C. Gurrin, Schoeffmann, K., Joho, H., Leibetseder, A., Zhou, L., Duane, A., Dang-Nguyen, D. - T., Riegler, M., Piras, L., Tran, M. - T., Lokoč, J., e Hürst, W.,
«Comparing Approaches to Interactive Lifelog Search at the Lifelog Search Challenge (LSC2018)»,
ITE Transactions on Media Technology and Applications, vol 7, pagg 46-59, 2019.
(4.7 MB) D. Maiorca e Biggio, B.,
«Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware»,
IEEE Security and Privacy: Special Issue on Digital Forensics, vol 17, n° 1, pagg 63-71, 2019.
(838.95 KB) M. Scalas, Maiorca, D., Mercaldo, F., Visaggio, C. Aaron, Martinelli, F., e Giacinto, G.,
«On the Effectiveness of System API-Related Information for Android Ransomware Detection»,
Computers and Security, vol 86, pagg 162-182, 2019.
(706.92 KB) L. Demetrio, Biggio, B., Lagorio, G., Roli, F., e Armando, A.,
«Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries», in
3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol 2315.
D. Ugarte, Maiorca, D., Cara, F., e Giacinto, G.,
«PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware»,
16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pagg 240-259, 2019.
(352.39 KB) A. Demontis, Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., Nita-Rotaru, C., e Roli, F.,
«Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks», in
28th Usenix Security Symposium, Santa Clara, California, USA, 2019, vol 28th {USENIX} Security Symposium ({USENIX} Security 19), pag 321--338.
(1.09 MB) A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., e Roli, F.,
«Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection»,
IEEE Trans. Dependable and Secure Computing, vol 16, n° 4, pagg 711-724, 2019.
(3.61 MB)