GIACINTO, GIORGIO
GIACINTO, GIORGIO
DIPARTIMENTO DI INGEGNERIA ELETTRICA ED ELETTRONICA
A risk estimation study of native code vulnerabilities in Android applications
2024-01-01 Sanna, S. L.; Soi, D.; Maiorca, D.; Fumera, G.; Giacinto, G.
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly
2024-01-01 Massidda, Emmanuele; Pisu, Lorenzo; Maiorca, Davide; Giacinto, Giorgio
Do you Trust your Device? Open Challenges in IoT Security Analysis
2024-01-01 Binosi, Lorenzo; Mazzini, Pietro; Sanna, Alessandro; Carminati, Michele; Giacinto, Giorgio; Lazzeretti, Riccardo; Zanero, Stefano; Polino, Mario; Coppa, Emilio; Maiorca, Davide
Enhancing android malware detection explainability through function call graph APIs
2024-01-01 Soi, Diego; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio
Oblivion: an open-source system for large-scale analysis of macro-based office malware
2024-01-01 Sanna, Alessandro; Cara, Fabrizio; Maiorca, Davide; Giacinto, Giorgio
A Targeted Assessment of Cross-Site Scripting Detection Tools
2023-01-01 Pala, Bruno; Pisu, Lorenzo; Sanna, SILVIA LUCIA; Maiorca, Davide; Giacinto, Giorgio
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection
2023-01-01 Bergadano, Francesco; Giacinto, Giorgio
Explaining the Use of Cryptographic API in Android Malware
2023-01-01 Janovsky, Adam; Maiorca, Davide; Macko, Dominik; Matyas, Vashek; Giacinto, Giorgio
Improving malware detection with explainable machine learning
2023-01-01 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection"
2023-01-01 Bergadano, F; Giacinto, G
A Longitudinal Study of Cryptographic API: A Decade of Android Malware
2022-01-01 Janovsky, A; Maiorca, D; Macko, D; Matyas, V; Giacinto, G
Detection of Intrusions and Malware, and Vulnerability Assessment
2022-01-01 Cavallaro, Lorenzo; Gruss, Daniel; Pellegrino, Giancarlo; Giacinto, Giorgio
Do gradient-based explanations tell anything about adversarial robustness to android malware?
2022-01-01 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F.
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware
2022-01-01 Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps
2022-01-01 Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps
2022-01-01 Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio
Explanation-Driven Characterization of Android Ransomware
2021-01-01 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio
PowerDecode: a PowerShell Script Decoder Dedicated to Malware Analysis
2021-01-01 Mario Malandrone, Giuseppe; Virdis, Giovanni; Giacinto, Giorgio; Maiorca, Davide
Adversarial Detection of Flash Malware: Limitations and Open Issues
2020-01-01 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G.
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback
2020-01-01 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio
Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
---|---|---|---|---|
A risk estimation study of native code vulnerabilities in Android applications | 1-gen-2024 | Sanna, S. L.; Soi, D.; Maiorca, D.; Fumera, G.; Giacinto, G. | JOURNAL OF CYBERSECURITY | - |
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly | 1-gen-2024 | Massidda, Emmanuele; Pisu, Lorenzo; Maiorca, Davide; Giacinto, Giorgio | - | Sabrina De Capitani Di Vimercati, Pierangela Samarati |
Do you Trust your Device? Open Challenges in IoT Security Analysis | 1-gen-2024 | Binosi, Lorenzo; Mazzini, Pietro; Sanna, Alessandro; Carminati, Michele; Giacinto, Giorgio; Lazzeretti, Riccardo; Zanero, Stefano; Polino, Mario; Coppa, Emilio; Maiorca, Davide | - | SciTePress - Science and and Technology Publications |
Enhancing android malware detection explainability through function call graph APIs | 1-gen-2024 | Soi, Diego; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS | - |
Oblivion: an open-source system for large-scale analysis of macro-based office malware | 1-gen-2024 | Sanna, Alessandro; Cara, Fabrizio; Maiorca, Davide; Giacinto, Giorgio | JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES | - |
A Targeted Assessment of Cross-Site Scripting Detection Tools | 1-gen-2023 | Pala, Bruno; Pisu, Lorenzo; Sanna, SILVIA LUCIA; Maiorca, Davide; Giacinto, Giorgio | - | - |
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection | 1-gen-2023 | Bergadano, Francesco; Giacinto, Giorgio | ALGORITHMS | mdpi |
Explaining the Use of Cryptographic API in Android Malware | 1-gen-2023 | Janovsky, Adam; Maiorca, Davide; Macko, Dominik; Matyas, Vashek; Giacinto, Giorgio | - | Springer |
Improving malware detection with explainable machine learning | 1-gen-2023 | Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio | - | Academic Press |
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection" | 1-gen-2023 | Bergadano, F; Giacinto, G | ALGORITHMS | - |
A Longitudinal Study of Cryptographic API: A Decade of Android Malware | 1-gen-2022 | Janovsky, A; Maiorca, D; Macko, D; Matyas, V; Giacinto, G | - | SCITEPRESS |
Detection of Intrusions and Malware, and Vulnerability Assessment | 1-gen-2022 | Cavallaro, Lorenzo; Gruss, Daniel; Pellegrino, Giancarlo; Giacinto, Giorgio | - | Springer, Cham |
Do gradient-based explanations tell anything about adversarial robustness to android malware? | 1-gen-2022 | Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. | INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS | - |
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware | 1-gen-2022 | Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio | - | Springer |
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps | 1-gen-2022 | Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio | - | Springer |
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps | 1-gen-2022 | Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio | - | - |
Explanation-Driven Characterization of Android Ransomware | 1-gen-2021 | Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio | - | - |
PowerDecode: a PowerShell Script Decoder Dedicated to Malware Analysis | 1-gen-2021 | Mario Malandrone, Giuseppe; Virdis, Giovanni; Giacinto, Giorgio; Maiorca, Davide | - | CEUR-WS.org |
Adversarial Detection of Flash Malware: Limitations and Open Issues | 1-gen-2020 | Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. | COMPUTERS & SECURITY | - |
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback | 1-gen-2020 | Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio | MULTIMEDIA TOOLS AND APPLICATIONS | - |