Sfoglia per Correlatore POLINO, MARIO
A static analysis approach for securing industrial robotics applications
2016/2017 VITTONE, MARTINO
Apicula : static detection of API call in malware memory
2018/2019 SALVADORE, MATTEO
Binary function vulnerability discover through LLVM IR
2018/2019 MARSELLA, DANIELE
BitAnalyzer : a framework for extracting intelligence from the blockchain
2017/2018 GNECCO, ENRICO
CANPass : an extensible framework for bypassing CAN peripherals on unmodified microcontrollers
2020/2021 De FAVERI TRON, ALVISE
Crave 2.0 : toward scalable and reproducible antivirus analyses
2018/2019 MORTILLARO, LUCA
EMEGO: enhancing malware evasion through genetic optimization
2022/2023 Barotti, Matteo
An evaluation of anti-evasion techniques implemented in malware analysis sandboxes and debuggers
2019/2020 Bova, Salvatore
Evasion attacks against banking fraud detection systems
2018/2019 SANTINI, LUCA
Extracting common malicious temporal dependent behaviors from malware
2014/2015 MASSETTI, ALESSIO
A game theoretical approach to the fraud detection problem
2021/2022 CURCIO, CESARE
A graph-based approach for the application and evaluation of address clustering heuristics on the Bitcoin blockchain
2022/2023 Dragonetti, Giovanni
Hybrid malware analysis interface to simplify reverse engineering and crowd-sourcing
2015/2016 TIRONI, EMANUELE
Improving JackDaw : algorithm linearization, streaming and visualization
2015/2016 ALEOTTI, FEDERICO
Malware behaviors: uncover dataflow dependencies among called API
2015/2016 AMENDOLA, ANDREA
MALwhere : a memory forensics platform for financial malware analysis and classification
2018/2019 GIOSSI, GABRIELE OLIVIERO
NoSQL breakdown : a large-scale analysis of misconfigured NoSQL services
2018/2019 FERRARI, DARIO
Packhero: leveraging graph-based analysis for packer identification
2023/2024 Di Gennaro, Marco
PANDORA : a flexible and transparent Windows native API tracer
2014/2015 MAZZONI, SIMONE
PinDemonium : a DBI-based generic unpacker for Windows executables
2015/2016 D'ALESSIO, STEFANO
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili