Professor Lorenzo Cavallaro

  1. 2018
  2. E-pub ahead of print

    BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J. 7 Sep 2018 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). Springer, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS); vol. 11050)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Anomaly-based exploratory analysis and detection of exploits in android mediaserver

    Suárez-Tangil, G., Dash, S. K., García-Teodoro, P., Camacho, J. & Cavallaro, L. 16 Aug 2018 In : IET Information Security. 12, 5, p. 404-413 10 p.

    Research output: Contribution to journalArticle

  4. 2017
  5. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L. 30 Oct 2017 PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Transcend: Detecting Concept Drift in Malware Classification Models

    Jordaney, R., Sharad, K., Dash, S., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L. 16 Aug 2017 USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J. Aug 2017 USENIX Workshop on Offensive Technologies (WOOT). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware

    Hurier, M., Suarez de Tangil Rotaeche, G., Dash, S., Bissyandé, T., Le Traon, Y., Klein, J. & Cavallaro, L. 3 Jul 2017 Mining Software Repositories (MSR), 2017 IEEE/ACM 14th International Conference on. IEEE, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L. 24 Mar 2017 ACM CODASPY. p. 309-320 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Stack Bounds Protection with Low Fat Pointers

    Duck, G., Yap, R. & Cavallaro, L. 26 Feb 2017 NDSS Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    The Evolution of Android Malware and Android Analysis Techniques

    Tam, K., Feizollah, A., Anuar, N. B., Salleh, R. & Cavallaro, L. 1 Feb 2017 In : ACM Computing Surveys. 49, 4, 76

    Research output: Contribution to journalArticle

  12. Published

    Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting

    Li, L., Bissyande, T. F., Klein, J., Le Traon, Y., Lo, D. & Cavallaro, L. 20 Jan 2017 In : IEEE Transactions on Information Forensics and Security . PP, 99

    Research output: Contribution to journalArticle

  13. 2016
  14. Published

    You Can't Touch This: Consumer-Centric Android Application Repackaging Detection

    Gurulian, I., Markantonakis, K., Cavallaro, L. & Mayes, K. 1 Dec 2016 In : Future Generation Computer Systems. 65, p. 1-9 9 p.

    Research output: Contribution to journalArticle

  15. Published

    Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection

    Deo, A., Dash, S., Suarez de Tangil Rotaeche, G., Vovk, V. & Cavallaro, L. 28 Oct 2016 ACM Workshop on Artificial Intelligence and Security. Vienna, Austria: ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L. 4 Aug 2016 Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published
  18. 2015
  19. Published

    Conformal Clustering and Its Application to Botnet Traffic

    Cherubin, G., Nouretdinov, I., Gammerman, A., Jordaney, R., Wang, Z., Papini, D. & Cavallaro, L. 3 Apr 2015 Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, Vol. 9047, p. 313-322 10 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    CopperDroid: Automatic Reconstruction of Android Malware Behaviors

    Tam, K., Fattori, A., Khan, S. & Cavallaro, L. 7 Feb 2015 NDSS Symposium 2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. 2014
  22. Published

    Phoenix: DGA-Based Botnet Tracking and Intelligence

    Schiavoni, S., Maggi, F., Cavallaro, L. & Zanero, S. 10 Jul 2014 Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). London: Springer, Vol. 8550, p. 192-211 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. 2013
  24. Published

    Practical Automated Vulnerability Monitoring Using Program State Invariants

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S. 23 Jun 2013 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '13). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors

    Reina, A., Fattori, A. & Cavallaro, L. 14 Apr 2013 ACM European Workshop on Systems Security (EuroSec). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. 2012
  27. Published

    When Hardware Meets Software: a Bulletproof Solution to Forensic Memory Acquisition

    Reina, A., Fattori, A., Pagani, F., Cavallaro, L. & Bruschi, D. Dec 2012 Annual Computer Security Application Conference (ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Memory Errors: the Past, the Present, and the Future

    van der Veen, V., dutt-Sharma, N., Bos, H. J. & Cavallaro, L. 12 Sep 2012 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. 2011
  30. Published

    Systems Security at VU University Amsterdam

    Bos, H. J. & Cavallaro, L. 1 Jul 2011 1st SysSec Workshop on Systems Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Sandnet: Network Traffic Analysis of Malicious Software

    Rossow, C., Dietrich, C. J., Bos, H., Cavallaro, L., Steen, M. V., Freiling, F. C. & Pohlmann, N. 1 Apr 2011 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Taint-Enhanced Anomaly Detection

    Cavallaro, L. & Sekar, R. 2011 ICISS. p. 160-174 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. 2010
  34. Published

    We Crashed, Now What?

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S. 3 Oct 2010 Proceedings of the 6th Workshop on Hot Topics in System Dependability (HotDep'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Live and Trustworthy Forensic Analysis of Commodity Production Systems

    Martignoni, L., Fattori, A., Paleari, R. & Cavallaro, L. 15 Sep 2010 Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010: Proceedings. Springer, p. 297-316 (Lecture Notes in Computer Science; vol. 6307)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Organizing Large Scale Hacking Competitions

    Childers, N., Boe, B., Cavallaro, L., Cavedon, L., Cova, M., Egele, M. & Vigna, G. 1 Jul 2010 GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Take a Deep Breath: a Stealthy, Resilient and Cost-Effective Botnet Using Skype

    Nappa, A., Fattori, A., Balduzzi, M., Dell'Amico, M. & Cavallaro, L. 1 Jul 2010 GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    MINIX 3: Status Report and Current Research

    Tanenbaum, A. S., Appuswamy, R., Bos, H. J., Cavallaro, L., Giuffrida, C., Hruby, T., Herder, J., van der Kouwe, . E. & van Moolenbroek, D. Jun 2010 ;login: The USENIX Magazine, 35, 3

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  39. Published

    PAriCheck: an efficient pointer arithmetic checker for C programs

    Younan, Y., Philippaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W. 13 Apr 2010 ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. Beijing, China: ACM, p. 145-156 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. 2009
  41. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G. 9 Nov 2009

    Research output: Working paper

  42. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G. 1 Nov 2009 CCS '09 Proceedings of the 16th ACM conference on Computer and communications security. New York: ACM, p. 635-647

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Mining the Network Behavior of Bots

    Cavallaro, L., Kruegel, C. & Vigna, G. 1 Jul 2009

    Research output: Working paper

  44. Published

    PAriCheck: An efficient pointer arithmetic checker for C programs

    Younan, Y., Phillipaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W. 1 Jun 2009

    Research output: Working paper

  45. 2008
  46. Published

    On the Limits of Information Flow Techniques for Malware Analysis and Containment

    Cavallaro, L., Saxena, P. & Sekar, R. 10 Jul 2008 Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. Zamboni, D. (ed.). Springer, p. 143-163 (Lecture Notes in Computer Science; vol. 5137)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Anomalous Taint Detection

    Cavallaro, L. & Sekar, R. 1 Jun 2008

    Research output: Working paper

  48. Published

    A Parallel Architecture for Stateful, High-Speed Intrusion Detection

    Foschini, L., Thapliyal, A. V., Cavallaro, L., Kruegel, C. & Vigna, G. 2008 4th International Conference on Information Systems Security (ICISS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Anomalous Taint Detection (Extended Abstract)

    Cavallaro, L. & Sekar, R. 2008 11th International Symposium on Recent Advances in Intrusion Detection.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    LISABETH: Automated Content-based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M. 2008 International Workshop on Software Engineering for Secure Systems (SESS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. 2007
  52. Published
  53. Published

    Static Analysis on x86 Executable for Preventing Automatic Mimicry Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A. 12 Jul 2007 In the Proceedings of the GI SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A. 2007 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Diversified Process Replicae for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A. 2007 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    LISABETH: Automated Content-Based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M. 2007

    Research output: Working paper

  57. 2006
  58. Published

    Diversified Process Replicæ for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A. 2006

    Research output: Working paper

  59. Published

    Syscalls Obfuscation for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A. 2006 Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano

    Research output: Working paper

  60. 2005
  61. Published

    Attacking a Trusted Computing Platform [Improving the Security of TCG Specification

    Bruschi, D., Cavallaro, L., Lanzi, A. & Monga, M. 2005 Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano

    Research output: Working paper

  62. Published

    Replay Attack in TCG Specification and Solution

    Bruschi, D., Cavallaro, L., Lanzi, A. A. & Monga, M. 2005 21th Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, Arizona, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. 2000
  64. Published

    Less harm, less worry or how to improve network security by bounding system offensiveness

    Bruschi, D., Cavallaro, L. & Rosti, E. 2000 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution