Davide Balzarotti
Orcid: 0000-0001-5957-6213
According to our database1,
Davide Balzarotti
authored at least 137 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Forensic Sci. Int. Digit. Investig., 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments.
ACM Trans. Priv. Secur., May, 2023
ACM Trans. Softw. Eng. Methodol., April, 2023
ACM Trans. Softw. Eng. Methodol., April, 2023
Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 2nd International Fuzzing Workshop, 2023
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
ACM Trans. Priv. Secur., 2022
ACM Trans. Priv. Secur., 2022
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Secur. Priv., 2021
Digit. Investig., 2021
Comput. Secur., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World.
Proceedings of the 30th USENIX Security Symposium, 2021
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Proceedings of the Checkmate@CCS 2021, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Cookies from the Past: Timing Server-side Request Processing Code for History Sniffing.
DTRAP, 2020
Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
ACM Trans. Priv. Secur., 2019
Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
ACM Comput. Surv., 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services.
Proceedings of the 26th International Conference on World Wide Web, 2017
Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies.
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Digit. Investig., 2015
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
Proceedings of the 24th USENIX Security Symposium, 2015
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence.
Proceedings of the 24th USENIX Security Symposium, 2015
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
EURASIP J. Inf. Secur., 2014
Comput. Networks, 2014
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Have things changed now? An empirical study on input validation vulnerabilities in web applications.
Comput. Secur., 2012
Proceedings of the Tests and Proofs - 6th International Conference, 2012
An empirical analysis of input validation mechanisms in web applications and languages.
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the International Symposium on Software Testing and Analysis, 2012
Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Measurement and evaluation of a real world deployment of a challenge-response spam filter.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications.
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the Fourth European Workshop on System Security, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
2010
IEEE Trans. Software Eng., 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries.
J. Comput. Secur., 2009
All your contacts are belong to us: automated identity theft attacks on social networks.
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009
2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Are your votes <i>really</i> counted?: testing the security of real-world electronic voting systems.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008
2007
The LighTS tuple space framework and its customization for context-aware applications.
Web Intell. Agent Syst., 2007
Proceedings of the First USENIX Workshop on Offensive Technologies, 2007
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
IEEE Trans. Syst. Man Cybern. Part A, 2006
2005
LighTS: a lightweight, customizable tuple space supporting context-aware applications.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2002
Supporting configuration management for virtual workgroups ini a peer-to-peer setting.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002