Stefano Zanero [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
BREAKING THE LAWS OF ROBOTICS: ATTACKING INDUSTRIAL ROBOTS blackhat-2017 - las vegas,usa
SHIELDFS: THE LAST WORD IN RANSOMWARE RESILIENT FILE SYSTEMS blackhat-2017 - las vegas,usa
POCKET-SIZED BADNESS: WHY RANSOMWARE COMES AS A PLOT TWIST IN THE CAT-MOUSE GAME BlackHatEU-2016 - London,uk
Things in the cloud: (in)security profiles of the CSAceeSummit-2016 - ljubljana,slovenia
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications ACSAC-2015 - los angeles,usa
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries, Dimva-2015 - Milan,Italy
Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications MOST-2015 - San Jose,USA
Face in the Distorting Mirror: Revisiting Photo-based Social Authentication CCS-2014 - Scottsdale,USA
AUTOMATIC, SCALABLE EXTRACTION OF MALICIOUS BEHAVIOR FROM LARGE DATASETS HackInTheBoxMalaysia-2014 - kuala lampur,malaysia
Botintime - Phoenix: DGA-based Botnet Tracking and Intelligence BlueHat-2014 - Redmond,USA
Jackdaw talk - Automatic Malware Behavior Extraction and Tagging BlueHat-2014 - Redmond,USA
Zarathustra: Extracting WebInject Signatures from Banking Trojans PST-2014 - Toronto,Canada
AndRadar: Fast Discovery of Android Applications in Alternative Markets Dimva-2014 - London,UK
Phoenix: DGA-based Botnet Tracking and Intelligence Dimva-2014 - London,UK
BankSealer: An Online Banking Fraud Analysis and Decision Support System ifip-2014 - Marrakech,Morroco
A Comprehensive Black-box Methodology for Testing the Forensic Characteristics of Solid-state Drives ACSAC-2013 - New Orleans, USA
Tracking and Characterizing Botnets Using Automatically Generated Domains HITBSecConf Malaysia-2013 - Kuala Lumpur,Malaysia
All Your Faces Are Belong to Us --Breaking Facebook's Social Authentication Hackcon-2013 - Oslo, Norway Security
Behavior--based Methods for Automated, Scalable Malware Analysis HITBSecConf Malaysia-2012 - KL, Malaysia Reverse Engineering Malware Static Analysis At Scale Dynamic Analysis
iSnoop: How to Steal Secrets From Touchscreen Devices BlackHatAbuDhabi-2011 - Emirates Palace, Abu Dhabi
Session: Vulnerability Discovery EC2ND-2010 - Germany Security
Machine Learning For Computer Security: Blessing Or Curse? EC2ND-2010 - Germany Security
Welcome EC2ND-2009 - Germany Security
Integrated Detection Of Attacks Against Browsers, Web Applications And Databases EC2ND-2009 - Germany Security
A Web Application Firewall based on Anomaly Detection DeepSec-2008 - Vienna,Austria
Observing the Tidal Waves of Malware DeepSec-2007 - Vienna,Austria
Observing The Tidal Waves Of Malware Blackhat USA-2007 - Las Vegas, USA Security Malware
Flaws and frauds in the evaluation of IDS/IPS technologies First-2007 - Seville,Spain
360° Anomaly Based Unsupervised Intrusion Detection Blackhat Europe-2007 - Amsterdam, The Netherlands Security
Observing the Tidal Waves of Malware BlackHatDC-2007 - Washington,USA
Host-Based Anomaly Detection on System Call Arguments BlackhatUSA-2006 - Las Vegas,USA
Anomaly Detection Through System Call Argument Analysis Blackhat Europe-2006 - Amsterdam, The Netherlands Security Analysis
Automatically Detecting Web Application Vulnerabilities By Variable Flow Reconstruction Blackhat Europe-2005 - Amsterdam, The Netherlands Security Web
Detecting Ø-Days Attacks With Learning Intrusion Detection Systems Blackhat USA-2004 - Las Vegas, USA Security
Detecting Ø-Days Attacks With Learning Intrusion Detection Systems Blackhat Europe-2004 - Amsterdam, The Netherlands Security