Andrea Lanzi
Orcid: 0000-0002-1544-3758
According to our database1,
Andrea Lanzi
authored at least 53 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
EmbedWatch: Fat Pointer Solution for Detecting Spatial Memory Errors in Embedded Systems.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024
2022
A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks.
IEEE Trans. Dependable Secur. Comput., 2022
Scramblesuit: An effective timing side-channels framework for malware sandbox evasion.
J. Comput. Secur., 2022
JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
CoRR, 2021
Deja-Vu: A Glimpse on Radioactive Soft-Error Consequences on Classical and Quantum Computations.
CoRR, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
Mob. Networks Appl., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
Game Bot Detection on Massive Multiplayer Online Role-Playing Games (MMORPGs) Systems.
Proceedings of the Encyclopedia of Computer Graphics and Games., 2019
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework.
IEEE Access, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Detecting (absent) app-to-app authentication on cross-device short-distance channels.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
ACM Trans. Priv. Secur., 2018
Trans. Data Priv., 2018
ACM Comput. Surv., 2018
Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the A Systems Approach to Cyber Security, 2017
Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study -.
Proceedings of the Integrated Formal Methods - 13th International Conference, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence.
Proceedings of the 24th USENIX Security Symposium, 2015
2014
Proceedings of the Seventh European Workshop on System Security, 2014
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
2012
Proceedings of the International Symposium on Software Testing and Analysis, 2012
2011
Proceedings of the Fourth European Workshop on System Security, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Pattern Recognit. Lett., 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
LISABETH: automated content-based signature generator for zero-day polymorphic worms.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007
Proceedings of the Detection of Intrusions and Malware, 2007
2005
Proceedings of the E-Government: Towards Electronic Democracy, International Conference, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005