Daniele Sgandurra

Orcid: 0000-0001-5238-8068

Affiliations:
  • Huawei, Munich, Germany
  • Royal Holloway - University of London, UK


According to our database1, Daniele Sgandurra authored at least 72 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets.
ACM Comput. Surv., August, 2024

2023
Protecting Voice-Controllable Devices Against Self-Issued Voice Commands.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

The VOCODES Kill Chain for Voice Controllable Devices.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale.
Proceedings of the 6th Network Traffic Measurement and Analysis Conference, 2022

Evaluating Anti-Virus Effectiveness in Linux.
Proceedings of the IEEE International Conference on Big Data, 2022

ALEXA VERSUS ALEXA: Controlling Smart Speakers by Self-Issuing Voice Commands.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets.
CoRR, 2021

RansomClave: Ransomware Key Management using SGX.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage.
Comput. J., 2020

Malware vs Anti-Malware Battle - Gotta Evade 'em All!
Proceedings of the 17th IEEE Symposium on Visualization for Cyber Security, VizSec 2020, 2020

2nd Workshop on Cyber-Security Arms Race (CYSARM 2020).
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Clust-IT: clustering-based intrusion detection in IoT environments.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs.
IEEE Trans. Dependable Secur. Comput., 2019

On Deception-Based Protection Against Cryptographic Ransomware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique.
Proceedings of the Third Central European Cybersecurity Conference, 2019

1st Workshop on Cyber-Security Arms Race (CYSARM 2019).
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

A game of "Cut and Mouse": bypassing antivirus by simulating user inputs.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention.
IEEE Trans. Dependable Secur. Comput., 2018

An improved SMURF scheme for cleaning RFID data.
Int. J. Grid Util. Comput., 2018

Risk analysis of Android applications: A user-centric solution.
Future Gener. Comput. Syst., 2018

Towards a Framework for Testing the Security of IoT Devices Consistently.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

A Logic-Based Reasoner for Discovering Authentication Vulnerabilities Between Interconnected Accounts.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

Lightweight Classification of IoT Malware Based on Image Recognition.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Efficient Attack Graph Analysis through Approximate Inference.
ACM Trans. Priv. Secur., 2017

VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks.
J. Sensors, 2017

Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A new security middleware architecture based on fog computing and cloud to support IoT constrained devices.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

2016
Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems.
ACM Comput. Surv., 2016

Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection.
CoRR, 2016

Formalizing Threat Models for Virtualized Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

2015
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment.
Future Gener. Comput. Syst., 2015

Exact Inference Techniques for the Dynamic Analysis of Attack Graphs.
CoRR, 2015

Detection of repackaged mobile applications through a collaborative approach.
Concurr. Comput. Pract. Exp., 2015

Design and Development of a Facebook Application to Raise Privacy Awareness.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

Sharing Data through Confidential Clouds: An Architectural Perspective.
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015

2014
Automating the assessment of ICT risk.
J. Inf. Secur. Appl., 2014

A Scenario Method to Automatically Assess ICT Risk.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

Enforcing Mobile Application Security Through Probabilistic Contracts.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Addressing privacy issues in location-based collaborative and distributed environments.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

2013
A Survey on Security for Mobile Devices.
IEEE Commun. Surv. Tutorials, 2013

AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Remote Policy Enforcement for Trusted Application Execution in Mobile Environments.
Proceedings of the Trusted Systems - 5th International Conference, 2013

CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Classifying Android Malware through Subgraph Mining.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

A collaborative framework for generating probabilistic contracts.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Are photos on Social Networks really private?
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Towards enforcing on-the-fly policies in BYOD environments.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

How to grant less permissions to facebook applications.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

Probabilistic Contract Compliance for Mobile Applications.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
MADAM: A Multi-level Anomaly Detector for Android Malware.
Proceedings of the Computer Network Security, 2012

A Multi-criteria-Based Evaluation of Android Applications.
Proceedings of the Trusted Systems, 4th International Conference, 2012

2011
Attestation of integrity of overlay networks.
J. Syst. Archit., 2011

A simulation-driven approach for assessing risks of complex systems.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

An Obfuscation-Based Approach against Injection Attacks.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Measuring the Semantic Integrity of a Process Self.
PhD thesis, 2010

Semantic Attestation of Node Integrity in Overlays.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

Securing a Community Cloud.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

2009
Hierarchical, model-based risk management of critical infrastructures.
Reliab. Eng. Syst. Saf., 2009

Measuring Semantic Integrity for Remote Attestation.
Proceedings of the Trusted Computing, 2009

PsycoTrace: Virtual and Transparent Monitoring of a Process Self.
Proceedings of the 17th Euromicro International Conference on Parallel, 2009

Modeling and Managing Risk in Billing Infrastructures.
Proceedings of the Critical Infrastructure Protection III, 2009

Cloud security is not (just) virtualization security: a short paper.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

Securing Health Information Infrastructures through Overlays.
Proceedings of the Second International Conference on Health Informatics, 2009

2008
Transparent Process Monitoring in a Virtual Environment.
Proceedings of the 3rd International Workshop on Views On Designing Complex Architectures, 2008

Virtual interacting network community: exploiting multi-core architectures to increase security.
Proceedings of the 5th Conference on Computing Frontiers, 2008

Secure Sharing of an ICT Infrastructure through Vinci.
Proceedings of the Resilient Networks and Services, 2008

Semantics-Driven Introspection in a Virtual Environment.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Security and Integrity of a Distributed File Storage in a Virtual Environment.
Proceedings of the Fourth International IEEE Security in Storage Workshop, 2007

Managing Critical Infrastructures through Virtual Network Communities.
Proceedings of the Critical Information Infrastructures Security, 2007

Building Trustworthy Intrusion Detection through VM Introspection.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...