Giovanni Vigna
Orcid: 0000-0002-3422-5369Affiliations:
- University of California, Santa Barbara, USA
According to our database1,
Giovanni Vigna
authored at least 268 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2019, "For contributions to improving the security of the Internet and combating cybercrime".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.ucsb.edu
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024
2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
ACM Trans. Priv. Secur., 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Proceedings of the Checkmate@CCS 2021, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Twelfth International Conference on Web and Social Media, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IEEE Secur. Priv., 2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities.
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
IEEE Secur. Priv., 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines.
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the 2014 USENIX Summit on Gaming, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the Symposium on Applied Computing, 2014
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security.
Proceedings of the Symposium on Applied Computing, 2014
Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2013 Internet Measurement Conference, 2013
Proceedings of the Control of Cyber-Physical Systems, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Comput. Commun. Rev., 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Runtime Verification, Third International Conference, 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
IEEE Trans. Software Eng., 2010
Proceedings of the 19th International Conference on World Wide Web, 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Open Research Problems in Network Security, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries.
J. Comput. Secur., 2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the 2nd USENIX Workshop on Offensive Technologies, 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Are your votes <i>really</i> counted?: testing the security of real-world electronic voting systems.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
2007
J. Comput. Virol., 2007
Proceedings of the First USENIX Workshop on Offensive Technologies, 2007
Proceedings of the Test and Analysis of Web Services, 2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005
Proceedings of the Detection of Intrusions and Malware, 2005
Advances in Information Security 14, Springer, ISBN: 978-0-387-23398-7, 2005
2004
IEEE Trans. Dependable Secur. Comput., 2004
Prax. Inf.verarb. Kommun., 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the 5th IEEE International Conference on Mobile Data Management (MDM 2004), 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, 2003
Teaching Network Security Through Live Exercises.
Proceedings of the Security Education and Critical Infrastructures, 2003
Proceedings of the 25th International Conference on Software Engineering, 2003
Proceedings of the FME 2003: Formal Methods, 2003
Proceedings of the Computer Security, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
J. Comput. Secur., 2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
Proceedings of the Mobile Agents, 6th International Conference, 2002
Proceedings of the 8th International Conference on Engineering of Complex Computer Systems (ICECCS 2002), 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Proceedings of the E-Commerce Security and Privacy, 2001
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001
Proceedings of the Mobile Agents, 5th International Conference, 2001
1999
1998
Proceedings of the Mobile Agents and Security, 1998
Proceedings of the 9th International Workshop on Software Specification and Design, 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
Proceedings of the Requirements Targeting Software and Systems Engineering, 1997
Proceedings of the Mobile Agents, First International Workshop, 1997
Proceedings of the Pulling Together, 1997
1996
1994
Designing and Implementing Inter-Client Communication in the O2 Object-Oriented Database Management System.
Proceedings of the Object-Oriented Methodologies and Systems, 1994