What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yanick Fratantonio
Google Scholar
29
publications in security and cryptology related venues
Year
Venue
Title
2022
conf/uss
How Machine Learning Is Solving the Binary Function Similarity Problem.
Andrea Marcelli
Mariano Graziano
Xabier Ugarte-Pedrero
Yanick Fratantonio
Mohamad Mansouri
Davide Balzarotti
2022
conf/uss
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
Jayakrishna Vadayath
Moritz Eckert
Kyle Zeng
Nicolaas Weideman
Gokulkrishna Praveen Menon
Yanick Fratantonio
Davide Balzarotti
Adam Doupé
Tiffany Bao
Ruoyu Wang
Christophe Hauser
Yan Shoshitaishvili
2022
conf/uss
RE-Mind: a First Look Inside the Mind of a Reverse Engineer.
Alessandro Mantovani
Simone Aonzo
Yanick Fratantonio
Davide Balzarotti
2021
conf/ccs
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Davide Quarta
Michele Ianni
Aravind Machiry
Yanick Fratantonio
Eric Gustafson
Davide Balzarotti
Martina Lindorfer
Giovanni Vigna
Christopher Kruegel
2021
conf/sp
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization.
Andrea Possemato
Simone Aonzo
Davide Balzarotti
Yanick Fratantonio
2021
conf/ndss
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices.
Zeyu Lei
Yuhong Nan
Yanick Fratantonio
Antonio Bianchi
2021
conf/ndss
Preventing and Detecting State Inference Attacks on Android.
Andrea Possemato
Dario Nisi
Yanick Fratantonio
2020
conf/uss
Towards HTTPS Everywhere on Android: We Are Not There Yet.
Andrea Possemato
Yanick Fratantonio
2018
conf/ccs
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android.
Andrea Possemato
Andrea Lanzi
Simon Pak Ho Chung
Wenke Lee
Yanick Fratantonio
2018
conf/ccs
Phishing Attacks on Modern Android.
Simone Aonzo
Alessio Merlo
Giulio Tavella
Yanick Fratantonio
2018
conf/sp
Understanding Linux Malware.
Emanuele Cozzi
Mariano Graziano
Yanick Fratantonio
Davide Balzarotti
2018
conf/ndss
Broken Fingers: On the Usage of the Fingerprint API in Android.
Antonio Bianchi
Yanick Fratantonio
Aravind Machiry
Christopher Kruegel
Giovanni Vigna
Simon Pak Ho Chung
Wenke Lee
2018
conf/acsac
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
Aravind Machiry
Nilo Redini
Eric Gustafson
Yanick Fratantonio
Yung Ryn Choe
Christopher Kruegel
Giovanni Vigna
2017
journals/popets
On the Privacy and Security of the Ultrasound Ecosystem.
Vasilios Mavroudis
Shuang Hao
Yanick Fratantonio
Federico Maggi
Christopher Kruegel
Giovanni Vigna
2017
conf/uss
BootStomp: On the Security of Bootloaders in Mobile Devices.
Nilo Redini
Aravind Machiry
Dipanjan Das
Yanick Fratantonio
Antonio Bianchi
Eric Gustafson
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2017
conf/sp
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop.
Yanick Fratantonio
Chenxiong Qian
Simon P. Chung
Wenke Lee
2017
conf/ndss
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
Andrea Continella
Yanick Fratantonio
Martina Lindorfer
Alessandro Puccetti
Ali Zand
Christopher Kruegel
Giovanni Vigna
2017
conf/acsac
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
Antonio Bianchi
Eric Gustafson
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2016
conf/ccs
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Victor van der Veen
Yanick Fratantonio
Martina Lindorfer
Daniel Gruss
Clémentine Maurice
Giovanni Vigna
Herbert Bos
Kaveh Razavi
Cristiano Giuffrida
2016
conf/sp
TriggerScope: Towards Detecting Logic Bombs in Android Applications.
Yanick Fratantonio
Antonio Bianchi
William K. Robertson
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2016
conf/ndss
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Vitor Monte Afonso
Paulo L. de Geus
Antonio Bianchi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
Adam Doupé
Mario Polino
2015
conf/ccs
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android.
Antonio Bianchi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2015
conf/sp
What the App is That? Deception and Countermeasures in the Android User Interface.
Antonio Bianchi
Jacopo Corbetta
Luca Invernizzi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2015
conf/ndss
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Yinzhi Cao
Yanick Fratantonio
Antonio Bianchi
Manuel Egele
Christopher Kruegel
Giovanni Vigna
Yan Chen
2015
conf/acsac
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications.
Luca Falsina
Yanick Fratantonio
Stefano Zanero
Christopher Kruegel
Giovanni Vigna
Federico Maggi
2015
conf/acsac
BareDroid: Large-Scale Analysis of Android Apps on Real Devices.
Simone Mutti
Yanick Fratantonio
Antonio Bianchi
Luca Invernizzi
Jacopo Corbetta
Dhilung Kirat
Christopher Kruegel
Giovanni Vigna
2014
conf/uss
Ten Years of iCTF: The Good, The Bad, and The Ugly.
Giovanni Vigna
Kevin Borgolte
Jacopo Corbetta
Adam Doupé
Yanick Fratantonio
Luca Invernizzi
Dhilung Kirat
Yan Shoshitaishvili
2014
conf/ndss
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
Sebastian Poeplau
Yanick Fratantonio
Antonio Bianchi
Christopher Kruegel
Giovanni Vigna
2013
conf/ccs
An empirical study of cryptographic misuse in android applications.
Manuel Egele
David Brumley
Yanick Fratantonio
Christopher Kruegel
Coauthors
Adam Doupé
(3)
Alessandro Mantovani
(1)
Alessandro Puccetti
(1)
Alessio Merlo
(1)
Ali Zand
(1)
Andrea Continella
(1)
Andrea Lanzi
(1)
Andrea Marcelli
(1)
Andrea Possemato
(4)
Antonio Bianchi
(11)
Aravind Machiry
(4)
Chenxiong Qian
(1)
Christophe Hauser
(1)
Christopher Kruegel
(16)
Clémentine Maurice
(1)
Cristiano Giuffrida
(1)
Daniel Gruss
(1)
Dario Nisi
(1)
David Brumley
(1)
Davide Balzarotti
(6)
Davide Quarta
(1)
Dhilung Kirat
(2)
Dipanjan Das
(1)
Emanuele Cozzi
(1)
Engin Kirda
(1)
Eric Gustafson
(4)
Federico Maggi
(2)
Giovanni Vigna
(17)
Giulio Tavella
(1)
Gokulkrishna Praveen Menon
(1)
Herbert Bos
(1)
Jacopo Corbetta
(3)
Jayakrishna Vadayath
(1)
Kaveh Razavi
(1)
Kevin Borgolte
(1)
Kyle Zeng
(1)
Luca Falsina
(1)
Luca Invernizzi
(3)
Manuel Egele
(2)
Mariano Graziano
(2)
Mario Polino
(1)
Martina Lindorfer
(3)
Michele Ianni
(1)
Mohamad Mansouri
(1)
Moritz Eckert
(1)
Nicolaas Weideman
(1)
Nilo Redini
(2)
Paulo L. de Geus
(1)
Ruoyu Wang
(1)
Sebastian Poeplau
(1)
Shuang Hao
(1)
Simon P. Chung
(1)
Simon Pak Ho Chung
(2)
Simone Aonzo
(3)
Simone Mutti
(1)
Stefano Zanero
(1)
Tiffany Bao
(1)
Vasilios Mavroudis
(1)
Victor van der Veen
(1)
Vitor Monte Afonso
(1)
Wenke Lee
(3)
William K. Robertson
(1)
Xabier Ugarte-Pedrero
(1)
Yan Chen
(1)
Yan Shoshitaishvili
(3)
Yanick Fratantonio
(29)
Yinzhi Cao
(1)
Yuhong Nan
(1)
Yung Ryn Choe
(1)
Zeyu Lei
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to