Mariano Graziano
Mariano Graziano
Verified email at - Homepage
Cited by
Cited by
Understanding linux malware
E Cozzi, M Graziano, Y Fratantonio, D Balzarotti
2018 IEEE symposium on security and privacy (SP), 161-175, 2018
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence
M Graziano, D Canali, L Bilge, A Lanzi, E Shi, D Balzarotti, M van Dijk, ...
24th USENIX Security Symposium (USENIX Security 15), 1057-1072, 2015
Hypervisor memory forensics
M Graziano, A Lanzi, D Balzarotti
International Workshop on Recent Advances in Intrusion Detection, 21-40, 2013
A close look at a daily dataset of malware samples
X Ugarte-Pedrero, M Graziano, D Balzarotti
ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-30, 2019
Towards Network Containment in Malware Analysis Systems
M Graziano, C Leita, D Balzarotti
ROPMEMU: A framework for the analysis of complex code-reuse attacks
M Graziano, D Balzarotti, A Zidouemba
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Subverting operating system properties through evolutionary DKOM attacks
M Graziano, L Flore, A Lanzi, D Balzarotti
International Conference on Detection of Intrusions and Malware, and …, 2016
Micro-virtualization memory tracing to detect and prevent spraying attacks
S Cristalli, M Pagnozzi, M Graziano, A Lanzi, D Balzarotti
25th {USENIX} Security Symposium ({USENIX} Security 16), 431-446, 2016
Smashing the stack in 2010
M Graziano, A Cugliari
no. July, 1-73, 2010
Survivalism: Systematic analysis of windows malware living-off-the-land
F Barr-Smith, X Ugarte-Pedrero, M Graziano, R Spolaor, I Martinovic
2021 IEEE Symposium on Security and Privacy (SP), 1557-1574, 2021
Measuring the role of greylisting and nolisting in fighting spam
F Pagani, M De Astis, M Graziano, A Lanzi, D Balzarotti
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
Through the {Looking-Glass}, and What Eve Found There
L Bruno, M Graziano, D Balzarotti, A Francillon
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
How machine learning is solving the binary function similarity problem
A Marcelli, M Graziano, X Ugarte-Pedrero, Y Fratantonio, M Mansouri, ...
31st USENIX Security Symposium (USENIX Security 22), 2099-2116, 2022
Lost in the Loader: The Many Faces of the Windows PE File Format
D Nisi, M Graziano, Y Fratantonio, D Balzarotti
24th International Symposium on Research in Attacks, Intrusions and Defenses …, 2021
SnakeGX: a sneaky attack against SGX Enclaves
F Toffalini, M Graziano, M Conti, J Zhou
International Conference on Applied Cryptography and Network Security, 333-362, 2021
The evidence beyond the wall: Memory forensics in SGX environments
F Toffalini, A Oliveri, M Graziano, J Zhou, D Balzarotti
Forensic Science International: Digital Investigation 39, 301313, 2021
The system can't perform the operation now. Try again later.
Articles 1–16