Home
Publications
Contact
1
A Digital Forensics Approach for Validating Screen Captures in Legal Proceedings
Claudia Greco
,
Michele Ianni
,
Antonella Guzzo
,
Giancarlo Fortino
Cite
Evasion of Deep Learning Malware Detection via Adversarial Selective Obfuscation
Claudia Greco
,
Michele Ianni
,
Antonella Guzzo
,
Giancarlo Fortino
Cite
DOI
A Forensic Framework for Screen Capture Validation in Legal Contexts
Claudia Greco
,
Michele Ianni
,
Giuseppe Seminara
,
Antonella Guzzo
,
Giancarlo Fortino
Cite
DOI
CheckMATE '24 - Research on Offensive and Defensive Techniques in the context of Man At The End (MATE) Attacks
Sebastian Schrittwieser
,
Michele Ianni
Cite
DOI
URL
SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language
Giancarlo Fortino
,
Claudia Greco
,
Antonella Guzzo
,
Michele Ianni
Cite
Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications
Giuseppe Beltrano
,
Claudia Greco
,
Michele Ianni
,
Giancarlo Fortino
Cite
DOI
Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts
Usman Tahir
,
Fiza Siyal
,
Michele Ianni
,
Antonella Guzzo
,
Giancarlo Fortino
Cite
DOI
Explaining Binary Obfuscation
Claudia Greco
,
Michele Ianni
,
Antonella Guzzo
,
Giancarlo Fortino
Cite
DOI
Enabling Faster Security Assessment of Re-hosted Firmware
Giancarlo Fortino
,
Claudia Greco
,
Antonella Guzzo
,
Michele Ianni
Cite
DOI
Neural Network based Temporal Point Processes for Attack Detection in Industrial Control Systems
Giancarlo Fortino
,
Claudia Greco
,
Antonella Guzzo
,
Michele Ianni
Cite
DOI
»
Cite
×