Manufacturing compromise: the emergence of exploit-as-a-service C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 312 | 2012 |
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities J Caballero, G Grieco, M Marron, A Nappa Proceedings of the 2012 International Symposium on Software Testing and …, 2012 | 236 | 2012 |
The attack of the clones: A study of the impact of shared code on vulnerability patching A Nappa, R Johnson, L Bilge, J Caballero, T Dumitras 2015 IEEE symposium on security and privacy, 692-708, 2015 | 201 | 2015 |
Ad injection at scale: Assessing deceptive advertisement modifications K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ... 2015 IEEE Symposium on Security and Privacy, 151-167, 2015 | 165 | 2015 |
Driving in the cloud: An analysis of drive-by download operations and abuse reporting A Nappa, MZ Rafique, J Caballero International Conference on Detection of Intrusions and Malware, and …, 2013 | 126 | 2013 |
The MALICIA dataset: identification and analysis of drive-by download operations A Nappa, MZ Rafique, J Caballero International Journal of Information Security 14, 15-33, 2015 | 116 | 2015 |
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers. A Nappa, Z Xu, MZ Rafique, J Caballero, G Gu NDSS, 2014 | 74 | 2014 |
Autoprobe: Towards automatic active malicious server probing using dynamic binary analysis Z Xu, A Nappa, R Baykov, G Yang, J Caballero, G Gu Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 64 | 2014 |
Take a deep breath: a stealthy, resilient and cost-effective botnet using skype A Nappa, A Fattori, M Balduzzi, M Dell’Amico, L Cavallaro Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010 | 54 | 2010 |
Whowas: A platform for measuring web deployments on iaas clouds L Wang, A Nappa, J Caballero, T Ristenpart, A Akella Proceedings of the 2014 Conference on Internet Measurement Conference, 101-114, 2014 | 33 | 2014 |
Blocklist babel: On the transparency and dynamics of open source blocklisting Á Feal, P Vallina, J Gamba, S Pastrana, A Nappa, O Hohlfeld, ... IEEE Transactions on Network and Service Management 18 (2), 1334-1349, 2021 | 23 | 2021 |
VPN-zero: a privacy-preserving decentralized virtual private network M Varvello, IQ Azurmendi, A Nappa, P Papadopoulos, G Pestana, ... 2021 IFIP Networking Conference (IFIP Networking), 1-6, 2021 | 13 | 2021 |
Performance comparision of secure and insecure VoIP environments V Miroslav, A Rozza, A Nappa | 12 | 2008 |
RevProbe: detecting silent reverse proxies in malicious server infrastructures A Nappa, RF Munir, IK Tanoli, C Kreibich, J Caballero Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 10 | 2016 |
Analysis and implementation of secure and unsecure Voice over IP environment and performance comparison using OpenSER A Nappa, D Bruschi, A Rozza, M Voznak Universita degli studi di Milano 84, 2007 | 10 | 2007 |
Vpn0: A privacy-preserving decentralized virtual private network M Varvello, IQ Azurmendi, A Nappa, P Papadopoulos, G Pestana, ... arXiv preprint arXiv:1910.00159, 2019 | 9 | 2019 |
Deja-Vu: A Glimpse on Radioactive Soft-Error Consequences on Classical and Quantum Computations A Nappa, C Hobbs, A Lanzi arXiv preprint arXiv:2105.05103, 2021 | 4 | 2021 |
PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes A Nappa, P Papadopoulos, M Varvello, DA Gomez, J Tapiador, A Lanzi Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 4 | 2021 |
ZKSENSE: a privacy-preserving mechanism for bot detection in mobile devices P Papadopoulos, I Querejeta-Azurmendi, J Zhang, M Varvello, A Nappa, ... arXiv e-prints, arXiv: 1911.07649, 2019 | 4 | 2019 |
Scramblesuit: An effective timing side-channels framework for malware sandbox evasion 1 A Nappa, A Úbeda-Portugués, P Papadopoulos, M Varvello, J Tapiador, ... Journal of Computer Security 30 (6), 851-876, 2022 | 3 | 2022 |