Luca Invernizzi

Orcid: 0000-0001-8420-0760

Affiliations:
  • University of California, Santa Barbara, CA, USA
  • Google Inc., Mountain View, CA, USA
  • Sant'Anna School of Advanced Studies, College of Engineering, Pisa, Italy


According to our database1, Luca Invernizzi authored at least 24 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Magika: AI-Powered Content-Type Detection.
CoRR, 2024

Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

2023
Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning.
CoRR, 2023

2022
Hybrid Post-Quantum Signatures in Hardware Security Keys.
IACR Cryptol. ePrint Arch., 2022

2020
CoinPolice: Detecting Hidden Cryptojacking Attacks with Neural Networks.
CoRR, 2020

Spotlight: Malware Lead Generation at Scale.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Protecting accounts from credential stuffing with password breach alerting.
Proceedings of the 28th USENIX Security Symposium, 2019


2018
Tracking Ransomware End-to-end.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017

Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Cloak of Visibility: Detecting When Machines Browse a Different Web.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
What the App is That? Deception and Countermeasures in the Android User Interface.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

BareDroid: Large-Scale Analysis of Android Apps on Real Devices.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Ten Years of iCTF: The Good, The Bad, and The Ugly.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security.
Proceedings of the Symposium on Applied Computing, 2014

Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Nazca: Detecting Malware Distribution in Large-Scale Networks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Message in a bottle: sailing past censorship.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
EvilSeed: A Guided Approach to Finding Malicious Web Pages.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

You are what you include: large-scale evaluation of remote javascript inclusions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2010
Geometric control for autonomous underwater vehicles: Overcoming a thruster failure.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010


  Loading...