Mariano Graziano
Mariano Graziano
JPMorgan Chase
Verified email at - Homepage
Cited by
Cited by
Understanding linux malware
E Cozzi, M Graziano, Y Fratantonio, D Balzarotti
2018 IEEE symposium on security and privacy (SP), 161-175, 2018
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence
M Graziano, D Canali, L Bilge, A Lanzi, E Shi, D Balzarotti, M van Dijk, ...
24th USENIX Security Symposium (USENIX Security 15), 1057-1072, 2015
How machine learning is solving the binary function similarity problem
A Marcelli, M Graziano, X Ugarte-Pedrero, Y Fratantonio, M Mansouri, ...
31st USENIX Security Symposium (USENIX Security 22), 2099-2116, 2022
Hypervisor memory forensics
M Graziano, A Lanzi, D Balzarotti
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
A close look at a daily dataset of malware samples
X Ugarte-Pedrero, M Graziano, D Balzarotti
ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-30, 2019
Survivalism: Systematic analysis of windows malware living-off-the-land
F Barr-Smith, X Ugarte-Pedrero, M Graziano, R Spolaor, I Martinovic
2021 IEEE Symposium on Security and Privacy (SP), 1557-1574, 2021
Towards Network Containment in Malware Analysis Systems
M Graziano, C Leita, D Balzarotti
ROPMEMU: A framework for the analysis of complex code-reuse attacks
M Graziano, D Balzarotti, A Zidouemba
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Micro-virtualization memory tracing to detect and prevent spraying attacks
S Cristalli, M Pagnozzi, M Graziano, A Lanzi, D Balzarotti
25th {USENIX} Security Symposium ({USENIX} Security 16), 431-446, 2016
Subverting operating system properties through evolutionary DKOM attacks
M Graziano, L Flore, A Lanzi, D Balzarotti
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
SnakeGX: a sneaky attack against SGX Enclaves
F Toffalini, M Graziano, M Conti, J Zhou
International Conference on Applied Cryptography and Network Security, 333-362, 2021
Smashing the stack in 2010
M Graziano, A Cugliari
no. July, 1-73, 2010
Lost in the loader: The many faces of the windows pe file format
D Nisi, M Graziano, Y Fratantonio, D Balzarotti
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
Measuring the role of greylisting and nolisting in fighting spam
F Pagani, M De Astis, M Graziano, A Lanzi, D Balzarotti
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
Through the {Looking-Glass}, and What Eve Found There
L Bruno, M Graziano, D Balzarotti, A Francillon
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
The evidence beyond the wall: Memory forensics in SGX environments
F Toffalini, A Oliveri, M Graziano, J Zhou, D Balzarotti
Forensic Science International: Digital Investigation 39, 301313, 2021
From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!
G Stivala, S Abdelnabi, A Mengascini, M Graziano, M Fritz, G Pellegrino
Proceedings of the 39th Annual Computer Security Applications Conference, 14-28, 2023
A Large-Scale Study of Phishing PDF Documents
G Stivala, S Abdelnabi, A Mengascini, M Graziano, M Fritz, G Pellegrino
arXiv e-prints, arXiv: 2308.01273, 2023
The system can't perform the operation now. Try again later.
Articles 1–18