Paolo Milani Comparetti
Paolo Milani Comparetti
Postdoc at International Secure Systems Lab
Bestätigte E-Mail-Adresse bei seclab.tuwien.ac.at
TitelZitiert vonJahr
Scalable, behavior-based malware clustering
U Bayer, P Milani Comparetti, C Hlauschek, C Kruegel, E Kirda
Network and Distributed System Security Symposium (NDSS), 2009
6582009
Effective and efficient malware detection at the end host
C Kolbitsch, P Milani Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang
Proceedings of the 18th USENIX security symposium, 351-366, 2009
4912009
Prospex: Protocol specification extraction
P Milani Comparetti, G Wondracek, C Kruegel, E Kirda
Security and Privacy, 2009 30th IEEE Symposium on, 110-125, 2009
279*2009
Detecting environment-sensitive malware
M Lindorfer, C Kolbitsch, PM Comparetti
International Workshop on Recent Advances in Intrusion Detection, 338-357, 2011
2782011
Automatic network protocol analysis
G Wondracek, P Milani Comparetti, C Kruegel, E Kirda
15th Symposium on Network and Distributed System Security (NDSS), 2008
2372008
EVILSEED: A Guided Approach to Finding Malicious Web Pages
L Invernizzi, UC Santa Barbara, S Benvenuti, M Cova, ...
Security and Privacy (SP), 2011 IEEE Symposium on, 2012
1642012
Hulk: Eliciting malicious behavior in browser extensions
A Kapravelos, C Grier, N Chachra, C Kruegel, G Vigna, V Paxson
23rd {USENIX} Security Symposium ({USENIX} Security 14), 641-654, 2014
1142014
Identifying dormant functionality in malware programs
P Milani Comparetti, G Salvaneschi, E Kirda, C Kolbitsch, C Kruegel, ...
Security and Privacy (SP), 2010 IEEE Symposium on, 61-76, 2010
108*2010
A static, packer-agnostic filter to detect similar malware samples
G Jacob, M Neugschwandtner, P Milani Comparetti, C Kruegel, G Vigna
Department of Computer Science University of California Santa Barbara …, 2010
692010
Lines of Malicious Code: Insights Into the Malicious Software Industry
M Lindorfer, A Di Federico, F Maggi, P Milani Comparetti, S Zanero
412012
FORECAST: skimming off the malware cream
M Neugschwandtner, P Milani Comparetti, G Jacob, C Kruegel
Proceedings of the 27th Annual Computer Security Applications Conference, 11-20, 2011
352011
The borg: Nanoprobing binaries for buffer overreads
M Neugschwandtner, P Milani Comparetti, I Haller, H Bos
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
332015
Detecting malware's failover C&C strategies with squeeze
M Neugschwandtner, P Milani Comparetti, C Platzer
Proceedings of the 27th Annual Computer Security Applications Conference, 21-30, 2011
292011
dAnubis–dynamic device driver analysis based on virtual machine introspection
M Neugschwandtner, C Platzer, P Milani Comparetti, U Bayer
Detection of Intrusions and Malware, and Vulnerability Assessment, 41-60, 2010
202010
Methods and systems for malware detection based on environment-dependent behavior
C Kolbitsch, PM Comparetti, L Cavedon
US Patent 9,361,459, 2016
152016
Methods and systems for reciprocal generation of watch-lists and malware signatures
C Kolbitsch, PM Comparetti, L Cavedon
US Patent 8,910,285, 2014
92014
Lobotomy: An architecture for jit spraying mitigation
M Jauernig, M Neugschwandtner, C Platzer, PM Comparetti
2014 Ninth International Conference on Availability, Reliability and …, 2014
72014
Reference clustering
P Milani Comparetti
2010
Beiträge in Tagungsbänden
M Lindorfer, C Kolbitsch, PM Comparetti
Beiträge in Tagungsbänden
PM Comparetti, G Salvaneschi, E Kirda, C Kolbitsch, C Krügel, S Zanero
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20