Mark Vella

Orcid: 0000-0002-6483-9054

According to our database1, Mark Vella authored at least 29 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks.
Comput. Stand. Interfaces, 2025

2023
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics.
J. Cybersecur. Priv., July, 2023

Runtime Verification for Trustworthy Computing.
Proceedings of the Third Workshop on Agents and Robots for reliable Engineered Autonomy, 2023

Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
RV-TEE-Based Trustworthy Secure Shell Deployment: An Empirical Evaluation.
J. Object Technol., 2022

Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps.
IEEE Access, 2022

D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

2021
RV-TEE: secure cryptographic protocol execution based on runtime verification.
J. Comput. Virol. Hacking Tech., 2021

Casting exploit analysis as a Weird Machine reconstruction problem.
CoRR, 2021

EtherClue: Digital investigation of attacks on Ethereum smart contracts.
CoRR, 2021

PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone.
IEEE Access, 2021

Secure Implementation of a Quantum-Future GAKE Protocol.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Runtime verification for trustworthy secure shell deployment.
Proceedings of the VORTEX 2021: Proceedings of the 5th ACM International Workshop on Verification and mOnitoring at Runtime EXecution, 2021

2020
Reducing the Forensic Footprint with Android Accessibility Attacks.
Proceedings of the Security and Trust Management - 16th International Workshop, 2020

SpotCheck: On-Device Anomaly Detection for Android.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2018
Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

Enhancing Virtual Machine Introspection-Based Memory Analysis with Event Triggers.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

2017
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics.
Proceedings of the Information Security Theory and Practice, 2017

Memory Forensics of Insecure Android Inter-app Communications.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Using thumbnail affinity for fragmentation point detection of JPEG files.
Proceedings of the IEEE EUROCON 2017 -17th International Conference on Smart Technologies, 2017

2015
SUDUTA: Script UAF Detection Using Taint Analysis.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification.
Proceedings of the SECRYPT 2015, 2015

2012
Distress detection.
PhD thesis, 2012

Distress Detection (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

2010
Danger Theory and Intrusion Detection: Possibilities and Limitations of the Analogy.
Proceedings of the Artificial Immune Systems, 9th International Conference, 2010

2007
Using Weak Bisimulation for Enterprise Integration Architecture Formal Verification--I.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007


  Loading...