Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures I Homoliak, F Toffalini, J Guarnizo, Y Elovici, M Ochoa ACM Computing Surveys (CSUR) 52 (2), 1-40, 2019 | 297 | 2019 |
Twos: A dataset of malicious insider threat behavior based on a gamified competition A Harilal, F Toffalini, J Castellanos, J Guarnizo, I Homoliak, M Ochoa Proceedings of the 2017 international workshop on managing insider security …, 2017 | 60 | 2017 |
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. A Harilal, F Toffalini, I Homoliak, JH Castellanos, J Guarnizo, S Mondal, ... J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (1), 54-85, 2018 | 47 | 2018 |
{ScaRR}: Scalable Runtime Remote Attestation for Complex Systems F Toffalini, E Losiouk, A Biondo, J Zhou, M Conti 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 23 | 2019 |
Google dorks: Analysis, creation, and new defenses F Toffalini, M Abbà, D Carra, D Balzarotti Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016 | 21 | 2016 |
ASAINT: A spy App identification system based on network traffic M Conti, G Rigoni, F Toffalini Proceedings of the 15th International Conference on Availability …, 2020 | 18 | 2020 |
Detection of masqueraders based on graph partitioning of file system access events F Toffalini, I Homoliak, A Harilal, A Binder, M Ochoa 2018 IEEE Security and Privacy Workshops (SPW), 217-227, 2018 | 16 | 2018 |
FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets H Zheng, J Zhang, Y Huang, Z Ren, H Wang, C Cao, Y Zhang, F Toffalini, ... 32nd USENIX Security Symposium (USENIX Security 23), 1343-1360, 2023 | 15* | 2023 |
Renvdb, a restful database for pervasive environmental wireless sensor networks F De Stefani, P Gamba, E Goldoni, A Savioli, D Silvestri, F Toffalini 2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010 | 14 | 2010 |
Evocatio: Conjuring bug capabilities from a single poc Z Jiang, S Gan, A Herrera, F Toffalini, L Romerio, C Tang, M Egele, ... Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 12 | 2022 |
SnakeGX: a sneaky attack against SGX Enclaves F Toffalini, M Graziano, M Conti, J Zhou International Conference on Applied Cryptography and Network Security, 333-362, 2021 | 12 | 2021 |
Warpattack: bypassing cfi through compiler-introduced double-fetches J Xu, L Di Bartolomeo, F Toffalini, B Mao, M Payer 2023 IEEE Symposium on Security and Privacy (SP), 1271-1288, 2023 | 7 | 2023 |
Videzzo: Dependency-aware virtual device fuzzing Q Liu, F Toffalini, Y Zhou, M Payer 2023 IEEE Symposium on Security and Privacy (SP), 3228-3245, 2023 | 6 | 2023 |
SAFE^ d: Self-Attestation For Networks of Heterogeneous Embedded Devices A Visintin, F Toffalini, M Conti, J Zhou arXiv preprint arXiv:1909.08168, 2019 | 6 | 2019 |
Careful-packing: A practical and scalable anti-tampering software protection enforced by trusted computing F Toffalini, M Ochoa, J Sun, J Zhou Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019 | 6 | 2019 |
Practical static analysis of context leaks in Android applications F Toffalini, J Sun, M Ochoa Software: Practice and Experience 49 (2), 233-251, 2019 | 5 | 2019 |
HolA: Holistic and autonomous attestation for IoT networks A Visintin, F Toffalini, E Losiouk, M Conti, J Zhou International Conference on Applied Cryptography and Network Security, 277-296, 2022 | 4 | 2022 |
The evidence beyond the wall: Memory forensics in SGX environments F Toffalini, A Oliveri, M Graziano, J Zhou, D Balzarotti Forensic Science International: Digital Investigation 39, 301313, 2021 | 4 | 2021 |
Designing a provenance analysis for SGX enclaves F Toffalini, M Payer, J Zhou, L Cavallaro Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 3 | 2022 |
Static analysis of context leaks in android applications F Toffalini, J Sun, M Ochoa Proceedings of the 40th International Conference on Software Engineering …, 2018 | 2 | 2018 |