Follow
Antonio Bianchi
Antonio Bianchi
Assistant Professor, Purdue University
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Execute this! analyzing unsafe and malicious dynamic code loading in android applications.
S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna
NDSS 14, 23-26, 2014
3832014
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
2262015
What the App is That? Deception and Countermeasures in the Android User Interface
A Bianchi, J Corbetta, L Invernizzi, Y Fratantonio, C Kruegel, G Vigna
Security and Privacy (SP), 2015 IEEE Symposium on, 931-948, 2015
1992015
Triggerscope: Towards detecting logic bombs in android applications
Y Fratantonio, A Bianchi, W Robertson, E Kirda, C Kruegel, G Vigna
2016 IEEE symposium on security and privacy (SP), 377-396, 2016
1882016
Ramblr: Making Reassembly Great Again.
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
NDSS, 2017
1502017
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
VM Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, PL de Geus, ...
NDSS, 2016
1272016
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
1102017
Baredroid: Large-scale analysis of android apps on real devices
S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015
782015
Blacksheep: Detecting compromised hosts in homogeneous crowds
A Bianchi, Y Shoshitaishvili, C Kruegel, G Vigna
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
622012
Heaphopper: Bringing bounded model checking to heap implementation security
M Eckert, A Bianchi, R Wang, Y Shoshitaishvili, C Kruegel, G Vigna
27th {USENIX} Security Symposium ({USENIX} Security 18), 99-116, 2018
592018
Njas: Sandboxing unmodified applications in non-rooted devices running stock android
A Bianchi, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
592015
BootStomp: On the Security of Bootloaders in Mobile Devices.
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
USENIX Security Symposium, 781-798, 2017
572017
Clapp: Characterizing loops in android applications
Y Fratantonio, A Machiry, A Bianchi, C Kruegel, G Vigna
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
432015
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
J Wu, Y Nan, V Kumar, Dave (Jing) Tian, A Bianchi, M Payer, D Xu
WOOT@ USENIX Security Symposium, 2020
402020
Broken Fingers: On the Usage of the Fingerprint API in Android.
A Bianchi, Y Fratantonio, A Machiry, C Kruegel, G Vigna, SPH Chung, ...
NDSS, 2018
332018
DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ...
292021
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles
H Kim, MO Ozmen, A Bianchi, ZB Celik, D Xu
232021
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
232018
Exploitation and mitigation of authentication schemes based on device-public information
A Bianchi, E Gustafson, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference, 16-27, 2017
212017
On the security and engineering implications of finer-grained access controls for Android developers and users
Y Fratantonio, A Bianchi, W Robertson, M Egele, C Kruegel, E Kirda, ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015
192015
The system can't perform the operation now. Try again later.
Articles 1–20