Alert button
Picture for Enrico Mariconti

Enrico Mariconti

Alert button

Cerberus: Exploring Federated Prediction of Security Events

Add code
Bookmark button
Alert button
Sep 07, 2022
Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro

Figure 1 for Cerberus: Exploring Federated Prediction of Security Events
Figure 2 for Cerberus: Exploring Federated Prediction of Security Events
Figure 3 for Cerberus: Exploring Federated Prediction of Security Events
Figure 4 for Cerberus: Exploring Federated Prediction of Security Events
Viaarxiv icon

MaMaDroid2.0 -- The Holes of Control Flow Graphs

Add code
Bookmark button
Alert button
Feb 28, 2022
Harel Berger, Chen Hajaj, Enrico Mariconti, Amit Dvir

Figure 1 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 2 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 3 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 4 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Viaarxiv icon

Tiresias: Predicting Security Events Through Deep Learning

Add code
Bookmark button
Alert button
May 24, 2019
Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini

Figure 1 for Tiresias: Predicting Security Events Through Deep Learning
Figure 2 for Tiresias: Predicting Security Events Through Deep Learning
Figure 3 for Tiresias: Predicting Security Events Through Deep Learning
Figure 4 for Tiresias: Predicting Security Events Through Deep Learning
Viaarxiv icon

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)

Add code
Bookmark button
Alert button
Nov 20, 2017
Lucky Onwuzurike, Enrico Mariconti, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini

Figure 1 for MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
Figure 2 for MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
Figure 3 for MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
Figure 4 for MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
Viaarxiv icon