Secure in-vm monitoring using hardware virtualization MI Sharif, W Lee, W Cui, A Lanzi Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 425 | 2009 |
G-Free: defeating return-oriented programming through gadget-less binaries K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda Proceedings of the 26th annual computer security applications conference, 49-58, 2010 | 390 | 2010 |
Impeding Malware Analysis Using Conditional Code Obfuscation. MI Sharif, A Lanzi, JT Giffin, W Lee NDSS, 2008 | 359 | 2008 |
Automatic reverse engineering of malware emulators M Sharif, A Lanzi, J Giffin, W Lee 2009 30th IEEE Symposium on Security and Privacy, 94-109, 2009 | 301 | 2009 |
Accessminer: using system-centric models for malware protection A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 263 | 2010 |
Classification of packed executables for accurate computer virus detection R Perdisci, A Lanzi, W Lee Pattern recognition letters 29 (14), 1941-1946, 2008 | 246 | 2008 |
Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables R Perdisci, A Lanzi, W Lee 2008 Annual Computer Security Applications Conference (ACSAC), 301-310, 2008 | 208 | 2008 |
A quantitative study of accuracy in system call-based malware detection D Canali, A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda Proceedings of the 2012 International Symposium on Software Testing and …, 2012 | 199 | 2012 |
K-Tracer: A System for Extracting Kernel Malware Behavior. A Lanzi, MI Sharif, W Lee NDSS, 2009 | 156 | 2009 |
The privacy implications of cyber security systems: A technological survey E Toch, C Bettini, E Shmueli, L Radaelli, A Lanzi, D Riboni, B Lepri ACM Computing Surveys (CSUR) 51 (2), 1-27, 2018 | 104 | 2018 |
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence M Graziano, D Canali, L Bilge, A Lanzi, E Shi, D Balzarotti, M van Dijk, ... 24th USENIX Security Symposium (USENIX Security 15), 1057-1072, 2015 | 102 | 2015 |
Diversified process replicæ for defeating memory error exploits D Bruschi, L Cavallaro, A Lanzi 2007 IEEE International Performance, Computing, and Communications …, 2007 | 81 | 2007 |
Peerrush: Mining for unwanted p2p traffic B Rahbarinia, R Perdisci, A Lanzi, K Li Detection of Intrusions and Malware, and Vulnerability Assessment: 10th …, 2013 | 80 | 2013 |
Replay attack in TCG specification and solution D Bruschi, L Cavallaro, A Lanzi, M Monga 21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005 | 75* | 2005 |
LISABETH: automated content-based signature generator for zero-day polymorphic worms L Cavallaro, A Lanzi, L Mayer, M Monga Proceedings of the fourth international workshop on Software engineering for …, 2008 | 73 | 2008 |
Hypervisor memory forensics M Graziano, A Lanzi, D Balzarotti Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013 | 70 | 2013 |
Peerrush: Mining for unwanted p2p traffic B Rahbarinia, R Perdisci, A Lanzi, K Li Journal of Information Security and Applications 19 (3), 194-208, 2014 | 67 | 2014 |
A smart fuzzer for x86 executables A Lanzi, L Martignoni, M Monga, R Paleari Third International Workshop on Software Engineering for Secure Systems …, 2007 | 62* | 2007 |
Hypervisor-based malware protection with accessminer A Fattori, A Lanzi, D Balzarotti, E Kirda Computers & Security 52, 33-50, 2015 | 47 | 2015 |
Security evaluation of a banking fraud analysis system M Carminati, M Polino, A Continella, A Lanzi, F Maggi, S Zanero ACM Transactions on Privacy and Security (TOPS) 21 (3), 1-31, 2018 | 44 | 2018 |