Davide Balzarotti
Davide Balzarotti
Professor, Eurecom
Verified email at - Homepage
Cited by
Cited by
All your contacts are belong to us: automated identity theft attacks on social networks
L Bilge, T Strufe, D Balzarotti, E Kirda
Proceedings of the 18th international conference on World wide web, 551-560, 2009
A {Large-scale} analysis of the security of embedded firmwares
A Costin, J Zaddach, A Francillon, D Balzarotti
23rd USENIX security symposium (USENIX Security 14), 95-110, 2014
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks
A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2015
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
J Zaddach, L Bruno, A Francillon, D Balzarotti
NDSS 14, 1-16, 2014
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
G-Free: defeating return-oriented programming through gadget-less binaries
K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda
Proceedings of the 26th annual computer security applications conference, 49-58, 2010
Exposure: A passive dns analysis service to detect and report malicious domains
L Bilge, S Sen, D Balzarotti, E Kirda, C Kruegel
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-28, 2014
A view on current malware behaviors
U Bayer, I Habibi, D Balzarotti, E Kirda, C Kruegel
Proceedings of the 2nd USENIX conference on Large-scale exploits and …, 2009
Efficient detection of split personalities in malware.
D Balzarotti, M Cova, C Karlberger, E Kirda, C Kruegel, G Vigna
NDSS, 2010
Testing network-based intrusion detection signatures using mutant exploits
G Vigna, W Robertson, D Balzarotti
Proceedings of the 11th ACM conference on Computer and communications …, 2004
Accessminer: using system-centric models for malware protection
A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Abusing social networks for automated user profiling
M Balduzzi, C Platzer, T Holz, E Kirda, D Balzarotti, C Kruegel
Recent Advances in Intrusion Detection, 422-441, 2010
Swaddler: An approach for the anomaly-based detection of state violations in web applications
M Cova, D Balzarotti, V Felmetsger, G Vigna
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
Understanding linux malware
E Cozzi, M Graziano, Y Fratantonio, D Balzarotti
2018 IEEE symposium on security and privacy (SP), 161-175, 2018
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
M Muench, J Stijohann, F Kargl, A Francillon, D Balzarotti
NDSS, 2018
Reverse social engineering attacks in online social networks
D Irani, M Balduzzi, D Balzarotti, E Kirda, C Pu
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011
Can I opt out yet? GDPR and the global illusion of cookie control
I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ...
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
A quantitative study of accuracy in system call-based malware detection
D Canali, A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
A security analysis of amazon's elastic compute cloud service
M Balduzzi, J Zaddach, D Balzarotti, E Kirda, S Loureiro
Proceedings of the 27th annual ACM symposium on applied computing, 1427-1434, 2012
The system can't perform the operation now. Try again later.
Articles 1–20