Vigna

Results: 339



#Item
1Botnets / Cybercrime / Computing / Cyberwarfare / Torpig / Srizbi botnet / Festi / Fast flux / Domain generation algorithm / Bot herder / The Spamhaus Project / Conficker

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2015-02-12 10:29:36
2Computer security / Security engineering / Cyberwarfare / Prevention / Cybercrime / National security / Computer network security / Cyberattack / Capture the flag / Information security / Denial-of-service attack

Poster: Shell We Play A Game? CTF-as-a-service for Security Education Adam Doup´e and Giovanni Vigna Arizona State University and UC Santa Barbara ,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 00:24:26
3Software / Computing / Web browsers / Internet privacy / Fingerprinting algorithms / Cross-platform software / Computer network security / HTTP cookie / Device fingerprint / Browser extension / JavaScript / Fingerprint

Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting Nick Nikiforakis∗ , Alexandros Kapravelos† , Wouter Joosen∗ , Christopher Kruegel† , Frank Piessens∗ , Giovanni Vigna† ∗ iMinds

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-03-07 03:28:15
4

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, Giovanni Vigna

Add to Reading List

Source URL: wp.internetsociety.org

Language: English - Date: 2017-09-02 18:26:15
    5

    Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications Davide Balzarotti§, Marco Cova§, Vika Felmetsger§, Nenad Jovanovic∗, Engin Kirda¶, Christopher Kruegel§, and Giovanni Vigna

    Add to Reading List

    Source URL: seclab.ccs.neu.edu

    Language: English - Date: 2018-08-14 16:50:47
      6

      Vasilios Mavroudis*, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, and Giovanni Vigna On the Privacy and Security of the Ultrasound Ecosystem Abstract: Nowadays users often possess a variety of ele

      Add to Reading List

      Source URL: www.s3.eurecom.fr

      Language: English - Date: 2017-11-07 11:46:31
        7

        Protecting a Moving Target: Addressing Web Application Concept Drift The 12th International Symposium on Recent Advances in Intrusion DetectionFederico Maggi, William Robertson, Christopher Krügel, Giovanni Vigna

        Add to Reading List

        Source URL: www.rennes.supelec.fr

        Language: English - Date: 2009-10-01 10:00:37
          8

          Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications Sebastian Poeplau∗† , Yanick Fratantonio∗ , Antonio Bianchi∗ , Christopher Kruegel∗ , Giovanni Vigna∗ ∗ UC

          Add to Reading List

          Source URL: www.s3.eurecom.fr

          Language: English - Date: 2017-11-07 11:46:31
            9

            TriggerScope: Towards Detecting Logic Bombs in Android Applications Yanick Fratantonio∗ , Antonio Bianchi∗ , William Robertson† , Engin Kirda† , Christopher Kruegel∗ , Giovanni Vigna∗ ∗ UC Santa Barbara

            Add to Reading List

            Source URL: www.s3.eurecom.fr

            Language: English - Date: 2017-11-07 11:46:31
              10

              Chinese Long Bean Fabaceae Vigna sesquipedalis (analysis based on boiled, drained Chinese long bean) CALIFORNIA

              Add to Reading List

              Source URL: harvestofthemonth.cdph.ca.gov

              - Date: 2014-03-04 12:24:12
                UPDATE