SentiNet: Detecting Localized Universal Attack Against Deep Learning Systems E Chou, F Tramèr, G Pellegrino arXiv preprint arXiv:1812.00292, 2018 | 349 | 2018 |
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ... Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012 | 143 | 2012 |
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification B Stock, G Pellegrino, C Rossow, M Johns, M Backes 25th USENIX Security Symposium, USENIX Security 16, 1015--1032, 2016 | 136 | 2016 |
Toward Black-Box Detection of Logic Flaws in Web Applications G Pellegrino, D Balzarotti NDSS Symposium 2014, 2014 | 107 | 2014 |
Didn’t you hear me?—Towards more successful Web vulnerability notifications B Stock, G Pellegrino, F Li, M Backes, C Rossow NDSS Symposium 2018, 2018 | 102 | 2018 |
An authentication flaw in browser-based single sign-on protocols: Impact and remediations A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti Computers & Security 33, 41-58, 2013 | 98 | 2013 |
The rise of the citizen developer: Assessing the security impact of online app generators M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ... 2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018 | 91 | 2018 |
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning F Tramèr, P Dupré, R Gili, G Pellegrino, D Boneh Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 81 | 2019 |
Deemon: Detecting CSRF with dynamic analysis and property graphs G Pellegrino, M Johns, S Koch, M Backes, C Rossow Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 79 | 2017 |
Fidelius: Protecting User Secrets from Compromised Browsers S Eskandarian, J Cogan, S Birnbaum, PCW Brandon, D Franke, F Fraser, ... 2019 IEEE Symposium on Security and Privacy (SP), 611-627, 2019 | 67 | 2019 |
Security validation of business processes via model-checking W Arsac, L Compagna, G Pellegrino, SE Ponta International Symposium on Engineering Secure Software and Systems, 29-42, 2011 | 62 | 2011 |
Black Widow: Blackbox Data-driven Web Scanning B Eriksson, G Pellegrino, A Sabelfeld Proceedings of IEEE SSP 2021, 2021 | 60 | 2021 |
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications G Pellegrino, C Tschürtz, E Bodden, C Rossow The 18th International Symposium on Research in Attacks, Intrusions and Defenses, 2015 | 58 | 2015 |
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. Q Zhao, C Zuo, G Pellegrino, L Zhiqiang CISPA, 2019 | 47 | 2019 |
From multiple credentials to browser-based single sign-on: Are we more secure? A Armando, R Carbone, L Compagna, J Cuellar, G Pellegrino, A Sorniotti IFIP International Information Security Conference, 68-79, 2011 | 46 | 2011 |
Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals M Simeonovski, G Pellegrino, C Rossow, M Backes Proceedings of the 26th International World Wide Web Conference, 2017 (WWW 2017), 2017 | 43 | 2017 |
From model-checking to automated testing of security protocols: Bridging the gap A Armando, G Pellegrino, R Carbone, A Merlo, D Balzarotti International Conference on Tests and Proofs, 3-18, 2012 | 40 | 2012 |
Model-checking driven security testing of web-based applications A Armando, R Carbone, L Compagna, K Li, G Pellegrino 2010 Third International Conference on Software Testing, Verification, and …, 2010 | 40 | 2010 |
JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals S Khodayari, G Pellegrino 30th USENIX Security Symposium, USENIX Security 21, 2021 | 39 | 2021 |
Automatic uncovering of hidden behaviors from input validation in mobile apps Q Zhao, C Zuo, B Dolan-Gavitt, G Pellegrino, Z Lin 2020 IEEE Symposium on Security and Privacy (SP), 1106-1120, 2020 | 39 | 2020 |