Publications

Export 140 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
2022
M. Melis, Scalas, M., Demontis, A., Maiorca, D., Biggio, B., Giacinto, G., and Roli, F., Do Gradient-Based Explanations Tell Anything About Adversarial Robustness to Android Malware?, International Journal of Machine Learning and Cybernetics, vol. 13, pp. 217-232, 2022. (1.2 MB)
F. Meloni, Sanna, A., Maiorca, D., and Giacinto, G., Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware, 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). pp. 42-52, 2022. (328.32 KB)
A. Janovsky, Maiorca, D., Marko, D., Matyas, V., and Giacinto, G., A Longitudinal Study of Cryptographic API: A Decade of Android Malware, 19th International Conference on Security and Cryptography (SECRYPT). pp. 121-133, 2022. (251.06 KB)
L. Borzacchiello, Coppa, E., Maiorca, D., Columbu, A., Demetrescu, C., and Giacinto, G., Reach Me if You Can: On Native Vulnerability Reachability in Android Apps, 27th European Symposium on Research in Computer Security (ESORICS). 2022. (979.51 KB)
2021
G. Malandrone, Virdis, G., Maiorca, D., and Giacinto, G., PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis, 5th Italian Conference on CyberSecurity (ITASEC). 2021. (982.03 KB)
2019
M. Scalas, Maiorca, D., Mercaldo, F., Visaggio, C. Aaron, Martinelli, F., and Giacinto, G., On the Effectiveness of System API-Related Information for Android Ransomware Detection, Computers and Security, vol. 86, pp. 162-182, 2019. (706.92 KB)
D. Ugarte, Maiorca, D., Cara, F., and Giacinto, G., PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware, 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pp. 240-259, 2019. (352.39 KB)
D. Maiorca, Biggio, B., and Giacinto, G., Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks, ACM Computing Surveys, vol. 52, no. 4, 2019. (1.21 MB)
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., and Roli, F., Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection, IEEE Trans. Dependable and Secure Computing, vol. 16, no. 4, pp. 711-724, 2019. (3.61 MB)
2018
B. Kolosnjaji, Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., and Roli, F., Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables, in 2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pp. 533-537. (674.62 KB)
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., and Roli, F., Explaining Black-box Android Malware Detection, in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pp. 524-528. (431.78 KB)
2017
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., and Roli, F., Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels, in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol. 10640 of LNCS, pp. 347-358. (1.21 MB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., and Giacinto, G., Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis, in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol. 1816, pp. 96-105. (371.53 KB)
L. Piras and Giacinto, G., Information Fusion in Content Based Image Retrieval: A Comprehensive Overview, Information Fusion, vol. 37, pp. 50-60, 2017. (734.6 KB)
D. Maiorca, Mercaldo, F., Giacinto, G., Visaggio, A., and Martinelli, F., R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware, in ACM Symposium on Applied Computing (SAC 2017 - Acceptance Rate 15.7%), 2017, pp. 1718-1723. (272.44 KB)
2016
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation, Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation, Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
M. Ahmadi, Ulyanov, D., Semenov, S., Trofimov, M., and Giacinto, G., Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification, in Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016, pp. 183–194. (6.49 MB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., and Ariu, D., Pharmaguard WebApp: an application for the detection of illegal online pharmacies, 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., and Giacinto, G., Who Are You? A Statistical Approach to Measuring User Authenticity, in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
2015
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., and Roli, F., 2020 Cybercrime Economic Costs: No measure No solution, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., and Giacinto, G., Clustering Android Malware Families by Http Traffic, in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)

Pages