Giovanni Vigna

Affiliations: 
Computer Science University of California, Santa Barbara, Santa Barbara, CA, United States 
Google:
"Giovanni Vigna"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Falsina L, Fratantonio Y, Zanero S, et al. (2015) Grab 'n run: Secure and practical dynamic code loading for android applications Acm International Conference Proceeding Series. 7: 201-210
Mutti S, Fratantonio Y, Bianchi A, et al. (2015) Baredroid: Large-Scale analysis of android apps on real devices Acm International Conference Proceeding Series. 7: 71-80
Zand A, Houmansadr A, Vigna G, et al. (2015) Know your achilles' heel: Automatic detection of network critical services Acm International Conference Proceeding Series. 7: 41-50
Kirat D, Vigna G. (2015) MalGene: Automatic extraction of malware analysis evasion signature Proceedings of the Acm Conference On Computer and Communications Security. 2015: 769-780
Hao S, Borgolte K, Nikiforakis N, et al. (2015) Drops for stuff: An analysis of reshipping mule scams Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1081-1092
Bianchi A, Fratantonio Y, Kruegel C, et al. (2015) NJAS: Sandboxing unmodified applications in non-rooted devices running stock android Spsm 2015 - Proceedings of the 5th Annual Acm Ccs Workshop On Security and Privacy in Smartphones and Mobile Devices, Co-Located With: Ccs 2015. 27-38
Fratantonio Y, Machiry A, Bianchi A, et al. (2015) CLAPP: Characterizing loops in Android applications (invited talk) 3rd International Workshop On Software Development Lifecycle For Mobile, Demobile 2015 - Proceedings. 33-34
Bianchi A, Corbetta J, Invernizzi L, et al. (2015) What the app is that? Deception and countermeasures in the android user interface Proceedings - Ieee Symposium On Security and Privacy. 2015: 931-948
Mirkovic J, Dark M, Du W, et al. (2015) Evaluating Cybersecurity Education Interventions: Three Case Studies Ieee Security and Privacy. 13: 63-69
Caillat B, Gilbert B, Kemmerer R, et al. (2015) Prison: Tracking process interactions to contain malware Proceedings - 2015 Ieee 17th International Conference On High Performance Computing and Communications, 2015 Ieee 7th International Symposium On Cyberspace Safety and Security and 2015 Ieee 12th International Conference On Embedded Software and Systems, Hpcc-Css-Icess 2015. 1282-1291
See more...