All your contacts are belong to us: automated identity theft attacks on social networks L Bilge, T Strufe, D Balzarotti, E Kirda Proceedings of the 18th international conference on World wide web, 551-560, 2009 | 811 | 2009 |
A {Large-scale} analysis of the security of embedded firmwares A Costin, J Zaddach, A Francillon, D Balzarotti 23rd USENIX security symposium (USENIX Security 14), 95-110, 2014 | 603 | 2014 |
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2015 | 593 | 2015 |
Saner: Composing static and dynamic analysis to validate sanitization in web applications D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ... 2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008 | 563 | 2008 |
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares. J Zaddach, L Bruno, A Francillon, D Balzarotti NDSS 14 (2014), 1-16, 2014 | 448 | 2014 |
Disclosure: detecting botnet command and control servers through large-scale netflow analysis L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 398 | 2012 |
Exposure: A passive dns analysis service to detect and report malicious domains L Bilge, S Sen, D Balzarotti, E Kirda, C Kruegel ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-28, 2014 | 382 | 2014 |
G-Free: defeating return-oriented programming through gadget-less binaries K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda Proceedings of the 26th annual computer security applications conference, 49-58, 2010 | 380 | 2010 |
A view on current malware behaviors U Bayer, I Habibi, D Balzarotti, E Kirda, C Kruegel Proceedings of the 2nd USENIX conference on Large-scale exploits and …, 2009 | 301 | 2009 |
Efficient detection of split personalities in malware. D Balzarotti, M Cova, C Karlberger, E Kirda, C Kruegel, G Vigna NDSS, 2010 | 285 | 2010 |
Testing network-based intrusion detection signatures using mutant exploits G Vigna, W Robertson, D Balzarotti Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 280 | 2004 |
Accessminer: using system-centric models for malware protection A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 258 | 2010 |
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices. M Muench, J Stijohann, F Kargl, A Francillon, D Balzarotti NDSS, 2018 | 257 | 2018 |
Understanding linux malware E Cozzi, M Graziano, Y Fratantonio, D Balzarotti 2018 IEEE symposium on security and privacy (SP), 161-175, 2018 | 254 | 2018 |
Abusing social networks for automated user profiling M Balduzzi, C Platzer, T Holz, E Kirda, D Balzarotti, C Kruegel Recent Advances in Intrusion Detection, 422-441, 2010 | 249 | 2010 |
Can I opt out yet? GDPR and the global illusion of cookie control I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ... Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019 | 238 | 2019 |
Swaddler: An approach for the anomaly-based detection of state violations in web applications M Cova, D Balzarotti, V Felmetsger, G Vigna Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007 | 231 | 2007 |
Reverse social engineering attacks in online social networks D Irani, M Balduzzi, D Balzarotti, E Kirda, C Pu Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011 | 221 | 2011 |
SoK: Deep packer inspection: A longitudinal study of the complexity of run-time packers X Ugarte-Pedrero, D Balzarotti, I Santos, PG Bringas 2015 IEEE Symposium on Security and Privacy, 659-673, 2015 | 197 | 2015 |
A quantitative study of accuracy in system call-based malware detection D Canali, A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda Proceedings of the 2012 International Symposium on Software Testing and …, 2012 | 196 | 2012 |