关注
Marco Balduzzi
Marco Balduzzi
Technical Research Lead at Trend Micro
在 madlab.it 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
L Bilge, E Kirda, C Kruegel, M Balduzzi
Ndss, 1-17, 2011
8992011
A Security Evaluation of AIS [Technical Report]
M Balduzzi, K Wilhoit, A Pasta
Trend Micro, 2014
289*2014
Abusing social networks for automated user profiling
M Balduzzi, C Platzer, T Holz, E Kirda, D Balzarotti, C Kruegel
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
2492010
Reverse social engineering attacks in online social networks
D Irani, M Balduzzi, D Balzarotti, E Kirda, C Pu
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011
2222011
A security analysis of amazon's elastic compute cloud service
M Balduzzi, J Zaddach, D Balzarotti, E Kirda, S Loureiro
Proceedings of the 27th annual ACM symposium on applied computing, 1427-1434, 2012
1872012
A solution for the automated detection of clickjacking attacks
M Balduzzi, M Egele, E Kirda, D Balzarotti, C Kruegel
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1262010
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications.
M Balduzzi, CT Gimenez, D Balzarotti, E Kirda
NDSS, 2011
892011
Automatic extraction of indicators of compromise for web applications
O Catakoglu, M Balduzzi, D Balzarotti
Proceedings of the 25th international conference on world wide web, 333-343, 2016
862016
Soundsquatting: Uncovering the use of homophones in domain squatting
N Nikiforakis, M Balduzzi, L Desmet, F Piessens, W Joosen
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
772014
Below the Surface: Exploring the Deep Web [Technical Report]
V Ciancaglini, M Balduzzi, R McArdle, M Rösler
Trend Micro, 2015
69*2015
Take a deep breath: a stealthy, resilient and cost-effective botnet using skype
A Nappa, A Fattori, M Balduzzi, M Dell’Amico, L Cavallaro
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010
522010
The role of phone numbers in understanding cyber-crime schemes
A Costin, J Isacenkova, M Balduzzi, A Francillon, D Balzarotti
2013 Eleventh Annual Conference on Privacy, Security and Trust, 213-220, 2013
432013
Mobipot: Understanding mobile telephony threats with honeycards
M Balduzzi, P Gupta, L Gu, D Gao, M Ahamad
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
422016
Targeted attacks detection with spunge
M Balduzzi, V Ciangaglini, R McArdle
2013 Eleventh Annual Conference on Privacy, Security and Trust, 185-194, 2013
372013
Exposing the lack of privacy in file hosting services
N Nikiforakis, M Balduzzi, S Van Acker, W Joosen, D Balzarotti
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011
372011
Investigating web defacement campaigns at large
F Maggi, M Balduzzi, R Flores, L Gu, V Ciancaglini
Proceedings of the 2018 on asia conference on computer and communications …, 2018
362018
Attacks landscape in the dark side of the web
O Catakoglu, M Balduzzi, D Balzarotti
Proceedings of the Symposium on Applied Computing, 1739-1746, 2017
332017
Real-time detection of malware downloads via large-scale URL-> file-> machine graph mining
B Rahbarinia, M Balduzzi, R Perdisci
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
312016
Deepweb and cybercrime: It’s not all about TOR
V Ciancaglini, M Balduzzi, M Goncharov, R McArdle
Trend Micro, 2-21, 2013
312013
Exploring the long tail of (malicious) software downloads
B Rahbarinia, M Balduzzi, R Perdisci
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
272017
系统目前无法执行此操作,请稍后再试。
文章 1–20