default search action
Yury Zhauniarovich
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Radu Anghel, Yury Zhauniarovich, Carlos Gañán:
Who's Got My Back? Measuring the Adoption of an Internet-wide BGP RTBH Service. Proc. ACM Meas. Anal. Comput. Syst. 8(1): 3:1-3:25 (2024) - [c25]Berend Kloeg, Aaron Yi Ding, Sjoerd Pellegrom, Yury Zhauniarovich:
Charting the Path to SBOM Adoption: A Business Stakeholder-Centric Approach. AsiaCCS 2024 - [c24]Anne-Kee Doing, Eduardo Barbaro, Frank van der Roest, Pieter van Gelder, Yury Zhauniarovich, Simon Parkin:
An analysis of phishing reporting activity in a bank. EuroUSEC 2024: 44-57 - [c23]Tom-Martijn Roelofs, Eduardo Barbaro, Svetlana Pekarskikh, Katarzyna Orzechowska, Marta Kwapien, Jakub Tyrlik, Dinu Smadu, Michel van Eeten, Yury Zhauniarovich:
Finding Harmony in the Noise: Blending Security Alerts for Attack Detection. SAC 2024: 1385-1394 - [c22]Radu Anghel, Yury Zhauniarovich, Carlos Gañán:
Who's Got My Back? Measuring the Adoption of an Internet-wide BGP RTBH Service. SIGMETRICS/Performance (Abstracts) 2024: 53-54 - [c21]Aksel Ethembabaoglu, Rolf van Wegberg, Yury Zhauniarovich, Michel van Eeten:
The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts. USENIX Security Symposium 2024 - 2023
- [c20]Radu Anghel, Swaathi Vetrivel, Elsa Turcios Rodriguez, Kaichi Sameshima, Daisuke Makita, Katsunari Yoshioka, Carlos Gañán, Yury Zhauniarovich:
Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks. ESORICS (2) 2023: 23-41 - [c19]Hilmy Hanif, Jorge Constantino, Marie-Therese Sekwenz, Michel van Eeten, Jolien Ubacht, Ben Wagner, Yury Zhauniarovich:
Tough Decisions? Supporting System Classification According to the AI Act. JURIX 2023: 353-358 - [c18]Yevheniya Nosyk, Qasim Lone, Yury Zhauniarovich, Carlos Hernandez Gañán, Emile Aben, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Andrzej Duda, Maciej Korczynski:
Intercept and Inject: DNS Response Manipulation in the Wild. PAM 2023: 461-478 - [e2]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - 2022
- [e1]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - 2020
- [j6]Maqsood Ahmad, Valerio Costamagna, Bruno Crispo, Francesco Bergadano, Yury Zhauniarovich:
StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications. J. Syst. Softw. 159 (2020) - [j5]Aleksandr Pilgun, Olga Gadyatskaya, Yury Zhauniarovich, Stanislav Dashevskyi, Artsiom Kushniarou, Sjouke Mauw:
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing. ACM Trans. Softw. Eng. Methodol. 29(4): 23:1-23:35 (2020) - [c17]Stanislav Dashevskyi, Yury Zhauniarovich, Olga Gadyatskaya, Aleksandr Pilgun, Hamza Ouhssain:
Dissecting Android Cryptocurrency Miners. CODASPY 2020: 191-202
2010 – 2019
- 2019
- [c16]Priyanka Dodia, Yury Zhauniarovich:
Poster: SDN-based System to Filter Out DRDoS Amplification Traffic in ISP Networks. CCS 2019: 2645-2647 - [c15]Yury Zhauniarovich, Priyanka Dodia:
Sorting the Garbage: Filtering Out DRDoS Amplification Traffic in ISP Networks. NetSoft 2019: 142-150 - [i4]Stanislav Dashevskyi, Yury Zhauniarovich, Olga Gadyatskaya, Aleksandr Pilgun, Hamza Ouhssain:
Dissecting Android Cryptocurrency Miners. CoRR abs/1905.02602 (2019) - [i3]Yury Zhauniarovich, Yazan Boshmaf, Husam Al Jawaheri, Mashael Al Sabah:
Characterizing Bitcoin donations to open source software on GitHub. CoRR abs/1907.04002 (2019) - 2018
- [j4]Yury Zhauniarovich, Issa Khalil, Ting Yu, Marc Dacier:
A Survey on Malicious Domains Detection through DNS Data Analysis. ACM Comput. Surv. 51(4): 67:1-67:36 (2018) - [c14]Aleksandr Pilgun, Olga Gadyatskaya, Stanislav Dashevskyi, Yury Zhauniarovich, Artsiom Kushniarou:
An Effective Android Code Coverage Tool. CCS 2018: 2189-2191 - [c13]Stanislav Dashevskyi, Olga Gadyatskaya, Aleksandr Pilgun, Yury Zhauniarovich:
The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android. CCS 2018: 2216-2218 - [i2]Yury Zhauniarovich, Issa Khalil, Ting Yu, Marc Dacier:
A Survey on Malicious Domains Detection through DNS Data Analysis. CoRR abs/1805.08426 (2018) - [i1]Aleksandr Pilgun, Olga Gadyatskaya, Stanislav Dashevskyi, Yury Zhauniarovich, Artsiom Kushniarou:
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing. CoRR abs/1812.10729 (2018) - 2017
- [c12]Laure Berti-Équille, Yury Zhauniarovich:
Profiling DRDoS Attacks with Data Analytics Pipeline. CIKM 2017: 1983-1986 - [c11]Attaullah Buriro, Bruno Crispo, Yury Zhauniarovich:
Please hold on: Unobtrusive user authentication using smartphone's built-in sensors. ISBA 2017: 1-8 - 2016
- [c10]Olga Gadyatskaya, Andra-Lidia Lezza, Yury Zhauniarovich:
Evaluation of Resource-Based App Repackaging Detection in Android. NordSec 2016: 135-151 - [c9]Yury Zhauniarovich, Olga Gadyatskaya:
Small Changes, Big Changes: An Updated View on the Android Permission System. RAID 2016: 346-367 - [c8]Michaël Aupetit, Yury Zhauniarovich, Giorgos Vasiliadis, Marc Dacier, Yazan Boshmaf:
Visualization of actionable knowledge to mitigate DRDoS attacks. VizSEC 2016: 1-8 - 2015
- [c7]Yury Zhauniarovich, Anton Philippov, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci:
Towards Black Box Testing of Android Apps. ARES 2015: 501-510 - [c6]Yury Zhauniarovich, Maqsood Ahmad, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci:
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. CODASPY 2015: 37-48 - 2014
- [b1]Yury Zhauniarovich:
Improving the security of the Android ecosystem. University of Trento, Italy, 2014 - [j3]Olga Gadyatskaya, Fabio Massacci, Yury Zhauniarovich:
Security in the Firefox OS and Tizen Mobile Platforms. Computer 47(6): 57-63 (2014) - [j2]Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes:
MOSES: Supporting and Enforcing Security Profiles on Smartphones. IEEE Trans. Dependable Secur. Comput. 11(3): 211-223 (2014) - [c5]Yury Zhauniarovich:
Security of the Android Operating System. CRiSIS 2014: 272-274 - [c4]Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, Ermanno Moser:
FSquaDRA: Fast Detection of Repackaged Applications. DBSec 2014: 130-145 - 2013
- [c3]Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo:
Enabling trusted stores for android. CCS 2013: 1345-1348 - 2012
- [j1]Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android. IEEE Trans. Inf. Forensics Secur. 7(5): 1426-1438 (2012) - [c2]Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
Demonstrating the effectiveness of MOSES for separation of execution modes. CCS 2012: 998-1000 - 2011
- [c1]Giovanni Russello, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
YAASE: Yet Another Android Security Extension. SocialCom/PASSAT 2011: 1033-1040
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint