default search action
Yanick Fratantonio
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [e1]Eleonora Losiouk, Alessandro Brighente, Mauro Conti, Yousra Aafer, Yanick Fratantonio:
The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024. ACM 2024, ISBN 979-8-4007-0959-3 [contents] - [i1]Yanick Fratantonio, Luca Invernizzi, Loua Farah, Kurt Thomas, Marina Zhang, Ange Albertini, Francois Galilee, Giancarlo Metitieri, Julien Cretin, Alex Petit-Bianco, David Tao, Elie Bursztein:
Magika: AI-Powered Content-Type Detection. CoRR abs/2409.13768 (2024) - 2022
- [c38]Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili:
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. USENIX Security Symposium 2022: 413-430 - [c37]Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti:
How Machine Learning Is Solving the Binary Function Similarity Problem. USENIX Security Symposium 2022: 2099-2116 - [c36]Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Balzarotti:
RE-Mind: a First Look Inside the Mind of a Reverse Engineer. USENIX Security Symposium 2022: 2727-2745 - 2021
- [c35]Davide Quarta, Michele Ianni, Aravind Machiry, Yanick Fratantonio, Eric Gustafson, Davide Balzarotti, Martina Lindorfer, Giovanni Vigna, Christopher Kruegel:
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone. Checkmate@CCS 2021: 43-57 - [c34]Zeyu Lei, Yuhong Nan, Yanick Fratantonio, Antonio Bianchi:
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices. NDSS 2021 - [c33]Andrea Possemato, Dario Nisi, Yanick Fratantonio:
Preventing and Detecting State Inference Attacks on Android. NDSS 2021 - [c32]Dario Nisi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti:
Lost in the Loader: The Many Faces of the Windows PE File Format. RAID 2021: 177-192 - [c31]Andrea Possemato, Simone Aonzo, Davide Balzarotti, Yanick Fratantonio:
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization. SP 2021: 87-102 - 2020
- [c30]Andrea Possemato, Yanick Fratantonio:
Towards HTTPS Everywhere on Android: We Are Not There Yet. USENIX Security Symposium 2020: 343-360
2010 – 2019
- 2019
- [c29]Eric Gustafson, Marius Muench, Chad Spensky, Nilo Redini, Aravind Machiry, Yanick Fratantonio, Davide Balzarotti, Aurélien Francillon, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
Toward the Analysis of Embedded Firmware through Automated Re-hosting. RAID 2019: 135-150 - [c28]Dario Nisi, Antonio Bianchi, Yanick Fratantonio:
Exploring Syscall-Based Semantics Reconstruction of Android Applications. RAID 2019: 517-531 - 2018
- [c27]Aravind Machiry, Nilo Redini, Eric Gustafson, Yanick Fratantonio, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations. ACSAC 2018: 112-123 - [c26]Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio:
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android. CCS 2018: 1120-1136 - [c25]Simone Aonzo, Alessio Merlo, Giulio Tavella, Yanick Fratantonio:
Phishing Attacks on Modern Android. CCS 2018: 1788-1801 - [c24]Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi:
GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. DIMVA 2018: 92-113 - [c23]Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, Wenke Lee:
Broken Fingers: On the Usage of the Fingerprint API in Android. NDSS 2018 - [c22]Emanuele Cozzi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti:
Understanding Linux Malware. IEEE Symposium on Security and Privacy 2018: 161-175 - 2017
- [j1]Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna:
On the Privacy and Security of the Ultrasound Ecosystem. Proc. Priv. Enhancing Technol. 2017(2): 95-112 (2017) - [c21]Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. ACSAC 2017: 16-27 - [c20]Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, Giovanni Vigna:
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. NDSS 2017 - [c19]Yanick Fratantonio, Chenxiong Qian, Simon P. Chung, Wenke Lee:
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop. IEEE Symposium on Security and Privacy 2017: 1041-1057 - [c18]Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
BootStomp: On the Security of Bootloaders in Mobile Devices. USENIX Security Symposium 2017: 781-798 - 2016
- [c17]Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida:
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. CCS 2016: 1675-1689 - [c16]Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, Vasileios P. Kemerlis:
RETracer: triaging crashes by reverse execution from partial memory dumps. ICSE 2016: 820-831 - [c15]Vitor Monte Afonso, Paulo L. de Geus, Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna, Adam Doupé, Mario Polino:
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy. NDSS 2016 - [c14]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
TriggerScope: Towards Detecting Logic Bombs in Android Applications. IEEE Symposium on Security and Privacy 2016: 377-396 - 2015
- [c13]Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna:
BareDroid: Large-Scale Analysis of Android Apps on Real Devices. ACSAC 2015: 71-80 - [c12]Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi:
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications. ACSAC 2015: 201-210 - [c11]Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android. SPSM@CCS 2015: 27-38 - [c10]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. DIMVA 2015: 282-303 - [c9]Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen:
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. NDSS 2015 - [c8]Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
CLAPP: characterizing loops in Android applications (invited talk). DeMobile@SIGSOFT FSE 2015: 33-34 - [c7]Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
CLAPP: characterizing loops in Android applications. ESEC/SIGSOFT FSE 2015: 687-697 - [c6]Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
What the App is That? Deception and Countermeasures in the Android User Interface. IEEE Symposium on Security and Privacy 2015: 931-948 - 2014
- [c5]Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor van der Veen, Christian Platzer:
ANDRUBIS - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors. BADGERS@ESORICS 2014: 3-17 - [c4]Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. NDSS 2014 - [c3]Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupé, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, Yan Shoshitaishvili:
Ten Years of iCTF: The Good, The Bad, and The Ugly. 3GSE 2014 - 2013
- [c2]Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel:
An empirical study of cryptographic misuse in android applications. CCS 2013: 73-84 - 2011
- [c1]Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode. RAID 2011: 61-80
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint