Shieldfs: a self-healing, ransomware-aware filesystem A Continella, A Guagnelli, G Zingaro, G De Pasquale, A Barenghi, ... Proceedings of the 32nd annual conference on computer security applications …, 2016 | 353 | 2016 |
FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic T van Ede, R Bortolameotti, A Continella, J Ren, DJ Dubois, M Lindorfer, ... Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2020 | 203 | 2020 |
Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis Q Grundy, K Chiu, F Held, A Continella, L Bero, R Holz bmj 364, 2019 | 176 | 2019 |
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis A Continella, Y Fratantonio, M Lindorfer, A Puccetti, A Zand, C Kruegel, ... Network and Distributed System Security Symposium (NDSS), 2017 | 142 | 2017 |
KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ... IEEE Symposium on Security & Privacy (S&P), 2020 | 111 | 2020 |
Measuring and defeating anti-instrumentation-equipped malware M Polino, A Continella, S Mariani, S D’Alessio, L Fontana, F Gritti, ... Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017 | 68 | 2017 |
DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ... IEEE Symposium on Security & Privacy (S&P), 2021 | 67 | 2021 |
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events T van Ede, H Aghakhani, N Spahn, R Bortolameotti, M Cova, A Continella, ... In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2022 | 64 | 2022 |
A Systematical and longitudinal study of evasive behaviors in windows malware N Galloro, M Polino, M Carminati, A Continella, S Zanero Computers & security 113, 102550, 2022 | 46 | 2022 |
Security evaluation of a banking fraud analysis system M Carminati, M Polino, A Continella, A Lanzi, F Maggi, S Zanero ACM Transactions on Privacy and Security (TOPS) 21 (3), 1-31, 2018 | 40 | 2018 |
There's a hole in that bucket! a large-scale analysis of misconfigured s3 buckets A Continella, M Polino, M Pogliani, S Zanero Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 38 | 2018 |
Protection system and method for protecting a computer system against ransomware attacks A Continella, S Zanero, F Maggi, A Guagnelli, G Zingaro, A Barenghi, ... US Patent App. 15/368,465, 2018 | 35 | 2018 |
Prometheus: Analyzing WebInject-based information stealers A Continella, M Carminati, M Polino, A Lanzi, S Zanero, F Maggi Journal of Computer Security 25 (2), 117-137, 2017 | 31 | 2017 |
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities N Marastoni, A Continella, D Quarta, S Zanero, M Dalla Preda Software Security, Protection, and Reverse Engineering Workshop, 2017 | 29 | 2017 |
Leakdoctor: Toward automatically diagnosing privacy leaks in mobile applications X Wang, A Continella, Y Yang, Y He, S Zhu Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019 | 23 | 2019 |
An i/o request packet (irp) driven effective ransomware detection scheme using artificial neural network MA Ayub, A Continella, A Siraj 2020 IEEE 21st International Conference on Information Reuse and Integration …, 2020 | 22 | 2020 |
SYMBION: Interleaving Symbolic with Concrete Execution F Gritti, L Fontana, E Gustafson, F Pagani, A Continella, C Kruegel, ... Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2020 | 20 | 2020 |
Toward systematically exploring antivirus engines D Quarta, F Salvioni, A Continella, S Zanero Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018 | 16 | 2018 |
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning N Ruaro, L Dresel, K Zeng, T Bao, M Polino, A Continella, S Zanero, ... In Proceedings of the International Symposium on Research in Attacks …, 2021 | 15 | 2021 |
Aot-attack on things: A security analysis of iot firmware updates M Ibrahim, A Continella, A Bianchi 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 1047-1064, 2023 | 13 | 2023 |