default search action
BibTeX records: Luca Invernizzi
@article{DBLP:journals/tches/BurszteinIKMPZ24, author = {Elie Bursztein and Luca Invernizzi and Karel Kr{\'{a}}l and Daniel Moghimi and Jean{-}Michel Picod and Marina Zhang}, title = {Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {472--499}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.472-499}, doi = {10.46586/TCHES.V2024.I3.472-499}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BurszteinIKMPZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-09757, author = {Enze Liu and George Kappos and Eric Mugnier and Luca Invernizzi and Stefan Savage and David Tao and Kurt Thomas and Geoffrey M. Voelker and Sarah Meiklejohn}, title = {Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates}, journal = {CoRR}, volume = {abs/2405.09757}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.09757}, doi = {10.48550/ARXIV.2405.09757}, eprinttype = {arXiv}, eprint = {2405.09757}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-09757.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GhineaKPCKMPIB23, author = {Diana Ghinea and Fabian Kaczmarczyck and Jennifer Pullman and Julien Cretin and Stefan K{\"{o}}lbl and Rafael Misoczki and Jean{-}Michel Picod and Luca Invernizzi and Elie Bursztein}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {Hybrid Post-quantum Signatures in Hardware Security Keys}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {480--499}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6\_26}, doi = {10.1007/978-3-031-41181-6\_26}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GhineaKPCKMPIB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-07249, author = {Elie Bursztein and Luca Invernizzi and Karel Kr{\'{a}}l and Daniel Moghimi and Jean{-}Michel Picod and Marina Zhang}, title = {Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning}, journal = {CoRR}, volume = {abs/2306.07249}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.07249}, doi = {10.48550/ARXIV.2306.07249}, eprinttype = {arXiv}, eprint = {2306.07249}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-07249.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhineaKPCKMPIB22, author = {Diana Ghinea and Fabian Kaczmarczyck and Jennifer Pullman and Julien Cretin and Stefan K{\"{o}}lbl and Rafael Misoczki and Jean{-}Michel Picod and Luca Invernizzi and Elie Bursztein}, title = {Hybrid Post-Quantum Signatures in Hardware Security Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1225}, year = {2022}, url = {https://eprint.iacr.org/2022/1225}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhineaKPCKMPIB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KaczmarczyckGIP20, author = {Fabian Kaczmarczyck and Bernhard Grill and Luca Invernizzi and Jennifer Pullman and Cecilia M. Procopiuc and David Tao and Borbala Benko and Elie Bursztein}, title = {Spotlight: Malware Lead Generation at Scale}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {17--27}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427273}, doi = {10.1145/3427228.3427273}, timestamp = {Tue, 15 Dec 2020 12:22:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KaczmarczyckGIP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-10861, author = {Ivan Petrov and Luca Invernizzi and Elie Bursztein}, title = {CoinPolice: Detecting Hidden Cryptojacking Attacks with Neural Networks}, journal = {CoRR}, volume = {abs/2006.10861}, year = {2020}, url = {https://arxiv.org/abs/2006.10861}, eprinttype = {arXiv}, eprint = {2006.10861}, timestamp = {Tue, 23 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-10861.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BertramBCCFFGHH19, author = {Theo Bertram and Elie Bursztein and Stephanie Caro and Hubert Chao and Rutledge Chin Feman and Peter Fleischer and Albin Gustafsson and Jess Hemerly and Chris Hibbert and Luca Invernizzi and Lanah Kammourieh Donnelly and Jason Ketover and Jay Laefer and Paul Nicholas and Yuan Niu and Harjinder Obhi and David Price and Andrew Strait and Kurt Thomas and Al Verney}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Five Years of the Right to be Forgotten}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {959--972}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354208}, doi = {10.1145/3319535.3354208}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BertramBCCFFGHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ThomasPYRKIBPPB19, author = {Kurt Thomas and Jennifer Pullman and Kevin Yeo and Ananth Raghunathan and Patrick Gage Kelley and Luca Invernizzi and Borbala Benko and Tadek Pietraszek and Sarvar Patel and Dan Boneh and Elie Bursztein}, editor = {Nadia Heninger and Patrick Traynor}, title = {Protecting accounts from credential stuffing with password breach alerting}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1556--1571}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/thomas}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/ThomasPYRKIBPPB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HuangALIBMLLSM18, author = {Danny Yuxing Huang and Maxwell Matthaios Aliapoulios and Vector Guo Li and Luca Invernizzi and Elie Bursztein and Kylie McRoberts and Jonathan Levin and Kirill Levchenko and Alex C. Snoeren and Damon McCoy}, title = {Tracking Ransomware End-to-end}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {618--631}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00047}, doi = {10.1109/SP.2018.00047}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/HuangALIBMLLSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangHILFKV17, author = {Cheng Huang and Shuang Hao and Luca Invernizzi and Jiayong Liu and Yong Fang and Christopher Kruegel and Giovanni Vigna}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {494--505}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053017}, doi = {10.1145/3052973.3053017}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HuangHILFKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThomasLZBRIMCEM17, author = {Kurt Thomas and Frank Li and Ali Zand and Jacob Barrett and Juri Ranieri and Luca Invernizzi and Yarik Markov and Oxana Comanescu and Vijay Eranti and Angelika Moscicki and Daniel Margolis and Vern Paxson and Elie Bursztein}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1421--1434}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134067}, doi = {10.1145/3133956.3134067}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ThomasLZBRIMCEM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AntonakakisABBB17, author = {Manos Antonakakis and Tim April and Michael D. Bailey and Matt Bernhard and Elie Bursztein and Jaime Cochran and Zakir Durumeric and J. Alex Halderman and Luca Invernizzi and Michalis Kallitsis and Deepak Kumar and Chaz Lever and Zane Ma and Joshua Mason and Damian Menscher and Chad Seaman and Nick Sullivan and Kurt Thomas and Yi Zhou}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Understanding the Mirai Botnet}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1093--1110}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AntonakakisABBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/InvernizziTKCPB16, author = {Luca Invernizzi and Kurt Thomas and Alexandros Kapravelos and Oxana Comanescu and Jean{-}Michel Picod and Elie Bursztein}, title = {Cloak of Visibility: Detecting When Machines Browse a Different Web}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {743--758}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.50}, doi = {10.1109/SP.2016.50}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/InvernizziTKCPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MuttiFBICKKV15, author = {Simone Mutti and Yanick Fratantonio and Antonio Bianchi and Luca Invernizzi and Jacopo Corbetta and Dhilung Kirat and Christopher Kruegel and Giovanni Vigna}, title = {BareDroid: Large-Scale Analysis of Android Apps on Real Devices}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {71--80}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818036}, doi = {10.1145/2818000.2818036}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MuttiFBICKKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BianchiCIFKV15, author = {Antonio Bianchi and Jacopo Corbetta and Luca Invernizzi and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna}, title = {What the App is That? Deception and Countermeasures in the Android User Interface}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {931--948}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.62}, doi = {10.1109/SP.2015.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BianchiCIFKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/InvernizziMTKSVLM14, author = {Luca Invernizzi and Stanislav Miskovic and Ruben Torres and Christopher Kruegel and Sabyasachi Saha and Giovanni Vigna and Sung{-}Ju Lee and Marco Mellia}, title = {Nazca: Detecting Malware Distribution in Large-Scale Networks}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/nazca-detecting-malware-distribution-large-scale-networks}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/InvernizziMTKSVLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CorbettaIKV14, author = {Jacopo Corbetta and Luca Invernizzi and Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {130--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_7}, doi = {10.1007/978-3-319-11379-1\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/CorbettaIKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ShoshitaishviliIDV14, author = {Yan Shoshitaishvili and Luca Invernizzi and Adam Doup{\'{e}} and Giovanni Vigna}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {1649--1656}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2554880}, doi = {10.1145/2554850.2554880}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/ShoshitaishviliIDV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VignaBCDFIKS14, author = {Giovanni Vigna and Kevin Borgolte and Jacopo Corbetta and Adam Doup{\'{e}} and Yanick Fratantonio and Luca Invernizzi and Dhilung Kirat and Yan Shoshitaishvili}, editor = {Zachary N. J. Peterson}, title = {Ten Years of iCTF: The Good, The Bad, and The Ugly}, booktitle = {2014 {USENIX} Summit on Gaming, Games, and Gamification in Security Education, 3GSE '14, San Diego, CA, USA, August 18, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/3gse14/summit-program/presentation/vigna}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/VignaBCDFIKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/InvernizziKV13, author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna}, editor = {Charles N. Payne Jr.}, title = {Message in a bottle: sailing past censorship}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {39--48}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523654}, doi = {10.1145/2523649.2523654}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/InvernizziKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NikiforakisIKAJKPV12, author = {Nick Nikiforakis and Luca Invernizzi and Alexandros Kapravelos and Steven {Van Acker} and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {You are what you include: large-scale evaluation of remote javascript inclusions}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {736--747}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382274}, doi = {10.1145/2382196.2382274}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NikiforakisIKAJKPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/InvernizziC12, author = {Luca Invernizzi and Paolo Milani Comparetti and Stefano Benvenuti and Christopher Kruegel and Marco Cova and Giovanni Vigna}, title = {EvilSeed: {A} Guided Approach to Finding Malicious Web Pages}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {428--442}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.33}, doi = {10.1109/SP.2012.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/InvernizziC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/AndonianCICG10, author = {Michael Andonian and Dario Cazzaro and Luca Invernizzi and Monique Chyba and Sergio Grammatico}, title = {Geometric control for autonomous underwater vehicles: Overcoming a thruster failure}, booktitle = {Proceedings of the 49th {IEEE} Conference on Decision and Control, {CDC} 2010, December 15-17, 2010, Atlanta, Georgia, {USA}}, pages = {7051--7056}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CDC.2010.5718157}, doi = {10.1109/CDC.2010.5718157}, timestamp = {Fri, 04 Mar 2022 13:28:01 +0100}, biburl = {https://dblp.org/rec/conf/cdc/AndonianCICG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.