All your contacts are belong to us: automated identity theft attacks on social networks L Bilge, T Strufe, D Balzarotti, E Kirda Proceedings of the 18th international conference on World wide web, 551-560, 2009 | 692 | 2009 |
Saner: Composing static and dynamic analysis to validate sanitization in web applications D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ... 2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008 | 468 | 2008 |
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2015 | 363 | 2015 |
A large-scale analysis of the security of embedded firmwares A Costin, J Zaddach, A Francillon, D Balzarotti 23rd {USENIX} Security Symposium ({USENIX} Security 14), 95-110, 2014 | 346 | 2014 |
G-Free: defeating return-oriented programming through gadget-less binaries K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda Proceedings of the 26th Annual Computer Security Applications Conference, 49-58, 2010 | 330 | 2010 |
Disclosure: detecting botnet command and control servers through large-scale netflow analysis L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 273 | 2012 |
A view on current malware behaviors U Bayer, I Habibi, D Balzarotti, E Kirda, C Kruegel Proceedings of the 2nd USENIX conference on Large-scale exploits and …, 2009 | 254* | 2009 |
Testing network-based intrusion detection signatures using mutant exploits G Vigna, W Robertson, D Balzarotti Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 249 | 2004 |
Efficient Detection of Split Personalities in Malware. D Balzarotti, M Cova, C Karlberger, E Kirda, C Kruegel, G Vigna NDSS, 2010 | 243 | 2010 |
Abusing social networks for automated user profiling M Balduzzi, C Platzer, T Holz, E Kirda, D Balzarotti, C Kruegel Recent Advances in Intrusion Detection, 422-441, 2010 | 221 | 2010 |
Exposure: A passive dns analysis service to detect and report malicious domains L Bilge, S Sen, D Balzarotti, E Kirda, C Kruegel ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-28, 2014 | 215 | 2014 |
Swaddler: An approach for the anomaly-based detection of state violations in web applications M Cova, D Balzarotti, V Felmetsger, G Vigna International Workshop on Recent Advances in Intrusion Detection, 63-86, 2007 | 214 | 2007 |
Accessminer: using system-centric models for malware protection A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 209 | 2010 |
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares. J Zaddach, L Bruno, A Francillon, D Balzarotti NDSS 23, 1-16, 2014 | 208 | 2014 |
A security analysis of amazon's elastic compute cloud service M Balduzzi, J Zaddach, D Balzarotti, E Kirda, S Loureiro Proceedings of the 27th annual ACM symposium on applied computing, 1427-1434, 2012 | 163 | 2012 |
Reverse social engineering attacks in online social networks D Irani, M Balduzzi, D Balzarotti, E Kirda, C Pu International conference on detection of intrusions and malware, and …, 2011 | 157 | 2011 |
A quantitative study of accuracy in system call-based malware detection D Canali, A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda Proceedings of the 2012 International Symposium on Software Testing and …, 2012 | 150 | 2012 |
Multi-module vulnerability analysis of web-based applications D Balzarotti, M Cova, VV Felmetsger, G Vigna Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 146 | 2007 |
Clearshot: Eavesdropping on keyboard input from video D Balzarotti, M Cova, G Vigna 2008 IEEE Symposium on Security and Privacy (sp 2008), 170-183, 2008 | 138 | 2008 |
A solution for the automated detection of clickjacking attacks M Balduzzi, M Egele, E Kirda, D Balzarotti, C Kruegel Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 108 | 2010 |