Follow
Flavio Toffalini
Flavio Toffalini
EPFL, HexHive Laboratory
Verified email at epfl.ch - Homepage
Title
Cited by
Cited by
Year
Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures
I Homoliak, F Toffalini, J Guarnizo, Y Elovici, M Ochoa
ACM Computing Surveys (CSUR) 52 (2), 1-40, 2019
1552019
Twos: A dataset of malicious insider threat behavior based on a gamified competition
A Harilal, F Toffalini, J Castellanos, J Guarnizo, I Homoliak, M Ochoa
Proceedings of the 2017 International Workshop on Managing Insider Security …, 2017
332017
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
A Harilal, F Toffalini, I Homoliak, JH Castellanos, J Guarnizo, S Mondal, ...
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (1), 54-85, 2018
272018
Google dorks: Analysis, creation, and new defenses
F Toffalini, M Abbà, D Carra, D Balzarotti
International Conference on Detection of Intrusions and Malware, and …, 2016
152016
Detection of masqueraders based on graph partitioning of file system access events
F Toffalini, I Homoliak, A Harilal, A Binder, M Ochoa
2018 IEEE Security and Privacy Workshops (SPW), 217-227, 2018
132018
Renvdb, a restful database for pervasive environmental wireless sensor networks
F De Stefani, P Gamba, E Goldoni, A Savioli, D Silvestri, F Toffalini
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
132010
{ScaRR}: Scalable Runtime Remote Attestation for Complex Systems
F Toffalini, E Losiouk, A Biondo, J Zhou, M Conti
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
8*2019
SAFE^ d: Self-Attestation For Networks of Heterogeneous Embedded Devices
A Visintin, F Toffalini, M Conti, J Zhou
arXiv preprint arXiv:1909.08168, 2019
62019
Careful-packing: A practical and scalable anti-tampering software protection enforced by trusted computing
F Toffalini, M Ochoa, J Sun, J Zhou
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
62019
ASAINT: a spy app identification system based on network traffic
M Conti, G Rigoni, F Toffalini
Proceedings of the 15th International Conference on Availability …, 2020
42020
Practical static analysis of context leaks in Android applications
F Toffalini, J Sun, M Ochoa
Software: Practice and Experience 49 (2), 233-251, 2019
42019
SnakeGX: a sneaky attack against SGX Enclaves
F Toffalini, M Graziano, M Conti, J Zhou
International Conference on Applied Cryptography and Network Security, 333-362, 2021
32021
Static analysis of context leaks in android applications
F Toffalini, J Sun, M Ochoa
Proceedings of the 40th International Conference on Software Engineering …, 2018
22018
The evidence beyond the wall: Memory forensics in SGX environments
F Toffalini, A Oliveri, M Graziano, J Zhou, D Balzarotti
Forensic Science International: Digital Investigation 39, 301313, 2021
12021
FishFuzz: Throwing Larger Nets to Catch Deeper Bugs
H Zheng, J Zhang, Y Huang, Z Ren, H Wang, C Cao, Y Zhang, F Toffalini, ...
arXiv e-prints, arXiv: 2207.13393, 2022
2022
Designing a Provenance Analysis for SGX Enclaves
F Toffalini, M Payer, J Zhou, L Cavallaro
arXiv preprint arXiv:2206.07418, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–16