Understanding the mirai botnet M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ... 26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017 | 2502 | 2017 |
Keras Tuner T O’Malley, E Bursztein, J Long, F Chollet, H Jin, L Invernizzi, ... Available online: github. com/keras-team/kerastuner (accessed on 2 April 2022), 2019 | 685* | 2019 |
You are what you include: large-scale evaluation of remote javascript inclusions N Nikiforakis, L Invernizzi, A Kapravelos, S Van Acker, W Joosen, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 393 | 2012 |
Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 270* | 2017 |
EVILSEED: A Guided Approach to Finding Malicious Web Pages L Invernizzi, UC Santa Barbara, S Benvenuti, M Cova, PM Comparetti, ... IEEE Symposium on Security & Privacy 2012 (AT&T NYU CSAW best security …, 2012 | 262 | 2012 |
Tracking ransomware end-to-end DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ... 2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018 | 258 | 2018 |
What the app is that? deception and countermeasures in the android user interface A Bianchi, J Corbetta, L Invernizzi, Y Fratantonio, C Kruegel, G Vigna 2015 IEEE Symposium on Security and Privacy, 931-948, 2015 | 216 | 2015 |
Nazca: Detecting Malware Distribution in Large-Scale Networks. L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha, G Vigna, SJ Lee, ... NDSS 14, 23-26, 2014 | 182 | 2014 |
Protecting accounts from credential stuffing with password breach alerting K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ... 28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019 | 151 | 2019 |
Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context M Reid, N Savinov, D Teplyashin, D Lepikhin, T Lillicrap, J Alayrac, ... https://storage.googleapis.com/deepmind-media/gemini/gemini_v1_5_report.pdf, 2024 | 141 | 2024 |
Cloak of Visibility: Detecting When Machines Browse A Different Web L Invernizzi, K Thomas, A Kapravelos, O Comanescu, JM Picod, ... Security and Privacy (SP), 2016 IEEE Symposium on, 2016 | 112 | 2016 |
Baredroid: Large-scale analysis of android apps on real devices S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ... Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015 | 85 | 2015 |
Ten Years of {iCTF}: The Good, The Bad, and The Ugly G Vigna, K Borgolte, J Corbetta, A Doupé, Y Fratantonio, L Invernizzi, ... 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014 | 85 | 2014 |
Message In A Bottle: Sailing Past Censorship L Invernizzi, C Kruegel, G Vigna ACSAC'13, and in HotPETS12 (workshop), 2012 | 50 | 2012 |
Detecting malware infestations in large-scale networks L Invernizzi, S Miskovic, R Torres, S Saha, C Kruegel, A Nucci, SJ Lee, ... US Patent 8,959,643, 2015 | 43 | 2015 |
Five years of the right to be forgotten T Bertram, E Bursztein, S Caro, H Chao, R Chin Feman, P Fleischer, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 40 | 2019 |
CoinPolice: Detecting Hidden Cryptojacking Attacks with Neural Networks I Petrov, L Invernizzi, E Bursztein http://arxiv.org/abs/2006.10861, 2020 | 28 | 2020 |
Gossip: Automatically identifying malicious domains from mailing list discussions C Huang, S Hao, L Invernizzi, J Liu, Y Fang, C Kruegel, G Vigna Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 23 | 2017 |
Three years of the Right to be Forgotten T Bertram, E Bursztein, S Caro, H Chao, RC Feman, P Fleischer, ... Google, Inc, 1-17, 2018 | 22 | 2018 |
Do you feel lucky? A large-scale analysis of risk-rewards trade-offs in cyber security Y Shoshitaishvili, L Invernizzi, A Doupe, G Vigna Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1649-1656, 2014 | 18 | 2014 |