2009 |
13 | EE | Leyla Bilge,
Thorsten Strufe,
Davide Balzarotti,
Engin Kirda:
All your contacts are belong to us: automated identity theft attacks on social networks.
WWW 2009: 551-560 |
2008 |
12 | EE | Davide Balzarotti,
Marco Cova,
Giovanni Vigna:
ClearShot: Eavesdropping on Keyboard Input from Video.
IEEE Symposium on Security and Privacy 2008: 170-183 |
11 | EE | Davide Balzarotti,
Marco Cova,
Viktoria Felmetsger,
Nenad Jovanovic,
Engin Kirda,
Christopher Kruegel,
Giovanni Vigna:
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
IEEE Symposium on Security and Privacy 2008: 387-401 |
10 | EE | Davide Balzarotti,
Greg Banks,
Marco Cova,
Viktoria Felmetsger,
Richard A. Kemmerer,
William K. Robertson,
Fredrik Valeur,
Giovanni Vigna:
Are your votes really counted?: testing the security of real-world electronic voting systems.
ISSTA 2008: 237-248 |
2007 |
9 | EE | Davide Balzarotti,
Marco Cova,
Viktoria Felmetsger,
Giovanni Vigna:
Multi-module vulnerability analysis of web-based applications.
ACM Conference on Computer and Communications Security 2007: 25-35 |
8 | EE | Christopher Kruegel,
Davide Balzarotti,
William K. Robertson,
Giovanni Vigna:
Improving Signature Testing through Dynamic Data Flow Analysis.
ACSAC 2007: 53-63 |
7 | EE | Marco Cova,
Davide Balzarotti,
Viktoria Felmetsger,
Giovanni Vigna:
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications.
RAID 2007: 63-86 |
6 | EE | Davide Balzarotti,
Paolo Costa,
Gian Pietro Picco:
The LighTS tuple space framework and its customization for context-aware applications.
Web Intelligence and Agent Systems 5(2): 215-231 (2007) |
2006 |
5 | EE | Davide Balzarotti,
Carlo Ghezzi,
Mattia Monga:
Supporting Cooperative Software Processes in a Decentralized and Nomadic World.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 36(6): 1098-1109 (2006) |
2005 |
4 | EE | Gian Pietro Picco,
Davide Balzarotti,
Paolo Costa:
LighTS: a lightweight, customizable tuple space supporting context-aware applications.
SAC 2005: 413-419 |
2004 |
3 | EE | Giovanni Vigna,
William K. Robertson,
Davide Balzarotti:
Testing network-based intrusion detection signatures using mutant exploits.
ACM Conference on Computer and Communications Security 2004: 21-30 |
2002 |
2 | EE | Davide Balzarotti,
Carlo Ghezzi,
Mattia Monga:
Freeing Cooperation from Servers Tyranny.
NETWORKING Workshops 2002: 235-246 |
1 | EE | Davide Balzarotti,
Carlo Ghezzi,
Mattia Monga:
Supporting configuration management for virtual workgroups ini a peer-to-peer setting.
SEKE 2002: 507-511 |