关注
Jennifer Bellizzi
Jennifer Bellizzi
在 um.edu.mt 的电子邮件经过验证
标题
引用次数
引用次数
年份
Responding to targeted stealthy attacks on android using timely-captured memory dumps
J Bellizzi, M Vella, C Colombo, J Hernandez-Castro
IEEE Access 10, 35172-35218, 2022
112022
WeXpose: Towards on-line dynamic analysis of web attack payloads using just-in-time binary modification
J Bellizzi, M Vella
2015 12th International Joint Conference on e-Business and …, 2015
72015
Responding to living-off-the-land tactics using just-in-time memory forensics (JIT-MF) for android
J Bellizzi, M Vella, C Colombo, J Hernandez-Castro
arXiv preprint arXiv:2105.05510, 2021
62021
Real-time triggering of Android memory dumps for stealthy attack investigation
J Bellizzi, M Vella, C Colombo, J Hernandez-Castro
5*
VEDRANDO: a novel way to reveal stealthy attack steps on android through memory forensics
J Bellizzi, E Losiouk, M Conti, C Colombo, M Vella
Journal of Cybersecurity and Privacy 3 (3), 364-395, 2023
12023
Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications.
J Bellizzi, M Vella, C Colombo, JC Hernandez-Castro
ICISSP, 389-401, 2023
12023
Responding to stealthy attacks on android using timely-captured memory dumps
J Bellizzi
University of Malta, 2023
2023
Hooking Android apps for just-in-time memory dumping
J Bellizzi, MJ Vella, C Colombo
University of Malta. Department of Computer Science, 2019
2019
Obfuscation-resistant, code-injection detection at the network level
J Bellizzi
University of Malta, 2014
2014
系统目前无法执行此操作,请稍后再试。
文章 1–9