23 results on '"Giuffrida, Cristiano"'
Search Results
2. Secure Hardware-Software Architectures for Robust Computing Systems
3. I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics
4. KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware
5. Bait Your Hook: A Novel Detection Technique for Keyloggers
6. Symbolic Deobfuscation: From Virtualized Code Back to the Original
7. FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds
8. ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation
9. Extended Abstract: Toward Systematically Exploring Antivirus Engines
10. No Random, No Ransom: A Key to Stop Cryptographic Ransomware
11. Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception
12. Knockin’ on Trackers’ Door: Large-Scale Automatic Analysis of Web Tracking
13. JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript
14. Bytecode Corruption Attacks Are Real—And How to Defend Against Them
15. On the Weaknesses of Function Table Randomization
16. Evasive Malware via Identifier Implanting
17. B IN A RM : Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices
18. GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM
19. Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats
20. Honey, I Shrunk Your App Security: The State of Android App Hardening
21. MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps
22. Spearphishing Malware: Do We Really Know the Unknown?
23. Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.