Responding to targeted stealthy attacks on android using timely-captured memory dumps J Bellizzi, M Vella, C Colombo, J Hernandez-Castro IEEE Access 10, 35172-35218, 2022 | 11 | 2022 |
WeXpose: Towards on-line dynamic analysis of web attack payloads using just-in-time binary modification J Bellizzi, M Vella 2015 12th International Joint Conference on e-Business and …, 2015 | 7 | 2015 |
Responding to living-off-the-land tactics using just-in-time memory forensics (JIT-MF) for android J Bellizzi, M Vella, C Colombo, J Hernandez-Castro arXiv preprint arXiv:2105.05510, 2021 | 6 | 2021 |
Real-time triggering of Android memory dumps for stealthy attack investigation J Bellizzi, M Vella, C Colombo, J Hernandez-Castro | 5* | |
VEDRANDO: a novel way to reveal stealthy attack steps on android through memory forensics J Bellizzi, E Losiouk, M Conti, C Colombo, M Vella Journal of Cybersecurity and Privacy 3 (3), 364-395, 2023 | 1 | 2023 |
Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications. J Bellizzi, M Vella, C Colombo, JC Hernandez-Castro ICISSP, 389-401, 2023 | 1 | 2023 |
Responding to stealthy attacks on android using timely-captured memory dumps J Bellizzi University of Malta, 2023 | | 2023 |
Hooking Android apps for just-in-time memory dumping J Bellizzi, MJ Vella, C Colombo University of Malta. Department of Computer Science, 2019 | | 2019 |
Obfuscation-resistant, code-injection detection at the network level J Bellizzi University of Malta, 2014 | | 2014 |