Antonio Nappa
Antonio Nappa
Corelight Inc - UC3M Madrid
Verified email at corelight.com - Homepage
Title
Cited by
Cited by
Year
Manufacturing Compromise: The Emergence of Exploit-as-a-Service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
2412012
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
J Caballero, G Grieco, M Marron, A Nappa
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
1252012
The attack of the clones: A study of the impact of shared code on vulnerability patching
A Nappa, R Johnson, L Bilge, J Caballero, T Dumitras
2015 IEEE symposium on security and privacy, 692-708, 2015
922015
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
922015
Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting
A Nappa, MZ Rafique, J Caballero
DIMVA 2013, 2013
902013
Take a deep breath: a stealthy, resilient and cost-effective botnet using skype
A Nappa, A Fattori, M Balduzzi, M Dell’Amico, L Cavallaro
International Conference on Detection of Intrusions and Malware, and …, 2010
432010
The MALICIA dataset: identification and analysis of drive-by download operations
A Nappa, MZ Rafique, J Caballero
International Journal of Information Security 14 (1), 15-33, 2015
352015
Cyberprobe: Towards internet-scale active detection of malicious servers
A Nappa, Z Xu, MZ Rafique, J Caballero, G Gu
In Proceedings of the 2014 Network and Distributed System Security Symposium …, 2014
352014
Autoprobe: Towards automatic active malicious server probing using dynamic binary analysis
Z Xu, A Nappa, R Baykov, G Yang, J Caballero, G Gu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
292014
WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds
W Liang, N Antonio, C Juan, R Thomas, A Aditya
ACM IMC, 2014
282014
Performance comparision of secure and insecure VoIP environments
V Miroslav, A Rozza, A Nappa
TERENA Networking Conference, 2008
112008
Analysis and implementation of secure and unsecure Voice over IP environment and performance comparison using OpenSER
A Nappa, D Bruschi, A Rozza, M Voznak
Universita degli studi di Milano 84, 2007
102007
Browser Exploits as a Service: The Monetization of Driveby Downloads
C Grier, L Ballard, J Caballero, N Chachra, C Dietrich, K Levchenko, ...
22012
Impact of security on speech quality
M Voznak, F Rezac, A Nappa, A Rozza
RTT Conference, 2008
22008
ZKSENSE: a Privacy-Preserving Mechanism for Bot Detection in Mobile Devices
P Papadopoulos, IQ Azurmendi, J Zhang, M Varvello, A Nappa, B Livshits
arXiv preprint arXiv:1911.07649, 2019
2019
VPN0: A Privacy-Preserving Decentralized Virtual Private Network
M Varvello, IQ Azurmendi, A Nappa, P Papadopoulos, G Pestana, ...
arXiv preprint arXiv:1910.00159, 2019
2019
RevProbe: detecting silent reverse proxies in malicious server infrastructures
A Nappa, RF Munir, IK Tanoli, C Kreibich, J Caballero
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
2016
Defending against cybercrime: advances in the detection of malicious servers and the analysis of client-side vulnerabilities
A Nappa
ETS de Ingenieros Informáticos (UPM), 2016
2016
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching
R Johnson, A Nappa, L Bilge, J Caballero, T Dumitras
Actas de las primeras Jornadas Nacionales de Investigación en Ciberseguridad …, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–19