When malware is packin'heat; limits of machine learning classifiers based on static analysis features H Aghakhani, F Gritti, F Mecca, M Lindorfer, S Ortolani, D Balzarotti, ... Network and Distributed Systems Security (NDSS) Symposium 2020, 2020 | 135 | 2020 |
Measuring and defeating anti-instrumentation-equipped malware M Polino, A Continella, S Mariani, S D’Alessio, L Fontana, F Gritti, ... Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017 | 68 | 2017 |
Symbion: Interleaving symbolic with concrete execution F Gritti, L Fontana, E Gustafson, F Pagani, A Continella, C Kruegel, ... 2020 IEEE Conference on Communications and Network Security (CNS), 1-10, 2020 | 18 | 2020 |
Heapster: Analyzing the security of dynamic allocators for monolithic firmware images F Gritti, F Pagani, I Grishchenko, L Dresel, N Redini, C Kruegel, G Vigna 2022 IEEE Symposium on Security and Privacy (SP), 1082-1099, 2022 | 13 | 2022 |
Exploiting Unfair Advantages: Investigating Opportunistic Trading in the NFT Market P Bose, D Das, F Gritti, N Ruaro, C Kruegel, G Vigna arXiv preprint arXiv:2310.06844, 2023 | 2 | 2023 |
Confusum contractum: confused deputy vulnerabilities in ethereum smart contracts F Gritti, N Ruaro, R McLaughlin, P Bose, D Das, I Grishchenko, C Kruegel, ... 32nd USENIX Security Symposium (USENIX Security 23), 1793-1810, 2023 | 2 | 2023 |
Hiding Pin's Artifacts to Defeat Evasive Malware M Polino, A Continella, S Mariani, S D’Alessio, L Fontana, F Gritti, ... Black Hat Europe 2017, 2017 | 1 | 2017 |
PinShield: a dynamic layer of protection against anti-instrumentation attacks L FONTANA, F GRITTI Politecnico di Milano, 2014 | | 2014 |
Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts N Ruaro, F Gritti, R McLaughlin, I Grishchenko, C Kruegel, G Vigna | | |