Antonio Bianchi
Orcid: 0000-0002-2862-5286
According to our database1,
Antonio Bianchi
authored at least 58 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Automated Detection of Cryptographic Inconsistencies in Android's Keymaster Implementations.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Making Sense of Constellations: Methodologies for Understanding Starlink's Scheduling Algorithms.
Proceedings of the Companion of the 19th International Conference on emerging Networking EXperiments and Technologies, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the IEEE Secure Development Conference, 2021
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
2018
PhD thesis, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2010
Autonomamente: Using Goal Attainment Scales to Evaluate the Impact of a Multimodal Domotic System to Support Autonomous Life of People with Cognitive Impairment.
Proceedings of the Computers Helping People with Special Needs, 2010
2005
Creating and Managing Electronic Content for Automatic Adaptation to the Reader's Profile: the Experience of Project MultiAbile for the Inclusion of Impaired e-Learners.
Proceedings of the From Author to Reader: Challenges for the Digital Content Chain: Proceedings of the 9th ICCC International Conference on Electronic Publishing held at Katholieke Universiteit Leuven, 2005
2004
Minus-Two: Multimedia, Sound Spatialization and 3D Representation for Cognitively Impaired Children.
Proceedings of the Computers Helping People with Special Needs, 2004