REGANO, Leonardo
REGANO, Leonardo
DIPARTIMENTO DI INGEGNERIA ELETTRICA ED ELETTRONICA
Race against time: investigating the factors that influence web race condition exploits
2026-01-01 Loi, Federico; Pisu, Lorenzo; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio
Analysis and detection of android stegomalware: the impact of the loading stage
2025-01-01 Soi, Diego; Sanna, Silvia Lucia; Benedetti, Giacomo; Liguori, Angelica; Regano, Leonardo; Caviglione, Luca; Giacinto, Giorgio
Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data Sets
2025-01-01 Sanna, Alessandro; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio
On the Feasibility of Android Stegomalware: A Detection Study
2025-01-01 Soi, Diego; Sanna, SILVIA LUCIA; Liguori, Angelica; Zuppelli, Marco; Regano, Leonardo; Maiorca, Davide; Caviglione, Luca; Manco, Giuseppe; Giacinto, Giorgio
A Privacy-Preserving Approach for Vulnerability Scanning Detection
2024-01-01 Regano, L.; Canavese, D.; Mannella, L.
Automated Intel SGX integration for enhanced application security
2024-01-01 Regano, L.; Canavese, D.
Detecting Cryptomining Traffic in IoT Networks
2024-01-01 Mannella, L.; Canavese, D.; Regano, L.
Security at the Edge for Resource-Limited IoT Devices
2024-01-01 Canavese, Daniele; Mannella, Luca; Regano, Leonardo; Basile, Cataldo
A model for automated cybersecurity threat remediation and sharing
2023-01-01 Settanni, F.; Regano, L.; Basile, C.; Lioy, A.
Computer-Aided reverse engineering of protected software
2023-01-01 Canavese, Daniele; Regano, Leonardo; Lioy, Antonio
Design, implementation, and automation of a risk management approach for man-at-the-End software protection
2023-01-01 Basile, C.; De Sutter, B.; Canavese, D.; Regano, L.; Coppens, B.
A model of capabilities of network security functions
2022-01-01 Basile, C.; Canavese, D.; Regano, L.; Pedone, I.; Lioy, A.
Data set and machine learning models for the classification of network traffic originators
2022-01-01 Canavese, D.; Regano, L.; Basile, C.; Ciravegna, G.; Lioy, A.
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
2022-01-01 Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Ciravegna, Gabriele; Lioy, Antonio
Detection of encrypted cryptomining malware connections with machine and deep learning
2020-01-01 Pastor, Antonio; Mozo, Alberto; Vakaruk, Stanislav; Canavese, Daniele; Lopez, Diego R.; Regano, Leonardo; Gomez-Canaval, Sandra; Lioy, Antonio
Empirical assessment of the effort needed to attack programs protected with client/server code splitting
2020-01-01 Viticchie, A.; Regano, L.; Basile, C.; Torchiano, M.; Ceccato, M.; Tonella, P.
A meta-model for software protections and reverse engineering attacks
2019-01-01 Basile, Cataldo; Canavese, Daniele; Regano, Leonardo; Falcarin, Paolo; De Sutter, Bjorn
Estimating Software Obfuscation Potency with Artificial Neural Networks
2017-01-01 Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Viticchie', Alessio
Privacy issues of ISPs in the modern web
2017-01-01 Khatouni, Ali Safari; Trevisan, Martino; Regano, Leonardo; Viticchie, Alessio
Towards Optimally Hiding Protected Assets in Software Applications
2017-01-01 Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Lioy, Antonio
| Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
|---|---|---|---|---|
| Race against time: investigating the factors that influence web race condition exploits | 1-gen-2026 | Loi, Federico; Pisu, Lorenzo; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio | COMPUTERS & SECURITY | - |
| Analysis and detection of android stegomalware: the impact of the loading stage | 1-gen-2025 | Soi, Diego; Sanna, Silvia Lucia; Benedetti, Giacomo; Liguori, Angelica; Regano, Leonardo; Caviglione, Luca; Giacinto, Giorgio | - | ACM |
| Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data Sets | 1-gen-2025 | Sanna, Alessandro; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio | - | - |
| On the Feasibility of Android Stegomalware: A Detection Study | 1-gen-2025 | Soi, Diego; Sanna, SILVIA LUCIA; Liguori, Angelica; Zuppelli, Marco; Regano, Leonardo; Maiorca, Davide; Caviglione, Luca; Manco, Giuseppe; Giacinto, Giorgio | - | - |
| A Privacy-Preserving Approach for Vulnerability Scanning Detection | 1-gen-2024 | Regano, L.; Canavese, D.; Mannella, L. | - | CEUR-WS |
| Automated Intel SGX integration for enhanced application security | 1-gen-2024 | Regano, L.; Canavese, D. | IEEE ACCESS | - |
| Detecting Cryptomining Traffic in IoT Networks | 1-gen-2024 | Mannella, L.; Canavese, D.; Regano, L. | - | Institute of Electrical and Electronics Engineers Inc. |
| Security at the Edge for Resource-Limited IoT Devices | 1-gen-2024 | Canavese, Daniele; Mannella, Luca; Regano, Leonardo; Basile, Cataldo | SENSORS | - |
| A model for automated cybersecurity threat remediation and sharing | 1-gen-2023 | Settanni, F.; Regano, L.; Basile, C.; Lioy, A. | - | Institute of Electrical and Electronics Engineers Inc. |
| Computer-Aided reverse engineering of protected software | 1-gen-2023 | Canavese, Daniele; Regano, Leonardo; Lioy, Antonio | - | Springer |
| Design, implementation, and automation of a risk management approach for man-at-the-End software protection | 1-gen-2023 | Basile, C.; De Sutter, B.; Canavese, D.; Regano, L.; Coppens, B. | COMPUTERS & SECURITY | - |
| A model of capabilities of network security functions | 1-gen-2022 | Basile, C.; Canavese, D.; Regano, L.; Pedone, I.; Lioy, A. | - | IEEE |
| Data set and machine learning models for the classification of network traffic originators | 1-gen-2022 | Canavese, D.; Regano, L.; Basile, C.; Ciravegna, G.; Lioy, A. | DATA IN BRIEF | - |
| Encryption-agnostic classifiers of traffic originators and their application to anomaly detection | 1-gen-2022 | Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Ciravegna, Gabriele; Lioy, Antonio | COMPUTERS & ELECTRICAL ENGINEERING | - |
| Detection of encrypted cryptomining malware connections with machine and deep learning | 1-gen-2020 | Pastor, Antonio; Mozo, Alberto; Vakaruk, Stanislav; Canavese, Daniele; Lopez, Diego R.; Regano, Leonardo; Gomez-Canaval, Sandra; Lioy, Antonio | IEEE ACCESS | - |
| Empirical assessment of the effort needed to attack programs protected with client/server code splitting | 1-gen-2020 | Viticchie, A.; Regano, L.; Basile, C.; Torchiano, M.; Ceccato, M.; Tonella, P. | EMPIRICAL SOFTWARE ENGINEERING | - |
| A meta-model for software protections and reverse engineering attacks | 1-gen-2019 | Basile, Cataldo; Canavese, Daniele; Regano, Leonardo; Falcarin, Paolo; De Sutter, Bjorn | THE JOURNAL OF SYSTEMS AND SOFTWARE | - |
| Estimating Software Obfuscation Potency with Artificial Neural Networks | 1-gen-2017 | Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Viticchie', Alessio | - | Springer International Publishing |
| Privacy issues of ISPs in the modern web | 1-gen-2017 | Khatouni, Ali Safari; Trevisan, Martino; Regano, Leonardo; Viticchie, Alessio | - | IEEE |
| Towards Optimally Hiding Protected Assets in Software Applications | 1-gen-2017 | Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Lioy, Antonio | - | IEEE |