What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Antonio Bianchi
Google Scholar
46
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Why Am I Seeing Double? An Investigation of Device Management Flaws in Voice Assistant Platforms.
Muslum Ozgur Ozmen
Mehmet Oguz Sakaoglu
Jackson Bizjak
Jianliang Wu
Antonio Bianchi
Dave (Jing) Tian
Z. Berkay Celik
2025
conf/ndss
VeriBin: Adaptive Verification of Patches at the Binary Level.
Hongwei Wu
Jianliang Wu
Ruoyu Wu
Ayushi Sharma
Aravind Machiry
Antonio Bianchi
2025
conf/ndss
ScopeVerif: Analyzing the Security of Android's Scoped Storage via Differential Analysis.
Zeyu Lei
Güliz Seray Tuncay
Beatrice Carissa Williem
Z. Berkay Celik
Antonio Bianchi
2025
conf/uss
LEMIX: Enabling Testing of Embedded Applications as Linux Applications.
Sai Ritvik Tanksalkar
Siddharth Muralee
Srihari Danduri
Paschal Amusuo
Antonio Bianchi
James C. Davis
Aravind Kumar Machiry
2025
conf/uss
NeuroScope: Reverse Engineering Deep Neural Network on Edge Devices using Dynamic Analysis.
Ruoyu Wu
Muqi Zou
Arslan Khan
Taegyu Kim
Dongyan Xu
Dave (Jing) Tian
Antonio Bianchi
2025
conf/uss
Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems.
Doguhan Yeke
Kartik Anand Pant
Muslum Ozgur Ozmen
Hyungsub Kim
James M. Goppert
Inseok Hwang
Antonio Bianchi
Z. Berkay Celik
2024
conf/uss
ATTention Please! An Investigation of the App Tracking Transparency Permission.
Reham Mohamed
Arjun Arunasalam
Habiba Farrukh
Jason Tong
Antonio Bianchi
Z. Berkay Celik
2024
conf/uss
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations.
Jianliang Wu
Patrick Traynor
Dongyan Xu
Dave (Jing) Tian
Antonio Bianchi
2024
conf/uss
D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation.
Muqi Zou
Arslan Khan
Ruoyu Wu
Han Gao
Antonio Bianchi
Dave (Jing) Tian
2024
conf/sp
A Systematic Study of Physical Sensor Attack Hardness.
Hyungsub Kim
Rwitam Bandyopadhyay
Muslum Ozgur Ozmen
Z. Berkay Celik
Antonio Bianchi
Yongdae Kim
Dongyan Xu
2024
conf/sp
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth.
Jianliang Wu
Ruoyu Wu
Dongyan Xu
Dave Jing Tian
Antonio Bianchi
2024
conf/sp
Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables.
Doguhan Yeke
Muhammad Ibrahim
Güliz Seray Tuncay
Habiba Farrukh
Abdullah Imran
Antonio Bianchi
Z. Berkay Celik
2023
conf/uss
Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery.
Kyungtae Kim
Sungwoo Kim
Kevin R. B. Butler
Antonio Bianchi
Rick Kennell
Dave Tian
2023
conf/uss
Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.
Ruoyu Song
Muslum Ozgur Ozmen
Hyungsub Kim
Raymond Muller
Z. Berkay Celik
Antonio Bianchi
2023
conf/uss
PatchVerif: Discovering Faulty Patches in Robotic Vehicles.
Hyungsub Kim
Muslum Ozgur Ozmen
Z. Berkay Celik
Antonio Bianchi
Dongyan Xu
2023
conf/uss
LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality.
Habiba Farrukh
Reham Mohamed
Aniket Nare
Antonio Bianchi
Z. Berkay Celik
2023
conf/uss
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions.
Siddharth Muralee
Igibek Koishybayev
Aleksandr Nahapetyan
Greg Tystahl
Bradley Reaves
Antonio Bianchi
William Enck
Alexandros Kapravelos
Aravind Machiry
2023
conf/eurosp
Fuzzing SGX Enclaves via Host Program Mutations.
Arslan Khan
Muqi Zou
Kyungtae Kim
Dongyan Xu
Antonio Bianchi
Dave Jing Tian
2023
conf/eurosp
AoT - Attack on Things: A security analysis of IoT firmware updates.
Muhammad Ibrahim
Andrea Continella
Antonio Bianchi
2022
conf/uss
DnD: A Cross-Architecture Deep Neural Network Decompiler.
Ruoyu Wu
Taegyu Kim
Dave (Jing) Tian
Antonio Bianchi
Dongyan Xu
2022
conf/uss
SARA: Secure Android Remote Authorization.
Abdullah Imran
Habiba Farrukh
Muhammad Ibrahim
Z. Berkay Celik
Antonio Bianchi
2022
conf/sp
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.
Jianliang Wu
Ruoyu Wu
Dongyan Xu
Dave Jing Tian
Antonio Bianchi
2022
conf/sp
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks.
Kyungtae Kim
Taegyu Kim
Ertza Warraich
Byoungyoung Lee
Kevin R. B. Butler
Antonio Bianchi
Dave Jing Tian
2022
conf/sp
PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles.
Hyungsub Kim
Muslum Ozgur Ozmen
Z. Berkay Celik
Antonio Bianchi
Dongyan Xu
2022
conf/asiaccs
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs.
Sungwoo Kim
Gisu Yeo
Taegyu Kim
Junghwan John Rhee
Yuseok Jeon
Antonio Bianchi
Dongyan Xu
Dave (Jing) Tian
2022
conf/acsac
One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction.
Prashast Srivastava
Stefan Nagy
Matthew Hicks
Antonio Bianchi
Mathias Payer
2021
conf/uss
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Jianliang Wu
Ruoyu Wu
Daniele Antonioli
Mathias Payer
Nils Ole Tippenhauer
Dongyan Xu
Dave (Jing) Tian
Antonio Bianchi
2021
conf/uss
M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.
Arslan Khan
Hyungsub Kim
Byoungyoung Lee
Dongyan Xu
Antonio Bianchi
Dave (Jing) Tian
2021
conf/sp
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.
Nilo Redini
Andrea Continella
Dipanjan Das
Giulio De Pasquale
Noah Spahn
Aravind Machiry
Antonio Bianchi
Christopher Kruegel
Giovanni Vigna
2021
conf/eurosp
AppJitsu: Investigating the Resiliency of Android Applications.
Onur Zungur
Antonio Bianchi
Gianluca Stringhini
Manuel Egele
2021
conf/ndss
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices.
Zeyu Lei
Yuhong Nan
Yanick Fratantonio
Antonio Bianchi
2021
conf/ndss
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles.
Hyungsub Kim
Muslum Ozgur Ozmen
Antonio Bianchi
Z. Berkay Celik
Dongyan Xu
2018
conf/uss
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security.
Moritz Eckert
Antonio Bianchi
Ruoyu Wang
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2018
conf/ndss
Broken Fingers: On the Usage of the Fingerprint API in Android.
Antonio Bianchi
Yanick Fratantonio
Aravind Machiry
Christopher Kruegel
Giovanni Vigna
Simon Pak Ho Chung
Wenke Lee
2017
conf/uss
BootStomp: On the Security of Bootloaders in Mobile Devices.
Nilo Redini
Aravind Machiry
Dipanjan Das
Yanick Fratantonio
Antonio Bianchi
Eric Gustafson
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2017
conf/ndss
Ramblr: Making Reassembly Great Again.
Ruoyu Wang
Yan Shoshitaishvili
Antonio Bianchi
Aravind Machiry
John Grosen
Paul Grosen
Christopher Kruegel
Giovanni Vigna
2017
conf/ndss
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Aravind Machiry
Eric Gustafson
Chad Spensky
Christopher Salls
Nick Stephens
Ruoyu Wang
Antonio Bianchi
Yung Ryn Choe
Christopher Kruegel
Giovanni Vigna
2017
conf/acsac
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
Antonio Bianchi
Eric Gustafson
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2016
conf/sp
TriggerScope: Towards Detecting Logic Bombs in Android Applications.
Yanick Fratantonio
Antonio Bianchi
William K. Robertson
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2016
conf/ndss
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Vitor Monte Afonso
Paulo L. de Geus
Antonio Bianchi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
Adam Doupé
Mario Polino
2015
conf/ccs
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android.
Antonio Bianchi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2015
conf/sp
What the App is That? Deception and Countermeasures in the Android User Interface.
Antonio Bianchi
Jacopo Corbetta
Luca Invernizzi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2015
conf/ndss
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Yinzhi Cao
Yanick Fratantonio
Antonio Bianchi
Manuel Egele
Christopher Kruegel
Giovanni Vigna
Yan Chen
2015
conf/acsac
BareDroid: Large-Scale Analysis of Android Apps on Real Devices.
Simone Mutti
Yanick Fratantonio
Antonio Bianchi
Luca Invernizzi
Jacopo Corbetta
Dhilung Kirat
Christopher Kruegel
Giovanni Vigna
2014
conf/ndss
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
Sebastian Poeplau
Yanick Fratantonio
Antonio Bianchi
Christopher Kruegel
Giovanni Vigna
2012
conf/ccs
Blacksheep: detecting compromised hosts in homogeneous crowds.
Antonio Bianchi
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
Coauthors
Abdullah Imran
(2)
Adam Doupé
(1)
Aleksandr Nahapetyan
(1)
Alexandros Kapravelos
(1)
Andrea Continella
(2)
Aniket Nare
(1)
Antonio Bianchi
(46)
Aravind Kumar Machiry
(1)
Aravind Machiry
(7)
Arjun Arunasalam
(1)
Arslan Khan
(4)
Ayushi Sharma
(1)
Beatrice Carissa Williem
(1)
Bradley Reaves
(1)
Byoungyoung Lee
(2)
Chad Spensky
(1)
Christopher Kruegel
(15)
Christopher Salls
(1)
Daniele Antonioli
(1)
Dave (Jing) Tian
(8)
Dave Jing Tian
(4)
Dave Tian
(1)
Dhilung Kirat
(1)
Dipanjan Das
(2)
Doguhan Yeke
(2)
Dongyan Xu
(13)
Engin Kirda
(1)
Eric Gustafson
(3)
Ertza Warraich
(1)
Gianluca Stringhini
(1)
Giovanni Vigna
(15)
Gisu Yeo
(1)
Giulio De Pasquale
(1)
Greg Tystahl
(1)
Güliz Seray Tuncay
(2)
Habiba Farrukh
(4)
Han Gao
(1)
Hongwei Wu
(1)
Hyungsub Kim
(7)
Igibek Koishybayev
(1)
Inseok Hwang
(1)
Jackson Bizjak
(1)
Jacopo Corbetta
(2)
James C. Davis
(1)
James M. Goppert
(1)
Jason Tong
(1)
Jianliang Wu
(6)
John Grosen
(1)
Junghwan John Rhee
(1)
Kartik Anand Pant
(1)
Kevin R. B. Butler
(2)
Kyungtae Kim
(3)
Luca Invernizzi
(2)
Manuel Egele
(2)
Mario Polino
(1)
Mathias Payer
(2)
Matthew Hicks
(1)
Mehmet Oguz Sakaoglu
(1)
Moritz Eckert
(1)
Muhammad Ibrahim
(3)
Muqi Zou
(3)
Muslum Ozgur Ozmen
(7)
Nick Stephens
(1)
Nilo Redini
(2)
Nils Ole Tippenhauer
(1)
Noah Spahn
(1)
Onur Zungur
(1)
Paschal Amusuo
(1)
Patrick Traynor
(1)
Paul Grosen
(1)
Paulo L. de Geus
(1)
Prashast Srivastava
(1)
Raymond Muller
(1)
Reham Mohamed
(2)
Rick Kennell
(1)
Ruoyu Song
(1)
Ruoyu Wang
(3)
Ruoyu Wu
(7)
Rwitam Bandyopadhyay
(1)
Sai Ritvik Tanksalkar
(1)
Sebastian Poeplau
(1)
Siddharth Muralee
(2)
Simon Pak Ho Chung
(1)
Simone Mutti
(1)
Srihari Danduri
(1)
Stefan Nagy
(1)
Sungwoo Kim
(2)
Taegyu Kim
(4)
Vitor Monte Afonso
(1)
Wenke Lee
(1)
William Enck
(1)
William K. Robertson
(1)
Yan Chen
(1)
Yan Shoshitaishvili
(4)
Yanick Fratantonio
(11)
Yinzhi Cao
(1)
Yongdae Kim
(1)
Yuhong Nan
(1)
Yung Ryn Choe
(1)
Yuseok Jeon
(1)
Z. Berkay Celik
(12)
Zeyu Lei
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to