Lorenzo Cavallaro
Orcid: 0000-0002-3878-2680Affiliations:
- University College London, UK
According to our database1,
Lorenzo Cavallaro
authored at least 88 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems.
CoRR, January, 2025
2024
ACM Comput. Surv., August, 2024
Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers.
CoRR, 2024
CoRR, 2024
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version).
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
EmbedWatch: Fat Pointer Solution for Detecting Spatial Memory Errors in Embedded Systems.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024
2023
IEEE Secur. Priv., 2023
CoRR, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Poster: RPAL-Recovering Malware Classifiers from Data Poisoning using Active Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Frontiers Neurorobotics, 2021
Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets.
CoRR, 2021
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
2020
CoRR, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists.
CoRR, 2019
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time.
Proceedings of the 28th USENIX Security Symposium, 2019
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed).
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
IET Inf. Secur., 2018
Reprint of "You can't touch this: Consumer-centric android application repackaging detection".
Future Gener. Comput. Syst., 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting.
IEEE Trans. Inf. Forensics Secur., 2017
ACM Comput. Surv., 2017
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017
2016
Future Gener. Comput. Syst., 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
2015
Proceedings of the Statistical Learning and Data Sciences - Third International Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2014
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications.
CoRR, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
2013
CoRR, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Sixth Workshop on Hot Topics in System Dependability, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
LISABETH: automated content-based signature generator for zero-day polymorphic worms.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Proceedings of the Detection of Intrusions and Malware, 2007
2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2000
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000