default search action
Davide Maiorca
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Diego Soi, Alessandro Sanna, Davide Maiorca, Giorgio Giacinto:
Enhancing android malware detection explainability through function call graph APIs. J. Inf. Secur. Appl. 80: 103691 (2024) - [j9]Alessandro Sanna, Fabrizio Cara, Davide Maiorca, Giorgio Giacinto:
Oblivion: an open-source system for large-scale analysis of macro-based office malware. J. Comput. Virol. Hacking Tech. 20(4): 783-802 (2024) - [c23]Emmanuele Massidda, Lorenzo Pisu, Davide Maiorca, Giorgio Giacinto:
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly. SECRYPT 2024: 552-559 - [c22]Lorenzo Binosi, Pietro Mazzini, Alessandro Sanna, Michele Carminati, Giorgio Giacinto, Riccardo Lazzeretti, Stefano Zanero, Mario Polino, Emilio Coppa, Davide Maiorca:
Do You Trust Your Device? Open Challenges in IoT Security Analysis. SECRYPT 2024: 568-575 - [d1]Alessandro Sanna, Fabrizio Cara, Davide Maiorca:
Oblivion Results. IEEE DataPort, 2024 - [i16]Lorenzo Pisu, Davide Maiorca, Giorgio Giacinto:
A Survey of the Overlooked Dangers of Template Engines. CoRR abs/2405.01118 (2024) - [i15]Silvia Lucia Sanna, Diego Soi, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto:
A Risk Estimation Study of Native Code Vulnerabilities in Android Applications. CoRR abs/2406.02011 (2024) - 2023
- [c21]Maura Pintor, Giulia Orrù, Davide Maiorca, Ambra Demontis, Luca Demetrio, Gian Luca Marcialis, Battista Biggio, Fabio Roli:
Cybersecurity and AI: The PRALab Research Experience. Ital-IA 2023: 426-431 - [c20]Bruno Pala, Lorenzo Pisu, Silvia Lucia Sanna, Davide Maiorca, Giorgio Giacinto:
A Targeted Assessment of Cross-Site Scripting Detection Tools. ITASEC 2023 - [i14]Diego Soi, Davide Maiorca, Giorgio Giacinto, Harel Berger:
Can you See me? On the Visibility of NOPs against Android Malware Detectors. CoRR abs/2312.17356 (2023) - 2022
- [j8]Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Do gradient-based explanations tell anything about adversarial robustness to android malware? Int. J. Mach. Learn. Cybern. 13(1): 217-232 (2022) - [c19]Francesco Meloni, Alessandro Sanna, Davide Maiorca, Giorgio Giacinto:
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware. DIMVA 2022: 42-52 - [c18]Luca Borzacchiello, Emilio Coppa, Davide Maiorca, Andrea Columbu, Camil Demetrescu, Giorgio Giacinto:
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps. ESORICS (3) 2022: 701-722 - [c17]Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
Explaining the Use of Cryptographic API in Android Malware. ICSBT/SECRYPT (Revised Selected Papers) 2022: 69-97 - [c16]Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
A Longitudinal Study of Cryptographic API: A Decade of Android Malware. SECRYPT 2022: 121-133 - [i13]Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
A Longitudinal Study of Cryptographic API - a Decade of Android Malware. CoRR abs/2205.05573 (2022) - 2021
- [c15]Giuseppe Mario Malandrone, Giovanni Virdis, Giorgio Giacinto, Davide Maiorca:
PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis. ITASEC 2021: 219-232 - 2020
- [j7]Davide Maiorca, Ambra Demontis, Battista Biggio, Fabio Roli, Giorgio Giacinto:
Adversarial Detection of Flash Malware: Limitations and Open Issues. Comput. Secur. 96: 101901 (2020) - [j6]Fabrizio Cara, Michele Scalas, Giorgio Giacinto, Davide Maiorca:
On the Feasibility of Adversarial Sample Creation Using the Android System API. Inf. 11(9): 433 (2020) - [i12]Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware? CoRR abs/2005.01452 (2020)
2010 – 2019
- 2019
- [j5]Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto:
On the effectiveness of system API-related information for Android ransomware detection. Comput. Secur. 86: 168-182 (2019) - [j4]Davide Maiorca, Battista Biggio, Giorgio Giacinto:
Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks. ACM Comput. Surv. 52(4): 78:1-78:36 (2019) - [j3]Davide Maiorca, Battista Biggio:
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware. IEEE Secur. Priv. 17(1): 63-71 (2019) - [j2]Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli:
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. IEEE Trans. Dependable Secur. Comput. 16(4): 711-724 (2019) - [c14]Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto:
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware. DIMVA 2019: 240-259 - [i11]Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto:
PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware. CoRR abs/1904.10270 (2019) - 2018
- [c13]Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Explaining Black-box Android Malware Detection. EUSIPCO 2018: 524-528 - [c12]Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli:
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. EUSIPCO 2018: 533-537 - [i10]Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Explaining Black-box Android Malware Detection. CoRR abs/1803.03544 (2018) - [i9]Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli:
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. CoRR abs/1803.04173 (2018) - [i8]Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto:
R-PackDroid: Practical On-Device Detection of Android Ransomware. CoRR abs/1805.09563 (2018) - [i7]Davide Maiorca, Battista Biggio, Giorgio Giacinto:
Towards Robust Detection of Adversarial Infection Vectors: Lessons Learned in PDF Malware. CoRR abs/1811.00830 (2018) - 2017
- [c11]Davide Maiorca, Paolo Russu, Igino Corona, Battista Biggio, Giorgio Giacinto:
Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API Analysis. ITASEC 2017: 96-105 - [c10]Davide Maiorca, Francesco Mercaldo, Giorgio Giacinto, Corrado Aaron Visaggio, Fabio Martinelli:
R-PackDroid: API package-based characterization and detection of mobile ransomware. SAC 2017: 1718-1723 - [i6]Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli:
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. CoRR abs/1704.08996 (2017) - [i5]Davide Maiorca, Battista Biggio:
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware. CoRR abs/1707.05102 (2017) - [i4]Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli:
Evasion Attacks against Machine Learning at Test Time. CoRR abs/1708.06131 (2017) - [i3]Davide Maiorca, Battista Biggio, Maria Elena Chiappe, Giorgio Giacinto:
Adversarial Detection of Flash Malware: Limitations and Open Issues. CoRR abs/1710.10225 (2017) - 2016
- [b1]Davide Maiorca:
Design and implementation of robust systems for secure malware detection. University of Cagliari, Italy, 2016 - [c9]Johannes Hoffmann, Teemu Rytilahti, Davide Maiorca, Marcel Winandy, Giorgio Giacinto, Thorsten Holz:
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation. CODASPY 2016: 139-141 - [i2]Igino Corona, Battista Biggio, Davide Maiorca:
AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack. CoRR abs/1611.04786 (2016) - 2015
- [j1]Davide Maiorca, Davide Ariu, Igino Corona, Marco Aresu, Giorgio Giacinto:
Stealth attacks: An extended insight into the obfuscation effects on Android malware. Comput. Secur. 51: 16-31 (2015) - [c8]Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto:
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms? ACSAC 2015: 191-200 - [c7]Davide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto:
A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files. ICISSP 2015: 27-36 - [c6]Davide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto:
An Evasion Resilient Approach to the Detection of Malicious PDF Files. ICISSP (Revised Selected Papers) 2015: 68-85 - [c5]Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, Giorgio Giacinto:
Clustering android malware families by http traffic. MALWARE 2015: 128-135 - 2014
- [c4]Igino Corona, Davide Maiorca, Davide Ariu, Giorgio Giacinto:
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References. AISec@CCS 2014: 47-57 - [i1]Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, Fabio Roli:
Security Evaluation of Support Vector Machines in Adversarial Environments. CoRR abs/1401.7727 (2014) - 2013
- [c3]Davide Maiorca, Igino Corona, Giorgio Giacinto:
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection. AsiaCCS 2013: 119-130 - [c2]Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli:
Evasion Attacks against Machine Learning at Test Time. ECML/PKDD (3) 2013: 387-402 - 2012
- [c1]Davide Maiorca, Giorgio Giacinto, Igino Corona:
A Pattern Recognition System for Malicious PDF Files Detection. MLDM 2012: 510-524
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint