Marco Cova, Ph.D.

Affiliations: 
2010 Computer Science University of California, Santa Barbara, Santa Barbara, CA, United States 
Google:
"Marco Cova"

Parents

Sign in to add mentor
Giovanni Vigna grad student 2010 UC Santa Barbara
 (Taming the Malicious Web: Avoiding and Detecting Web-based Attacks.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Invernizzi L, Comparetti PM, Benvenuti S, et al. (2012) EvilSeed: A guided approach to finding malicious web pages Proceedings - Ieee Symposium On Security and Privacy. 428-442
Leita C, Cova M. (2011) HARMUR: Storing and analyzing historic data on malicious domains Proceedings of the 1st Workshop On Building Analysis Datasets and Gathering Experience Returns For Security, Badgers 2011. 46-53
Canali D, Cova M, Vigna G, et al. (2011) Prophiler: A fast filter for the large-scale detection of malicious web pages Proceedings of the 20th International Conference On World Wide Web, Www 2011. 197-206
Stone-Gross B, Cova M, Gilbert B, et al. (2011) Analysis of a botnet takeover Ieee Security and Privacy. 9: 64-72
Stone-Gross B, Cova M, Kruegel C, et al. (2011) Peering through the iframe Proceedings - Ieee Infocom. 411-415
Kapravelos A, Cova M, Kruegel C, et al. (2011) Escape from monkey island: Evading high-interaction honeyclients Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6739: 124-143
Cova M, Kruegel C, Vigna G. (2010) Detection and analysis of drive-by-download attacks and malicious JavaScript code Proceedings of the 19th International Conference On World Wide Web, Www '10. 281-290
Balzarotti D, Banks G, Cova M, et al. (2010) An experience in testing the security of real-world electronic voting systems Ieee Transactions On Software Engineering. 36: 453-473
Cova M, Leita C, Thonnard O, et al. (2010) Gone rogue: An analysis of rogue security software campaigns Ec2nd 2009 - European Conference On Computer Network Defense. 1-3
Cova M, Leita C, Thonnard O, et al. (2010) An analysis of rogue AV campaigns Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 442-463
See more...