关注
Yanick Fratantonio
Yanick Fratantonio
Senior Research Scientist, Google
在 fratantonio.me 的电子邮件经过验证 - 首页
标题
引用次数
年份
{RE-Mind}: a first look inside the mind of a reverse engineer
A Mantovani, S Aonzo, Y Fratantonio, D Balzarotti
31st USENIX Security Symposium (USENIX Security 22), 2727-2745, 2022
232022
An Empirical Study of Cryptographic Misuse in Android Applications
M Egele, D Brumley, Y Fratantonio, C Kruegel
Proceedings of the ACM SIGSAC Conference on Computer & Communications Security, 2013
6112013
ANDRUBIS-1,000,000 Apps Later: A View on Current Android Malware Behaviors
M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ...
Proceedings of the International Workshop on Building Analysis Datasets and …, 2014
4102014
Andrubis: Android Malware Under the Magnifying Glass
L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ...
Vienna University of Technology, Tech. Rep. TRISECLAB-0414-001, 2014
1272014
Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs
J Vadayath, M Eckert, K Zeng, N Weideman, GP Menon, Y Fratantonio, ...
31st USENIX Security Symposium (USENIX Security 22), 413-430, 2022
192022
Baredroid: Large-scale analysis of android apps on real devices
S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015
852015
BootStomp: On the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017
722017
Broken Fingers: On the Usage of the Fingerprint API in Android
A Bianchi, Y Fratantonio, A Machiry, C Kruegel, G Vigna, SPH Chung, ...
NDSS, 2018
482018
CLAPP: Characterizing Loops in Android Applications
Y Fratantonio, A Machiry, A Bianchi, C Kruegel, G Vigna
Proceedings of the ACM Symposium on the Foundations of Software Engineering …, 2015
432015
CLAPP: Characterizing Loops in Android Applications (Invited Talk)
Y Fratantonio, A Machiry, A Bianchi, C Kruegel, G Vigna
Proceedings of the 3rd International Workshop on Software Development …, 2015
22015
Clickshield: Are you hiding something? towards eradicating clickjacking on android
A Possemato, A Lanzi, SPH Chung, W Lee, Y Fratantonio
Proceedings of the 2018 acm sigsac conference on computer and communications …, 2018
372018
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
Y Fratantonio, C Qian, SP Chung, W Lee
IEEE Symposium on Security and Privacy (Oakland), 2017
1562017
Drammer
V van der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
12016
Drammer: Deterministic rowhammer attacks on mobile platforms
V van der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
Proceedings of ACM SIGSAC Conference on Computer and Communications Security …, 2016
4112016
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
Proceedings of the Annual Network & Distributed System Security Symposium (NDSS), 2015
2392015
Execute This!
S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna
Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications …, 0
4
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications
S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna
Proceedings of the Annual Network & Distributed System Security Symposium (NDSS), 2014
4032014
Exploitation and mitigation of authentication schemes based on device-public information
A Bianchi, E Gustafson, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference, 16-27, 2017
262017
Exploring {Syscall-Based} Semantics Reconstruction of Android Applications
D Nisi, A Bianchi, Y Fratantonio
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
112019
Going native: Using a large-scale analysis of android apps to create a practical native-code sandboxing policy
V Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, P de Geus, ...
The Network and Distributed System Security Symposium 2016, 1-15, 2016
1362016
系统目前无法执行此操作,请稍后再试。
文章 1–20