REGANO, Leonardo
REGANO, Leonardo
DIPARTIMENTO DI INGEGNERIA ELETTRICA ED ELETTRONICA
AndroWasm: an Empirical Study on Android Malware Obfuscation through WebAssembly
2026-01-01 Soi, Diego; Sanna, Silvia Lucia; Pisu, Lorenzo; Regano, Leonardo; Giacinto, Giorgio
Empirical assessment of the code comprehension effort needed to attack programs protected with obfuscation
2026-01-01 Regano, L.; Canavese, D.; Basile, C.; Torchiano, M.
LLM-Based Auto-Categorization of Android Applications
2026-01-01 Loi, Pierangelo; Soi, Diego; Regano, Leonardo; Giacinto, Giorgio
Race against time: investigating the factors that influence web race condition exploits
2026-01-01 Loi, Federico; Pisu, Lorenzo; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio
Analysis and detection of android stegomalware: the impact of the loading stage
2025-01-01 Soi, Diego; Sanna, Silvia Lucia; Benedetti, Giacomo; Liguori, Angelica; Regano, Leonardo; Caviglione, Luca; Giacinto, Giorgio
Evaluation of Resource-Aware HTTP/3 Proxies for Smuggling Resilience in IoT Environments
2025-01-01 Pisu, Lorenzo; Pettorru, Giovanni; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio; Martalò, Marco
Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data Sets
2025-01-01 Sanna, Alessandro; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio
On the Feasibility of Android Stegomalware: A Detection Study
2025-01-01 Soi, Diego; Sanna, SILVIA LUCIA; Liguori, Angelica; Zuppelli, Marco; Regano, Leonardo; Maiorca, Davide; Caviglione, Luca; Manco, Giuseppe; Giacinto, Giorgio
SHAP happens: an explainable IDS for industrial IoT networks
2025-01-01 Loi, Pierangelo; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio
A Privacy-Preserving Approach for Vulnerability Scanning Detection
2024-01-01 Regano, L.; Canavese, D.; Mannella, L.
Automated Intel SGX integration for enhanced application security
2024-01-01 Regano, L.; Canavese, D.
Detecting cryptomining traffic in IoT networks
2024-01-01 Mannella, L.; Canavese, D.; Regano, L.
Security at the Edge for Resource-Limited IoT Devices
2024-01-01 Canavese, Daniele; Mannella, Luca; Regano, Leonardo; Basile, Cataldo
A model for automated cybersecurity threat remediation and sharing
2023-01-01 Settanni, F.; Regano, L.; Basile, C.; Lioy, A.
Computer-Aided reverse engineering of protected software
2023-01-01 Canavese, Daniele; Regano, Leonardo; Lioy, Antonio
Design, implementation, and automation of a risk management approach for man-at-the-End software protection
2023-01-01 Basile, C.; De Sutter, B.; Canavese, D.; Regano, L.; Coppens, B.
A model of capabilities of network security functions
2022-01-01 Basile, C.; Canavese, D.; Regano, L.; Pedone, I.; Lioy, A.
Data set and machine learning models for the classification of network traffic originators
2022-01-01 Canavese, D.; Regano, L.; Basile, C.; Ciravegna, G.; Lioy, A.
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
2022-01-01 Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Ciravegna, Gabriele; Lioy, Antonio
Detection of encrypted cryptomining malware connections with machine and deep learning
2020-01-01 Pastor, Antonio; Mozo, Alberto; Vakaruk, Stanislav; Canavese, Daniele; Lopez, Diego R.; Regano, Leonardo; Gomez-Canaval, Sandra; Lioy, Antonio
| Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
|---|---|---|---|---|
| AndroWasm: an Empirical Study on Android Malware Obfuscation through WebAssembly | 1-gen-2026 | Soi, Diego; Sanna, Silvia Lucia; Pisu, Lorenzo; Regano, Leonardo; Giacinto, Giorgio | - | - |
| Empirical assessment of the code comprehension effort needed to attack programs protected with obfuscation | 1-gen-2026 | Regano, L.; Canavese, D.; Basile, C.; Torchiano, M. | COMPUTERS & SECURITY | - |
| LLM-Based Auto-Categorization of Android Applications | 1-gen-2026 | Loi, Pierangelo; Soi, Diego; Regano, Leonardo; Giacinto, Giorgio | - | - |
| Race against time: investigating the factors that influence web race condition exploits | 1-gen-2026 | Loi, Federico; Pisu, Lorenzo; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio | COMPUTERS & SECURITY | - |
| Analysis and detection of android stegomalware: the impact of the loading stage | 1-gen-2025 | Soi, Diego; Sanna, Silvia Lucia; Benedetti, Giacomo; Liguori, Angelica; Regano, Leonardo; Caviglione, Luca; Giacinto, Giorgio | - | ACM |
| Evaluation of Resource-Aware HTTP/3 Proxies for Smuggling Resilience in IoT Environments | 1-gen-2025 | Pisu, Lorenzo; Pettorru, Giovanni; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio; Martalò, Marco | - | IEEE |
| Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data Sets | 1-gen-2025 | Sanna, Alessandro; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio | - | - |
| On the Feasibility of Android Stegomalware: A Detection Study | 1-gen-2025 | Soi, Diego; Sanna, SILVIA LUCIA; Liguori, Angelica; Zuppelli, Marco; Regano, Leonardo; Maiorca, Davide; Caviglione, Luca; Manco, Giuseppe; Giacinto, Giorgio | - | - |
| SHAP happens: an explainable IDS for industrial IoT networks | 1-gen-2025 | Loi, Pierangelo; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio | - | IEEE |
| A Privacy-Preserving Approach for Vulnerability Scanning Detection | 1-gen-2024 | Regano, L.; Canavese, D.; Mannella, L. | - | CEUR-WS |
| Automated Intel SGX integration for enhanced application security | 1-gen-2024 | Regano, L.; Canavese, D. | IEEE ACCESS | - |
| Detecting cryptomining traffic in IoT networks | 1-gen-2024 | Mannella, L.; Canavese, D.; Regano, L. | - | Institute of Electrical and Electronics Engineers Inc. |
| Security at the Edge for Resource-Limited IoT Devices | 1-gen-2024 | Canavese, Daniele; Mannella, Luca; Regano, Leonardo; Basile, Cataldo | SENSORS | - |
| A model for automated cybersecurity threat remediation and sharing | 1-gen-2023 | Settanni, F.; Regano, L.; Basile, C.; Lioy, A. | - | Institute of Electrical and Electronics Engineers Inc. |
| Computer-Aided reverse engineering of protected software | 1-gen-2023 | Canavese, Daniele; Regano, Leonardo; Lioy, Antonio | - | Springer |
| Design, implementation, and automation of a risk management approach for man-at-the-End software protection | 1-gen-2023 | Basile, C.; De Sutter, B.; Canavese, D.; Regano, L.; Coppens, B. | COMPUTERS & SECURITY | - |
| A model of capabilities of network security functions | 1-gen-2022 | Basile, C.; Canavese, D.; Regano, L.; Pedone, I.; Lioy, A. | - | IEEE |
| Data set and machine learning models for the classification of network traffic originators | 1-gen-2022 | Canavese, D.; Regano, L.; Basile, C.; Ciravegna, G.; Lioy, A. | DATA IN BRIEF | - |
| Encryption-agnostic classifiers of traffic originators and their application to anomaly detection | 1-gen-2022 | Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Ciravegna, Gabriele; Lioy, Antonio | COMPUTERS & ELECTRICAL ENGINEERING | - |
| Detection of encrypted cryptomining malware connections with machine and deep learning | 1-gen-2020 | Pastor, Antonio; Mozo, Alberto; Vakaruk, Stanislav; Canavese, Daniele; Lopez, Diego R.; Regano, Leonardo; Gomez-Canaval, Sandra; Lioy, Antonio | IEEE ACCESS | - |