Davide Maiorca
Orcid: 0000-0003-2640-4663
According to our database1,
Davide Maiorca
authored at least 44 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
5
1
1
2
4
2
1
1
1
1
2
2
4
1
1
2
2
1
4
1
2
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Oblivion: an open-source system for large-scale analysis of macro-based office malware.
J. Comput. Virol. Hacking Tech., November, 2024
J. Inf. Secur. Appl., February, 2024
J. Cybersecur., January, 2024
Exploring the Robustness of AI-Driven Tools in Digital Forensics: A Preliminary Study.
CoRR, 2024
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2023
CoRR, 2023
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023
Proceedings of the Italia Intelligenza Artificiale, 2023
2022
Do gradient-based explanations tell anything about adversarial robustness to android malware?
Int. J. Mach. Learn. Cybern., 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
2021
Proceedings of the Italian Conference on Cybersecurity, 2021
2020
Inf., 2020
Comput. Secur., 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Secur. Priv., 2019
ACM Comput. Surv., 2019
On the effectiveness of system API-related information for Android ransomware detection.
Comput. Secur., 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
2018
Towards Robust Detection of Adversarial Infection Vectors: Lessons Learned in PDF Malware.
CoRR, 2018
Proceedings of the 26th European Signal Processing Conference, 2018
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables.
Proceedings of the 26th European Signal Processing Conference, 2018
2017
Proceedings of the Symposium on Applied Computing, 2017
Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API Analysis.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017
2016
PhD thesis, 2016
AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack.
CoRR, 2016
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
Stealth attacks: An extended insight into the obfuscation effects on Android malware.
Comput. Secur., 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Proceedings of the Information Systems Security and Privacy, 2015
A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files.
Proceedings of the ICISSP 2015, 2015
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
CoRR, 2014
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
2013
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2012