Follow
Davide Balzarotti
Davide Balzarotti
Professor, Eurecom
Verified email at eurecom.fr - Homepage
Title
Cited by
Cited by
Year
All your contacts are belong to us: automated identity theft attacks on social networks
L Bilge, T Strufe, D Balzarotti, E Kirda
Proceedings of the 18th international conference on World wide web, 551-560, 2009
8132009
A {Large-scale} analysis of the security of embedded firmwares
A Costin, J Zaddach, A Francillon, D Balzarotti
23rd USENIX security symposium (USENIX Security 14), 95-110, 2014
5892014
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks
A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2015
5782015
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008
5582008
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
J Zaddach, L Bruno, A Francillon, D Balzarotti
NDSS 14, 1-16, 2014
4332014
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
3922012
G-Free: defeating return-oriented programming through gadget-less binaries
K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda
Proceedings of the 26th annual computer security applications conference, 49-58, 2010
3822010
Exposure: A passive dns analysis service to detect and report malicious domains
L Bilge, S Sen, D Balzarotti, E Kirda, C Kruegel
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-28, 2014
3782014
A view on current malware behaviors
U Bayer, I Habibi, D Balzarotti, E Kirda, C Kruegel
Proceedings of the 2nd USENIX conference on Large-scale exploits and …, 2009
2992009
Efficient detection of split personalities in malware.
D Balzarotti, M Cova, C Karlberger, E Kirda, C Kruegel, G Vigna
NDSS, 2010
2842010
Testing network-based intrusion detection signatures using mutant exploits
G Vigna, W Robertson, D Balzarotti
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2792004
Accessminer: using system-centric models for malware protection
A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2552010
Abusing social networks for automated user profiling
M Balduzzi, C Platzer, T Holz, E Kirda, D Balzarotti, C Kruegel
Recent Advances in Intrusion Detection, 422-441, 2010
2462010
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
M Muench, J Stijohann, F Kargl, A Francillon, D Balzarotti
NDSS, 2018
2432018
Understanding linux malware
E Cozzi, M Graziano, Y Fratantonio, D Balzarotti
2018 IEEE symposium on security and privacy (SP), 161-175, 2018
2402018
Swaddler: An approach for the anomaly-based detection of state violations in web applications
M Cova, D Balzarotti, V Felmetsger, G Vigna
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
2312007
Can I opt out yet? GDPR and the global illusion of cookie control
I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ...
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
2232019
Reverse social engineering attacks in online social networks
D Irani, M Balduzzi, D Balzarotti, E Kirda, C Pu
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011
2192011
A quantitative study of accuracy in system call-based malware detection
D Canali, A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
1922012
SoK: Deep packer inspection: A longitudinal study of the complexity of run-time packers
X Ugarte-Pedrero, D Balzarotti, I Santos, PG Bringas
2015 IEEE Symposium on Security and Privacy, 659-673, 2015
1902015
The system can't perform the operation now. Try again later.
Articles 1–20