Follow
Mariano Graziano
Mariano Graziano
JPMorgan Chase
Verified email at jpmchase.com - Homepage
Title
Cited by
Cited by
Year
Understanding linux malware
E Cozzi, M Graziano, Y Fratantonio, D Balzarotti
2018 IEEE symposium on security and privacy (SP), 161-175, 2018
2722018
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence
M Graziano, D Canali, L Bilge, A Lanzi, E Shi, D Balzarotti, M van Dijk, ...
24th USENIX Security Symposium (USENIX Security 15), 1057-1072, 2015
1002015
How machine learning is solving the binary function similarity problem
A Marcelli, M Graziano, X Ugarte-Pedrero, Y Fratantonio, M Mansouri, ...
31st USENIX Security Symposium (USENIX Security 22), 2099-2116, 2022
882022
Hypervisor memory forensics
M Graziano, A Lanzi, D Balzarotti
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
702013
A close look at a daily dataset of malware samples
X Ugarte-Pedrero, M Graziano, D Balzarotti
ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-30, 2019
692019
Survivalism: Systematic analysis of windows malware living-off-the-land
F Barr-Smith, X Ugarte-Pedrero, M Graziano, R Spolaor, I Martinovic
2021 IEEE Symposium on Security and Privacy (SP), 1557-1574, 2021
512021
Towards Network Containment in Malware Analysis Systems
M Graziano, C Leita, D Balzarotti
402012
ROPMEMU: A framework for the analysis of complex code-reuse attacks
M Graziano, D Balzarotti, A Zidouemba
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
392016
Micro-virtualization memory tracing to detect and prevent spraying attacks
S Cristalli, M Pagnozzi, M Graziano, A Lanzi, D Balzarotti
25th {USENIX} Security Symposium ({USENIX} Security 16), 431-446, 2016
202016
Subverting operating system properties through evolutionary DKOM attacks
M Graziano, L Flore, A Lanzi, D Balzarotti
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
192016
SnakeGX: a sneaky attack against SGX Enclaves
F Toffalini, M Graziano, M Conti, J Zhou
International Conference on Applied Cryptography and Network Security, 333-362, 2021
122021
Lost in the loader: The many faces of the windows pe file format
D Nisi, M Graziano, Y Fratantonio, D Balzarotti
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
112021
Smashing the stack in 2010
M Graziano, A Cugliari
no. July, 1-73, 2010
10*2010
Measuring the role of greylisting and nolisting in fighting spam
F Pagani, M De Astis, M Graziano, A Lanzi, D Balzarotti
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
82016
Through the {Looking-Glass}, and What Eve Found There
L Bruno, M Graziano, D Balzarotti, A Francillon
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
72014
The evidence beyond the wall: Memory forensics in SGX environments
F Toffalini, A Oliveri, M Graziano, J Zhou, D Balzarotti
Forensic Science International: Digital Investigation 39, 301313, 2021
42021
From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!
G Stivala, S Abdelnabi, A Mengascini, M Graziano, M Fritz, G Pellegrino
Proceedings of the 39th Annual Computer Security Applications Conference, 14-28, 2023
12023
Uncovering the Role of Support Infrastructure in Clickbait PDF Campaigns
G Stivala, G De Stefano, A Mengascini, M Graziano, G Pellegrino
2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P), 155-172, 2024
2024
A Large-Scale Study of Phishing PDF Documents
G Stivala, S Abdelnabi, A Mengascini, M Graziano, M Fritz, G Pellegrino
arXiv e-prints, arXiv: 2308.01273, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–19