What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Luca Invernizzi
Google Scholar
17
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/tches
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning.
Elie Bursztein
Luca Invernizzi
Karel Král
Daniel Moghimi
Jean-Michel Picod
Marina Zhang
2023
conf/acns
Hybrid Post-quantum Signatures in Hardware Security Keys.
Diana Ghinea
Fabian Kaczmarczyck
Jennifer Pullman
Julien Cretin
Stefan Kölbl
Rafael Misoczki
Jean-Michel Picod
Luca Invernizzi
Elie Bursztein
2020
conf/acsac
Spotlight: Malware Lead Generation at Scale.
Fabian Kaczmarczyck
Bernhard Grill
Luca Invernizzi
Jennifer Pullman
Cecilia M. Procopiuc
David Tao
Borbala Benko
Elie Bursztein
2019
conf/ccs
Five Years of the Right to be Forgotten.
Theo Bertram
Elie Bursztein
Stephanie Caro
Hubert Chao
Rutledge Chin Feman
Peter Fleischer
Albin Gustafsson
Jess Hemerly
Chris Hibbert
Luca Invernizzi
Lanah Kammourieh Donnelly
Jason Ketover
Jay Laefer
Paul Nicholas
Yuan Niu
Harjinder Obhi
David Price
Andrew Strait
Kurt Thomas
Al Verney
2019
conf/uss
Protecting accounts from credential stuffing with password breach alerting.
Kurt Thomas
Jennifer Pullman
Kevin Yeo
Ananth Raghunathan
Patrick Gage Kelley
Luca Invernizzi
Borbala Benko
Tadek Pietraszek
Sarvar Patel
Dan Boneh
Elie Bursztein
2018
conf/sp
Tracking Ransomware End-to-end.
Danny Yuxing Huang
Maxwell Matthaios Aliapoulios
Vector Guo Li
Luca Invernizzi
Elie Bursztein
Kylie McRoberts
Jonathan Levin
Kirill Levchenko
Alex C. Snoeren
Damon McCoy
2017
conf/ccs
Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.
Kurt Thomas
Frank Li
Ali Zand
Jacob Barrett
Juri Ranieri
Luca Invernizzi
Yarik Markov
Oxana Comanescu
Vijay Eranti
Angelika Moscicki
Daniel Margolis
Vern Paxson
Elie Bursztein
2017
conf/ccs
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Cheng Huang
Shuang Hao
Luca Invernizzi
Jiayong Liu
Yong Fang
Christopher Kruegel
Giovanni Vigna
2017
conf/uss
Understanding the Mirai Botnet.
Manos Antonakakis
Tim April
Michael D. Bailey
Matt Bernhard
Elie Bursztein
Jaime Cochran
Zakir Durumeric
J. Alex Halderman
Luca Invernizzi
Michalis Kallitsis
Deepak Kumar
Chaz Lever
Zane Ma
Joshua Mason
Damian Menscher
Chad Seaman
Nick Sullivan
Kurt Thomas
Yi Zhou
2016
conf/sp
Cloak of Visibility: Detecting When Machines Browse a Different Web.
Luca Invernizzi
Kurt Thomas
Alexandros Kapravelos
Oxana Comanescu
Jean-Michel Picod
Elie Bursztein
2015
conf/sp
What the App is That? Deception and Countermeasures in the Android User Interface.
Antonio Bianchi
Jacopo Corbetta
Luca Invernizzi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2015
conf/acsac
BareDroid: Large-Scale Analysis of Android Apps on Real Devices.
Simone Mutti
Yanick Fratantonio
Antonio Bianchi
Luca Invernizzi
Jacopo Corbetta
Dhilung Kirat
Christopher Kruegel
Giovanni Vigna
2014
conf/uss
Ten Years of iCTF: The Good, The Bad, and The Ugly.
Giovanni Vigna
Kevin Borgolte
Jacopo Corbetta
Adam Doupé
Yanick Fratantonio
Luca Invernizzi
Dhilung Kirat
Yan Shoshitaishvili
2014
conf/ndss
Nazca: Detecting Malware Distribution in Large-Scale Networks.
Luca Invernizzi
Stanislav Miskovic
Ruben Torres
Christopher Kruegel
Sabyasachi Saha
Giovanni Vigna
Sung-Ju Lee
Marco Mellia
2013
conf/acsac
Message in a bottle: sailing past censorship.
Luca Invernizzi
Christopher Kruegel
Giovanni Vigna
2012
conf/ccs
You are what you include: large-scale evaluation of remote javascript inclusions.
Nick Nikiforakis
Luca Invernizzi
Alexandros Kapravelos
Steven Van Acker
Wouter Joosen
Christopher Kruegel
Frank Piessens
Giovanni Vigna
2012
conf/sp
EvilSeed: A Guided Approach to Finding Malicious Web Pages.
Luca Invernizzi
Paolo Milani Comparetti
Stefano Benvenuti
Christopher Kruegel
Marco Cova
Giovanni Vigna
Coauthors
Adam Doupé
(1)
Al Verney
(1)
Albin Gustafsson
(1)
Alex C. Snoeren
(1)
Alexandros Kapravelos
(2)
Ali Zand
(1)
Ananth Raghunathan
(1)
Andrew Strait
(1)
Angelika Moscicki
(1)
Antonio Bianchi
(2)
Bernhard Grill
(1)
Borbala Benko
(2)
Cecilia M. Procopiuc
(1)
Chad Seaman
(1)
Chaz Lever
(1)
Cheng Huang
(1)
Chris Hibbert
(1)
Christopher Kruegel
(7)
Damian Menscher
(1)
Damon McCoy
(1)
Dan Boneh
(1)
Daniel Margolis
(1)
Daniel Moghimi
(1)
Danny Yuxing Huang
(1)
David Price
(1)
David Tao
(1)
Deepak Kumar
(1)
Dhilung Kirat
(2)
Diana Ghinea
(1)
Elie Bursztein
(9)
Fabian Kaczmarczyck
(2)
Frank Li
(1)
Frank Piessens
(1)
Giovanni Vigna
(8)
Harjinder Obhi
(1)
Hubert Chao
(1)
J. Alex Halderman
(1)
Jacob Barrett
(1)
Jacopo Corbetta
(3)
Jaime Cochran
(1)
Jason Ketover
(1)
Jay Laefer
(1)
Jean-Michel Picod
(3)
Jennifer Pullman
(3)
Jess Hemerly
(1)
Jiayong Liu
(1)
Jonathan Levin
(1)
Joshua Mason
(1)
Julien Cretin
(1)
Juri Ranieri
(1)
Karel Král
(1)
Kevin Borgolte
(1)
Kevin Yeo
(1)
Kirill Levchenko
(1)
Kurt Thomas
(5)
Kylie McRoberts
(1)
Lanah Kammourieh Donnelly
(1)
Luca Invernizzi
(17)
Manos Antonakakis
(1)
Marco Cova
(1)
Marco Mellia
(1)
Marina Zhang
(1)
Matt Bernhard
(1)
Maxwell Matthaios Aliapoulios
(1)
Michael D. Bailey
(1)
Michalis Kallitsis
(1)
Nick Nikiforakis
(1)
Nick Sullivan
(1)
Oxana Comanescu
(2)
Paolo Milani Comparetti
(1)
Patrick Gage Kelley
(1)
Paul Nicholas
(1)
Peter Fleischer
(1)
Rafael Misoczki
(1)
Ruben Torres
(1)
Rutledge Chin Feman
(1)
Sabyasachi Saha
(1)
Sarvar Patel
(1)
Shuang Hao
(1)
Simone Mutti
(1)
Stanislav Miskovic
(1)
Stefan Kölbl
(1)
Stefano Benvenuti
(1)
Stephanie Caro
(1)
Steven Van Acker
(1)
Sung-Ju Lee
(1)
Tadek Pietraszek
(1)
Theo Bertram
(1)
Tim April
(1)
Vector Guo Li
(1)
Vern Paxson
(1)
Vijay Eranti
(1)
Wouter Joosen
(1)
Yan Shoshitaishvili
(1)
Yanick Fratantonio
(3)
Yarik Markov
(1)
Yi Zhou
(1)
Yong Fang
(1)
Yuan Niu
(1)
Zakir Durumeric
(1)
Zane Ma
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to