Toward automated detection of logic vulnerabilities in web applications V Felmetsger, L Cavedon, C Kruegel, G Vigna 19th USENIX Security Symposium (USENIX Security 10), 2010 | 258 | 2010 |
Enemy of the State: A {State-Aware}{Black-Box} Web Vulnerability Scanner A Doupé, L Cavedon, C Kruegel, G Vigna 21st USENIX Security Symposium (USENIX Security 12), 523-538, 2012 | 224 | 2012 |
Organizing large scale hacking competitions N Childers, B Boe, L Cavallaro, L Cavedon, M Cova, M Egele, G Vigna Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010 | 69 | 2010 |
Hit'em where it hurts: a live security exercise on cyber situational awareness A Doupé, M Egele, B Caillat, G Stringhini, G Yakin, A Zand, L Cavedon, ... Proceedings of the 27th Annual Computer Security Applications Conference, 51-61, 2011 | 63 | 2011 |
Methods and systems for reciprocal generation of watch-lists and malware signatures C Kolbitsch, PM Comparetti, L Cavedon US Patent 8,910,285, 2014 | 26 | 2014 |
Methods and systems for malware detection based on environment-dependent behavior C Kolbitsch, PM Comparetti, L Cavedon US Patent 9,361,459, 2016 | 16 | 2016 |
Getting the face behind the squares: Reconstructing pixelized video streams L Cavedon, L Foschini, G Vigna 5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011 | 15 | 2011 |
Are BGP routers open to attack? an experiment L Cavedon, C Kruegel, G Vigna Open Research Problems in Network Security: IFIP WG 11.4 International …, 2011 | 9 | 2011 |
Organizing large scale hacking competitions B Boe, L Cavallaro, L Cavedon, N Childers, M Cova, M Egele, G Vigna DIMVA 2010, July 8-9, 2010, Paris, France, 2010 | 1 | 2010 |
Design and validation of a methodology for distributed relay service for NAT traversal in a peer-to-peer VoIP network LM Cavedon | | 2007 |