Year |
Citation |
Score |
2012 |
Invernizzi L, Comparetti PM, Benvenuti S, Kruegel C, Cova M, Vigna G. EvilSeed: A guided approach to finding malicious web pages Proceedings - Ieee Symposium On Security and Privacy. 428-442. DOI: 10.1109/SP.2012.33 |
0.568 |
|
2011 |
Leita C, Cova M. HARMUR: Storing and analyzing historic data on malicious domains Proceedings of the 1st Workshop On Building Analysis Datasets and Gathering Experience Returns For Security, Badgers 2011. 46-53. DOI: 10.1145/1978672.1978678 |
0.362 |
|
2011 |
Canali D, Cova M, Vigna G, Kruegel C. Prophiler: A fast filter for the large-scale detection of malicious web pages Proceedings of the 20th International Conference On World Wide Web, Www 2011. 197-206. DOI: 10.1145/1963405.1963436 |
0.605 |
|
2011 |
Stone-Gross B, Cova M, Gilbert B, Kemmerer R, Kruegel C, Vigna G. Analysis of a botnet takeover Ieee Security and Privacy. 9: 64-72. DOI: 10.1109/MSP.2010.144 |
0.522 |
|
2011 |
Stone-Gross B, Cova M, Kruegel C, Vigna G. Peering through the iframe Proceedings - Ieee Infocom. 411-415. DOI: 10.1109/INFCOM.2011.5935193 |
0.578 |
|
2011 |
Kapravelos A, Cova M, Kruegel C, Vigna G. Escape from monkey island: Evading high-interaction honeyclients Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6739: 124-143. DOI: 10.1007/978-3-642-22424-9_8 |
0.619 |
|
2010 |
Cova M, Kruegel C, Vigna G. Detection and analysis of drive-by-download attacks and malicious JavaScript code Proceedings of the 19th International Conference On World Wide Web, Www '10. 281-290. DOI: 10.1145/1772690.1772720 |
0.525 |
|
2010 |
Balzarotti D, Banks G, Cova M, Felmetsger V, Kemmerer R, Robertson W, Valeur F, Vigna G. An experience in testing the security of real-world electronic voting systems Ieee Transactions On Software Engineering. 36: 453-473. DOI: 10.1109/Tse.2009.53 |
0.709 |
|
2010 |
Cova M, Leita C, Thonnard O, Keromytis A, Dacier M. Gone rogue: An analysis of rogue security software campaigns Ec2nd 2009 - European Conference On Computer Network Defense. 1-3. DOI: 10.1109/EC2ND.2009.8 |
0.328 |
|
2010 |
Cova M, Leita C, Thonnard O, Keromytis AD, Dacier M. An analysis of rogue AV campaigns Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 442-463. DOI: 10.1007/978-3-642-15512-3_23 |
0.343 |
|
2010 |
Childers N, Boe B, Cavallaro L, Cavedon L, Cova M, Egele M, Vigna G. Organizing large scale hacking competitions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6201: 132-152. DOI: 10.1007/978-3-642-14215-4_8 |
0.41 |
|
2010 |
Doupé A, Cova M, Vigna G. Why Johnny can't pentest: An analysis of black-box web vulnerability scanners Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6201: 111-131. DOI: 10.1007/978-3-642-14215-4_7 |
0.489 |
|
2009 |
Stone-Gross B, Cova M, Cavallaro L, Gilbert B, Szydlowski M, Kemmerer R, Kruegel C, Vigna G. Your botnet is my botnet: Analysis of a botnet takeover Proceedings of the Acm Conference On Computer and Communications Security. 635-647. DOI: 10.1145/1653662.1653738 |
0.479 |
|
2009 |
Ford S, Cova M, Kruegel C, Vigna G. Analyzing and detecting malicious flash advertisements Proceedings - Annual Computer Security Applications Conference, Acsac. 363-372. DOI: 10.1109/ACSAC.2009.41 |
0.63 |
|
2008 |
Balzarotti D, Banks G, Cova M, Felmetsger V, Kemmerer R, Robertson W, Valeur F, Vigna G. Are your votes really counted? Testing the security of real-world electronic voting systems Issta'08: Proceedings of the 2008 International Symposium On Software Testing and Analysis 2008. 237-247. DOI: 10.1145/1390630.1390660 |
0.694 |
|
2008 |
Balzarotti D, Cova M, Vigna G. ClearShot: Eavesdropping on keyboard input from video Proceedings - Ieee Symposium On Security and Privacy. 170-183. DOI: 10.1109/SP.2008.28 |
0.54 |
|
2008 |
Balzarotti D, Cova M, Felmetsger V, Jovanovic N, Kirda E, Kruegel C, Vigna G. Saner: Composing static and dynamic analysis to validate sanitization in web applications Proceedings - Ieee Symposium On Security and Privacy. 387-401. DOI: 10.1109/SP.2008.22 |
0.738 |
|
2007 |
Balzarotti D, Cova M, Felmetsger VV, Vigna G. Multi-module vulnerability analysis of web-based applications Proceedings of the Acm Conference On Computer and Communications Security. 25-35. DOI: 10.1145/1315245.1315250 |
0.761 |
|
2007 |
Cova M, Felmetsger V, Vigna G. Vulnerability analysis of Web-based applications Test and Analysis of Web Services. 363-394. DOI: 10.1007/978-3-540-72912-9_13 |
0.758 |
|
2007 |
Cova M, Balzarotti D, Felmetsger V, Vigna G. Swaddler: An approach for the anomaly-based detection of state violations in web applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4637: 63-86. |
0.752 |
|
2006 |
Cova M, Felmetsger V, Banks G, Vigna G. Static detection of vulnerabilities in x86 executables Proceedings - Annual Computer Security Applications Conference, Acsac. 269-278. DOI: 10.1109/ACSAC.2006.50 |
0.724 |
|
2006 |
Banks G, Cova M, Felmetsger V, Almeroth K, Kemmerer R, Vigna G. SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4176: 343-358. |
0.723 |
|
Show low-probability matches. |