Publications

Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols

Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2024.

PDF Code

FrameD: Toward Automated Identication of Embedded Frameworks in Firmware Images

Proceedings of the Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS), 2024.

PDF Code

Inferring Recovery Steps from Cyber Threat Intelligence Reports

In Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2024.

PDF Code

ERAFL: Efficient Resource Allocation for Federated Learning Training in Smart Homes

Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS), 2024.

ReplicaWatcher: Training-less Anomaly Detection in Containerized Microservices

Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2024.

PDF Code

Understanding and Measuring Inter-Process Code Injection in Windows Malware

Proceedings of the International Conference on Security and Privacy in Communication Networks (SecureComm), 2023.

PDF Code

Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images

In Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2023.

PDF Code

Mobile apps and children's privacy: a traffic analysis of data sharing practices among children's mobile iOS apps

Archives of Disease in Childhood, 2023.

PDF Project

Divak: Non-invasive Characterization of Out-Of-Bounds Write Vulnerabilities

Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2023.

PDF Code

AoT - Attack on Things: A security analysis of IoT firmware updates

Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P), 2023.

PDF

HoneyKube: Designing and Deploying a Microservices-based Web Honeypot

Proceedings of the SecWeb Workshop (SecWeb), 2023.

PDF Code

COLUMBUS: Android App Testing Through Systematic Callback Exploration

Proceedings of the International Conference on Software Engineering (ICSE), 2023.

PDF Code

Operationalizing Cybersecurity Research Ethics Review: From Principles and Guidelines to Practice

Proceedings of the International Workshop on Ethics in Computer Security (EthiCS), 2023.

PDF

Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behaviour profiles

Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2022.

PDF Code

Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies

Proceedings of the ACM Cloud Computing Security Workshop (CCSW), 2022.

PDF Code

Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection

Proceedings of the ACM Cloud Computing Security Workshop (CCSW), 2022.

PDF Code

Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and Experimentation

IEEE World Forum on IoT (WF-IoT), 2022.

PDF Code

DeepCASE: Semi-Supervised Contextual Analysis of Security Events

In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2022.

PDF Code

A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware

Computers & Security, 2022.

PDF

Reversing and Fuzzing the Google Titan M Chip

In Proceedings of the Reversing and Offensive-oriented Trends Symposium (ROOTS), 2021.

PDF Code

SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning

In Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2021.

PDF Code

Toward a Secure Crowdsourced Location Tracking System

In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2021.

PDF Code

Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms

In Proceedings of the ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2021.

PDF Code

DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices

In Proceedings of the IEEE Symposium on Security & Privacy (S&P), 2021.

PDF Code

SYMBION: Interleaving Symbolic with Concrete Execution

Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2020.

PDF Code

A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web

Proceedings of the Network Traffic Measurement and Analysis Conference (TMA), 2020.

PDF

KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware

In Proceedings of the IEEE Symposium on Security & Privacy (S&P), 2020.

PDF Code Teaser

Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale

Black Hat Asia, 2020.

PDF Slides

HeadPrint: Detecting Anomalous Communications through Header-based Application Fingerprinting

Proceedings of the ACM Symposium on Applied Computing (SAC), 2020.

PDF

FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic

Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2020.

PDF Code

Victim-Aware Adaptive Covert Channels

Proceedings of the International Conference on Security and Privacy in Communication Networks (SecureComm), 2019.

PDF

Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

BMJ, 2019.

PDF Project

LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2019.

There's a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets

Proceedings of the ACM Annual Computer Security Applications Conference (ACSAC), 2018.

PDF Code Project Slides

SysTaint: Assisting Reversing of Malicious Network Communications

Proceedings of the Software Security, Protection, and Reverse Engineering Workshop (SSPREW), 2018.

PDF Code

Toward Systematically Exploring Antivirus Engines (short paper)

Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2018.

PDF Code

Protection system and method for protecting a computer system against ransomware attacks

Patent US20180157834A1, 2018.

PDF Project

Security Evaluation of a Banking Fraud Analysis System

ACM Transactions on Privacy and Security (TOPS), 2018.

PDF

GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities

Proceedings of the Software Security, Protection, and Reverse Engineering Workshop (SSPREW), 2017.

PDF

Hiding Pin's Artifacts to Defeat Evasive Malware

Black Hat Europe, 2017.

Slides

ShieldFS: The Last Word In Ransomware Resilient Filesystems

Black Hat USA, 2017.

PDF Slides Video

Measuring and Defeating Anti-Instrumentation-Equipped Malware

Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2017.

PDF Code

Poster: Detecting webinjects through live memory inspection

IEEE Symposium on Security and Privacy (S&P), 2017.

PDF

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis

Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2017.

PDF Code Slides

Prometheus: Analyzing WebInject-based information stealers

Journal of Computer Security, 2017.

PDF

ShieldFS: A Self-healing, Ransomware-aware Filesystem

Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2016.

PDF Project Slides

GASOLINE: a Cytoscape app for multiple local alignment of PPI networks

F1000Research, 2014.

PDF