Davide Balzarotti [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices. NDSS-2018 - san diego,usa
When Malware is Packin’ Heat enigma-2018 - santa clara,usa
Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies usenixsecurity-2017 - vancouver,canada
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks USENIX-2016 - austin,usa
Subverting Operating System Properties through Evolutionary DKOM Attacks Dimva-2016 - Donostia-San Sebastián, Spain
RAMBO: Run-time packer Analysis with Multiple Branch Observation Dimva-2016 - Donostia-San Sebastián, Spain
Google Dorks: Analysis, Creation, and new Defenses Dimva-2016 - Donostia-San Sebastián, Spain
PIE: Parser Identification in Embedded Systems ACSAC-2015 - los angeles,usa
In the Compression Hornet’s Nest: A Security Study of Data Compression in Network Services SecuritySymposium-2015 - washington,USA
The Impact of GPU-Assisted Malware on Memory Forensics: A Case Study DFRWS-2015 - Philadelphia,USA
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks, Dimva-2015 - Milan,Italy
The Role of Cloud Services in Malicious Software: Trends and Insights, Dimva-2015 - Milan,Italy
FIRMWARE.RE: FIRMWARE UNPACKING, ANALYSIS AND VULNERABILITY-DISCOVERY AS A SERVICE BlackHatEU-2014 - amsterdam,netherlands
A Large-Scale Analysis of the Security of Embedded Firmwares usenix-2014 - san diego,usa
Through the Looking-Glass, and What Eve Found There Woot-2014 - san diego,usa
On The Effectiveness of Risk Prediction Based on Users Browsing Behavior asiaccs-2014 - kyoto,japan
On the Feasibility of Software Attacks on Commodity Virtual Machine Monitors via Direct Device Assignment asiaccs-2014 - kyoto,japan
Shades of Grey: A Closer Look at Emails in the Gray Area asiaccs-2014 - kyoto,japan
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares NDSS-2014 - San Diego,USA
Toward Black-Box Detection of Logic Flaws in Web Applications NDSS-2014 - San Diego,USA
Implementation and Implications of a Stealth Hard-Drive Backdoor ACSAC-2013 - New Orleans, USA
Reverse Social Engineering Attacks in Online Social Networks 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece
Reverse Social Engineering Attacks in Online Social Networks dimva-2011 - Amsterdam,Netherkands
A View On Current Malware Behaviors 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Malware
Catch Me, If You Can: Evading Network Signatures With Web-Based Polymorphic Worms 1st USENIX Workshop on Offensive Technologies-2007 - Boston, USA Security