Sfoglia per Autore
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners
2020-01-01 Valenza, Andrea; Costa, Gabriele; Armando, Alessandro
WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs
2020-01-01 Valenza, Andrea; Demetrio, Luca; Costa, Gabriele; Lagorio, Giovanni
A NERD DOGMA: Introducing CTF to Non-Expert Audience
2020-01-01 Costa, Gabriele; Lualdi, Martina; Ribaudo, Marina; Valenza, Andrea
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols
2020-01-01 Sinigaglia, F.; Carbone, R.; Costa, G.; Ranise, S.
WAF-A-MoLE: Evading web application firewalls through adversarial machine learning
2020-01-01 Demetrio, L.; Valenza, A.; Costa, G.; Lagorio, G.
A survey on multi-factor authentication for online banking in the wild
2020-01-01 Sinigaglia, F.; Carbone, R.; Costa, G.; Zannone, N.
Building next generation Cyber Ranges with CRACK
2020-01-01 Russo, E.; Costa, G.; Armando, A.
VeriOSS: Using the Blockchain to Foster Bug Bounty Programs
2021-01-01 Canidio, Andrea; Costa, Gabriele; Galletta, Letterio
Enhancing malware classification with symbolic features
2021-01-01 Siwach, C.; Costa, G.; de Nicola, R.
Turning Federated Learning Systems into Covert Channels
2022-01-01 Costa, Gabriele; Pinelli, Fabio; Soderi, Simone; Tolomei, Gabriele
Formally verifying security protocols built on watermarking and jamming
2023-01-01 Costa, Gabriele; Degano, Pierpaolo; Galletta, Letterio; Soderi, Simone
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners | 1-gen-2020 | Valenza, Andrea; Costa, Gabriele; Armando, Alessandro | |
WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs | 1-gen-2020 | Valenza, Andrea; Demetrio, Luca; Costa, Gabriele; Lagorio, Giovanni | |
A NERD DOGMA: Introducing CTF to Non-Expert Audience | 1-gen-2020 | Costa, Gabriele; Lualdi, Martina; Ribaudo, Marina; Valenza, Andrea | |
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols | 1-gen-2020 | Sinigaglia, F.; Carbone, R.; Costa, G.; Ranise, S. | |
WAF-A-MoLE: Evading web application firewalls through adversarial machine learning | 1-gen-2020 | Demetrio, L.; Valenza, A.; Costa, G.; Lagorio, G. | |
A survey on multi-factor authentication for online banking in the wild | 1-gen-2020 | Sinigaglia, F.; Carbone, R.; Costa, G.; Zannone, N. | |
Building next generation Cyber Ranges with CRACK | 1-gen-2020 | Russo, E.; Costa, G.; Armando, A. | |
VeriOSS: Using the Blockchain to Foster Bug Bounty Programs | 1-gen-2021 | Canidio, Andrea; Costa, Gabriele; Galletta, Letterio | |
Enhancing malware classification with symbolic features | 1-gen-2021 | Siwach, C.; Costa, G.; de Nicola, R. | |
Turning Federated Learning Systems into Covert Channels | 1-gen-2022 | Costa, Gabriele; Pinelli, Fabio; Soderi, Simone; Tolomei, Gabriele | |
Formally verifying security protocols built on watermarking and jamming | 1-gen-2023 | Costa, Gabriele; Degano, Pierpaolo; Galletta, Letterio; Soderi, Simone |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile