{RE-Mind}: a first look inside the mind of a reverse engineer A Mantovani, S Aonzo, Y Fratantonio, D Balzarotti 31st USENIX Security Symposium (USENIX Security 22), 2727-2745, 2022 | 23 | 2022 |
An Empirical Study of Cryptographic Misuse in Android Applications M Egele, D Brumley, Y Fratantonio, C Kruegel Proceedings of the ACM SIGSAC Conference on Computer & Communications Security, 2013 | 611 | 2013 |
ANDRUBIS-1,000,000 Apps Later: A View on Current Android Malware Behaviors M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ... Proceedings of the International Workshop on Building Analysis Datasets and …, 2014 | 410 | 2014 |
Andrubis: Android Malware Under the Magnifying Glass L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ... Vienna University of Technology, Tech. Rep. TRISECLAB-0414-001, 2014 | 127 | 2014 |
Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs J Vadayath, M Eckert, K Zeng, N Weideman, GP Menon, Y Fratantonio, ... 31st USENIX Security Symposium (USENIX Security 22), 413-430, 2022 | 19 | 2022 |
Baredroid: Large-scale analysis of android apps on real devices S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ... Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015 | 85 | 2015 |
BootStomp: On the security of bootloaders in mobile devices N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ... 26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017 | 72 | 2017 |
Broken Fingers: On the Usage of the Fingerprint API in Android A Bianchi, Y Fratantonio, A Machiry, C Kruegel, G Vigna, SPH Chung, ... NDSS, 2018 | 48 | 2018 |
CLAPP: Characterizing Loops in Android Applications Y Fratantonio, A Machiry, A Bianchi, C Kruegel, G Vigna Proceedings of the ACM Symposium on the Foundations of Software Engineering …, 2015 | 43 | 2015 |
CLAPP: Characterizing Loops in Android Applications (Invited Talk) Y Fratantonio, A Machiry, A Bianchi, C Kruegel, G Vigna Proceedings of the 3rd International Workshop on Software Development …, 2015 | 2 | 2015 |
Clickshield: Are you hiding something? towards eradicating clickjacking on android A Possemato, A Lanzi, SPH Chung, W Lee, Y Fratantonio Proceedings of the 2018 acm sigsac conference on computer and communications …, 2018 | 37 | 2018 |
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Y Fratantonio, C Qian, SP Chung, W Lee IEEE Symposium on Security and Privacy (Oakland), 2017 | 156 | 2017 |
Drammer V van der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 1 | 2016 |
Drammer: Deterministic rowhammer attacks on mobile platforms V van der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ... Proceedings of ACM SIGSAC Conference on Computer and Communications Security …, 2016 | 411 | 2016 |
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen Proceedings of the Annual Network & Distributed System Security Symposium (NDSS), 2015 | 239 | 2015 |
Execute This! S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications …, 0 | 4 | |
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna Proceedings of the Annual Network & Distributed System Security Symposium (NDSS), 2014 | 403 | 2014 |
Exploitation and mitigation of authentication schemes based on device-public information A Bianchi, E Gustafson, Y Fratantonio, C Kruegel, G Vigna Proceedings of the 33rd Annual Computer Security Applications Conference, 16-27, 2017 | 26 | 2017 |
Exploring {Syscall-Based} Semantics Reconstruction of Android Applications D Nisi, A Bianchi, Y Fratantonio 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 11 | 2019 |
Going native: Using a large-scale analysis of android apps to create a practical native-code sandboxing policy V Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, P de Geus, ... The Network and Distributed System Security Symposium 2016, 1-15, 2016 | 136 | 2016 |