default search action
Luca Invernizzi
Person information
- affiliation: University of California, Santa Barbara, CA, USA
- affiliation: Google Inc., Mountain View, CA, USA
- affiliation: Sant'Anna School of Advanced Studies, College of Engineering, Pisa, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j1]Elie Bursztein, Luca Invernizzi, Karel Král, Daniel Moghimi, Jean-Michel Picod, Marina Zhang:
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 472-499 (2024) - [i4]Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn:
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates. CoRR abs/2405.09757 (2024) - 2023
- [c19]Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, Elie Bursztein:
Hybrid Post-quantum Signatures in Hardware Security Keys. ACNS Workshops 2023: 480-499 - [i3]Elie Bursztein, Luca Invernizzi, Karel Král, Daniel Moghimi, Jean-Michel Picod, Marina Zhang:
Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning. CoRR abs/2306.07249 (2023) - 2022
- [i2]Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, Elie Bursztein:
Hybrid Post-Quantum Signatures in Hardware Security Keys. IACR Cryptol. ePrint Arch. 2022: 1225 (2022) - 2020
- [c18]Fabian Kaczmarczyck, Bernhard Grill, Luca Invernizzi, Jennifer Pullman, Cecilia M. Procopiuc, David Tao, Borbala Benko, Elie Bursztein:
Spotlight: Malware Lead Generation at Scale. ACSAC 2020: 17-27 - [i1]Ivan Petrov, Luca Invernizzi, Elie Bursztein:
CoinPolice: Detecting Hidden Cryptojacking Attacks with Neural Networks. CoRR abs/2006.10861 (2020)
2010 – 2019
- 2019
- [c17]Theo Bertram, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Peter Fleischer, Albin Gustafsson, Jess Hemerly, Chris Hibbert, Luca Invernizzi, Lanah Kammourieh Donnelly, Jason Ketover, Jay Laefer, Paul Nicholas, Yuan Niu, Harjinder Obhi, David Price, Andrew Strait, Kurt Thomas, Al Verney:
Five Years of the Right to be Forgotten. CCS 2019: 959-972 - [c16]Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein:
Protecting accounts from credential stuffing with password breach alerting. USENIX Security Symposium 2019: 1556-1571 - 2018
- [c15]Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy:
Tracking Ransomware End-to-end. IEEE Symposium on Security and Privacy 2018: 618-631 - 2017
- [c14]Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna:
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. AsiaCCS 2017: 494-505 - [c13]Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, Elie Bursztein:
Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials. CCS 2017: 1421-1434 - [c12]Manos Antonakakis, Tim April, Michael D. Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou:
Understanding the Mirai Botnet. USENIX Security Symposium 2017: 1093-1110 - 2016
- [c11]Luca Invernizzi, Kurt Thomas, Alexandros Kapravelos, Oxana Comanescu, Jean-Michel Picod, Elie Bursztein:
Cloak of Visibility: Detecting When Machines Browse a Different Web. IEEE Symposium on Security and Privacy 2016: 743-758 - 2015
- [c10]Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna:
BareDroid: Large-Scale Analysis of Android Apps on Real Devices. ACSAC 2015: 71-80 - [c9]Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
What the App is That? Deception and Countermeasures in the Android User Interface. IEEE Symposium on Security and Privacy 2015: 931-948 - 2014
- [c8]Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Christopher Kruegel, Sabyasachi Saha, Giovanni Vigna, Sung-Ju Lee, Marco Mellia:
Nazca: Detecting Malware Distribution in Large-Scale Networks. NDSS 2014 - [c7]Jacopo Corbetta, Luca Invernizzi, Christopher Krügel, Giovanni Vigna:
Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection. RAID 2014: 130-149 - [c6]Yan Shoshitaishvili, Luca Invernizzi, Adam Doupé, Giovanni Vigna:
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security. SAC 2014: 1649-1656 - [c5]Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupé, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, Yan Shoshitaishvili:
Ten Years of iCTF: The Good, The Bad, and The Ugly. 3GSE 2014 - 2013
- [c4]Luca Invernizzi, Christopher Kruegel, Giovanni Vigna:
Message in a bottle: sailing past censorship. ACSAC 2013: 39-48 - 2012
- [c3]Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
You are what you include: large-scale evaluation of remote javascript inclusions. CCS 2012: 736-747 - [c2]Luca Invernizzi, Paolo Milani Comparetti, Stefano Benvenuti, Christopher Kruegel, Marco Cova, Giovanni Vigna:
EvilSeed: A Guided Approach to Finding Malicious Web Pages. IEEE Symposium on Security and Privacy 2012: 428-442 - 2010
- [c1]Michael Andonian, Dario Cazzaro, Luca Invernizzi, Monique Chyba, Sergio Grammatico:
Geometric control for autonomous underwater vehicles: Overcoming a thruster failure. CDC 2010: 7051-7056
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-22 20:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint