Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Luca Invernizzi"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
To make cryptographic processors more resilient against side-channel attacks, engineers have developed various countermeasures. However, the effectiveness of these countermeasures is often uncertain, as it depends on the complex interplay between sof
Externí odkaz:
https://doaj.org/article/708f474d609e4d40b530b2b14f320163
Autor:
Elie Bursztein, David Tao, Luca Invernizzi, Cecilia M. Procopiuc, Borbala Benko, Bernhard Grill, Fabian Kaczmarczyck, Jennifer Pullman
Publikováno v:
ACSAC
Malware is one of the key threats to online security today, with applications ranging from phishing mailers to ransomware and trojans. Due to the sheer size and variety of the malware threat, it is impractical to combat it as a whole. Instead, govern
Autor:
Jess Hemerly, Paul Nicholas, Stephanie Caro, Andrew Strait, Theo Bertram, Harjinder Obhi, Elie Bursztein, Chris Hibbert, Luca Invernizzi, Yuan Niu, Al Verney, Jason Ketover, Peter Fleischer, Jay Laefer, Hubert Ming-Hwa Chao, David Price, Albin Gustafsson, Lanah Kammourieh Donnelly, Kurt Thomas, Rutledge Chin Feman
Publikováno v:
CCS
The "Right to be Forgotten" is a privacy ruling that enables Europeans to delist certain URLs appearing in search results related to their name. In order to illuminate the effect this ruling has on information access, we conducted a retrospective mea
Autor:
Danny Yuxing Huang, Vector Guo Li, Jonathan Levin, Luca Invernizzi, Kylie McRoberts, Kirill Levchenko, Alex C. Snoeren, Maxwell Aliapoulios, Elie Bursztein, Damon McCoy
Publikováno v:
IEEE Symposium on Security and Privacy
Ransomware is a type of malware that encrypts the files of infected hosts and demands payment, often in a crypto-currency like Bitcoin. In this paper, we create a measurement framework that we use to perform a large-scale, two-year, end-to-end measur
Autor:
Vijay Eranti, Oxana Comanescu, Elie Bursztein, Jacob Barrett, Vern Paxson, Juri Ranieri, Yarik Markov, Kurt Thomas, Angelika Moscicki, Ali Zand, Frank Li, Daniel Margolis, Luca Invernizzi
Publikováno v:
CCS
In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the course of March, 2016--March, 2017, we identify 788,000 potential vic
Autor:
Giovanni Vigna, Yong Fang, Cheng Huang, Christopher Kruegel, Jiayong Liu, Shuang Hao, Luca Invernizzi
Publikováno v:
AsiaCCS
Domain names play a critical role in cybercrime, because they identify hosts that serve malicious content (such as malware, Trojan binaries, or malicious scripts), operate as command-and-control servers, or carry out some other role in the malicious
Autor:
Kurt Thomas, Oxana Comanescu, Jean-Michel Picod, Luca Invernizzi, Alexandros Kapravelos, Elie Bursztein
Publikováno v:
IEEE Symposium on Security and Privacy
The contentious battle between web services and miscreants involved in blackhat search engine optimization and malicious advertisements has driven the underground to develop increasingly sophisticated techniques that hide the true nature of malicious
Autor:
Giovanni Vigna, Christopher Kruegel, Simone Mutti, Yanick Fratantonio, Luca Invernizzi, Antonio Bianchi, Kirat Dhilung Hang, Jacopo Corbetta
Publikováno v:
ACSAC
To protect Android users, researchers have been analyzing unknown, potentially-malicious applications by using systems based on emulators, such as the Google's Bouncer and Andrubis. Emulators are the go-to choice because of their convenience: they ca
Publikováno v:
Acta Applicandae Mathematicae. 115:209-232
In this paper, we present a control strategy design technique for an autonomous underwater vehicle based on solutions to the motion planning problem derived from differential geometric methods. The motion planning problem is motivated by the practica
Autor:
Luca Invernizzi, Jacopo Corbetta, Antonio Bianchi, Christopher Kruegel, Yanick Fratantonio, Giovanni Vigna
Publikováno v:
IEEE Symposium on Security and Privacy
Mobile applications are part of the everyday lives of billions of people, who often trust them with sensitive information. These users identify the currently focused app solely by its visual appearance, since the GUIs of the most popular mobile OSes