USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 43 results:
Filters: Author is Giovanni Vigna [Clear All Filters]
Hulk: Eliciting Malicious Behavior in Browser Extensions. 23rd USENIX Security Symposium (USENIX Security 14). :641--654.
.
2014. Ten Years of iCTF: The Good, The Bad, and The Ugly. 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14).
.
2014. Revolver: An Automated Approach to the Detection of Evasive Web-based Malware. 22nd USENIX Security Symposium (USENIX Security 13). :637--652.
.
2013. Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. 22nd USENIX Security Symposium (USENIX Security 13). :687--702.
.
2013. B@bel: Leveraging Email Delivery for Spam Mitigation. 21st USENIX Security Symposium (USENIX Security 12). :16--32.
.
2012. Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. 21st USENIX Security Symposium (USENIX Security 12). :523--538.
.
2012. PUBCRAWL: Protecting Users and Businesses from CRAWLers. 21st USENIX Security Symposium (USENIX Security 12). :507--522.
.
2012. BOTMAGNIFIER: Locating Spambots on the Internet. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams. 5th USENIX Workshop on Offensive Technologies (WOOT 11).
.
2011. The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns. 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11).
.
2011. Toward Automated Detection of Logic Vulnerabilities in Web Applications. 19th USENIX Security Symposium (USENIX Security 10).
.
2010. Panel on Security Education. Workshop on Cyber Security Experimentation and Test (CSET 08).
.
2008. There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. 2nd USENIX Workshop on Offensive Technologies (WOOT 08).
.
2008. Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms. First USENIX Workshop on Offensive Technologies (WOOT 07).
.
2007. Panel: E-Voting. 16th USENIX Security Symposium (USENIX Security 07).
.
2007. Automating Mimicry Attacks Using Static Binary Analysis. 14th USENIX Security Symposium (USENIX Security 05).
.
2005. Static Disassembly of Obfuscated Binaries. 13th USENIX Security Symposium (USENIX Security 04).
.
2004. Detecting Malicious Java Code Using Virtual Machine Auditing. 12th USENIX Security Symposium (USENIX Security 03).
.
2003.