2024
RAMA: a risk assessment solution for healthcare organizations.
Int. J. Inf. Sec., June, 2024
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain.
Int. J. Inf. Sec., February, 2024
iVault: Architectural Code Concealing Techniques to Protect Cryptographic Keys.
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2024
2023
Defense strategies for Adversarial Machine Learning: A survey.
Comput. Sci. Rev., August, 2023
White paper on cybersecurity in the healthcare sector. The HEIR solution.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2023
Vacant holes for unsupervised detection of the outliers in compact latent representation.
Proceedings of the Uncertainty in Artificial Intelligence, 2023
Free Willy: Prune System Calls to Enhance Software Security.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
Digital Forgetting Using Key Decay.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
Label-Efficient and Robust Learning from Multiple Experts.
Proceedings of the IEEE International Conference on Acoustics, 2023
2022
Do Bayesian variational autoencoders know what they don't know?
Proceedings of the Uncertainty in Artificial Intelligence, 2022
Upside Down: Exploring the Ecosystem of Dark Web Data Markets.
Proceedings of the ICT Systems Security and Privacy Protection, 2022
2021
hybrid-Flacon: Hybrid Pattern Malware Detection and Categorization with Network Traffic andProgram Code.
CoRR, 2021
Detecting and categorizing Android malware with graph neural networks.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic.
Proceedings of the Information Security - 24th International Conference, 2021
HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021
Falcon: Malware Detection and Categorization with Network Traffic Images.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021
The Strategy Configuration Problem and How to Solve It.
Proceedings of the EuroPLoP'21: European Conference on Pattern Languages of Programs 2021, Graz, Austria, July 7, 2021
2020
MANIS: evading malware detection system on graph structure.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
2019
Can Today's Machine Learning Pass Image-Based Turing Tests?
Proceedings of the Information Security - 22nd International Conference, 2019
2018
Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection.
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Smashing the Stack Protector for Fun and Profit.
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Learning on a Budget for User Authentication on Mobile Devices.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Combating Control Flow Linearization.
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Towards Automated Classification of Firmware Images and Identification of Embedded Devices.
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Empowering convolutional networks for malware classification and analysis.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
2016
Towards detection and prevention of malicious activities against web applications and internet services.
PhD thesis, 2016
Leveraging Internet Services to Evade Censorship.
Proceedings of the Information Security - 19th International Conference, 2016
SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing.
Proceedings of the Information Security - 19th International Conference, 2016
Adaptive Semantics-Aware Malware Classification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Deep Learning for Classification of Malware System Call Sequences.
Proceedings of the AI 2016: Advances in Artificial Intelligence, 2016
2015
Revealing the relationship network behind link spam.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
2014
Automated generation of models for fast and precise detection of HTTP-based malware.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements.
Proceedings of the 2014 Internet Measurement Conference, 2014
The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security.
Proceedings of the International Carnahan Conference on Security Technology, 2014
2013
k-subscription: privacy-preserving microblogging browsing through obfuscation.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
B@bel: Leveraging Email Delivery for Spam Mitigation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
2011
Understanding fraudulent activities in online ad exchanges.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011