What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Davide Balzarotti
Google Scholar
74
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
ModSec-AdvLearn: Countering Adversarial SQL Injections With Robust Machine Learning.
Giuseppe Floris
Christian Scano
Biagio Montaruli
Luca Demetrio
Andrea Valenza
Luca Compagna
Davide Ariu
Luca Piras
Davide Balzarotti
Battista Biggio
2025
conf/esorics
The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families.
Antonino Vitale
Simone Aonzo
Savino Dambra
Nanda Rani
Lorenzo Ippolito
Platon Kotzias
Juan Caballero
Davide Balzarotti
2024
conf/ccs
On Understanding and Forecasting Fuzzers Performance with Static Analysis.
Dongjia Zhang
Andrea Fioraldi
Davide Balzarotti
2024
conf/asiaccs
Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware.
Antonio Ruggia
Dario Nisi
Savino Dambra
Alessio Merlo
Davide Balzarotti
Simone Aonzo
2024
conf/ndss
Predictive Context-sensitive Fuzzing.
Pietro Borrello
Andrea Fioraldi
Daniele Cono D'Elia
Davide Balzarotti
Leonardo Querzoni
Cristiano Giuffrida
2023
conf/ccs
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors.
Biagio Montaruli
Luca Demetrio
Maura Pintor
Luca Compagna
Davide Balzarotti
Battista Biggio
2023
conf/ccs
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance.
Savino Dambra
Yufei Han
Simone Aonzo
Platon Kotzias
Antonino Vitale
Juan Caballero
Davide Balzarotti
Leyla Bilge
2023
conf/uss
WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate.
Feras Al Kassar
Luca Compagna
Davide Balzarotti
2023
conf/uss
Humans vs. Machines in Malware Classification.
Simone Aonzo
Yufei Han
Alessandro Mantovani
Davide Balzarotti
2023
conf/uss
Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages.
Iskander Sánchez-Rola
Leyla Bilge
Davide Balzarotti
Armin Buescher
Petros Efstathopoulos
2023
conf/ndss
An OS-agnostic Approach to Memory Forensics.
Andrea Oliveri
Matteo Dell'Amico
Davide Balzarotti
2022
conf/ccs
LibAFL: A Framework to Build Modular and Reusable Fuzzers.
Andrea Fioraldi
Dominik Christian Maier
Dongjia Zhang
Davide Balzarotti
2022
conf/uss
How Machine Learning Is Solving the Binary Function Similarity Problem.
Andrea Marcelli
Mariano Graziano
Xabier Ugarte-Pedrero
Yanick Fratantonio
Mohamad Mansouri
Davide Balzarotti
2022
conf/uss
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
Jayakrishna Vadayath
Moritz Eckert
Kyle Zeng
Nicolaas Weideman
Gokulkrishna Praveen Menon
Yanick Fratantonio
Davide Balzarotti
Adam Doupé
Tiffany Bao
Ruoyu Wang
Christophe Hauser
Yan Shoshitaishvili
2022
conf/uss
When Sally Met Trackers: Web Tracking From the Users' Perspective.
Savino Dambra
Iskander Sánchez-Rola
Leyla Bilge
Davide Balzarotti
2022
conf/uss
RE-Mind: a First Look Inside the Mind of a Reverse Engineer.
Alessandro Mantovani
Simone Aonzo
Yanick Fratantonio
Davide Balzarotti
2022
conf/sp
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships.
Iskander Sánchez-Rola
Matteo Dell'Amico
Davide Balzarotti
Pierre-Antoine Vervier
Leyla Bilge
2022
conf/eurosp
Fuzzing with Data Dependency Information.
Alessandro Mantovani
Andrea Fioraldi
Davide Balzarotti
2022
conf/asiaccs
The Convergence of Source Code and Binary Vulnerability Discovery - A Case Study.
Alessandro Mantovani
Luca Compagna
Yan Shoshitaishvili
Davide Balzarotti
2022
conf/ndss
Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications.
Feras Al Kassar
Giulia Clerici
Luca Compagna
Davide Balzarotti
Fabian Yamaguchi
2021
journals/compsec
Pre-processing memory dumps to improve similarity score of Windows modules.
Miguel Martín-Pérez
Ricardo J. Rodríguez
Davide Balzarotti
2021
conf/ccs
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Davide Quarta
Michele Ianni
Aravind Machiry
Yanick Fratantonio
Eric Gustafson
Davide Balzarotti
Martina Lindorfer
Giovanni Vigna
Christopher Kruegel
2021
conf/uss
When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World.
Erin Avllazagaj
Ziyun Zhu
Leyla Bilge
Davide Balzarotti
Tudor Dumitras
2021
conf/uss
The Use of Likely Invariants as Feedback for Fuzzers.
Andrea Fioraldi
Daniele Cono D'Elia
Davide Balzarotti
2021
conf/sp
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization.
Andrea Possemato
Simone Aonzo
Davide Balzarotti
Yanick Fratantonio
2021
conf/asiaccs
SoK: Enabling Security Analyses of Embedded Systems via Rehosting.
Andrew Fasano
Tiemoko Ballo
Marius Muench
Tim Leek
Alexander Bulekov
Brendan Dolan-Gavitt
Manuel Egele
Aurélien Francillon
Long Lu
Nick Gregory
Davide Balzarotti
William Robertson
2021
conf/ndss
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes.
Alexander Küchler
Alessandro Mantovani
Yufei Han
Leyla Bilge
Davide Balzarotti
2020
conf/sp
SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap.
Savino Dambra
Leyla Bilge
Davide Balzarotti
2020
conf/ndss
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem.
Alessandro Mantovani
Simone Aonzo
Xabier Ugarte-Pedrero
Alessio Merlo
Davide Balzarotti
2020
conf/ndss
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.
Hojjat Aghakhani
Fabio Gritti
Francesco Mecca
Martina Lindorfer
Stefano Ortolani
Davide Balzarotti
Giovanni Vigna
Christopher Kruegel
2020
conf/acsac
The Tangled Genealogy of IoT Malware.
Emanuele Cozzi
Pierre-Antoine Vervier
Matteo Dell'Amico
Yun Shen
Leyla Bilge
Davide Balzarotti
2019
conf/ccs
Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control.
Iskander Sánchez-Rola
Matteo Dell'Amico
Platon Kotzias
Davide Balzarotti
Leyla Bilge
Pierre-Antoine Vervier
Igor Santos
2019
conf/uss
Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques.
Fabio Pagani
Davide Balzarotti
2019
conf/acsac
BakingTimer: privacy analysis of server-side request processing time.
Iskander Sánchez-Rola
Davide Balzarotti
Igor Santos
2018
conf/ccs
Clock Around the Clock: Time-Based Device Fingerprinting.
Iskander Sánchez-Rola
Igor Santos
Davide Balzarotti
2018
conf/sp
Understanding Linux Malware.
Emanuele Cozzi
Mariano Graziano
Yanick Fratantonio
Davide Balzarotti
2018
conf/ndss
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
Marius Muench
Jan Stijohann
Frank Kargl
Aurélien Francillon
Davide Balzarotti
2017
conf/ccs
Evaluation of Deception-Based Web Attacks Detection.
Xiao Han
Nizar Kheir
Davide Balzarotti
2017
conf/uss
Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies.
Iskander Sánchez-Rola
Igor Santos
Davide Balzarotti
2017
conf/sp
A Lustrum of Malware Network Communication: Evolution and Insights.
Chaz Lever
Platon Kotzias
Davide Balzarotti
Juan Caballero
Manos Antonakakis
2016
conf/ccs
PhishEye: Live Monitoring of Sandboxed Phishing Kits.
Xiao Han
Nizar Kheir
Davide Balzarotti
2016
conf/ccs
ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks.
Mariano Graziano
Davide Balzarotti
Alain Zidouemba
2016
conf/uss
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.
Stefano Cristalli
Mattia Pagnozzi
Mariano Graziano
Andrea Lanzi
Davide Balzarotti
2016
conf/dsn
Measuring the Role of Greylisting and Nolisting in Fighting Spam.
Fabio Pagani
Matteo De Astis
Mariano Graziano
Andrea Lanzi
Davide Balzarotti
2015
journals/compsec
Hypervisor-based malware protection with AccessMiner.
Aristide Fattori
Andrea Lanzi
Davide Balzarotti
Engin Kirda
2015
conf/uss
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
Giancarlo Pellegrino
Davide Balzarotti
Stefan Winter
Neeraj Suri
2015
conf/uss
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence.
Mariano Graziano
Davide Canali
Leyla Bilge
Andrea Lanzi
Davide Balzarotti
2015
conf/sp
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers.
Xabier Ugarte-Pedrero
Davide Balzarotti
Igor Santos
Pablo García Bringas
2015
conf/acsac
PIE: Parser Identification in Embedded Systems.
Lucian Cojocar
Jonas Zaddach
Roel Verdult
Herbert Bos
Aurélien Francillon
Davide Balzarotti
2014
conf/ccs
Shades of gray: a closer look at emails in the gray area.
Jelena Isacenkova
Davide Balzarotti
2014
conf/ccs
On the effectiveness of risk prediction based on users browsing behavior.
Davide Canali
Leyla Bilge
Davide Balzarotti
2014
conf/ccs
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment.
Gábor Pék
Andrea Lanzi
Abhinav Srivastava
Davide Balzarotti
Aurélien Francillon
Christoph Neumann
2014
conf/uss
A Large-Scale Analysis of the Security of Embedded Firmwares.
Andrei Costin
Jonas Zaddach
Aurélien Francillon
Davide Balzarotti
2014
conf/ndss
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
Jonas Zaddach
Luca Bruno
Aurélien Francillon
Davide Balzarotti
2014
conf/ndss
Toward Black-Box Detection of Logic Flaws in Web Applications.
Giancarlo Pellegrino
Davide Balzarotti
2014
conf/dsn
Optical Delusions: A Study of Malicious QR Codes in the Wild.
Amin Kharraz
Engin Kirda
William K. Robertson
Davide Balzarotti
Aurélien Francillon
2013
conf/sp
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations.
Jelena Isacenkova
Olivier Thonnard
Andrei Costin
Davide Balzarotti
Aurélien Francillon
2013
conf/ndss
Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web.
Davide Canali
Davide Balzarotti
2013
conf/acsac
Implementation and implications of a stealth hard-drive backdoor.
Jonas Zaddach
Anil Kurmus
Davide Balzarotti
Erik-Oliver Blass
Aurélien Francillon
Travis Goodspeed
Moitrayee Gupta
Ioannis Koltsidas
2012
journals/compsec
Have things changed now? An empirical study on input validation vulnerabilities in web applications.
Theodoor Scholte
Davide Balzarotti
Engin Kirda
2012
conf/ndss
Insights into User Behavior in Dealing with Internet Attacks.
Kaan Onarlioglu
Utku Ozan Yilmaz
Engin Kirda
Davide Balzarotti
2012
conf/acsac
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis.
Leyla Bilge
Davide Balzarotti
William K. Robertson
Engin Kirda
Christopher Kruegel
2012
conf/acsac
Towards network containment in malware analysis systems.
Mariano Graziano
Corrado Leita
Davide Balzarotti
2011
conf/fc
Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications.
Theodoor Scholte
Davide Balzarotti
Engin Kirda
2011
conf/ndss
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications.
Marco Balduzzi
Carmen Torrano Gimenez
Davide Balzarotti
Engin Kirda
2010
conf/ccs
AccessMiner: using system-centric models for malware protection.
Andrea Lanzi
Davide Balzarotti
Christopher Kruegel
Mihai Christodorescu
Engin Kirda
2010
conf/ccs
A solution for the automated detection of clickjacking attacks.
Marco Balduzzi
Manuel Egele
Engin Kirda
Davide Balzarotti
Christopher Kruegel
2010
conf/ndss
Efficient Detection of Split Personalities in Malware.
Davide Balzarotti
Marco Cova
Christoph Karlberger
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2010
conf/acsac
G-Free: defeating return-oriented programming through gadget-less binaries.
Kaan Onarlioglu
Leyla Bilge
Andrea Lanzi
Davide Balzarotti
Engin Kirda
2008
conf/sp
ClearShot: Eavesdropping on Keyboard Input from Video.
Davide Balzarotti
Marco Cova
Giovanni Vigna
2008
conf/sp
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
Davide Balzarotti
Marco Cova
Viktoria Felmetsger
Nenad Jovanovic
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2007
conf/ccs
Multi-module vulnerability analysis of web-based applications.
Davide Balzarotti
Marco Cova
Viktoria Felmetsger
Giovanni Vigna
2007
conf/acsac
Improving Signature Testing through Dynamic Data Flow Analysis.
Christopher Kruegel
Davide Balzarotti
William K. Robertson
Giovanni Vigna
2004
conf/ccs
Testing network-based intrusion detection signatures using mutant exploits.
Giovanni Vigna
William K. Robertson
Davide Balzarotti
Coauthors
Abhinav Srivastava
(1)
Adam Doupé
(1)
Alain Zidouemba
(1)
Alessandro Mantovani
(6)
Alessio Merlo
(2)
Alexander Bulekov
(1)
Alexander Küchler
(1)
Amin Kharraz
(1)
Andrea Fioraldi
(5)
Andrea Lanzi
(7)
Andrea Marcelli
(1)
Andrea Oliveri
(1)
Andrea Possemato
(1)
Andrea Valenza
(1)
Andrei Costin
(2)
Andrew Fasano
(1)
Anil Kurmus
(1)
Antonino Vitale
(2)
Antonio Ruggia
(1)
Aravind Machiry
(1)
Aristide Fattori
(1)
Armin Buescher
(1)
Aurélien Francillon
(9)
Battista Biggio
(2)
Biagio Montaruli
(2)
Brendan Dolan-Gavitt
(1)
Carmen Torrano Gimenez
(1)
Chaz Lever
(1)
Christian Scano
(1)
Christoph Karlberger
(1)
Christoph Neumann
(1)
Christophe Hauser
(1)
Christopher Kruegel
(8)
Corrado Leita
(1)
Cristiano Giuffrida
(1)
Daniele Cono D'Elia
(2)
Dario Nisi
(1)
Davide Ariu
(1)
Davide Balzarotti
(74)
Davide Canali
(3)
Davide Quarta
(1)
Dominik Christian Maier
(1)
Dongjia Zhang
(2)
Emanuele Cozzi
(2)
Engin Kirda
(12)
Eric Gustafson
(1)
Erik-Oliver Blass
(1)
Erin Avllazagaj
(1)
Fabian Yamaguchi
(1)
Fabio Gritti
(1)
Fabio Pagani
(2)
Feras Al Kassar
(2)
Francesco Mecca
(1)
Frank Kargl
(1)
Gábor Pék
(1)
Giancarlo Pellegrino
(2)
Giovanni Vigna
(8)
Giulia Clerici
(1)
Giuseppe Floris
(1)
Gokulkrishna Praveen Menon
(1)
Herbert Bos
(1)
Hojjat Aghakhani
(1)
Igor Santos
(5)
Ioannis Koltsidas
(1)
Iskander Sánchez-Rola
(7)
Jan Stijohann
(1)
Jayakrishna Vadayath
(1)
Jelena Isacenkova
(2)
Jonas Zaddach
(4)
Juan Caballero
(3)
Kaan Onarlioglu
(2)
Kyle Zeng
(1)
Leonardo Querzoni
(1)
Leyla Bilge
(13)
Long Lu
(1)
Lorenzo Ippolito
(1)
Luca Bruno
(1)
Luca Compagna
(5)
Luca Demetrio
(2)
Luca Piras
(1)
Lucian Cojocar
(1)
Manos Antonakakis
(1)
Manuel Egele
(2)
Marco Balduzzi
(2)
Marco Cova
(4)
Mariano Graziano
(7)
Marius Muench
(2)
Martina Lindorfer
(2)
Matteo De Astis
(1)
Matteo Dell'Amico
(4)
Mattia Pagnozzi
(1)
Maura Pintor
(1)
Michele Ianni
(1)
Miguel Martín-Pérez
(1)
Mihai Christodorescu
(1)
Mohamad Mansouri
(1)
Moitrayee Gupta
(1)
Moritz Eckert
(1)
Nanda Rani
(1)
Neeraj Suri
(1)
Nenad Jovanovic
(1)
Nick Gregory
(1)
Nicolaas Weideman
(1)
Nizar Kheir
(2)
Olivier Thonnard
(1)
Pablo García Bringas
(1)
Petros Efstathopoulos
(1)
Pierre-Antoine Vervier
(3)
Pietro Borrello
(1)
Platon Kotzias
(4)
Ricardo J. Rodríguez
(1)
Roel Verdult
(1)
Ruoyu Wang
(1)
Savino Dambra
(5)
Simone Aonzo
(7)
Stefan Winter
(1)
Stefano Cristalli
(1)
Stefano Ortolani
(1)
Theodoor Scholte
(2)
Tiemoko Ballo
(1)
Tiffany Bao
(1)
Tim Leek
(1)
Travis Goodspeed
(1)
Tudor Dumitras
(1)
Utku Ozan Yilmaz
(1)
Viktoria Felmetsger
(2)
William K. Robertson
(4)
William Robertson
(1)
Xabier Ugarte-Pedrero
(3)
Xiao Han
(2)
Yan Shoshitaishvili
(2)
Yanick Fratantonio
(6)
Yufei Han
(3)
Yun Shen
(1)
Ziyun Zhu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to