Prati
Antonio Bianchi
Antonio Bianchi
Assistant Professor, Purdue University
Potvrđena adresa e-pošte na purdue.edu - Početna stranica
Naslov
Citirano
Citirano
Godina
Execute this! analyzing unsafe and malicious dynamic code loading in android applications.
S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna
NDSS 14, 23-26, 2014
4042014
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
2372015
Triggerscope: Towards detecting logic bombs in android applications
Y Fratantonio, A Bianchi, W Robertson, E Kirda, C Kruegel, G Vigna
2016 IEEE symposium on security and privacy (SP), 377-396, 2016
2152016
What the App is That? Deception and Countermeasures in the Android User Interface
A Bianchi, J Corbetta, L Invernizzi, Y Fratantonio, C Kruegel, G Vigna
Security and Privacy (SP), 2015 IEEE Symposium on, 931-948, 2015
2122015
Ramblr: Making Reassembly Great Again.
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
NDSS, 2017
1782017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
1352017
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
VM Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, PL de Geus, ...
NDSS, 2016
1352016
Baredroid: Large-scale analysis of android apps on real devices
S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015
852015
{HeapHopper}: Bringing bounded model checking to heap implementation security
M Eckert, A Bianchi, R Wang, Y Shoshitaishvili, C Kruegel, G Vigna
27th USENIX Security Symposium (USENIX Security 18), 99-116, 2018
712018
{BootStomp}: On the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017
702017
DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ...
632021
Njas: Sandboxing unmodified applications in non-rooted devices running stock android
A Bianchi, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
632015
Blacksheep: Detecting compromised hosts in homogeneous crowds
A Bianchi, Y Shoshitaishvili, C Kruegel, G Vigna
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
622012
{BLESA}: Spoofing attacks against reconnections in bluetooth low energy
J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu
14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020
532020
Broken Fingers: On the Usage of the Fingerprint API in Android.
A Bianchi, Y Fratantonio, A Machiry, C Kruegel, G Vigna, SPH Chung, ...
NDSS, 2018
482018
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles
H Kim, MO Ozmen, A Bianchi, ZB Celik, D Xu
432021
Clapp: Characterizing loops in android applications
Y Fratantonio, A Machiry, A Bianchi, C Kruegel, G Vigna
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
432015
{LIGHTBLUE}: Automatic {Profile-Aware} Debloating of Bluetooth Stacks
J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu, DJ Tian, ...
30th USENIX Security Symposium (USENIX Security 21), 339-356, 2021
292021
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
282018
{M2MON}: Building an {MMIO-based} security reference monitor for unmanned vehicles
A Khan, H Kim, B Lee, D Xu, A Bianchi, DJ Tian
30th USENIX Security Symposium (USENIX Security 21), 285-302, 2021
262021
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20