Jacopo Corbetta
Jacopo Corbetta
Verified email at cs.ucsb.edu - Homepage
Title
Cited by
Cited by
Year
Driller: Augmenting Fuzzing Through Selective Symbolic Execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
4602016
What the app is that? Deception and countermeasures in the Android user interface
A Bianchi, J Corbetta, L Invernizzi, Y Fratantonio, C Kruegel, G Vigna
2015 IEEE Symposium on Security and Privacy, 931-948, 2015
1502015
Baredroid: Large-scale analysis of Android apps on real devices
S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ...
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
612015
Ten years of iCTF: The good, the bad, and the ugly
G Vigna, K Borgolte, J Corbetta, A Doupe, Y Fratantonio, L Invernizzi, ...
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
482014
Eyes of a human, eyes of a program: Leveraging different views of the web for analysis and detection
J Corbetta, L Invernizzi, C Kruegel, G Vigna
International Workshop on Recent Advances in Intrusion Detection, 130-149, 2014
102014
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
82018
Are We Using the Crypto We Want?: TLS Cipher-suite Negotiation and Its Discontents
J Corbetta
University of California, Santa Barbara, 2016
2016
Inner-Eye: Appearance-based Detection of Computer Scams
J Corbetta, B Lazzerini, G Frosini, G Vigna, C Kruegel
2011
Transparent and Efficient Instrumentation and Debugging of 32-bit Binaries
J Corbetta, A Pignotti
Sant'Anna School of Advanced Studies, 2010
2010
Mechanical Phish: Resilient Autonomous Hacking
A Cama, J Corbetta, P Grosen, A Machiry, C Salls
The system can't perform the operation now. Try again later.
Articles 1–10