Giovanni Vigna
Affiliations: | Computer Science | University of California, Santa Barbara, Santa Barbara, CA, United States |
Google:
"Giovanni Vigna"Parents
Sign in to add mentorCarlo Ghezzi | grad student | 1998 | Politecnico di Milano | |
(Dissertation: Mobile Code Technologies, Paradigms, and Applications) |
Children
Sign in to add traineeDhilung Kirat | research assistant | 2015 | UC Santa Barbara |
Luca Invernizzi | grad student | ||
William K. Robertson | grad student | 2003-2009 | UC Santa Barbara |
Marco Cova | grad student | 2010 | UC Santa Barbara |
Viktoria V. Felmetsger | grad student | 2010 | UC Santa Barbara |
Adam L. Doupe | grad student | 2014 | UC Santa Barbara |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Egele M, Stringhini G, Kruegel C, et al. (2017) Towards Detecting Compromised Accounts on Social Networks Ieee Transactions On Dependable and Secure Computing. 14: 447-460 |
Zand A, Modelo-Howard G, Tongaonkar A, et al. (2017) Demystifying DDoS as a Service Ieee Communications Magazine. 55: 14-21 |
Falsina L, Fratantonio Y, Zanero S, et al. (2015) Grab 'n run: Secure and practical dynamic code loading for android applications Acm International Conference Proceeding Series. 7: 201-210 |
Mutti S, Fratantonio Y, Bianchi A, et al. (2015) Baredroid: Large-Scale analysis of android apps on real devices Acm International Conference Proceeding Series. 7: 71-80 |
Zand A, Houmansadr A, Vigna G, et al. (2015) Know your achilles' heel: Automatic detection of network critical services Acm International Conference Proceeding Series. 7: 41-50 |
Bianchi A, Fratantonio Y, Kruegel C, et al. (2015) NJAS: Sandboxing unmodified applications in non-rooted devices running stock android Spsm 2015 - Proceedings of the 5th Annual Acm Ccs Workshop On Security and Privacy in Smartphones and Mobile Devices, Co-Located With: Ccs 2015. 27-38 |
Fratantonio Y, Machiry A, Bianchi A, et al. (2015) CLAPP: Characterizing loops in Android applications (invited talk) 3rd International Workshop On Software Development Lifecycle For Mobile, Demobile 2015 - Proceedings. 33-34 |
Bianchi A, Corbetta J, Invernizzi L, et al. (2015) What the app is that? Deception and countermeasures in the android user interface Proceedings - Ieee Symposium On Security and Privacy. 2015: 931-948 |
Caillat B, Gilbert B, Kemmerer R, et al. (2015) Prison: Tracking process interactions to contain malware Proceedings - 2015 Ieee 17th International Conference On High Performance Computing and Communications, 2015 Ieee 7th International Symposium On Cyberspace Safety and Security and 2015 Ieee 12th International Conference On Embedded Software and Systems, Hpcc-Css-Icess 2015. 1282-1291 |
Fratantonio Y, Bianchi A, Robertson W, et al. (2015) On the security and engineering implications of finer-grained access controls for android developers and users Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9148: 282-303 |