default search action
Daniele Sgandurra
Person information
- affiliation: Huawei, Munich, Germany
- affiliation: Royal Holloway - University of London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Jason Gray, Daniele Sgandurra, Lorenzo Cavallaro, Jorge Blasco Alís:
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets. ACM Comput. Surv. 56(8): 212:1-212:36 (2024) - [j15]Markus Sosnowski, Johannes Zirngibl, Patrick Sattler, Georg Carle, Claas Grohnfeldt, Michele Russo, Daniele Sgandurra:
EFACTLS: Effective Active TLS Fingerprinting for Large-Scale Server Deployment Characterization. IEEE Trans. Netw. Serv. Manag. 21(3): 2582-2595 (2024) - 2023
- [c53]Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
The VOCODES Kill Chain for Voice Controllable Devices. ESORICS Workshops (2) 2023: 176-197 - [c52]Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
Protecting Voice-Controllable Devices Against Self-Issued Voice Commands. EuroS&P 2023: 160-174 - 2022
- [c51]Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
ALEXA VERSUS ALEXA: Controlling Smart Speakers by Self-Issuing Voice Commands. AsiaCCS 2022: 1064-1078 - [c50]Giuseppe Raffa, Daniele Sgandurra, Daniel O'Keeffe:
Evaluating Anti-Virus Effectiveness in Linux. IEEE Big Data 2022: 3071-3080 - [c49]Markus Sosnowski, Johannes Zirngibl, Patrick Sattler, Georg Carle, Claas Grohnfeldt, Michele Russo, Daniele Sgandurra:
Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale. TMA 2022 - [i8]Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands. CoRR abs/2202.08619 (2022) - [i7]Markus Sosnowski, Johannes Zirngibl, Patrick Sattler, Georg Carle, Claas Grohnfeldt, Michele Russo, Daniele Sgandurra:
Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale. CoRR abs/2206.13230 (2022) - 2021
- [c48]Alpesh Bhudia, Daniel O'Keeffe, Daniele Sgandurra, Darren Hurley-Smith:
RansomClave: Ransomware Key Management using SGX. ARES 2021: 58:1-58:10 - [e3]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8661-6 [contents] - [i6]Jason Gray, Daniele Sgandurra, Lorenzo Cavallaro:
Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets. CoRR abs/2101.06124 (2021) - [i5]Alpesh Bhudia, Daniel O'Keeffe, Daniele Sgandurra, Darren Hurley-Smith:
RansomClave: Ransomware Key Management using SGX. CoRR abs/2107.09470 (2021) - 2020
- [j14]Wei Guo, Su-Juan Qin, Jun Lu, Fei Gao, Zhengping Jin, Qiaoyan Wen, Daniele Sgandurra:
Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage. Comput. J. 63(8): 1216-1230 (2020) - [c47]Robert P. Markiewicz, Daniele Sgandurra:
Clust-IT: clustering-based intrusion detection in IoT environments. ARES 2020: 81:1-81:9 - [c46]Thanassis Giannetsos, Daniele Sgandurra:
2nd Workshop on Cyber-Security Arms Race (CYSARM 2020). CCS 2020: 2147-2148 - [c45]Emily J. Chaffey, Daniele Sgandurra:
Malware vs Anti-Malware Battle - Gotta Evade 'em All! VizSec 2020: 40-44 - [e2]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, Virtual Event, USA, November, 2020. ACM 2020, ISBN 978-1-4503-8091-1 [contents]
2010 – 2019
- 2019
- [j13]Luis Munoz-Gonzalez, Daniele Sgandurra, Martín Barrère, Emil C. Lupu:
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs. IEEE Trans. Dependable Secur. Comput. 16(2): 231-244 (2019) - [c44]Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:
A game of "Cut and Mouse": bypassing antivirus by simulating user inputs. ACSAC 2019: 456-465 - [c43]Thanassis Giannetsos, Daniele Sgandurra:
1st Workshop on Cyber-Security Arms Race (CYSARM 2019). CCS 2019: 2711-2712 - [c42]Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:
Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. CECC 2019: 9:1-9:4 - [c41]Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:
On Deception-Based Protection Against Cryptographic Ransomware. DIMVA 2019: 219-239 - [e1]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6840-7 [contents] - 2018
- [j12]Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra:
Risk analysis of Android applications: A user-centric solution. Future Gener. Comput. Syst. 80: 505-518 (2018) - [j11]He Xu, Jie Ding, Peng Li, Daniele Sgandurra, Ruchuan Wang:
An improved SMURF scheme for cleaning RFID data. Int. J. Grid Util. Comput. 9(2): 170-178 (2018) - [j10]Andrea Saracino, Daniele Sgandurra, Gianluca Dini, Fabio Martinelli:
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention. IEEE Trans. Dependable Secur. Comput. 15(1): 83-97 (2018) - [c40]Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware Based on Image Recognition. COMPSAC (2) 2018: 664-669 - [c39]Erisa Karafili, Daniele Sgandurra, Emil Lupu:
A Logic-Based Reasoner for Discovering Authentication Vulnerabilities Between Interconnected Accounts. ETAA@ESORICS 2018: 73-87 - [c38]Gurjan Lally, Daniele Sgandurra:
Towards a Framework for Testing the Security of IoT Devices Consistently. ETAA@ESORICS 2018: 88-102 - [i4]Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware based on Image Recognition. CoRR abs/1802.03714 (2018) - 2017
- [j9]He Xu, Weiwei Shen, Peng Li, Daniele Sgandurra, Ruchuan Wang:
VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks. J. Sensors 2017: 3186482:1-3186482:11 (2017) - [j8]Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu:
Efficient Attack Graph Analysis through Approximate Inference. ACM Trans. Priv. Secur. 20(3): 10:1-10:30 (2017) - [c37]Wissam Razouk, Daniele Sgandurra, Kouichi Sakurai:
A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. IML 2017: 35:1-35:8 - [c36]He Xu, Daniele Sgandurra, Keith Mayes, Peng Li, Ruchuan Wang:
Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks. SpaCCS Workshops 2017: 291-301 - 2016
- [j7]Daniele Sgandurra, Emil C. Lupu:
Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems. ACM Comput. Surv. 48(3): 46:1-46:38 (2016) - [c35]Daniele Sgandurra, Erisa Karafili, Emil Lupu:
Formalizing Threat Models for Virtualized Systems. DBSec 2016: 251-267 - [i3]Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu:
Efficient Attack Graph Analysis through Approximate Inference. CoRR abs/1606.07025 (2016) - [i2]Daniele Sgandurra, Luis Muñoz-González, Rabih Mohsen, Emil C. Lupu:
Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection. CoRR abs/1609.03020 (2016) - 2015
- [j6]Alessandro Aldini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra:
Detection of repackaged mobile applications through a collaborative approach. Concurr. Comput. Pract. Exp. 27(11): 2818-2838 (2015) - [j5]Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra:
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment. Future Gener. Comput. Syst. 48: 28-38 (2015) - [c34]Daniele Sgandurra, Francesco Di Cerbo, Slim Trabelsi, Fabio Martinelli, Emil C. Lupu:
Sharing Data through Confidential Clouds: An Architectural Perspective. TELERISE@ICSE 2015: 58-61 - [c33]Gianpiero Costantino, Daniele Sgandurra:
Design and Development of a Facebook Application to Raise Privacy Awareness. PDP 2015: 583-586 - [i1]Luis Muñoz-González, Daniele Sgandurra, Martín Barrère, Emil C. Lupu:
Exact Inference Techniques for the Dynamic Analysis of Attack Graphs. CoRR abs/1510.02427 (2015) - 2014
- [j4]Fabrizio Baiardi, Fabio Corò, Federico Tonelli, Daniele Sgandurra:
Automating the assessment of ICT risk. J. Inf. Secur. Appl. 19(3): 182-193 (2014) - [c32]Andrea Saracino, Daniele Sgandurra, Dayana Spagnuelo:
Addressing privacy issues in location-based collaborative and distributed environments. CTS 2014: 166-172 - [c31]Fabio Martinelli, Ilaria Matteucci, Andrea Saracino, Daniele Sgandurra:
Enforcing Mobile Application Security Through Probabilistic Contracts. ESSoS Doctoral Symposium 2014 - [c30]Fabrizio Baiardi, Fabio Corò, Federico Tonelli, Daniele Sgandurra:
A Scenario Method to Automatically Assess ICT Risk. PDP 2014: 544-551 - 2013
- [j3]Mariantonietta Noemi La Polla, Fabio Martinelli, Daniele Sgandurra:
A Survey on Security for Mobile Devices. IEEE Commun. Surv. Tutorials 15(1): 446-471 (2013) - [c29]Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra:
Probabilistic Contract Compliance for Mobile Applications. ARES 2013: 599-606 - [c28]Gianpiero Costantino, Fabio Martinelli, Daniele Sgandurra:
How to grant less permissions to facebook applications. IAS 2013: 55-60 - [c27]Gianpiero Costantino, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra:
Towards enforcing on-the-fly policies in BYOD environments. IAS 2013: 61-65 - [c26]Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, Alessandro Aldini:
A collaborative framework for generating probabilistic contracts. CTS 2013: 139-142 - [c25]Gianpiero Costantino, Fabio Martinelli, Daniele Sgandurra:
Are photos on Social Networks really private? CTS 2013: 162-165 - [c24]Fabio Martinelli, Andrea Saracino, Daniele Sgandurra:
Classifying Android Malware through Subgraph Mining. DPM/SETOP 2013: 268-283 - [c23]Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Andrea Saracino, Daniele Sgandurra:
Introducing Probabilities in Contract-Based Approaches for Mobile Application Security. DPM/SETOP 2013: 284-299 - [c22]Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra:
CheR: Cheating Resilience in the Cloud via Smart Resource Allocation. FPS 2013: 339-352 - [c21]Fabio Martinelli, Ilaria Matteucci, Andrea Saracino, Daniele Sgandurra:
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments. INTRUST 2013: 70-84 - [c20]Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra:
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach. TrustCom/ISPA/IUCC 2013: 1541-1546 - [c19]Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra:
AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing. UIC/ATC 2013: 371-379 - 2012
- [c18]Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra:
A Multi-criteria-Based Evaluation of Android Applications. INTRUST 2012: 67-82 - [c17]Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra:
MADAM: A Multi-level Anomaly Detector for Android Malware. MMM-ACNS 2012: 240-253 - 2011
- [j2]Fabrizio Baiardi, Daniele Sgandurra:
Attestation of integrity of overlay networks. J. Syst. Archit. 57(4): 463-473 (2011) - [c16]Fabrizio Baiardi, Daniele Sgandurra:
An Obfuscation-Based Approach against Injection Attacks. ARES 2011: 51-58 - [c15]Fabrizio Baiardi, Claudio Telmon, Daniele Sgandurra:
A simulation-driven approach for assessing risks of complex systems. EWDC 2011: 35-40 - 2010
- [b1]Daniele Sgandurra:
Measuring the Semantic Integrity of a Process Self. University of Pisa, Italy, 2010 - [c14]Fabrizio Baiardi, Daniele Sgandurra:
Securing a Community Cloud. ICDCS Workshops 2010: 32-41 - [c13]Fabrizio Baiardi, Daniele Sgandurra:
Semantic Attestation of Node Integrity in Overlays. OTM Conferences (1) 2010: 656-671
2000 – 2009
- 2009
- [j1]Fabrizio Baiardi, Claudio Telmon, Daniele Sgandurra:
Hierarchical, model-based risk management of critical infrastructures. Reliab. Eng. Syst. Saf. 94(9): 1403-1415 (2009) - [c12]Fabrizio Baiardi, Dario Maggiari, Daniele Sgandurra:
Securing Health Information Infrastructures through Overlays. HEALTHINF 2009: 123-128 - [c11]Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, Diego Zamboni:
Cloud security is not (just) virtualization security: a short paper. CCSW 2009: 97-102 - [c10]Fabrizio Baiardi, Claudio Telmon, Daniele Sgandurra:
Modeling and Managing Risk in Billing Infrastructures. Critical Infrastructure Protection 2009: 51-64 - [c9]Fabrizio Baiardi, Dario Maggiari, Daniele Sgandurra, Francesco Tamberi:
PsycoTrace: Virtual and Transparent Monitoring of a Process Self. PDP 2009: 393-397 - [c8]Fabrizio Baiardi, Diego Cilea, Daniele Sgandurra, Francesco Ceccarelli:
Measuring Semantic Integrity for Remote Attestation. TRUST 2009: 81-100 - 2008
- [c7]Francesco Tamberi, Dario Maggiari, Daniele Sgandurra, Fabrizio Baiardi:
Semantics-Driven Introspection in a Virtual Environment. IAS 2008: 299-302 - [c6]Fabrizio Baiardi, Daniele Sgandurra:
Secure Sharing of an ICT Infrastructure through Vinci. AIMS 2008: 65-78 - [c5]Fabrizio Baiardi, Daniele Sgandurra:
Virtual interacting network community: exploiting multi-core architectures to increase security. Conf. Computing Frontiers 2008: 111-112 - [c4]Fabrizio Baiardi, Dario Maggiari, Daniele Sgandurra, Francesco Tamberi:
Transparent Process Monitoring in a Virtual Environment. VODCA@FOSAD 2008: 85-100 - 2007
- [c3]Fabrizio Baiardi, Daniele Sgandurra:
Building Trustworthy Intrusion Detection through VM Introspection. IAS 2007: 209-214 - [c2]Fabrizio Baiardi, Gaspare Sala, Daniele Sgandurra:
Managing Critical Infrastructures through Virtual Network Communities. CRITIS 2007: 71-82 - [c1]Gaspare Sala, Daniele Sgandurra, Fabrizio Baiardi:
Security and Integrity of a Distributed File Storage in a Virtual Environment. IEEE Security in Storage Workshop 2007: 58-69
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint