GIACINTO, GIORGIO
GIACINTO, GIORGIO
DIPARTIMENTO DI INGEGNERIA ELETTRICA ED ELETTRONICA
A Temporal Study on Memory Forensics Artifacts Extraction: the Volatility Reliability
2026-01-01 Arrus, Aurora; Sanna, Silvia Lucia; Aracri, Antonio; Giacinto, Giorgio
An Assessment of the Overlooked Dangers of Template Engines
2026-01-01 Pisu, Lorenzo; Maiorca, Davide; Giacinto, Giorgio
AndroWasm: an Empirical Study on Android Malware Obfuscation through WebAssembly
2026-01-01 Soi, Diego; Sanna, Silvia Lucia; Pisu, Lorenzo; Regano, Leonardo; Giacinto, Giorgio
Graph-Based Modelling of the Italian Criminal Code as a Knowledge Base for AI-Assisted Inference
2026-01-01 Yves Cerini, Samuele; Deidda, Nicola; Huang, Yilian; Lilli, Sara; Lobascio, Luca; Russo, Lavinia; Vittoria Zucca, Maria; Fumera, Giorgio; Giacinto, Giorgio; Prinetto, Paolo; Salvatore Marsocci, And
Integrating Human-in-the-Loop AI Systems in the Italian Judicial System
2026-01-01 Yves Cerini, Samuele; Deidda, Nicola; Lilli, Sara; Vittoria Zucca, Maria; Fumera, Giorgio; Giacinto, Giorgio; Prinetto, Paolo; Marsocci, Salvatore
LLM-Based Auto-Categorization of Android Applications
2026-01-01 Loi, Pierangelo; Soi, Diego; Regano, Leonardo; Giacinto, Giorgio
Race against time: investigating the factors that influence web race condition exploits
2026-01-01 Loi, Federico; Pisu, Lorenzo; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio
Adversarial pruning: A survey and benchmark of pruning methods for adversarial robustness
2025-01-01 Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio
Analysis and detection of android stegomalware: the impact of the loading stage
2025-01-01 Soi, Diego; Sanna, Silvia Lucia; Benedetti, Giacomo; Liguori, Angelica; Regano, Leonardo; Caviglione, Luca; Giacinto, Giorgio
Are Trees Really Green? A Detection Approach of IoT Malware Attacks
2025-01-01 Sanna, Silvia Lucia; Soi, Diego; Maiorca, Davide; Giacinto, Giorgio
DroidReach++: Exploring the reachability of native code in android applications
2025-01-01 Borzacchiello, L.; Cornacchia, M.; Maiorca, D.; Giacinto, G.; Coppa, E.
Evaluation of Resource-Aware HTTP/3 Proxies for Smuggling Resilience in IoT Environments
2025-01-01 Pisu, Lorenzo; Pettorru, Giovanni; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio; Martalò, Marco
Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data Sets
2025-01-01 Sanna, Alessandro; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio
HO-FMN: Hyperparameter optimization for fast minimum-norm attacks
2025-01-01 Mura, Raffaele; Floris, Giuseppe; Scionis, Luca; Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Giacinto, Giorgio; Biggio, Battista; Roli, Fabio
On the Feasibility of Android Stegomalware: A Detection Study
2025-01-01 Soi, Diego; Sanna, SILVIA LUCIA; Liguori, Angelica; Zuppelli, Marco; Regano, Leonardo; Maiorca, Davide; Caviglione, Luca; Manco, Giuseppe; Giacinto, Giorgio
SHAP happens: an explainable IDS for industrial IoT networks
2025-01-01 Loi, Pierangelo; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio
{{alert(’CSTI’)}}: Large-Scale Detection of Client-Side Template Injection
2025-01-01 Pisu, Lorenzo; Balzarotti, Davide; Maiorca, Davide; Giacinto, Giorgio
A risk estimation study of native code vulnerabilities in Android applications
2024-01-01 Sanna, S. L.; Soi, D.; Maiorca, D.; Fumera, G.; Giacinto, G.
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly
2024-01-01 Massidda, Emmanuele; Pisu, Lorenzo; Maiorca, Davide; Giacinto, Giorgio
Do you Trust your Device? Open Challenges in IoT Security Analysis
2024-01-01 Binosi, Lorenzo; Mazzini, Pietro; Sanna, Alessandro; Carminati, Michele; Giacinto, Giorgio; Lazzeretti, Riccardo; Zanero, Stefano; Polino, Mario; Coppa, Emilio; Maiorca, Davide
| Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
|---|---|---|---|---|
| A Temporal Study on Memory Forensics Artifacts Extraction: the Volatility Reliability | 1-gen-2026 | Arrus, Aurora; Sanna, Silvia Lucia; Aracri, Antonio; Giacinto, Giorgio | - | - |
| An Assessment of the Overlooked Dangers of Template Engines | 1-gen-2026 | Pisu, Lorenzo; Maiorca, Davide; Giacinto, Giorgio | ACM TRANSACTIONS ON THE WEB | - |
| AndroWasm: an Empirical Study on Android Malware Obfuscation through WebAssembly | 1-gen-2026 | Soi, Diego; Sanna, Silvia Lucia; Pisu, Lorenzo; Regano, Leonardo; Giacinto, Giorgio | - | - |
| Graph-Based Modelling of the Italian Criminal Code as a Knowledge Base for AI-Assisted Inference | 1-gen-2026 | Yves Cerini, Samuele; Deidda, Nicola; Huang, Yilian; Lilli, Sara; Lobascio, Luca; Russo, Lavinia; Vittoria Zucca, Maria; Fumera, Giorgio; Giacinto, Giorgio; Prinetto, Paolo; Salvatore Marsocci, And | - | - |
| Integrating Human-in-the-Loop AI Systems in the Italian Judicial System | 1-gen-2026 | Yves Cerini, Samuele; Deidda, Nicola; Lilli, Sara; Vittoria Zucca, Maria; Fumera, Giorgio; Giacinto, Giorgio; Prinetto, Paolo; Marsocci, Salvatore | - | - |
| LLM-Based Auto-Categorization of Android Applications | 1-gen-2026 | Loi, Pierangelo; Soi, Diego; Regano, Leonardo; Giacinto, Giorgio | - | - |
| Race against time: investigating the factors that influence web race condition exploits | 1-gen-2026 | Loi, Federico; Pisu, Lorenzo; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio | COMPUTERS & SECURITY | - |
| Adversarial pruning: A survey and benchmark of pruning methods for adversarial robustness | 1-gen-2025 | Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio | PATTERN RECOGNITION | - |
| Analysis and detection of android stegomalware: the impact of the loading stage | 1-gen-2025 | Soi, Diego; Sanna, Silvia Lucia; Benedetti, Giacomo; Liguori, Angelica; Regano, Leonardo; Caviglione, Luca; Giacinto, Giorgio | - | ACM |
| Are Trees Really Green? A Detection Approach of IoT Malware Attacks | 1-gen-2025 | Sanna, Silvia Lucia; Soi, Diego; Maiorca, Davide; Giacinto, Giorgio | - | - |
| DroidReach++: Exploring the reachability of native code in android applications | 1-gen-2025 | Borzacchiello, L.; Cornacchia, M.; Maiorca, D.; Giacinto, G.; Coppa, E. | COMPUTERS & SECURITY | - |
| Evaluation of Resource-Aware HTTP/3 Proxies for Smuggling Resilience in IoT Environments | 1-gen-2025 | Pisu, Lorenzo; Pettorru, Giovanni; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio; Martalò, Marco | - | IEEE |
| Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data Sets | 1-gen-2025 | Sanna, Alessandro; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio | - | - |
| HO-FMN: Hyperparameter optimization for fast minimum-norm attacks | 1-gen-2025 | Mura, Raffaele; Floris, Giuseppe; Scionis, Luca; Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Giacinto, Giorgio; Biggio, Battista; Roli, Fabio | NEUROCOMPUTING | - |
| On the Feasibility of Android Stegomalware: A Detection Study | 1-gen-2025 | Soi, Diego; Sanna, SILVIA LUCIA; Liguori, Angelica; Zuppelli, Marco; Regano, Leonardo; Maiorca, Davide; Caviglione, Luca; Manco, Giuseppe; Giacinto, Giorgio | - | - |
| SHAP happens: an explainable IDS for industrial IoT networks | 1-gen-2025 | Loi, Pierangelo; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio | - | IEEE |
| {{alert(’CSTI’)}}: Large-Scale Detection of Client-Side Template Injection | 1-gen-2025 | Pisu, Lorenzo; Balzarotti, Davide; Maiorca, Davide; Giacinto, Giorgio | - | - |
| A risk estimation study of native code vulnerabilities in Android applications | 1-gen-2024 | Sanna, S. L.; Soi, D.; Maiorca, D.; Fumera, G.; Giacinto, G. | JOURNAL OF CYBERSECURITY | - |
| Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly | 1-gen-2024 | Massidda, Emmanuele; Pisu, Lorenzo; Maiorca, Davide; Giacinto, Giorgio | - | - |
| Do you Trust your Device? Open Challenges in IoT Security Analysis | 1-gen-2024 | Binosi, Lorenzo; Mazzini, Pietro; Sanna, Alessandro; Carminati, Michele; Giacinto, Giorgio; Lazzeretti, Riccardo; Zanero, Stefano; Polino, Mario; Coppa, Emilio; Maiorca, Davide | - | SciTePress - Science and and Technology Publications |