Giorgio Giacinto
Oblivion: an open-source system for large-scale analysis of macro-based office malware
2024-01-01 Sanna, Alessandro; Cara, Fabrizio; Maiorca, Davide; Giacinto, Giorgio
Enhancing android malware detection explainability through function call graph APIs
2024-01-01 Soi, Diego; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio
Do you Trust your Device? Open Challenges in IoT Security Analysis
2024-01-01 Binosi, Lorenzo; Mazzini, Pietro; Sanna, Alessandro; Carminati, Michele; Giacinto, Giorgio; Lazzeretti, Riccardo; Zanero, Stefano; Polino, Mario; Coppa, Emilio; Maiorca, Davide
Explaining the Use of Cryptographic API in Android Malware
2023-01-01 Janovsky, Adam; Maiorca, Davide; Macko, Dominik; Matyas, Vashek; Giacinto, Giorgio
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection
2023-01-01 Bergadano, Francesco; Giacinto, Giorgio
Improving malware detection with explainable machine learning
2023-01-01 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection"
2023-01-01 Bergadano, F; Giacinto, G
A Targeted Assessment of Cross-Site Scripting Detection Tools
2023-01-01 Pala, Bruno; Pisu, Lorenzo; Sanna, SILVIA LUCIA; Maiorca, Davide; Giacinto, Giorgio
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps
2022-01-01 Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio
Detection of Intrusions and Malware, and Vulnerability Assessment
2022-01-01 Cavallaro, Lorenzo; Gruss, Daniel; Pellegrino, Giancarlo; Giacinto, Giorgio
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps
2022-01-01 Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio
Do gradient-based explanations tell anything about adversarial robustness to android malware?
2022-01-01 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F.
A Longitudinal Study of Cryptographic API: A Decade of Android Malware
2022-01-01 Janovsky, A; Maiorca, D; Macko, D; Matyas, V; Giacinto, G
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware
2022-01-01 Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio
Explanation-Driven Characterization of Android Ransomware
2021-01-01 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio
PowerDecode: a PowerShell Script Decoder Dedicated to Malware Analysis
2021-01-01 Mario Malandrone, Giuseppe; Virdis, Giovanni; Giacinto, Giorgio; Maiorca, Davide
On the Role of Explainable Machine Learning for Secure Smart Vehicles
2020-01-01 Scalas, Michele; Giacinto, Giorgio
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback
2020-01-01 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio
Defensive Programming for Smart Home Cybersecurity
2020-01-01 Rossi, Maria Teresa; Greca, Renan; Iovino, Ludovico; Giacinto, Giorgio; Bertoli, Antonia
Adversarial Detection of Flash Malware: Limitations and Open Issues
2020-01-01 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G.
On the Feasibility of Adversarial Sample Creation Using the Android System API
2020-01-01 Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, Davide
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
2019-01-01 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio
Towards adversarial malware detection: lessons learned from PDF-based attacks
2019-01-01 Maiorca, D.; Biggio, B.; Giacinto, G.
Detection of Intrusions and Malware, and Vulnerability Assessment
2019-01-01 Perdisci, Roberto; Maurice, Iclémentine; Giacinto, Giorgio; Almgren, Magnus
On the effectiveness of system API-related information for Android ransomware detection
2019-01-01 Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; Giacinto, Giorgio
Automotive cybersecurity: Foundations for next-generation vehicles
2019-01-01 Scalas, M.; Giacinto, G.
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware
2019-01-01 UGARTE ARZAC, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio
Explaining black-box android malware detection
2018-01-01 Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
2018-01-01 Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio
Ten years of relevance score for content based image retrieval
2018-01-01 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio
Infinity-norm support vector machines against adversarial label contamination
2017-01-01 Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio
Multimodal retrieval with diversification and relevance feedback for tourist attraction images
2017-01-01 Dang Nguyen, Duc Tien; Piras, Luca; Giacinto, Giorgio; Boato, Giulia; De Natale, Francesco GB
Detection of malicious scripting code through discriminant and adversary-aware API analysis
2017-01-01 Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio
Information fusion in content based image retrieval: A comprehensive overview
2017-01-01 Piras, Luca; Giacinto, Giorgio
R-PackDroid: API package-based characterization and detection of mobile ransomware
2017-01-01 Maiorca, Davide; Mercaldo, Francesco; Giacinto, Giorgio; Visaggio, Corrado Aaron; Martinelli, Fabio
IntelliAV: Toward the feasibility of building intelligent anti-malware on Android devices
2017-01-01 Ahmadi, Mansour; Sotgiu, Angelo; Giacinto, Giorgio
Deepsquatting: Learning-based typosquatting detection at deeper domain levels
2017-01-01 Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Roli, Fabio
DroidSieve: Fast and accurate classification of obfuscated android malware
2017-01-01 Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorgio; Cavallaro, Lorenzo
Pharmaguard WebApp: An application for the detection of illegal online pharmacies
2016-01-01 Contini, Matteo; Corona, Igino; Mulas, Alessio; Giacinto, Giorgio; Ariu, Davide
Detecting Misuse of Google Cloud Messaging in Android Badware
2016-01-01 Ahmadi, Mansour; Biggio, Battista; Arzt, S; Ariu, Davide; Giacinto, Giorgio
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
2016-01-01 Ahmadi, Mansour; Ulyanov, D; Semenov, S; Trofimov, M; Giacinto, Giorgio
Clustering android malware families by Http traffic
2016-01-01 Aresu, Marco; Ariu, Davide; Ahmadi, Mansour; Maiorca, Davide; Giacinto, Giorgio
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps
2016-01-01 Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio; Frumento, Enrico; Freschi, Federica
Who are you? A statistical approach to measuring user authenticity
2016-01-01 Jain, S; Mandell Freeman, M; Biggio, Battista; Duermuth, M; Giacinto, Giorgio
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation
2016-01-01 Hoffmann, J; Rytilahti, T; Maiorca, Davide; Winandy, M; Giacinto, Giorgio; Holz, T.
Multimodal-based Diversified Summarization in Social Image Retrieval
2015-01-01 DANG NGUYEN, DUC TIEN; Boato, G; De Natale F. G., B; Piras, Luca; Giacinto, Giorgio; Tuveri, F; Angioni, M.
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time
2015-01-01 Biggio, Battista; Corona, Igino; He, Z. M.; Chan P., P; Giacinto, Giorgio; Yeung D., S; Roli, Fabio
Yet Another Cybersecurity Roadmapping Methodology
2015-01-01 Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Frumento, E; Freschi, F; Giacinto, Giorgio; Roli, Fabio
Fast image classification with reduced multiclass support vector machines
2015-01-01 Melis, Marco; Piras, Luca; Biggio, Battista; Giacinto, Giorgio; Fumera, Giorgio; Roli, Fabio
An Evasion Resilient Approach to the Detection of Malicious PDF Files
2015-01-01 Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, Giorgio
Title | Issue Date | Author(s) | Journal | Publisher |
---|---|---|---|---|
Oblivion: an open-source system for large-scale analysis of macro-based office malware | 1-Jan-2024 | Sanna, Alessandro; Cara, Fabrizio; Maiorca, Davide; Giacinto, Giorgio | JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES | - |
Enhancing android malware detection explainability through function call graph APIs | 1-Jan-2024 | Soi, Diego; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS | - |
Do you Trust your Device? Open Challenges in IoT Security Analysis | 1-Jan-2024 | Binosi, Lorenzo; Mazzini, Pietro; Sanna, Alessandro; Carminati, Michele; Giacinto, Giorgio; Lazzeretti, Riccardo; Zanero, Stefano; Polino, Mario; Coppa, Emilio; Maiorca, Davide | - | SciTePress - Science and and Technology Publications |
Explaining the Use of Cryptographic API in Android Malware | 1-Jan-2023 | Janovsky, Adam; Maiorca, Davide; Macko, Dominik; Matyas, Vashek; Giacinto, Giorgio | - | Springer |
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection | 1-Jan-2023 | Bergadano, Francesco; Giacinto, Giorgio | ALGORITHMS | mdpi |
Improving malware detection with explainable machine learning | 1-Jan-2023 | Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio | - | Academic Press |
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection" | 1-Jan-2023 | Bergadano, F; Giacinto, G | ALGORITHMS | - |
A Targeted Assessment of Cross-Site Scripting Detection Tools | 1-Jan-2023 | Pala, Bruno; Pisu, Lorenzo; Sanna, SILVIA LUCIA; Maiorca, Davide; Giacinto, Giorgio | - | - |
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps | 1-Jan-2022 | Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio | - | - |
Detection of Intrusions and Malware, and Vulnerability Assessment | 1-Jan-2022 | Cavallaro, Lorenzo; Gruss, Daniel; Pellegrino, Giancarlo; Giacinto, Giorgio | - | Springer, Cham |
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps | 1-Jan-2022 | Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio | - | Springer |
Do gradient-based explanations tell anything about adversarial robustness to android malware? | 1-Jan-2022 | Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. | INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS | - |
A Longitudinal Study of Cryptographic API: A Decade of Android Malware | 1-Jan-2022 | Janovsky, A; Maiorca, D; Macko, D; Matyas, V; Giacinto, G | - | SCITEPRESS |
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware | 1-Jan-2022 | Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio | - | Springer |
Explanation-Driven Characterization of Android Ransomware | 1-Jan-2021 | Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio | - | - |
PowerDecode: a PowerShell Script Decoder Dedicated to Malware Analysis | 1-Jan-2021 | Mario Malandrone, Giuseppe; Virdis, Giovanni; Giacinto, Giorgio; Maiorca, Davide | - | CEUR-WS.org |
On the Role of Explainable Machine Learning for Secure Smart Vehicles | 1-Jan-2020 | Scalas, Michele; Giacinto, Giorgio | - | IEEE (Institute of Electrical and Electronics Engineers) |
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback | 1-Jan-2020 | Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio | MULTIMEDIA TOOLS AND APPLICATIONS | - |
Defensive Programming for Smart Home Cybersecurity | 1-Jan-2020 | Rossi, Maria Teresa; Greca, Renan; Iovino, Ludovico; Giacinto, Giorgio; Bertoli, Antonia | - | IEEE (Institute of Electrical and Electronics Engineers) |
Adversarial Detection of Flash Malware: Limitations and Open Issues | 1-Jan-2020 | Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. | COMPUTERS & SECURITY | - |
On the Feasibility of Adversarial Sample Creation Using the Android System API | 1-Jan-2020 | Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, Davide | INFORMATION | - |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection | 1-Jan-2019 | Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
Towards adversarial malware detection: lessons learned from PDF-based attacks | 1-Jan-2019 | Maiorca, D.; Biggio, B.; Giacinto, G. | ACM COMPUTING SURVEYS | - |
Detection of Intrusions and Malware, and Vulnerability Assessment | 1-Jan-2019 | Perdisci, Roberto; Maurice, Iclémentine; Giacinto, Giorgio; Almgren, Magnus | - | Springer |
On the effectiveness of system API-related information for Android ransomware detection | 1-Jan-2019 | Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; Giacinto, Giorgio | COMPUTERS & SECURITY | - |
Automotive cybersecurity: Foundations for next-generation vehicles | 1-Jan-2019 | Scalas, M.; Giacinto, G. | - | IEEE (Institute of Electrical and Electronics Engineers) |
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware | 1-Jan-2019 | UGARTE ARZAC, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio | - | Springer |
Explaining black-box android malware detection | 1-Jan-2018 | Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio | - | IEEE, Institute of Electrical and Electronics Engineers |
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables | 1-Jan-2018 | Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio | - | IEEE (Institute of Electrical and Electronics Engineers) |
Ten years of relevance score for content based image retrieval | 1-Jan-2018 | Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio | - | Springer Verlag |
Infinity-norm support vector machines against adversarial label contamination | 1-Jan-2017 | Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio | - | CEUR-WS |
Multimodal retrieval with diversification and relevance feedback for tourist attraction images | 1-Jan-2017 | Dang Nguyen, Duc Tien; Piras, Luca; Giacinto, Giorgio; Boato, Giulia; De Natale, Francesco GB | ACM TRANSACTIONS ON MULTIMEDIA COMPUTING, COMMUNICATIONS AND APPLICATIONS | - |
Detection of malicious scripting code through discriminant and adversary-aware API analysis | 1-Jan-2017 | Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio | - | CEUR-WS |
Information fusion in content based image retrieval: A comprehensive overview | 1-Jan-2017 | Piras, Luca; Giacinto, Giorgio | INFORMATION FUSION | - |
R-PackDroid: API package-based characterization and detection of mobile ransomware | 1-Jan-2017 | Maiorca, Davide; Mercaldo, Francesco; Giacinto, Giorgio; Visaggio, Corrado Aaron; Martinelli, Fabio | - | ACM |
IntelliAV: Toward the feasibility of building intelligent anti-malware on Android devices | 1-Jan-2017 | Ahmadi, Mansour; Sotgiu, Angelo; Giacinto, Giorgio | - | Springer |
Deepsquatting: Learning-based typosquatting detection at deeper domain levels | 1-Jan-2017 | Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Roli, Fabio | - | Springer |
DroidSieve: Fast and accurate classification of obfuscated android malware | 1-Jan-2017 | Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorgio; Cavallaro, Lorenzo | - | Association for Computing Machinery |
Pharmaguard WebApp: An application for the detection of illegal online pharmacies | 1-Jan-2016 | Contini, Matteo; Corona, Igino; Mulas, Alessio; Giacinto, Giorgio; Ariu, Davide | - | CEUR-WS |
Detecting Misuse of Google Cloud Messaging in Android Badware | 1-Jan-2016 | Ahmadi, Mansour; Biggio, Battista; Arzt, S; Ariu, Davide; Giacinto, Giorgio | - | ACM (Association for Computing Machinery) |
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification | 1-Jan-2016 | Ahmadi, Mansour; Ulyanov, D; Semenov, S; Trofimov, M; Giacinto, Giorgio | - | ACM |
Clustering android malware families by Http traffic | 1-Jan-2016 | Aresu, Marco; Ariu, Davide; Ahmadi, Mansour; Maiorca, Davide; Giacinto, Giorgio | - | IEEE (Institute of Electrical and Electronics Engineers) |
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps | 1-Jan-2016 | Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio; Frumento, Enrico; Freschi, Federica | - | Springer |
Who are you? A statistical approach to measuring user authenticity | 1-Jan-2016 | Jain, S; Mandell Freeman, M; Biggio, Battista; Duermuth, M; Giacinto, Giorgio | - | The Internet Society |
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation | 1-Jan-2016 | Hoffmann, J; Rytilahti, T; Maiorca, Davide; Winandy, M; Giacinto, Giorgio; Holz, T. | - | ACM |
Multimodal-based Diversified Summarization in Social Image Retrieval | 1-Jan-2015 | DANG NGUYEN, DUC TIEN; Boato, G; De Natale F. G., B; Piras, Luca; Giacinto, Giorgio; Tuveri, F; Angioni, M. | - | - |
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time | 1-Jan-2015 | Biggio, Battista; Corona, Igino; He, Z. M.; Chan P., P; Giacinto, Giorgio; Yeung D., S; Roli, Fabio | - | Springer Verlag |
Yet Another Cybersecurity Roadmapping Methodology | 1-Jan-2015 | Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Frumento, E; Freschi, F; Giacinto, Giorgio; Roli, Fabio | - | IEEE |
Fast image classification with reduced multiclass support vector machines | 1-Jan-2015 | Melis, Marco; Piras, Luca; Biggio, Battista; Giacinto, Giorgio; Fumera, Giorgio; Roli, Fabio | - | Springer |
An Evasion Resilient Approach to the Detection of Malicious PDF Files | 1-Jan-2015 | Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, Giorgio | - | Springer |
Icon legend
- files available
- files available on intranet
- files available for authorized users
- files available for administrators
- files under embargo
- no files available