Publications

(2019). A Game of “Cut and Mouse”: Bypassing Antivirus by Simulating User Inputs. Proceedings of the 35th Annual Computer Security Applications Conference.

PDF DOI Research Area

(2019). On Deception-Based Protection Against Cryptographic Ransomware. Detection of Intrusions and Malware, and Vulnerability Assessment.

PDF Research Area

(2018). Towards a Framework for Testing the Security of IoT Devices Consistently. Emerging Technologies for Authorization and Authentication - First International Workshop, ETAA@ESORICS 2018, Barcelona, Spain, September 7, 2018, Proceedings.

PDF DOI

(2018). A Logic-Based Reasoner for Discovering Authentication Vulnerabilities Between Interconnected Accounts. Emerging Technologies for Authorization and Authentication - First International Workshop, ETAA@ESORICS 2018, Barcelona, Spain, September 7, 2018, Proceedings.

PDF DOI

(2018). MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention. IEEE Trans. Dependable Sec. Comput..

PDF DOI

(2017). Efficient Attack Graph Analysis Through Approximate Inference. ACM Trans. Priv. Secur..

PDF DOI

(2016). Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection. CoRR.

PDF Research Area