MAIORCA, DAVIDE
MAIORCA, DAVIDE
DIPARTIMENTO DI INGEGNERIA ELETTRICA ED ELETTRONICA
Race against time: investigating the factors that influence web race condition exploits
2026-01-01 Loi, Federico; Pisu, Lorenzo; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio
An Experimental Analysis of Semi-supervised Learning for Malware Detection
2025-01-01 Minnei, Luca; Piras, Giorgio; Sotgiu, Angelo; Pintor, Maura; Demontis, Ambra; Maiorca, Davide; Biggio, Battista
Are Trees Really Green? A Detection Approach of IoT Malware Attacks
2025-01-01 Sanna, Silvia Lucia; Soi, Diego; Maiorca, Davide; Giacinto, Giorgio
DroidReach++: Exploring the reachability of native code in android applications
2025-01-01 Borzacchiello, L.; Cornacchia, M.; Maiorca, D.; Giacinto, G.; Coppa, E.
Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data Sets
2025-01-01 Sanna, Alessandro; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio
On the Feasibility of Android Stegomalware: A Detection Study
2025-01-01 Soi, Diego; Sanna, SILVIA LUCIA; Liguori, Angelica; Zuppelli, Marco; Regano, Leonardo; Maiorca, Davide; Caviglione, Luca; Manco, Giuseppe; Giacinto, Giorgio
Secure and Trusted Crowdsensing for Outdoor Air Quality Monitoring: State of the Art and Perspectives
2025-01-01 Marche, Claudio; Massidda, Emmanuele; Sanna, Alessandro; Angius, Gianmarco; Nitti, Michele; Maiorca, Davide; Lai, Stefano
A risk estimation study of native code vulnerabilities in Android applications
2024-01-01 Sanna, S. L.; Soi, D.; Maiorca, D.; Fumera, G.; Giacinto, G.
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly
2024-01-01 Massidda, Emmanuele; Pisu, Lorenzo; Maiorca, Davide; Giacinto, Giorgio
Do you Trust your Device? Open Challenges in IoT Security Analysis
2024-01-01 Binosi, Lorenzo; Mazzini, Pietro; Sanna, Alessandro; Carminati, Michele; Giacinto, Giorgio; Lazzeretti, Riccardo; Zanero, Stefano; Polino, Mario; Coppa, Emilio; Maiorca, Davide
Enhancing android malware detection explainability through function call graph APIs
2024-01-01 Soi, Diego; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio
HTTP/3 will not Save you from Request Smuggling: A Methodology to Detect HTTP/3 Header (mis)Validations
2024-01-01 Pisu, Lorenzo; Loi, Federico; Maiorca, Davide; Giacinto, Giorgio
Oblivion: an open-source system for large-scale analysis of macro-based office malware
2024-01-01 Sanna, Alessandro; Cara, Fabrizio; Maiorca, Davide; Giacinto, Giorgio
A Targeted Assessment of Cross-Site Scripting Detection Tools
2023-01-01 Pala, Bruno; Pisu, Lorenzo; Sanna, SILVIA LUCIA; Maiorca, Davide; Giacinto, Giorgio
Cybersecurity and AI: The PRALab Research Experience
2023-01-01 Pintor, Maura; Orru, Giulia; Maiorca, Davide; Demontis, Ambra; Demetrio, Luca; Marcialis, GIAN LUCA; Biggio, Battista; Roli, Fabio
Explaining the use of cryptographic API in Android malware
2023-01-01 Janovsky, Adam; Maiorca, Davide; Macko, Dominik; Matyas, Vashek; Giacinto, Giorgio
A Longitudinal Study of Cryptographic API: A Decade of Android Malware
2022-01-01 Janovsky, A; Maiorca, D; Macko, D; Matyas, V; Giacinto, G
Do gradient-based explanations tell anything about adversarial robustness to android malware?
2022-01-01 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F.
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware
2022-01-01 Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps
2022-01-01 Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio
| Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
|---|---|---|---|---|
| Race against time: investigating the factors that influence web race condition exploits | 1-gen-2026 | Loi, Federico; Pisu, Lorenzo; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio | COMPUTERS & SECURITY | - |
| An Experimental Analysis of Semi-supervised Learning for Malware Detection | 1-gen-2025 | Minnei, Luca; Piras, Giorgio; Sotgiu, Angelo; Pintor, Maura; Demontis, Ambra; Maiorca, Davide; Biggio, Battista | - | - |
| Are Trees Really Green? A Detection Approach of IoT Malware Attacks | 1-gen-2025 | Sanna, Silvia Lucia; Soi, Diego; Maiorca, Davide; Giacinto, Giorgio | - | - |
| DroidReach++: Exploring the reachability of native code in android applications | 1-gen-2025 | Borzacchiello, L.; Cornacchia, M.; Maiorca, D.; Giacinto, G.; Coppa, E. | COMPUTERS & SECURITY | - |
| Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data Sets | 1-gen-2025 | Sanna, Alessandro; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio | - | - |
| On the Feasibility of Android Stegomalware: A Detection Study | 1-gen-2025 | Soi, Diego; Sanna, SILVIA LUCIA; Liguori, Angelica; Zuppelli, Marco; Regano, Leonardo; Maiorca, Davide; Caviglione, Luca; Manco, Giuseppe; Giacinto, Giorgio | - | - |
| Secure and Trusted Crowdsensing for Outdoor Air Quality Monitoring: State of the Art and Perspectives | 1-gen-2025 | Marche, Claudio; Massidda, Emmanuele; Sanna, Alessandro; Angius, Gianmarco; Nitti, Michele; Maiorca, Davide; Lai, Stefano | SENSORS | - |
| A risk estimation study of native code vulnerabilities in Android applications | 1-gen-2024 | Sanna, S. L.; Soi, D.; Maiorca, D.; Fumera, G.; Giacinto, G. | JOURNAL OF CYBERSECURITY | - |
| Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly | 1-gen-2024 | Massidda, Emmanuele; Pisu, Lorenzo; Maiorca, Davide; Giacinto, Giorgio | - | - |
| Do you Trust your Device? Open Challenges in IoT Security Analysis | 1-gen-2024 | Binosi, Lorenzo; Mazzini, Pietro; Sanna, Alessandro; Carminati, Michele; Giacinto, Giorgio; Lazzeretti, Riccardo; Zanero, Stefano; Polino, Mario; Coppa, Emilio; Maiorca, Davide | - | SciTePress - Science and and Technology Publications |
| Enhancing android malware detection explainability through function call graph APIs | 1-gen-2024 | Soi, Diego; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS | - |
| HTTP/3 will not Save you from Request Smuggling: A Methodology to Detect HTTP/3 Header (mis)Validations | 1-gen-2024 | Pisu, Lorenzo; Loi, Federico; Maiorca, Davide; Giacinto, Giorgio | - | - |
| Oblivion: an open-source system for large-scale analysis of macro-based office malware | 1-gen-2024 | Sanna, Alessandro; Cara, Fabrizio; Maiorca, Davide; Giacinto, Giorgio | JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES | - |
| A Targeted Assessment of Cross-Site Scripting Detection Tools | 1-gen-2023 | Pala, Bruno; Pisu, Lorenzo; Sanna, SILVIA LUCIA; Maiorca, Davide; Giacinto, Giorgio | - | - |
| Cybersecurity and AI: The PRALab Research Experience | 1-gen-2023 | Pintor, Maura; Orru, Giulia; Maiorca, Davide; Demontis, Ambra; Demetrio, Luca; Marcialis, GIAN LUCA; Biggio, Battista; Roli, Fabio | - | CEUR-WS Team, Redaktion Sun SITE |
| Explaining the use of cryptographic API in Android malware | 1-gen-2023 | Janovsky, Adam; Maiorca, Davide; Macko, Dominik; Matyas, Vashek; Giacinto, Giorgio | - | Springer |
| A Longitudinal Study of Cryptographic API: A Decade of Android Malware | 1-gen-2022 | Janovsky, A; Maiorca, D; Macko, D; Matyas, V; Giacinto, G | - | SCITEPRESS |
| Do gradient-based explanations tell anything about adversarial robustness to android malware? | 1-gen-2022 | Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. | INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS | - |
| Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware | 1-gen-2022 | Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio | - | Springer |
| Reach Me if You Can: On Native Vulnerability Reachability in Android Apps | 1-gen-2022 | Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio | - | Springer |