Davide Balzarotti
Davide Balzarotti
Professor, Eurecom
Verified email at eurecom.fr - Homepage
Title
Cited by
Cited by
Year
All your contacts are belong to us: automated identity theft attacks on social networks
L Bilge, T Strufe, D Balzarotti, E Kirda
Proceedings of the 18th international conference on World wide web, 551-560, 2009
6702009
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008
4542008
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks
A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2015
3362015
G-Free: defeating return-oriented programming through gadget-less binaries
K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda
Proceedings of the 26th Annual Computer Security Applications Conference, 49-58, 2010
3122010
A large-scale analysis of the security of embedded firmwares
A Costin, J Zaddach, A Francillon, D Balzarotti
23rd {USENIX} Security Symposium ({USENIX} Security 14), 95-110, 2014
3072014
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
2572012
Testing network-based intrusion detection signatures using mutant exploits
G Vigna, W Robertson, D Balzarotti
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2442004
A view on current malware behaviors
U Bayer, I Habibi, D Balzarotti, E Kirda, C Kruegel
Proceedings of the 2nd USENIX conference on Large-scale exploits and …, 2009
240*2009
Efficient Detection of Split Personalities in Malware.
D Balzarotti, M Cova, C Karlberger, E Kirda, C Kruegel, G Vigna
NDSS, 2010
2312010
Swaddler: An approach for the anomaly-based detection of state violations in web applications
M Cova, D Balzarotti, V Felmetsger, G Vigna
International Workshop on Recent Advances in Intrusion Detection, 63-86, 2007
2042007
Exposure: A passive dns analysis service to detect and report malicious domains
L Bilge, S Sen, D Balzarotti, E Kirda, C Kruegel
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-28, 2014
2012014
Abusing social networks for automated user profiling
M Balduzzi, C Platzer, T Holz, E Kirda, D Balzarotti, C Kruegel
Recent Advances in Intrusion Detection, 422-441, 2010
2012010
Accessminer: using system-centric models for malware protection
A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1992010
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
J Zaddach, L Bruno, A Francillon, D Balzarotti
NDSS 14, 1-16, 2014
1782014
A security analysis of amazon's elastic compute cloud service
M Balduzzi, J Zaddach, D Balzarotti, E Kirda, S Loureiro
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 1427-1434, 2012
1562012
Reverse social engineering attacks in online social networks
D Irani, M Balduzzi, D Balzarotti, E Kirda, C Pu
International conference on detection of intrusions and malware, and …, 2011
1482011
Multi-module vulnerability analysis of web-based applications
D Balzarotti, M Cova, VV Felmetsger, G Vigna
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1442007
A quantitative study of accuracy in system call-based malware detection
D Canali, A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
1392012
Clearshot: Eavesdropping on keyboard input from video
D Balzarotti, M Cova, G Vigna
2008 IEEE Symposium on Security and Privacy (sp 2008), 170-183, 2008
1312008
A solution for the automated detection of clickjacking attacks
M Balduzzi, M Egele, E Kirda, D Balzarotti, C Kruegel
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1062010
The system can't perform the operation now. Try again later.
Articles 1–20