Marco Cova, Ph.D. - Publications

Affiliations: 
2010 Computer Science University of California, Santa Barbara, Santa Barbara, CA, United States 

22 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2012 Invernizzi L, Comparetti PM, Benvenuti S, Kruegel C, Cova M, Vigna G. EvilSeed: A guided approach to finding malicious web pages Proceedings - Ieee Symposium On Security and Privacy. 428-442. DOI: 10.1109/SP.2012.33  0.568
2011 Leita C, Cova M. HARMUR: Storing and analyzing historic data on malicious domains Proceedings of the 1st Workshop On Building Analysis Datasets and Gathering Experience Returns For Security, Badgers 2011. 46-53. DOI: 10.1145/1978672.1978678  0.362
2011 Canali D, Cova M, Vigna G, Kruegel C. Prophiler: A fast filter for the large-scale detection of malicious web pages Proceedings of the 20th International Conference On World Wide Web, Www 2011. 197-206. DOI: 10.1145/1963405.1963436  0.605
2011 Stone-Gross B, Cova M, Gilbert B, Kemmerer R, Kruegel C, Vigna G. Analysis of a botnet takeover Ieee Security and Privacy. 9: 64-72. DOI: 10.1109/MSP.2010.144  0.522
2011 Stone-Gross B, Cova M, Kruegel C, Vigna G. Peering through the iframe Proceedings - Ieee Infocom. 411-415. DOI: 10.1109/INFCOM.2011.5935193  0.578
2011 Kapravelos A, Cova M, Kruegel C, Vigna G. Escape from monkey island: Evading high-interaction honeyclients Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6739: 124-143. DOI: 10.1007/978-3-642-22424-9_8  0.619
2010 Cova M, Kruegel C, Vigna G. Detection and analysis of drive-by-download attacks and malicious JavaScript code Proceedings of the 19th International Conference On World Wide Web, Www '10. 281-290. DOI: 10.1145/1772690.1772720  0.525
2010 Balzarotti D, Banks G, Cova M, Felmetsger V, Kemmerer R, Robertson W, Valeur F, Vigna G. An experience in testing the security of real-world electronic voting systems Ieee Transactions On Software Engineering. 36: 453-473. DOI: 10.1109/Tse.2009.53  0.709
2010 Cova M, Leita C, Thonnard O, Keromytis A, Dacier M. Gone rogue: An analysis of rogue security software campaigns Ec2nd 2009 - European Conference On Computer Network Defense. 1-3. DOI: 10.1109/EC2ND.2009.8  0.328
2010 Cova M, Leita C, Thonnard O, Keromytis AD, Dacier M. An analysis of rogue AV campaigns Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 442-463. DOI: 10.1007/978-3-642-15512-3_23  0.343
2010 Childers N, Boe B, Cavallaro L, Cavedon L, Cova M, Egele M, Vigna G. Organizing large scale hacking competitions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6201: 132-152. DOI: 10.1007/978-3-642-14215-4_8  0.41
2010 Doupé A, Cova M, Vigna G. Why Johnny can't pentest: An analysis of black-box web vulnerability scanners Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6201: 111-131. DOI: 10.1007/978-3-642-14215-4_7  0.489
2009 Stone-Gross B, Cova M, Cavallaro L, Gilbert B, Szydlowski M, Kemmerer R, Kruegel C, Vigna G. Your botnet is my botnet: Analysis of a botnet takeover Proceedings of the Acm Conference On Computer and Communications Security. 635-647. DOI: 10.1145/1653662.1653738  0.479
2009 Ford S, Cova M, Kruegel C, Vigna G. Analyzing and detecting malicious flash advertisements Proceedings - Annual Computer Security Applications Conference, Acsac. 363-372. DOI: 10.1109/ACSAC.2009.41  0.63
2008 Balzarotti D, Banks G, Cova M, Felmetsger V, Kemmerer R, Robertson W, Valeur F, Vigna G. Are your votes really counted? Testing the security of real-world electronic voting systems Issta'08: Proceedings of the 2008 International Symposium On Software Testing and Analysis 2008. 237-247. DOI: 10.1145/1390630.1390660  0.694
2008 Balzarotti D, Cova M, Vigna G. ClearShot: Eavesdropping on keyboard input from video Proceedings - Ieee Symposium On Security and Privacy. 170-183. DOI: 10.1109/SP.2008.28  0.54
2008 Balzarotti D, Cova M, Felmetsger V, Jovanovic N, Kirda E, Kruegel C, Vigna G. Saner: Composing static and dynamic analysis to validate sanitization in web applications Proceedings - Ieee Symposium On Security and Privacy. 387-401. DOI: 10.1109/SP.2008.22  0.738
2007 Balzarotti D, Cova M, Felmetsger VV, Vigna G. Multi-module vulnerability analysis of web-based applications Proceedings of the Acm Conference On Computer and Communications Security. 25-35. DOI: 10.1145/1315245.1315250  0.761
2007 Cova M, Felmetsger V, Vigna G. Vulnerability analysis of Web-based applications Test and Analysis of Web Services. 363-394. DOI: 10.1007/978-3-540-72912-9_13  0.758
2007 Cova M, Balzarotti D, Felmetsger V, Vigna G. Swaddler: An approach for the anomaly-based detection of state violations in web applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4637: 63-86.  0.752
2006 Cova M, Felmetsger V, Banks G, Vigna G. Static detection of vulnerabilities in x86 executables Proceedings - Annual Computer Security Applications Conference, Acsac. 269-278. DOI: 10.1109/ACSAC.2006.50  0.724
2006 Banks G, Cova M, Felmetsger V, Almeroth K, Kemmerer R, Vigna G. SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4176: 343-358.  0.723
Show low-probability matches.