default search action
Andrea Lanzi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j12]Antonio Nappa, Aaron Úbeda-Portugués, Panagiotis Papadopoulos, Matteo Varvello, Juan Tapiador, Andrea Lanzi:
Scramblesuit: An effective timing side-channels framework for malware sandbox evasion. J. Comput. Secur. 30(6): 851-876 (2022) - [j11]Danilo Bruschi, Andrea Di Pasquale, Silvio Ghilardi, Andrea Lanzi, Elena Pagani:
A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks. IEEE Trans. Dependable Secur. Comput. 19(6): 4082-4098 (2022) - [c36]Luca Buccioli, Stefano Cristalli, Edoardo Vignati, Lorenzo Nava, Daniele Badagliacca, Danilo Bruschi, Long Lu, Andrea Lanzi:
JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language. STM 2022: 136-155 - 2021
- [j10]Fabio Pierazzi, Stefano Cristalli, Danilo Bruschi, Michele Colajanni, Mirco Marchetti, Andrea Lanzi:
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks. IEEE Trans. Inf. Forensics Secur. 16: 740-755 (2021) - [c35]Antonio Nappa, Panagiotis Papadopoulos, Matteo Varvello, Daniel Aceituno Gomez, Juan Tapiador, Andrea Lanzi:
PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes. ESORICS (1) 2021: 86-109 - [i4]Antonio Nappa, Christopher Hobbs, Andrea Lanzi:
Deja-Vu: A Glimpse on Radioactive Soft-Error Consequences on Classical and Quantum Computations. CoRR abs/2105.05103 (2021) - [i3]Antonio Nappa, Panagiotis Papadopoulos, Matteo Varvello, Daniel Aceituno Gomez, Juan Tapiador, Andrea Lanzi:
POW-HOW: An enduring timing side-channel to evadeonline malware sandboxes. CoRR abs/2109.02979 (2021) - 2020
- [j9]Andrea Lanzi:
Editorial: Advanced Techniques for Memory Forensics Analysis. Mob. Networks Appl. 25(1): 234-235 (2020) - [c34]Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-Purpose Program Obfuscation. TrustCom 2020: 394-401 - [e1]Lorenzo Cavallaro, Andrea Lanzi:
Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys 2020, Heraklion, Greece, April 27, 2020. ACM 2020, ISBN 978-1-4503-7523-8 [contents] - [i2]Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-purpose Program Obfuscation. CoRR abs/2011.02607 (2020)
2010 – 2019
- 2019
- [j8]Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, C. Lee Giles:
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework. IEEE Access 7: 110050-110073 (2019) - [c33]Stefano Cristalli, Long Lu, Danilo Bruschi, Andrea Lanzi:
Detecting (absent) app-to-app authentication on cross-device short-distance channels. ACSAC 2019: 328-338 - [c32]Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. CODASPY 2019: 315-325 - [r1]Andrea Lanzi:
Game Bot Detection on Massive Multiplayer Online Role-Playing Games (MMORPGs) Systems. Encyclopedia of Computer Graphics and Games 2019 - [i1]Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. CoRR abs/1903.12505 (2019) - 2018
- [j7]Eran Toch, Claudio Bettini, Erez Shmueli, Laura Radaelli, Andrea Lanzi, Daniele Riboni, Bruno Lepri:
The Privacy Implications of Cyber Security Systems: A Technological Survey. ACM Comput. Surv. 51(2): 36:1-36:27 (2018) - [j6]Sergio Mascetti, Nadia Metoui, Andrea Lanzi, Claudio Bettini:
EPIC: a Methodology for Evaluating Privacy Violation Risk in Cybersecurity Systems. Trans. Data Priv. 11(3): 239-277 (2018) - [j5]Michele Carminati, Mario Polino, Andrea Continella, Andrea Lanzi, Federico Maggi, Stefano Zanero:
Security Evaluation of a Banking Fraud Analysis System. ACM Trans. Priv. Secur. 21(3): 11:1-11:31 (2018) - [c31]Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio:
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android. CCS 2018: 1120-1136 - [c30]Stefano Cristalli, Edoardo Vignati, Danilo Bruschi, Andrea Lanzi:
Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data. RAID 2018: 445-464 - 2017
- [j4]Andrea Continella, Michele Carminati, Mario Polino, Andrea Lanzi, Stefano Zanero, Federico Maggi:
Prometheus: Analyzing WebInject-based information stealers. J. Comput. Secur. 25(2): 117-137 (2017) - [c29]Danilo Bruschi, Andrea Di Pasquale, Silvio Ghilardi, Andrea Lanzi, Elena Pagani:
Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study -. IFM 2017: 391-406 - [c28]Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, C. Lee Giles:
Scholarly Digital Libraries as a Platform for Malware Distribution. SG-CRC 2017: 107-128 - 2016
- [c27]Nicola Basilico, Andrea Lanzi, Mattia Monga:
A Security Game Model for Remote Software Protection. ARES 2016: 437-443 - [c26]Mariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti:
Subverting Operating System Properties Through Evolutionary DKOM Attacks. DIMVA 2016: 3-24 - [c25]Fabio Pagani, Matteo De Astis, Mariano Graziano, Andrea Lanzi, Davide Balzarotti:
Measuring the Role of Greylisting and Nolisting in Fighting Spam. DSN 2016: 562-571 - [c24]Stefano Cristalli, Mattia Pagnozzi, Mariano Graziano, Andrea Lanzi, Davide Balzarotti:
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks. USENIX Security Symposium 2016: 431-446 - 2015
- [j3]Aristide Fattori, Andrea Lanzi, Davide Balzarotti, Engin Kirda:
Hypervisor-based malware protection with AccessMiner. Comput. Secur. 52: 33-50 (2015) - [c23]Mariano Graziano, Davide Canali, Leyla Bilge, Andrea Lanzi, Davide Balzarotti:
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence. USENIX Security Symposium 2015: 1057-1072 - 2014
- [j2]Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li:
PeerRush: Mining for unwanted P2P traffic. J. Inf. Secur. Appl. 19(3): 194-208 (2014) - [c22]Gábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon, Christoph Neumann:
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment. AsiaCCS 2014: 305-316 - [c21]Stefano Bianchi Mazzone, Mattia Pagnozzi, Aristide Fattori, Alessandro Reina, Andrea Lanzi, Danilo Bruschi:
Improving Mac OS X security through gray box fuzzing technique. EUROSEC 2014: 2:1-2:6 - 2013
- [c20]Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li:
PeerRush: Mining for Unwanted P2P Traffic. DIMVA 2013: 62-82 - [c19]Mariano Graziano, Andrea Lanzi, Davide Balzarotti:
Hypervisor Memory Forensics. RAID 2013: 21-40 - 2012
- [c18]Davide Canali, Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
A quantitative study of accuracy in system call-based malware detection. ISSTA 2012: 122-132 - 2011
- [c17]Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin, Davide Balzarotti:
Operating System Interface Obfuscation and the Revealing of Hidden Operations. DIMVA 2011: 214-233 - [c16]Leyla Bilge, Andrea Lanzi, Davide Balzarotti:
Thwarting real-time dynamic unpacking. EUROSEC 2011: 5 - 2010
- [c15]Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, Engin Kirda:
G-Free: defeating return-oriented programming through gadget-less binaries. ACSAC 2010: 49-58 - [c14]Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
AccessMiner: using system-centric models for malware protection. CCS 2010: 399-412
2000 – 2009
- 2009
- [c13]Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi:
Secure in-VM monitoring using hardware virtualization. CCS 2009: 477-487 - [c12]Andrea Lanzi, Monirul Islam Sharif, Wenke Lee:
K-Tracer: A System for Extracting Kernel Malware Behavior. NDSS 2009 - [c11]Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee:
Automatic Reverse Engineering of Malware Emulators. SP 2009: 94-109 - 2008
- [j1]Roberto Perdisci, Andrea Lanzi, Wenke Lee:
Classification of packed executables for accurate computer virus detection. Pattern Recognit. Lett. 29(14): 1941-1946 (2008) - [c10]Roberto Perdisci, Andrea Lanzi, Wenke Lee:
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. ACSAC 2008: 301-310 - [c9]Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Mattia Monga:
LISABETH: automated content-based signature generator for zero-day polymorphic worms. SESS 2008: 41-48 - [c8]Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee:
Impeding Malware Analysis Using Conditional Code Obfuscation. NDSS 2008 - [c7]Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin:
System Call API Obfuscation (Extended Abstract). RAID 2008: 421-422 - 2007
- [c6]Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi:
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. DIMVA 2007: 213-230 - [c5]Andrea Lanzi, Lorenzo Martignoni, Mattia Monga, Roberto Paleari:
A Smart Fuzzer for x86 Executables. SESS@ICSE 2007: 7 - [c4]Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi:
An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks. IPCCC 2007: 418-425 - [c3]Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi:
Diversified Process Replicæ for Defeating Memory Error Exploits. IPCCC 2007: 434-441 - 2005
- [c2]Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga:
Replay Attack in TCG Specification and Solution. ACSAC 2005: 127-137 - [c1]Danilo Bruschi, Igor Nai Fovino, Andrea Lanzi:
A Protocol for Anonymous and Accurate E-Polling. TCGOV 2005: 112-121
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint