USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 22 results:
Filters: Author is Davide Balzarotti [Clear All Filters]
Humans vs. Machines in Malware Classification. 32nd USENIX Security Symposium (USENIX Security 23). :1145--1162.
.
2023. Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages. 32nd USENIX Security Symposium (USENIX Security 23). :4157--4173.
.
2023. WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate. 32nd USENIX Security Symposium (USENIX Security 23). :6079--6096.
.
2023. Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. 31st USENIX Security Symposium (USENIX Security 22). :413--430.
.
2022. How Machine Learning Is Solving the Binary Function Similarity Problem. 31st USENIX Security Symposium (USENIX Security 22). :2099--2116.
.
2022. RE-Mind: a First Look Inside the Mind of a Reverse Engineer. 31st USENIX Security Symposium (USENIX Security 22). :2727--2745.
.
2022. When Sally Met Trackers: Web Tracking From the Users' Perspective. 31st USENIX Security Symposium (USENIX Security 22). :2189--2206.
.
2022. The Use of Likely Invariants as Feedback for Fuzzers. 30th USENIX Security Symposium (USENIX Security 21). :2829--2846.
.
2021. When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World. 30th USENIX Security Symposium (USENIX Security 21). :3487--3504.
.
2021. Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques. 28th USENIX Security Symposium (USENIX Security 19). :1751--1768.
.
2019. Toward the Analysis of Embedded Firmware through Automated Re-hosting. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :135--150.
.
2019. When Malware is Packin’ Heat. Enigma 2018 (Enigma 2018).
.
2018. Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies. 26th USENIX Security Symposium (USENIX Security 17). :679--694.
.
2017. Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks. 25th USENIX Security Symposium (USENIX Security 16). :431--446.
.
2016. In the Compression Hornet’s Nest: A Security Study of Data Compression in Network Services. 24th USENIX Security Symposium (USENIX Security 15). :801--816.
.
2015. Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence. 24th USENIX Security Symposium (USENIX Security 15). :1057--1072.
.
2015. A Large-Scale Analysis of the Security of Embedded Firmwares. 23rd USENIX Security Symposium (USENIX Security 14). :95--110.
.
2014. Through the Looking-Glass, and What Eve Found There. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
.
2014. Exposing the Lack of Privacy in File Hosting Services. 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11).
.
2011. Honeybot, Your Man in the Middle for Automated Social Engineering. 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
.
2010. A View on Current Malware Behaviors. 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 09).
.
2009. Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms. First USENIX Workshop on Offensive Technologies (WOOT 07).
.
2007.