Follow
ANTONIO NAPPA
Title
Cited by
Cited by
Year
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3062012
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
J Caballero, G Grieco, M Marron, A Nappa
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
2322012
The attack of the clones: A study of the impact of shared code on vulnerability patching
A Nappa, R Johnson, L Bilge, J Caballero, T Dumitras
2015 IEEE symposium on security and privacy, 692-708, 2015
1942015
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1632015
Driving in the cloud: An analysis of drive-by download operations and abuse reporting
A Nappa, MZ Rafique, J Caballero
International Conference on Detection of Intrusions and Malware, and …, 2013
1252013
The MALICIA dataset: identification and analysis of drive-by download operations
A Nappa, MZ Rafique, J Caballero
International Journal of Information Security 14, 15-33, 2015
1142015
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers.
A Nappa, Z Xu, MZ Rafique, J Caballero, G Gu
NDSS, 2014
722014
Autoprobe: Towards automatic active malicious server probing using dynamic binary analysis
Z Xu, A Nappa, R Baykov, G Yang, J Caballero, G Gu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
622014
Take a deep breath: a stealthy, resilient and cost-effective botnet using skype
A Nappa, A Fattori, M Balduzzi, M Dell’Amico, L Cavallaro
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010
532010
Whowas: A platform for measuring web deployments on iaas clouds
L Wang, A Nappa, J Caballero, T Ristenpart, A Akella
Proceedings of the 2014 Conference on Internet Measurement Conference, 101-114, 2014
312014
Blocklist babel: On the transparency and dynamics of open source blocklisting
Á Feal, P Vallina, J Gamba, S Pastrana, A Nappa, O Hohlfeld, ...
IEEE Transactions on Network and Service Management 18 (2), 1334-1349, 2021
192021
Performance comparision of secure and insecure VoIP environments
V Miroslav, A Rozza, A Nappa
122008
VPN-zero: a privacy-preserving decentralized virtual private network
M Varvello, IQ Azurmendi, A Nappa, P Papadopoulos, G Pestana, ...
2021 IFIP Networking Conference (IFIP Networking), 1-6, 2021
102021
Analysis and implementation of secure and unsecure Voice over IP environment and performance comparison using OpenSER
A Nappa, D Bruschi, A Rozza, M Voznak
Universita degli studi di Milano 84, 2007
102007
Vpn0: A privacy-preserving decentralized virtual private network
M Varvello, IQ Azurmendi, A Nappa, P Papadopoulos, G Pestana, ...
arXiv preprint arXiv:1910.00159, 2019
92019
RevProbe: detecting silent reverse proxies in malicious server infrastructures
A Nappa, RF Munir, IK Tanoli, C Kreibich, J Caballero
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
92016
PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes
A Nappa, P Papadopoulos, M Varvello, DA Gomez, J Tapiador, A Lanzi
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
42021
ZKSENSE: a privacy-preserving mechanism for bot detection in mobile devices
P Papadopoulos, I Querejeta-Azurmendi, J Zhang, M Varvello, A Nappa, ...
arXiv e-prints, arXiv: 1911.07649, 2019
42019
Deja-Vu: A Glimpse on Radioactive Soft-Error Consequences on Classical and Quantum Computations
A Nappa, C Hobbs, A Lanzi
arXiv preprint arXiv:2105.05103, 2021
22021
ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices
I Querejeta-Azurmendi, P Papadopoulos, M Varvello, A Nappa, J Zhang, ...
arXiv preprint arXiv:1911.07649, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20