What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Gianluca Stringhini
Google Scholar
52
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
Pandawan: Quantifying Progress in Linux-based Firmware Rehosting.
Ioannis Angelakopoulos
Gianluca Stringhini
Manuel Egele
2024
conf/uss
PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter.
Pujan Paudel
Chen Ling
Jeremy Blackburn
Gianluca Stringhini
2024
conf/uss
Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation.
Pujan Paudel
Mohammad Hammas Saeed
Rebecca Auger
Chris Wells
Gianluca Stringhini
2024
conf/sp
LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks.
Saad Ullah
Mingji Han
Saurabh Pujar
Hammond Pearce
Ayse K. Coskun
Gianluca Stringhini
2023
conf/uss
FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules.
Ioannis Angelakopoulos
Gianluca Stringhini
Manuel Egele
2023
conf/sp
Lambretta: Learning to Rank for Twitter Soft Moderation.
Pujan Paudel
Jeremy Blackburn
Emiliano De Cristofaro
Savvas Zannettou
Gianluca Stringhini
2023
conf/eurosp
SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice.
Mohit Singhal
Chen Ling
Pujan Paudel
Poojitha Thota
Nihal Kumarswamy
Gianluca Stringhini
Shirin Nilizadeh
2022
conf/ccs
Finding MNEMON: Reviving Memories of Node Embeddings.
Yun Shen
Yufei Han
Zhikun Zhang
Min Chen
Ting Yu
Michael Backes
Yang Zhang
Gianluca Stringhini
2022
conf/ccs
Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.
Wai Man Si
Michael Backes
Jeremy Blackburn
Emiliano De Cristofaro
Gianluca Stringhini
Savvas Zannettou
Yang Zhang
2022
conf/ccs
CERBERUS: Exploring Federated Prediction of Security Events.
Mohammad Naseri
Yufei Han
Enrico Mariconti
Yun Shen
Gianluca Stringhini
Emiliano De Cristofaro
2022
conf/uss
A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned.
Yun Shen
Pierre-Antoine Vervier
Gianluca Stringhini
2022
conf/sp
TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit.
Mohammad Hammas Saeed
Shiza Ali
Jeremy Blackburn
Emiliano De Cristofaro
Savvas Zannettou
Gianluca Stringhini
2021
conf/uss
SocialHEISTing: Understanding Stolen Facebook Accounts.
Jeremiah Onaolapo
Nektarios Leontiadis
Despoina Magka
Gianluca Stringhini
2021
conf/sp
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Kurt Thomas
Devdatta Akhawe
Michael D. Bailey
Dan Boneh
Elie Bursztein
Sunny Consolvo
Nicola Dell
Zakir Durumeric
Patrick Gage Kelley
Deepak Kumar
Damon McCoy
Sarah Meiklejohn
Thomas Ristenpart
Gianluca Stringhini
2021
conf/sp
A First Look at Zoombombing.
Chen Ling
Utkucan Balci
Jeremy Blackburn
Gianluca Stringhini
2021
conf/eurosp
AppJitsu: Investigating the Resiliency of Android Applications.
Onur Zungur
Antonio Bianchi
Gianluca Stringhini
Manuel Egele
2021
conf/eurosp
ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices.
Yun Shen
Gianluca Stringhini
2021
conf/ndss
To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media.
Beliz Kaleli
Brian Kondracki
Manuel Egele
Nick Nikiforakis
Gianluca Stringhini
2021
conf/ndss
Understanding Worldwide Private Information Collection on Android.
Yun Shen
Pierre-Antoine Vervier
Gianluca Stringhini
2020
journals/tifs
Automatically Dismantling Online Dating Fraud.
Guillermo Suarez-Tangil
Matthew Edwards
Claudia Peersman
Gianluca Stringhini
Awais Rashid
Monica T. Whitty
2020
conf/ccs
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior.
Bushra A. AlAhmadi
Enrico Mariconti
Riccardo Spolaor
Gianluca Stringhini
Ivan Martinovic
2020
conf/eurosp
A Measurement Study on the Advertisements Displayed to Web Users Coming from the Regular Web and from Tor.
Adrian Bermudez-Villalva
Mirco Musolesi
Gianluca Stringhini
2020
conf/dsn
Libspector : Context-Aware Large-Scale Network Traffic Analysis of Android Applications.
Onur Zungur
Gianluca Stringhini
Manuel Egele
2019
conf/ccs
AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families.
Omid Mirzaei
Guillermo Suarez-Tangil
José María de Fuentes
Juan Tapiador
Gianluca Stringhini
2019
conf/ccs
Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web.
Colin C. Ife
Yun Shen
Steven J. Murdoch
Gianluca Stringhini
2019
conf/uss
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks.
Yun Shen
Gianluca Stringhini
2019
conf/eurosp
A Qualitative Evaluation of Two Different Law Enforcement Approaches on Dark Net Markets.
Cerys Bradley
Gianluca Stringhini
2019
conf/eurosp
Master of Sheets: A Tale of Compromised Cloud Documents.
Jeremiah Onaolapo
Martin Lazarov
Gianluca Stringhini
2019
conf/dsn
BorderPatrol: Securing BYOD using Fine-Grained Contextual Information.
Onur Zungur
Guillermo Suarez-Tangil
Gianluca Stringhini
Manuel Egele
2019
conf/wisec
Fatal attraction: identifying mobile devices through electromagnetic emissions.
Beatrice Perez
Mirco Musolesi
Gianluca Stringhini
2018
journals/istr
Studying users' adaptation to Android's run-time fine-grained access control system.
Panagiotis Andriotis
Gianluca Stringhini
Martina Angela Sasse
2018
conf/ccs
Tiresias: Predicting Security Events Through Deep Learning.
Yun Shen
Enrico Mariconti
Pierre-Antoine Vervier
Gianluca Stringhini
2018
conf/acsac
LOBO: Evaluation of Generalization Deficiencies in Twitter Bot Classifiers.
Juan Echeverría
Emiliano De Cristofaro
Nicolas Kourtellis
Ilias Leontiadis
Gianluca Stringhini
Shi Zhou
2017
conf/ccs
POISED: Spotting Twitter Spam Off the Beaten Paths.
Shirin Nilizadeh
Francois Labreche
Alireza Sedighian
Ali Zand
José M. Fernandez
Christopher Kruegel
Gianluca Stringhini
Giovanni Vigna
2017
conf/ccs
PayBreak: Defense Against Cryptographic Ransomware.
Eugene Kolodenker
William Koch
Gianluca Stringhini
Manuel Egele
2017
conf/uss
The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity.
Enrico Mariconti
Jeremiah Onaolapo
Gordon J. Ross
Gianluca Stringhini
2017
conf/ndss
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.
Enrico Mariconti
Lucky Onwuzurike
Panagiotis Andriotis
Emiliano De Cristofaro
Gordon J. Ross
Gianluca Stringhini
2017
conf/acsac
Ex-Ray: Detection of History-Leaking Browser Extensions.
Michael Weissbacher
Enrico Mariconti
Guillermo Suarez-Tangil
Gianluca Stringhini
William K. Robertson
Engin Kirda
2017
conf/acsac
Marmite: Spreading Malicious File Reputation Through Download Graphs.
Gianluca Stringhini
Yun Shen
Yufei Han
Xiangliang Zhang
2016
conf/uss
Honey Sheets: What Happens to Leaked Google Spreadsheets?
Martin Lazarov
Jeremiah Onaolapo
Gianluca Stringhini
2016
conf/fc
Are Payment Card Contracts Unfair? (Short Paper).
Steven J. Murdoch
Ingolf Becker
Ruba Abu-Salma
Ross J. Anderson
Nicholas Bohm
Alice Hutchings
M. Angela Sasse
Gianluca Stringhini
2015
conf/ccs
Drops for Stuff: An Analysis of Reshipping Mule Scams.
Shuang Hao
Kevin Borgolte
Nick Nikiforakis
Gianluca Stringhini
Manuel Egele
Michael Eubanks
Brian Krebs
Giovanni Vigna
2015
conf/uss
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.
Gianluca Stringhini
Pierre Mourlanne
Grégoire Jacob
Manuel Egele
Christopher Kruegel
Giovanni Vigna
2014
conf/ccs
The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape.
Gianluca Stringhini
Oliver Hohlfeld
Christopher Kruegel
Giovanni Vigna
2014
conf/ccs
Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?
Maria B. Line
Ali Zand
Gianluca Stringhini
Richard A. Kemmerer
2014
conf/sp
The Tricks of the Trade: What Makes Spam Campaigns Successful?
Jane Iedemska
Gianluca Stringhini
Richard A. Kemmerer
Christopher Kruegel
Giovanni Vigna
2013
conf/ccs
Shady paths: leveraging surfing crowds to detect malicious web pages.
Gianluca Stringhini
Christopher Kruegel
Giovanni Vigna
2013
conf/ndss
COMPA: Detecting Compromised Accounts on Social Networks.
Manuel Egele
Gianluca Stringhini
Christopher Krügel
Giovanni Vigna
2012
conf/uss
B@bel: Leveraging Email Delivery for Spam Mitigation.
Gianluca Stringhini
Manuel Egele
Apostolis Zarras
Thorsten Holz
Christopher Kruegel
Giovanni Vigna
2011
conf/uss
BOTMAGNIFIER: Locating Spambots on the Internet.
Gianluca Stringhini
Thorsten Holz
Brett Stone-Gross
Christopher Kruegel
Giovanni Vigna
2011
conf/acsac
Hit 'em where it hurts: a live security exercise on cyber situational awareness.
Adam Doupé
Manuel Egele
Benjamin Caillat
Gianluca Stringhini
Gorkem Yakin
Ali Zand
Ludovico Cavedon
Giovanni Vigna
2010
conf/acsac
Detecting spammers on social networks.
Gianluca Stringhini
Christopher Kruegel
Giovanni Vigna
Coauthors
Adam Doupé
(1)
Adrian Bermudez-Villalva
(1)
Ali Zand
(3)
Alice Hutchings
(1)
Alireza Sedighian
(1)
Antonio Bianchi
(1)
Apostolis Zarras
(1)
Awais Rashid
(1)
Ayse K. Coskun
(1)
Beatrice Perez
(1)
Beliz Kaleli
(1)
Benjamin Caillat
(1)
Brett Stone-Gross
(1)
Brian Kondracki
(1)
Brian Krebs
(1)
Bushra A. AlAhmadi
(1)
Cerys Bradley
(1)
Chen Ling
(3)
Chris Wells
(1)
Christopher Kruegel
(8)
Christopher Krügel
(1)
Claudia Peersman
(1)
Colin C. Ife
(1)
Damon McCoy
(1)
Dan Boneh
(1)
Deepak Kumar
(1)
Despoina Magka
(1)
Devdatta Akhawe
(1)
Elie Bursztein
(1)
Emiliano De Cristofaro
(6)
Engin Kirda
(1)
Enrico Mariconti
(6)
Eugene Kolodenker
(1)
Francois Labreche
(1)
Gianluca Stringhini
(52)
Giovanni Vigna
(11)
Gordon J. Ross
(2)
Gorkem Yakin
(1)
Grégoire Jacob
(1)
Guillermo Suarez-Tangil
(4)
Hammond Pearce
(1)
Ilias Leontiadis
(1)
Ingolf Becker
(1)
Ioannis Angelakopoulos
(2)
Ivan Martinovic
(1)
Jane Iedemska
(1)
Jeremiah Onaolapo
(4)
Jeremy Blackburn
(5)
José M. Fernandez
(1)
José María de Fuentes
(1)
Juan Echeverría
(1)
Juan Tapiador
(1)
Kevin Borgolte
(1)
Kurt Thomas
(1)
Lucky Onwuzurike
(1)
Ludovico Cavedon
(1)
M. Angela Sasse
(1)
Manuel Egele
(12)
Maria B. Line
(1)
Martin Lazarov
(2)
Martina Angela Sasse
(1)
Matthew Edwards
(1)
Michael Backes
(2)
Michael D. Bailey
(1)
Michael Eubanks
(1)
Michael Weissbacher
(1)
Min Chen
(1)
Mingji Han
(1)
Mirco Musolesi
(2)
Mohammad Hammas Saeed
(2)
Mohammad Naseri
(1)
Mohit Singhal
(1)
Monica T. Whitty
(1)
Nektarios Leontiadis
(1)
Nicholas Bohm
(1)
Nick Nikiforakis
(2)
Nicola Dell
(1)
Nicolas Kourtellis
(1)
Nihal Kumarswamy
(1)
Oliver Hohlfeld
(1)
Omid Mirzaei
(1)
Onur Zungur
(3)
Panagiotis Andriotis
(2)
Patrick Gage Kelley
(1)
Pierre Mourlanne
(1)
Pierre-Antoine Vervier
(3)
Poojitha Thota
(1)
Pujan Paudel
(4)
Rebecca Auger
(1)
Riccardo Spolaor
(1)
Richard A. Kemmerer
(2)
Ross J. Anderson
(1)
Ruba Abu-Salma
(1)
Saad Ullah
(1)
Sarah Meiklejohn
(1)
Saurabh Pujar
(1)
Savvas Zannettou
(3)
Shi Zhou
(1)
Shirin Nilizadeh
(2)
Shiza Ali
(1)
Shuang Hao
(1)
Steven J. Murdoch
(2)
Sunny Consolvo
(1)
Thomas Ristenpart
(1)
Thorsten Holz
(2)
Ting Yu
(1)
Utkucan Balci
(1)
Wai Man Si
(1)
William K. Robertson
(1)
William Koch
(1)
Xiangliang Zhang
(1)
Yang Zhang
(2)
Yufei Han
(3)
Yun Shen
(9)
Zakir Durumeric
(1)
Zhikun Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to