Follow
Antonio Bianchi
Antonio Bianchi
Assistant Professor, Purdue University
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Execute this! analyzing unsafe and malicious dynamic code loading in android applications.
S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna
NDSS 14, 23-26, 2014
4012014
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
2362015
What the App is That? Deception and Countermeasures in the Android User Interface
A Bianchi, J Corbetta, L Invernizzi, Y Fratantonio, C Kruegel, G Vigna
Security and Privacy (SP), 2015 IEEE Symposium on, 931-948, 2015
2102015
Triggerscope: Towards detecting logic bombs in android applications
Y Fratantonio, A Bianchi, W Robertson, E Kirda, C Kruegel, G Vigna
2016 IEEE symposium on security and privacy (SP), 377-396, 2016
2092016
Ramblr: Making Reassembly Great Again.
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
NDSS, 2017
1772017
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
VM Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, PL de Geus, ...
NDSS, 2016
1352016
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
1282017
Baredroid: Large-scale analysis of android apps on real devices
S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015
852015
{HeapHopper}: Bringing bounded model checking to heap implementation security
M Eckert, A Bianchi, R Wang, Y Shoshitaishvili, C Kruegel, G Vigna
27th USENIX Security Symposium (USENIX Security 18), 99-116, 2018
672018
{BootStomp}: On the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017
652017
Njas: Sandboxing unmodified applications in non-rooted devices running stock android
A Bianchi, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
632015
Blacksheep: Detecting compromised hosts in homogeneous crowds
A Bianchi, Y Shoshitaishvili, C Kruegel, G Vigna
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
622012
DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ...
582021
{BLESA}: Spoofing attacks against reconnections in bluetooth low energy
J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu
14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020
512020
Broken Fingers: On the Usage of the Fingerprint API in Android.
A Bianchi, Y Fratantonio, A Machiry, C Kruegel, G Vigna, SPH Chung, ...
NDSS, 2018
442018
Clapp: Characterizing loops in android applications
Y Fratantonio, A Machiry, A Bianchi, C Kruegel, G Vigna
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
432015
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles
H Kim, MO Ozmen, A Bianchi, ZB Celik, D Xu
412021
{LIGHTBLUE}: Automatic {Profile-Aware} Debloating of Bluetooth Stacks
J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu, DJ Tian, ...
30th USENIX Security Symposium (USENIX Security 21), 339-356, 2021
292021
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
282018
Exploitation and mitigation of authentication schemes based on device-public information
A Bianchi, E Gustafson, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference, 16-27, 2017
262017
The system can't perform the operation now. Try again later.
Articles 1–20