- FlashDetect: ActionScript 3 Malware Detection (2012) (29)
- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe (2006) (28)
- Shell We Play A Game? CTF-as-a-service for Security Education (2017) (27)
- Static Disassembly and Code Analysis (2007) (27)
- Using hidden markov models to evaluate the risks of intrusions : System architecture and model validation (2006) (26)
- Drops for Stuff: An Analysis of Reshipping Mule Scams (2015) (26)
- Peering through the iframe (2011) (25)
- Rippler: Delay injection for service dependency detection (2014) (24)
- Broken Fingers: On the Usage of the Fingerprint API in Android (2018) (24)
- Vulnerability Analysis of Web-based Applications (2007) (23)
- Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode (2011) (22)
- BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation (2019) (22)
- Detecting Malicious Java Code Using Virtual Machine Auditing (2003) (22)
- Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices (2021) (21)
- SPIDER: Enabling Fast Patch Propagation In Related Software Repositories (2020) (21)
- SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds (2021) (20)
- Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel (2014) (20)
- Composable tools for network discovery and security analysis (2002) (20)
- Evaluating Cybersecurity Education Interventions: Three Case Studies (2015) (20)
- How the ELF Ruined Christmas (2015) (19)
- An Intrusion Detection System for Aglets (2002) (19)
- Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks (2018) (19)
- ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities (2015) (19)
- Using Loops For Malware Classification Resilient to Feature-unaware Perturbations (2018) (18)
- In rDNS We Trust: Revisiting a Common Data-Source's Reliability (2018) (17)
- On the Workings and Current Practices of Web-Based Device Fingerprinting (2014) (17)
- The Tricks of the Trade: What Makes Spam Campaigns Successful? (2014) (17)
- Using a virtual security testbed for digital forensic reconstruction (2007) (17)
- On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users (2015) (16)
- Mechanical Phish: Resilient Autonomous Hacking (2018) (16)
- Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions (2017) (16)
- Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis (2019) (15)
- Portrait of a Privacy Invasion (2015) (15)
- Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information (2017) (15)
- Extending .NET security to unmanaged code (2006) (14)
- Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams (2011) (14)
- Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (2014) (14)
- MNEMOSYNE: designing and implementing network short-term memory (2002) (14)
- Detecting attacks that exploit application-logic errors through application-level auditing (2004) (13)
- Mining the Network Behavior of Bots (2009) (12)
- How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games (2017) (12)
- Tracking Memory Writes for Malware Classification and Code Reuse Identification (2012) (12)
- Automated Spyware Collection and Analysis (2009) (12)
- Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines (2014) (11)
- DEEPCASE: Semi-Supervised Contextual Analysis of Security Events (2022) (11)
- Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms (2007) (11)
- MASSA: Mobile Agents Security through Static/Dynamic Analysis (2001) (11)
- Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory (2016) (11)
- Network intrusion detection: dead or alive? (2010) (11)
- Measuring E-mail header injections on the world wide web (2018) (10)
- VENOMAVE: Clean-Label Poisoning Against Speech Recognition (2020) (10)
- Portrait of a Privacy Invasion Detecting Relationships Through Large-scale Photo Analysis (2015) (10)
- The 2010 International Capture the Flag Competition (2011) (10)
- Formulating Cyber-Security as Convex Optimization Problems (2013) (10)
- SYMBION: Interleaving Symbolic with Concrete Execution (2020) (9)
- Improving Signature Testing through Dynamic Data Flow Analysis (2007) (9)
- Demystifying DDoS as a Service (2017) (8)
- Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web (2020) (8)
- When Malware is Packin’ Heat (2018) (8)
- Token-Level Fuzzing (2023) (8)
- Conware: Automated Modeling of Hardware Peripherals (2021) (8)
- EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (2013) (8)
- Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing (2022) (8)
- Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection (2014) (8)
- Dymo: Tracking Dynamic Code Identity (2011) (7)
- Security Testing of the Online Banking Service of a Large International Bank (2000) (6)
- Detecting and preventing attacks against web applications (2009) (6)
- VenoMave: Targeted Poisoning Against Speech Recognition (2020) (6)
- A Formal Model for Firewall Testing (2007) (6)
- Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses (2021) (5)
- Exploiting OS-level mechanisms to implement mobile code security (2005) (5)
- Are BGP Routers Open to Attack? An Experiment (2010) (5)
- One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware (2020) (5)
- On the Security of Application Installers and Online Software Repositories (2020) (5)
- Recent advances in intrusion detection : 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002 : proceedings (2002) (5)
- Exploring Abstraction Functions in Fuzzing (2020) (5)
- Internet security and intrusion detection (2003) (4)
- Neurlux (2019) (4)
- Know Your Achilles' Heel: Automatic Detection of Network Critical Services (2015) (4)
- Prison: Tracking Process Interactions to Contain Malware (2015) (4)
- Protecting Web Single Sign-on against Relying Party Impersonation Attacks through a Bi-directional Secure Channel with Authentication (2014) (4)
- The statl attack detection language (2002) (4)
- Piston: Uncooperative Remote Runtime Patching (2017) (4)
- A Model-Based Real-Time Intrusion Detection System for Large Scale Heterogeneous Networks (2003) (3)
- Locating Spambots on the Internet (2011) (3)
- A Generative World Wide Web Object-Oriented Model (1997) (3)
- MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper) (2011) (3)
- The Analysis of Security (2018) (3)
- Sensor Families for Intrusion Detection Infrastructures (2005) (3)
- Limited-linkable Group Signatures with Distributed-Trust Traceability (2012) (3)
- Recent advances in intrusion detection : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003 : proceedings (2004) (3)
- Sleak: automating address space layout derandomization (2019) (3)
- Taming the malicious web: avoiding and detecting web-based attacks (2010) (3)
- Designing and Implementing Inter-Client Communication in the O2 Object-Oriented Database Management System (1994) (3)
- Host-Based Intrusion Detection Host-Based Intrusion Detection (2005) (3)
- Security Evaluation of the Sequoia Voting System (2007) (3)
- CLAPP: characterizing loops in Android applications (invited talk) (2015) (3)
- SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning (2021) (2)
- Context-sensitive multi-model anomaly detection (2006) (2)
- Toward a secure crowdsourced location tracking system (2021) (2)
- Leveraging Email Delivery for Spam Mitigation (2012) (2)
- TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems (2020) (2)
- Security Testing of an Online Banking Service (2001) (2)
- A Characterization of Mobility and State Distribution in Mobile Code Languages (2014) (2)
- Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network (2017) (2)
- SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros (2022) (2)
- Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs? (2020) (2)
- Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis (2019) (1)
- Regulator: Dynamic Analysis to Detect ReDoS (2022) (1)
- Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms (2021) (1)
- BootKeeper: Validating Software Integrity Properties on Boot Firmware Images (2019) (1)
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools (2019) (1)
- TrojanPuzzle: Covertly Poisoning Code-Suggestion Models (2023) (1)
- Scaling the Academic Security Community (2019) (1)
- Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone (2021) (1)
- Establishing a Guide to the Cyber Security Body of Knowledge (2017) (1)
- One Size Does Not Fit All (2021) (1)
- Inspect: a Lightweight Distributed Approach to Automated Audit Trail Analysis (2007) (1)
- 13 Vulnerability Analysis of Web-Based Applications (0)
- Why Johnny Can't Pentest (2010) (0)
- Peerin g Throu gh the iFrame (2011) (0)
- Proceedings of the 5th international conference on Recent advances in intrusion detection (2002) (0)
- BootKeeper (2019) (0)
- 2 Operating System Level Intrusion Detection (0)
- Malware Riding Badware: Challenges in Analyzing (Malicious/Benign) Web Applications (2012) (0)
- Securing Early Software Development (2012) (0)
- Thanks to Platinum Supporters Nickel Supporters (2011) (0)
- HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images (2022) (0)
- Computer Security Education: Training, Scholarship, and Research (Supplement to Computer Magazine) (2002) (0)
- Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale (2020) (0)
- Keeping Up with the Emotets: Tracking a Multi-Infrastructure Botnet (2023) (0)
- DARKDROID : EXPOSING THE DARK SIDE OF ANDROID (2016) (0)
- T RUST .IO: Protecting Physical Interfaces on Cyber-physical Systems (2020) (0)
- Carlo Ghezzi and network computing (2012) (0)
- Program Twenty-Second Annual Computer Security Applications Conference ( ACSAC ) Practical Solutions (0)
- Red Team / Blue Team , Capture the Flag , and Treasure Hunt : Teaching Network Security Through Live Exercises (2013) (0)
- 12 Vulnerability Analysis of Web-based Applications (2007) (0)
- 1 Static Disassembly and Code Analysis (2006) (0)
- Intrusion Detection: a Brief History and Overview Intrusion Detection: a Brief History Intrusion Detection Overview Data Collection Issues (0)
- The Design and Implementation of SPADE-1 2.0 (1994) (0)
- Hybrid Pruning: Towards Precise Pointer and Taint Analysis (2022) (0)
- POPKORN: Popping Windows Kernel Drivers At Scale (2022) (0)
- Drop Cardholder Reshipping Scam Site Stuffer User information Reshipping instruction Package Apply Data Breach Purchase Ship Reship Subscribe Manage ! " # $ % & ' (2015) (0)
- Binary Analysis for Autonomous Hacking: Invited Abstract (2016) (0)
- Archetype: Addressing Configuration Issues in Software Architectures (1995) (0)
- DARKDROID: Exposing the Dark Side of Android Marketplaces (2016) (0)
- Decomperson: How Humans Decompile and What We Can Learn From It (2022) (0)
- Panel: E-Voting (2007) (0)
- Demystifying NFT Promotion and Phishing Scams (2023) (0)
- Chapter 1 SENSOR FAMILIES FOR INTRUSION DETECTION INFRASTRUCTURES (2004) (0)
- Title Rampart : Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks Permalink (2018) (0)
- Sleak (2019) (0)
- Columbus: Android App Testing Through Systematic Callback Exploration (2023) (0)
- Software engineering issues for network computing (1997) (0)
- A Model-Centered Electronic Commerce Middleware (1998) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Giovanni Vigna?
Giovanni Vigna is affiliated with the following schools: