Follow
Andrea Lanzi
Andrea Lanzi
Associate Professor at Department Computer Science at University of Milan
Verified email at unimi.it - Homepage
Title
Cited by
Cited by
Year
Secure in-vm monitoring using hardware virtualization
MI Sharif, W Lee, W Cui, A Lanzi
Proceedings of the 16th ACM conference on Computer and communicationsá…, 2009
4252009
G-Free: defeating return-oriented programming through gadget-less binaries
K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda
Proceedings of the 26th annual computer security applications conference, 49-58, 2010
3822010
Impeding Malware Analysis Using Conditional Code Obfuscation.
MI Sharif, A Lanzi, JT Giffin, W Lee
NDSS, 2008
3522008
Automatic reverse engineering of malware emulators
M Sharif, A Lanzi, J Giffin, W Lee
2009 30th IEEE Symposium on Security and Privacy, 94-109, 2009
2992009
Accessminer: using system-centric models for malware protection
A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 17th ACM conference on Computer and communicationsá…, 2010
2572010
Classification of packed executables for accurate computer virus detection
R Perdisci, A Lanzi, W Lee
Pattern recognition letters 29 (14), 1941-1946, 2008
2422008
Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables
R Perdisci, A Lanzi, W Lee
2008 Annual Computer Security Applications Conference (ACSAC), 301-310, 2008
2042008
A quantitative study of accuracy in system call-based malware detection
D Canali, A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 2012 International Symposium on Software Testing andá…, 2012
1962012
K-Tracer: A System for Extracting Kernel Malware Behavior.
A Lanzi, MI Sharif, W Lee
NDSS, 2009
1552009
The privacy implications of cyber security systems: A technological survey
E Toch, C Bettini, E Shmueli, L Radaelli, A Lanzi, D Riboni, B Lepri
ACM Computing Surveys (CSUR) 51 (2), 1-27, 2018
992018
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence
M Graziano, D Canali, L Bilge, A Lanzi, E Shi, D Balzarotti, M van Dijk, ...
24th USENIX Security Symposium (USENIX Security 15), 1057-1072, 2015
982015
Diversified process replicŠ for defeating memory error exploits
D Bruschi, L Cavallaro, A Lanzi
2007 IEEE International Performance, Computing, and Communicationsá…, 2007
822007
Peerrush: Mining for unwanted p2p traffic
B Rahbarinia, R Perdisci, A Lanzi, K Li
Detection of Intrusions and Malware, and Vulnerability Assessment: 10thá…, 2013
802013
Replay attack in TCG specification and solution
D Bruschi, L Cavallaro, A Lanzi, M Monga
21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005
76*2005
LISABETH: automated content-based signature generator for zero-day polymorphic worms
L Cavallaro, A Lanzi, L Mayer, M Monga
Proceedings of the fourth international workshop on Software engineering forá…, 2008
722008
Peerrush: Mining for unwanted p2p traffic
B Rahbarinia, R Perdisci, A Lanzi, K Li
Journal of Information Security and Applications 19 (3), 194-208, 2014
662014
Hypervisor memory forensics
M Graziano, A Lanzi, D Balzarotti
Research in Attacks, Intrusions, and Defenses: 16th International Symposiumá…, 2013
662013
A smart fuzzer for x86 executables
A Lanzi, L Martignoni, M Monga, R Paleari
Third International Workshop on Software Engineering for Secure Systemsá…, 2007
62*2007
Hypervisor-based malware protection with accessminer
A Fattori, A Lanzi, D Balzarotti, E Kirda
Computers & Security 52, 33-50, 2015
452015
Security evaluation of a banking fraud analysis system
M Carminati, M Polino, A Continella, A Lanzi, F Maggi, S Zanero
ACM Transactions on Privacy and Security (TOPS) 21 (3), 1-31, 2018
392018
The system can't perform the operation now. Try again later.
Articles 1–20