EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. L Bilge, E Kirda, C Kruegel, M Balduzzi Ndss, 1-17, 2011 | 899 | 2011 |
A Security Evaluation of AIS [Technical Report] M Balduzzi, K Wilhoit, A Pasta Trend Micro, 2014 | 289* | 2014 |
Abusing social networks for automated user profiling M Balduzzi, C Platzer, T Holz, E Kirda, D Balzarotti, C Kruegel Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010 | 249 | 2010 |
Reverse social engineering attacks in online social networks D Irani, M Balduzzi, D Balzarotti, E Kirda, C Pu Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011 | 222 | 2011 |
A security analysis of amazon's elastic compute cloud service M Balduzzi, J Zaddach, D Balzarotti, E Kirda, S Loureiro Proceedings of the 27th annual ACM symposium on applied computing, 1427-1434, 2012 | 187 | 2012 |
A solution for the automated detection of clickjacking attacks M Balduzzi, M Egele, E Kirda, D Balzarotti, C Kruegel Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 126 | 2010 |
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. M Balduzzi, CT Gimenez, D Balzarotti, E Kirda NDSS, 2011 | 89 | 2011 |
Automatic extraction of indicators of compromise for web applications O Catakoglu, M Balduzzi, D Balzarotti Proceedings of the 25th international conference on world wide web, 333-343, 2016 | 86 | 2016 |
Soundsquatting: Uncovering the use of homophones in domain squatting N Nikiforakis, M Balduzzi, L Desmet, F Piessens, W Joosen Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014 | 77 | 2014 |
Below the Surface: Exploring the Deep Web [Technical Report] V Ciancaglini, M Balduzzi, R McArdle, M Rösler Trend Micro, 2015 | 69* | 2015 |
Take a deep breath: a stealthy, resilient and cost-effective botnet using skype A Nappa, A Fattori, M Balduzzi, M Dell’Amico, L Cavallaro Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010 | 52 | 2010 |
The role of phone numbers in understanding cyber-crime schemes A Costin, J Isacenkova, M Balduzzi, A Francillon, D Balzarotti 2013 Eleventh Annual Conference on Privacy, Security and Trust, 213-220, 2013 | 43 | 2013 |
Mobipot: Understanding mobile telephony threats with honeycards M Balduzzi, P Gupta, L Gu, D Gao, M Ahamad Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 42 | 2016 |
Targeted attacks detection with spunge M Balduzzi, V Ciangaglini, R McArdle 2013 Eleventh Annual Conference on Privacy, Security and Trust, 185-194, 2013 | 37 | 2013 |
Exposing the lack of privacy in file hosting services N Nikiforakis, M Balduzzi, S Van Acker, W Joosen, D Balzarotti 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011 | 37 | 2011 |
Investigating web defacement campaigns at large F Maggi, M Balduzzi, R Flores, L Gu, V Ciancaglini Proceedings of the 2018 on asia conference on computer and communications …, 2018 | 36 | 2018 |
Attacks landscape in the dark side of the web O Catakoglu, M Balduzzi, D Balzarotti Proceedings of the Symposium on Applied Computing, 1739-1746, 2017 | 33 | 2017 |
Real-time detection of malware downloads via large-scale URL-> file-> machine graph mining B Rahbarinia, M Balduzzi, R Perdisci Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 31 | 2016 |
Deepweb and cybercrime: It’s not all about TOR V Ciancaglini, M Balduzzi, M Goncharov, R McArdle Trend Micro, 2-21, 2013 | 31 | 2013 |
Exploring the long tail of (malicious) software downloads B Rahbarinia, M Balduzzi, R Perdisci 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 27 | 2017 |