Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Rosangela Casolare"'
Publikováno v:
Applied Sciences, Vol 10, Iss 23, p 8351 (2020)
The increase in computing capabilities of mobile devices has, in the last few years, made possible a plethora of complex operations performed from smartphones and tablets end users, for instance, from a bank transfer to the full management of home au
Externí odkaz:
https://doaj.org/article/d80ab3ad88894f6f95ac808ebd111d86
Publikováno v:
Information, Vol 11, Iss 6, p 304 (2020)
The Android platform is currently targeted by malicious writers, continuously focused on the development of new types of attacks to extract sensitive and private information from our mobile devices. In this landscape, one recent trend is represented
Externí odkaz:
https://doaj.org/article/06ecf75645bb4b62961a2e693c32159c
Autor:
Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone, Michele Tommasone
Publikováno v:
Procedia Computer Science. 207:145-157
Autor:
Daniele Albanese, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Marco Russodivito, Antonella Santone
Publikováno v:
Proceedings of the 9th International Conference on Information Systems Security and Privacy.
Autor:
Francesco Mercaldo, Fabio Martinelli, Antonella Santone, Giovanni Lacava, Marco Russodivito, Rosangela Casolare
Publikováno v:
Computer (Long Beach Calif. Print) 17 (2021). doi:10.1007/s11416-021-00409-8
info:cnr-pdr/source/autori:Casolare R. (1); Lacava G. (2); Martinelli F. (2); Mercaldo F. (2)(3); Russodivito M. (1); Santone A. (3)/titolo:2Faces: a new model of malware based on dynamic compiling and reflection/doi:10.1007%2Fs11416-021-00409-8/rivista:Computer (Long Beach Calif. Print)/anno:2021/pagina_da:/pagina_a:/intervallo_pagine:/volume:17
info:cnr-pdr/source/autori:Casolare R. (1); Lacava G. (2); Martinelli F. (2); Mercaldo F. (2)(3); Russodivito M. (1); Santone A. (3)/titolo:2Faces: a new model of malware based on dynamic compiling and reflection/doi:10.1007%2Fs11416-021-00409-8/rivista:Computer (Long Beach Calif. Print)/anno:2021/pagina_da:/pagina_a:/intervallo_pagine:/volume:17
Nowadays malware writers are continually striving to find new ways to evade antimalware checks. To do this, they exploit the vulnerabilities of current antimalware that are unable to detect zero-day threats, because to detect malicious behavior, they
Autor:
Francesco Mercaldo, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Ranieri, Antonella Santone
Publikováno v:
Proceedings of the 19th International Conference on Security and Cryptography.
Autor:
Fabio Martinelli, Giovanni Ciaramella, Antonella Santone, Francesco Mercaldo, Rosangela Casolare
Publikováno v:
ARES
Mobile malware is growing in number and its complexity is constantly increasing. Malware authors are continuously looking new ways to elude anti-malware controls. Anti-malware are not able to detect zero-day malware, because to detect malicious behav
Autor:
Rosangela Casolare, Christian Peluso, Giacomo Iadarola, Antonella Santone, Fabio Martinelli, Francesco Mercaldo
Publikováno v:
IJCNN
2021 International Joint Conference on Neural Networks (IJCNN), online, 18-22/07/2021
info:cnr-pdr/source/autori:Iadarola G. (1); Casolare R. (2); Martinelli F. (1); Mercaldo F. (3); Peluso C. (2); Santone A. (3)/congresso_nome:2021 International Joint Conference on Neural Networks (IJCNN)/congresso_luogo:online/congresso_data:18-22%2F07%2F2021/anno:2021/pagina_da:/pagina_a:/intervallo_pagine
2021 International Joint Conference on Neural Networks (IJCNN), online, 18-22/07/2021
info:cnr-pdr/source/autori:Iadarola G. (1); Casolare R. (2); Martinelli F. (1); Mercaldo F. (3); Peluso C. (2); Santone A. (3)/congresso_nome:2021 International Joint Conference on Neural Networks (IJCNN)/congresso_luogo:online/congresso_data:18-22%2F07%2F2021/anno:2021/pagina_da:/pagina_a:/intervallo_pagine
Cybercriminals are continually working to develop increasingly aggressive malicious code to steal sensitive and private information from mobile devices. Antimalware are not always able to detect all threats, especially when they do not have previous
Publikováno v:
ICISSP
Proceedings of the 7th International Conference on Information Systems Security and Privacy
Proceedings of the 7th International Conference on Information Systems Security and Privacy
Autor:
Francesco Mercaldo, Fabio Martinelli, Antonella Santone, Giacomo Iadarola, Rosangela Casolare
Publikováno v:
SECRYPT
International Conference on Security and Cryptography (SECRYPT 2021), pp. 479–486, online, 02/07/2021
info:cnr-pdr/source/autori:Casolare R.; Iadarola G. (2); Martinelli F. (2); Mercaldo F. (2)(3); Santone A. (3)/congresso_nome:International Conference on Security and Cryptography (SECRYPT 2021)/congresso_luogo:online/congresso_data:02%2F07%2F2021/anno:2021/pagina_da:479/pagina_a:486/intervallo_pagine:479–486
International Conference on Security and Cryptography (SECRYPT 2021), pp. 479–486, online, 02/07/2021
info:cnr-pdr/source/autori:Casolare R.; Iadarola G. (2); Martinelli F. (2); Mercaldo F. (2)(3); Santone A. (3)/congresso_nome:International Conference on Security and Cryptography (SECRYPT 2021)/congresso_luogo:online/congresso_data:02%2F07%2F2021/anno:2021/pagina_da:479/pagina_a:486/intervallo_pagine:479–486
Nowadays smartphones, and generically speaking mobile devices, allow users a plethora of tasks in total mobility for instance, from checking the balance on the bank account to distance learning. In this context it is really critical the detection of