• 310 Citations
  • 9 h-Index
20112020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 310 Citations
  • 9 h-Index
  • 13 Conference contribution
  • 5 Article
2020

StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications

Ahmad, M., Costamagna, V., Crispo, B., Bergadano, F. & Zhauniarovich, Y., Jan 2020, In : Journal of Systems and Software. 159, 110386.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2019

Sorting the Garbage: Filtering Out DRDoS Amplification Traffic in ISP Networks

Zhauniarovich, Y. & Dodia, P., Jun 2019, Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019. Jacquenet, C., De Turck, F., Chemouil, P., Esposito, F., Festor, O., Cerroni, W. & Secci, S. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 142-150 9 p. 8806653. (Proceedings of the 2019 IEEE Conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2018

A survey on malicious domains detection through DNS data analysis

Zhauniarovich, Y., Khalil, I., Yu, T. & Dacier, M., Jul 2018, In : ACM Computing Surveys. 51, 4, 3191329.

Research output: Contribution to journalArticle

17 Citations (Scopus)
2017

Please hold on: Unobtrusive user authentication using smartphone's built-in sensors

Buriro, A., Crispo, B. & Zhauniarovich, Y., 13 Jun 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2017. Institute of Electrical and Electronics Engineers Inc., 7947684. (2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Profiling DRDoS attacks with data analytics pipeline

Berti-Equille, L. & Zhauniarovich, Y., 6 Nov 2017, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1983-1986 4 p. (International Conference on Information and Knowledge Management, Proceedings; vol. Part F131841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2016

Evaluation of resource-based app repackaging detection in android

Gadyatskaya, O., Lezza, A. L. & Zhauniarovich, Y., 1 Jan 2016, Secure IT Systems - 21st Nordic Conference, NordSec 2016, Proceedings. Springer Verlag, p. 135-151 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10014 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Small changes, big changes: An updated view on the android permission system

Zhauniarovich, Y. & Gadyatskaya, O., 1 Jan 2016, Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, p. 346-367 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Visualization of actionable knowledge to mitigate DRDoS attacks

Aupetit, M., Zhauniarovich, Y., Vasiliadis, G., Dacier, M. & Boshmaf, Y., 8 Nov 2016, 2016 IEEE Symposium on Visualization for Cyber Security, VizSec 2016. Institute of Electrical and Electronics Engineers Inc., 7739577

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)
2015

Security of the android operating system

Zhauniarovich, Y., 1 Jan 2015, Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Revised Selected Papers. Springer Verlag, p. 272-274 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8924).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

StaDynA: Addressing the problem of dynamic code updates in the security analysis of android applications

Zhauniarovich, Y., Ahmad, M., Gadyatskaya, O., Crispo, B. & Massacci, F., 1 Jan 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 37-48 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

55 Citations (Scopus)

Towards black box testing of android apps

Zhauniarovich, Y., Philippov, A., Gadyatskaya, O., Crispo, B. & Massacci, F., 16 Oct 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. Institute of Electrical and Electronics Engineers Inc., p. 501-510 10 p. 7299958

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Citations (Scopus)
2014

FSquaDRA: Fast detection of repackaged applications

Zhauniarovich, Y., Gadyatskaya, O., Crispo, B., La Spina, F. & Moser, E., 1 Jan 2014, Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Proceedings. Springer Verlag, p. 130-145 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8566 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Citations (Scopus)

MOSES: Supporting and enforcing security profiles on smartphones

Zhauniarovich, Y., Russello, G., Conti, M., Crispo, B. & Fernandes, E., 1 Jan 2014, In : IEEE Transactions on Dependable and Secure Computing. 11, 3, p. 211-223 13 p., 2300482.

Research output: Contribution to journalArticle

34 Citations (Scopus)

Security in the Firefox OS and Tizen mobile platforms

Gadyatskaya, O., Massacci, F. & Zhauniarovich, Y., Jun 2014, Computer, 47, 6, p. 57-63 7 p.

Research output: Contribution to specialist publicationArticle

8 Citations (Scopus)
2013

Demo: Enabling trusted stores for Android

Zhauniarovich, Y., Gadyatskaya, O. & Crispo, B., 9 Dec 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1345-1347 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)
2012

CRêPE: A system for enforcing fine-grained context-related policies on android

Conti, M., Crispo, B., Fernandes, E. & Zhauniarovich, Y., 20 Sep 2012, In : IEEE Transactions on Information Forensics and Security. 7, 5, p. 1426-1438 13 p., 6215040.

Research output: Contribution to journalArticle

59 Citations (Scopus)

DEMO: Demonstrating the effectiveness of MOSES for separation of execution modes

Russello, G., Conti, M., Crispo, B., Fernandes, E. & Zhauniarovich, Y., 26 Nov 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 998-1000 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2011

YAASE: Yet another android security extension

Russello, G., Crispo, B., Fernandes, E. & Zhauniarovich, Y., 1 Dec 2011, Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011. p. 1033-1040 8 p. 6113256. (Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Citations (Scopus)