An Empirical Study of Cryptographic Misuse in Android Applications M Egele, D Brumley, Y Fratantonio, C Kruegel Proceedings of the ACM SIGSAC Conference on Computer & Communications Security, 2013 | 611 | 2013 |
Drammer: Deterministic rowhammer attacks on mobile platforms V van der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ... Proceedings of ACM SIGSAC Conference on Computer and Communications Security …, 2016 | 416 | 2016 |
ANDRUBIS-1,000,000 Apps Later: A View on Current Android Malware Behaviors M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ... Proceedings of the International Workshop on Building Analysis Datasets and …, 2014 | 411 | 2014 |
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna Proceedings of the Annual Network & Distributed System Security Symposium (NDSS), 2014 | 403 | 2014 |
Understanding Linux Malware E Cozzi, M Graziano, Y Fratantonio, D Balzarotti IEEE Security and Privacy, 2018 | 245 | 2018 |
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen Proceedings of the Annual Network & Distributed System Security Symposium (NDSS), 2015 | 239 | 2015 |
TriggerScope: Towards Detecting Logic Bombs in Android Applications Y Fratantonio, A Bianchi, W Robertson, E Kirda, C Kruegel, G Vigna IEEE Security and Privacy, 2016 | 217 | 2016 |
What the App is That? Deception and Countermeasures in the Android User Interface A Bianchi, J Corbetta, L Invernizzi, Y Fratantonio, C Kruegel, G Vigna Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2015 | 209 | 2015 |
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Y Fratantonio, C Qian, SP Chung, W Lee IEEE Symposium on Security and Privacy (Oakland), 2017 | 157 | 2017 |
Toward the analysis of embedded firmware through automated re-hosting E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ... 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 139 | 2019 |
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis A Continella, Y Fratantonio, M Lindorfer, A Puccetti, A Zand, C Kruegel, ... NDSS, 2017 | 138 | 2017 |
Going native: Using a large-scale analysis of android apps to create a practical native-code sandboxing policy V Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, P de Geus, ... The Network and Distributed System Security Symposium 2016, 1-15, 2016 | 136 | 2016 |
Andrubis: Android Malware Under the Magnifying Glass L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ... Vienna University of Technology, Tech. Rep. TRISECLAB-0414-001, 2014 | 129 | 2014 |
Retracer: Triaging crashes by reverse execution from partial memory dumps W Cui, M Peinado, SK Cha, Y Fratantonio, VP Kemerlis Proceedings of the 38th International Conference on Software Engineering …, 2016 | 95 | 2016 |
Guardion: Practical mitigation of dma-based rowhammer attacks on arm V Van der Veen, M Lindorfer, Y Fratantonio, H Padmanabha Pillai, ... Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018 | 92 | 2018 |
Ten Years of iCTF: The Good, The Bad, and The Ugly G Vigna, K Borgolte, J Corbetta, A Doupe, Y Fratantonio, L Invernizzi, ... Proceedings of the USENIX Summit on Gaming, Games, and Gamification in …, 2014 | 85 | 2014 |
Baredroid: Large-scale analysis of android apps on real devices S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ... Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015 | 84 | 2015 |
Phishing attacks on modern android S Aonzo, A Merlo, G Tavella, Y Fratantonio Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 74 | 2018 |
How machine learning is solving the binary function similarity problem A Marcelli, M Graziano, X Ugarte-Pedrero, Y Fratantonio, M Mansouri, ... 31st USENIX Security Symposium (USENIX Security 22), 2099-2116, 2022 | 72 | 2022 |
BootStomp: On the security of bootloaders in mobile devices N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ... 26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017 | 72 | 2017 |