Giovanni Vigna [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis NDSS-2017 - california,usa
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments NDSS-2017 - california,usa
TALKING BEHIND YOUR BACK: ATTACKS AND COUNTERMEASURES OF ULTRASONIC CROSS-DEVICE TRACKING BlackHatEU-2016 - London,uk
Cyber Grand Shellphish Defcon-2016 - las vegas,usa
Driller: Augmenting Fuzzing Through Selective Symbolic Execution NDSS-2016 - california,usa
Drops for Stuff: An Analysis of Reshipping Mule Scams Enigma-2016 - san francisco,usa
Know Your Achilles' Heel: Automatic Detection of Network Critical Services ACSAC-2015 - los angeles,usa
BareDroid: Large-Scale Analysis of Android Apps on Real Devices ACSAC-2015 - los angeles,usa
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications ACSAC-2015 - los angeles,usa
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services SecuritySymposium-2015 - washington,USA
Meerkat: Detecting Website Defacements through Image-based Object Recognition SecuritySymposium-2015 - washington,USA
How the ELF Ruined Christmas SecuritySymposium-2015 - washington,USA
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities SecuritySymposium-2015 - washington,USA
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users, Dimva-2015 - Milan,Italy
A Large-Scale Study of Mobile Web App Security MOST-2015 - San Jose,USA
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework NDSS-2015 - san diego,usa
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware NDSS-2015 - san diego,usa
Keynote:" Eliciting maliciousness: from exploit toolkits to evasive Malware" MalCon-2014 - fajardo,puerto rico
Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel Raid-2014 - gottenburg,sweden
Eyes of a Human, Eyes of a Program: Leveraging different views of the web for analysis and detection Raid-2014 - gottenburg,sweden
BareCloud: Bare-metal Analysis-based Evasive Malware Detection usenix-2014 - san diego,usa
Web Security: The Browser Strikes Back usenix-2014 - san diego,usa
Hulk: Eliciting Malicious Behavior in Browser Extensions usenix-2014 - san diego,usa
PExy: The other side of Exploit Kits Dimva-2014 - London,UK
The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape asiaccs-2014 - kyoto,japan
The Tricks of the Trade: What Makes Spam Campaigns Successful? IWCC-2014 - san jose,usa
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications NDSS-2014 - San Diego,USA
Nazca: Detecting Malware Distribution in Large-Scale Networks NDSS-2014 - San Diego,USA
Message In A Bottle: Sailing Past Censorship ACSAC-2013 - New Orleans, USA
SigMal: A Static Signal Processing Based Malware Triage ACSAC-2013 - New Orleans, USA
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware USENIX-2013 - Washington, D.C.
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services USENIX-2013 - Washington, D.C.
Malevolution: The Evolution of Evasive Malware Dimva-2013 - Berlin,Germany
B@bel: Leveraging Email Delivery for Spam Mitigation USENIX-2012 - Washington, D.C.
PUBCRAWL: Protecting Users and Businesses from CRAWLers USENIX-2012 - Washington, D.C.
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner USENIX-2012 - Washington, D.C.
Escape from Monkey Island: Evading High-Interaction Honeyclients 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece
MISHIMA: Multilateration of Internet hosts hidden using malicious fast-flux agents (Short Paper) 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece
Message In A Bottle: Sailing Past Censorship Privacy Enhancing Technologies Symposium-2012 - Vigo, Spain
Fear the EAR: Discovering and Mitigating Execution After Redirect Vulnerabilities Confrence-on-computer-communications-security-2011 - Chicago, USA
Escape from Monkey Island: Evading High-Interaction Honeyclients dimva-2011 - Amsterdam,Netherkands
MISHIMA: Multilateration of Internet hosts hidden using malicious fast-flux agents (Short Paper) dimva-2011 - Amsterdam,Netherkands
Toward Automated Detection Of Logic Vulnerabilities In Web Applications 19th USENIX Security Symposium-2010 - Washington DC, USA Security Web
Static Enforcement Of Web Application Integrity Through Strong Typing 18th USENIX Security Symposium-2009 - Montreal, Canada Security Web
There Is No Free Phish: An Analysis Of Free And Live Phishing Kits 2nd USENIX Workshop on Offensive Technologies-2008 - San Jose, USA Security Analysis Phishing
Panel: E-Voting 16th USENIX Security Symposium-2007 - Boston, USA Security
Catch Me, If You Can: Evading Network Signatures With Web-Based Polymorphic Worms 1st USENIX Workshop on Offensive Technologies-2007 - Boston, USA Security
Behavior-Based Spyware Detection 15th USENIX Security Symposium-2006 - Vancouver, Canada Security
Automating Mimicry Attacks Using Static Binary Analysis 14th USENIX Security Symposium-2005 - Baltimore, USA Security Analysis
Static Disassembly Of Obfuscated Binaries 13th USENIX Security Symposium-2004 - San Diego, USA Security
Detecting Malicious Java Code Using Virtual Machine Auditing 12th USENIX Security Symposium-2003 - Washington DC, USA Security Auditing