Follow
Andrea Continella
Andrea Continella
Assistant Professor at University of Twente
Verified email at utwente.nl - Homepage
Title
Cited by
Cited by
Year
Shieldfs: a self-healing, ransomware-aware filesystem
A Continella, A Guagnelli, G Zingaro, G De Pasquale, A Barenghi, ...
Proceedings of the 32nd annual conference on computer security applications …, 2016
2342016
Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis
Q Grundy, K Chiu, F Held, A Continella, L Bero, R Holz
bmj 364, 2019
1252019
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis
A Continella, Y Fratantonio, M Lindorfer, A Puccetti, A Zand, C Kruegel, ...
Network and Distributed System Security Symposium (NDSS), 2017
1052017
FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic
T van Ede, R Bortolameotti, A Continella, J Ren, DJ Dubois, M Lindorfer, ...
Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2020
612020
Measuring and defeating anti-instrumentation-equipped malware
M Polino, A Continella, S Mariani, S D’Alessio, L Fontana, F Gritti, ...
International Conference on Detection of Intrusions and Malware, and …, 2017
502017
KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
IEEE Symposium on Security & Privacy (S&P), 2020
432020
There's a hole in that bucket! a large-scale analysis of misconfigured s3 buckets
A Continella, M Polino, M Pogliani, S Zanero
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
252018
Prometheus: Analyzing WebInject-based information stealers
A Continella, M Carminati, M Polino, A Lanzi, S Zanero, F Maggi
Journal of Computer Security 25 (2), 117-137, 2017
212017
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities
N Marastoni, A Continella, D Quarta, S Zanero, M Dalla Preda
Software Security, Protection, and Reverse Engineering Workshop, 2017
202017
DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ...
IEEE Symposium on Security & Privacy (S&P), 2021
182021
Leakdoctor: Toward automatically diagnosing privacy leaks in mobile applications
X Wang, A Continella, Y Yang, Y He, S Zhu
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019
182019
Security evaluation of a banking fraud analysis system
M Carminati, M Polino, A Continella, A Lanzi, F Maggi, S Zanero
ACM Transactions on Privacy and Security (TOPS) 21 (3), 1-31, 2018
182018
Toward systematically exploring antivirus engines
D Quarta, F Salvioni, A Continella, S Zanero
International Conference on Detection of Intrusions and Malware, and …, 2018
122018
GASOLINE: a Cytoscape app for multiple local alignment of PPI networks
G Micale, A Continella, A Ferro, R Giugno, A Pulvirenti
F1000Research 3, 2014
122014
SYMBION: Interleaving Symbolic with Concrete Execution
F Gritti, L Fontana, E Gustafson, F Pagani, A Continella, C Kruegel, ...
Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2020
112020
Protection system and method for protecting a computer system against ransomware attacks
A Continella, S Zanero, F Maggi, A Guagnelli, G Zingaro, A Barenghi, ...
US Patent App. 15/368,465, 2018
82018
An i/o request packet (irp) driven effective ransomware detection scheme using artificial neural network
MA Ayub, A Continella, A Siraj
2020 IEEE 21st International Conference on Information Reuse and Integration …, 2020
72020
HeadPrint: Detecting Anomalous Communications through Header-based Application Fingerprinting
R Bortolameotti, T van Ede, A Continella, T Hupperich, M Everts, R Rafati, ...
ACM Symposium on Applied Computing (SAC), 2020
72020
A Systematical and longitudinal study of evasive behaviors in windows malware
N Galloro, M Polino, M Carminati, A Continella, S Zanero
Computers & Security 113, 102550, 2022
52022
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events
T van Ede, H Aghakhani, N Spahn, R Bortolameotti, M Cova, A Continella, ...
In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2022
52022
The system can't perform the operation now. Try again later.
Articles 1–20