King's College London

Research portal

Professor Lorenzo Cavallaro

  1. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., 14 Aug 2019, USENIX Security Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  2. Accepted/In press

    SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)

    Cono D'Elia, D., Coppa, E., Palmaro, F. & Cavallaro, L., 10 Apr 2019, (Accepted/In press) ACM Asia Conference on Information, Computer and Communications Security (ASIACCS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  3. Enabling Fair ML Evaluations for Security

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., 15 Oct 2018, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. p. 2264-2266 (Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  4. BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J., 7 Sep 2018, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). SPRINGER, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS)).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Anomaly-based Exploratory Analysis and Detection of Exploits in Android Mediaserver

    Suárez-Tangil, G., Dash, S. K., Garcia-Teodoro, P., Camacho, J. & Cavallaro, L., 4 Apr 2018, In : IET Information Security.

    Research output: Contribution to journalArticle

  6. Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L., 30 Oct 2017, PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. United States: Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  7. Transcend: Detecting Concept Drift in Malware Classification Models

    Jordaney, R., Sharad, K., Dash, S., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L., 16 Aug 2017, USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., 1 Aug 2017, USENIX Workshop on Offensive Technologies (WOOT). USENIX, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  9. Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting

    Li, L., Bissyande, T. F., Klein, J., Le Traon, Y., Lo, D. & Cavallaro, L., 1 Jun 2017, In : IEEE Transactions on Information Forensics and Security. 12, 6, p. 1269-1284 16 p.

    Research output: Contribution to journalArticle

  10. Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware

    Hurier, M., Suarez-Tangil, G., Dash, S. K., Bissyandé, T. F., Traon, Y. L., Klein, J. & Cavallaro, L., 20 May 2017, IEEE International Conference on Mining Software Repositories.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  11. DroidSieve: Fast and accurate classification of obfuscated android malware

    Suarez-Tangil, G., Dash, S. K., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L., 22 Mar 2017, ACM on Conference on Data and Application Security and Privacy (CODASPY).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  12. Stack Object Protection with Low Fat Pointers

    Duck, G., Yap, R. & Cavallaro, L., 27 Feb 2017, In : NDSS Symposium 2017. 15 p.

    Research output: Contribution to journalArticle

  13. The Evolution of Android Malware and Android Analysis Techniques

    Tam, K., Feizollah, A., Anuar, N. B., Salleh, R. & Cavallaro, L., 6 Feb 2017, In : COMPUTING SURVEYS. 49, 4, p. 1-41 41 p.

    Research output: Contribution to journalArticle

  14. You can’t touch this: Consumer-centric android application repackaging detection

    Gurulian, I., Markantonakis, K., Cavallaro, L. & Mayes, K., Dec 2016, In : FUTURE GENERATION COMPUTER SYSTEMS. 65, 9 p.

    Research output: Contribution to journalArticle

  15. Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection

    Deo, A., Dash, S. K., Suarez-Tangil, G., Vovk, V. & Cavallaro, L., 28 Oct 2016, ACM Workshop on Artificial Intelligence and Security (AISec).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  16. DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S. K., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L., 26 May 2016, Mobile Security Technologies (MoST).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  17. Misleading Metrics: On Evaluating Machine Learning for Malware with Confidence

    Jordaney, R., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L., 1 Feb 2016

    Research output: Book/ReportReport

  18. Conformal Clustering and Its Application to Botnet Traffic

    Cherubin, G., Nouretdinov, I., Gammerman, A., Jordaney, R., Wang, Z., Papini, D. & Cavallaro, L., 3 Apr 2015, In : Statistical Learning and Data Sciences. 9047, p. 313-322

    Research output: Contribution to journalConference paper

  19. CopperDroid: Automatic Reconstruction of Android Malware Behaviors

    Tam, K., Fattori, A., Khan, S. & Cavallaro, L., 7 Feb 2015, In : NDSS Symposium 2015.

    Research output: Contribution to journalConference paper

  20. Phoenix: DGA-Based Botnet Tracking and Intelligence

    Schiavoni, S., Maggi, F., Cavallaro, L. & Zanero, S., 10 Jul 2014, In : Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). 8550, p. 192-211 20 p.

    Research output: Contribution to journalArticle

  21. Practical Automated Vulnerability Monitoring Using Program State Invariants

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 23 Jun 2013, In : IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '13).

    Research output: Contribution to journalConference paper

  22. When Hardware Meets Software: a Bulletproof Solution to Forensic Memory Acquisition

    Reina, A., Fattori, A., Pagani, F., Cavallaro, L. & Bruschi, D., 1 Dec 2012, In : Annual Computer Security Application Conference (ACSAC).

    Research output: Contribution to journalConference paper

  23. Memory Errors: the Past, the Present, and the Future

    van der Veen, V., dutt-Sharma, N., Bos, H. J. & Cavallaro, L., 12 Sep 2012, 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  24. Systems Security at VU University Amsterdam

    Bos, H. J. & Cavallaro, L., 1 Jul 2011, 1st SysSec Workshop on Systems Security.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  25. Sandnet: Network Traffic Analysis of Malicious Software

    Rossow, C., Dietrich, C. J., Bos, H., Cavallaro, L., Steen, M. V., Freiling, F. C. & Pohlmann, N., 1 Apr 2011, In : 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

    Research output: Contribution to journalConference paper

  26. Taint-Enhanced Anomaly Detection

    Cavallaro, L. & Sekar, R., 2011, In : ICISS. p. 160-174 15 p.

    Research output: Contribution to journalConference paper

  27. We Crashed, Now What?

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 3 Oct 2010, Proceedings of the 6th Workshop on Hot Topics in System Dependability (HotDep'10).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  28. Live and Trustworthy Forensic Analysis of Commodity Production Systems

    Martignoni, L., Fattori, A., Paleari, R. & Cavallaro, L., 15 Sep 2010, Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010: Proceedings. SPRINGER, p. 297-316 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  29. Organizing Large Scale Hacking Competitions

    Childers, N., Boe, B., Cavallaro, L., Cavedon, L., Cova, M., Egele, M. & Vigna, G., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  30. Take a Deep Breath: a Stealthy, Resilient and Cost-Effective Botnet Using Skype

    Nappa, A., Fattori, A., Balduzzi, M., Dell'Amico, M. & Cavallaro, L., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  31. MINIX 3: Status Report and Current Research

    Tanenbaum, A. S., Appuswamy, R., Bos, H. J., Cavallaro, L., Giuffrida, C., Hruby, T., Herder, J., van der Kouwe, E. & van Moolenbroek, D., 1 Jun 2010, In : The USENIX Magazine.

    Research output: Contribution to journalArticle

  32. PAriCheck: an efficient pointer arithmetic checker for C programs

    Younan, Y., Philippaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W., 13 Apr 2010, ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, p. 145-156 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  33. Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 1 Nov 2009, In : CCS '09 Proceedings of the 16th ACM conference on Computer and communications security. p. 635-647 13 p.

    Research output: Contribution to journalConference paper

  34. Mining the Network Behavior of Bots

    Cavallaro, L., Kruegel, C. & Vigna, G., 1 Jul 2009.

    Research output: Working paper

  35. On the Limits of Information Flow Techniques for Malware Analysis and Containment

    Cavallaro, L., Saxena, P. & Sekar, R., 10 Jul 2008, Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. Zamboni, D. (ed.). SPRINGER, p. 143-163 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  36. Anomalous Taint Detection

    Cavallaro, L. & Sekar, R., 1 Jun 2008.

    Research output: Working paper

  37. A Parallel Architecture for Stateful, High-Speed Intrusion Detection

    Foschini, L., Thapliyal, A. V., Cavallaro, L., Kruegel, C. & Vigna, G., 2008, In : 4th International Conference on Information Systems Security (ICISS).

    Research output: Contribution to journalConference paper

  38. Anomalous Taint Detection (Extended Abstract)

    Cavallaro, L. & Sekar, R., 2008, 11th International Symposium on Recent Advances in Intrusion Detection.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  39. LISABETH: Automated Content-based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M., 2008, International Workshop on Software Engineering for Secure Systems (SESS).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  40. Static Analysis on x86 Executable for Preventing Automatic Mimicry Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 12 Jul 2007, In the Proceedings of the GI SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  41. An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  42. Diversified Process Replicæ for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006.

    Research output: Working paper

  43. Replay Attack in TCG Specification and Solution

    Bruschi, D., Cavallaro, L., [Unknown], L., Meiser, A. & Monga, M., 2005, In : 21th Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, Arizona, USA.

    Research output: Contribution to journalConference paper

Export:RIS BibTex Word PDF - will at most contain 500 items

Search within the list

Refine results

Language

Language

Publication year

Publication year

Full text

Full text

Meeting and poster abstracts

Meeting and poster abstracts

Authors

Authors

© 2018 King's College London | Strand | London WC2R 2LS | England | United Kingdom | Tel +44 (0)20 7836 5454