Antonio Bianchi

Orcid: 0000-0002-2862-5286

According to our database1, Antonio Bianchi authored at least 58 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing LLM-based Autonomous Driving Agents to Mitigate Perception Attacks.
CoRR, 2024

Rethinking How to Evaluate Language Model Jailbreak.
CoRR, 2024

D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation.
Proceedings of the 33rd USENIX Security Symposium, 2024

Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations.
Proceedings of the 33rd USENIX Security Symposium, 2024

ATTention Please! An Investigation of the App Tracking Transparency Permission.
Proceedings of the 33rd USENIX Security Symposium, 2024

Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

A Systematic Study of Physical Sensor Attack Hardness.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Automated Detection of Cryptographic Inconsistencies in Android's Keymaster Implementations.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024

2023
Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.
Proceedings of the 32nd USENIX Security Symposium, 2023

ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions.
Proceedings of the 32nd USENIX Security Symposium, 2023

PatchVerif: Discovering Faulty Patches in Robotic Vehicles.
Proceedings of the 32nd USENIX Security Symposium, 2023

Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery.
Proceedings of the 32nd USENIX Security Symposium, 2023

LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality.
Proceedings of the 32nd USENIX Security Symposium, 2023

Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Columbus: Android App Testing Through Systematic Callback Exploration.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Fuzzing SGX Enclaves via Host Program Mutations.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

AoT - Attack on Things: A security analysis of IoT firmware updates.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Making Sense of Constellations: Methodologies for Understanding Starlink's Scheduling Algorithms.
Proceedings of the Companion of the 19th International Conference on emerging Networking EXperiments and Technologies, 2023

2022
DnD: A Cross-Architecture Deep Neural Network Decompiler.
Proceedings of the 31st USENIX Security Symposium, 2022

SARA: Secure Android Remote Authorization.
Proceedings of the 31st USENIX Security Symposium, 2022

Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Proceedings of the 30th USENIX Security Symposium, 2021

M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.
Proceedings of the 30th USENIX Security Symposium, 2021

Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Towards Improving Container Security by Preventing Runtime Escapes.
Proceedings of the IEEE Secure Development Conference, 2021

On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

SafetyNOT: on the usage of the SafetyNet attestation API in Android.
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021

AppJitsu: Investigating the Resiliency of Android Applications.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

2019
Exploring Syscall-Based Semantics Reconstruction of Android Applications.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

2018
Identifying and Mitigating Trust Violations in the Mobile Ecosystem.
PhD thesis, 2018

Mechanical Phish: Resilient Autonomous Hacking.
IEEE Secur. Priv., 2018

HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security.
Proceedings of the 27th USENIX Security Symposium, 2018

Broken Fingers: On the Usage of the Fingerprint API in Android.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
BootStomp: On the Security of Bootloaders in Mobile Devices.
Proceedings of the 26th USENIX Security Symposium, 2017

Ramblr: Making Reassembly Great Again.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
TriggerScope: Towards Detecting Logic Bombs in Android Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
What the App is That? Deception and Countermeasures in the Android User Interface.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

CLAPP: characterizing loops in Android applications (invited talk).
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015

CLAPP: characterizing loops in Android applications.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

BareDroid: Large-Scale Analysis of Android Apps on Real Devices.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2012
Blacksheep: detecting compromised hosts in homogeneous crowds.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2010
Autonomamente: Using Goal Attainment Scales to Evaluate the Impact of a Multimodal Domotic System to Support Autonomous Life of People with Cognitive Impairment.
Proceedings of the Computers Helping People with Special Needs, 2010

2005
Creating and Managing Electronic Content for Automatic Adaptation to the Reader's Profile: the Experience of Project MultiAbile for the Inclusion of Impaired e-Learners.
Proceedings of the From Author to Reader: Challenges for the Digital Content Chain: Proceedings of the 9th ICCC International Conference on Electronic Publishing held at Katholieke Universiteit Leuven, 2005

2004
Minus-Two: Multimedia, Sound Spatialization and 3D Representation for Cognitively Impaired Children.
Proceedings of the Computers Helping People with Special Needs, 2004


  Loading...