Publications

[42]
How Machine Learning Is Solving the Binary Function Similarity Problem Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti. In Proceedings of the USENIX Security Symposium (SEC), 2022. [PDF] [BibTeX]
[41]
RE-Mind: a First Look Inside the Mind of a Reverse Engineer Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Balzarotti. In Proceedings of the USENIX Security Symposium (SEC), 2022. [PDF] [BibTeX]
[40]
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs Jayakrishna Menon Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupe, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili. In Proceedings of the USENIX Security Symposium (SEC), 2022. [PDF] [BibTeX]
[39]
Lost in the Loader: The Many Faces of the Windows PE File Format Dario Nisi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti. In Black Hat Europe, 2021. [PDF] [BibTeX] [GitHub]
[38]
Lost in the Loader: The Many Faces of the Windows PE File Format Dario Nisi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti. In Proceedings of the Symposium on Recent Advances in Intrusion Detection (RAID), 2021. [PDF] [BibTeX] [GitHub]
[37]
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization Andrea Possemato, Simone Aonzo, Davide Balzarotti, Yanick Fratantonio. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2021. [PDF] [BibTeX]
[36]
Preventing and Detecting State Inference Attacks on Android Andrea Possemato, Dario Nisi, Yanick Fratantonio. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2021. [PDF] [BibTeX]
[35]
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices Zeyu Lei, Yuhong Nan, Yanick Fratantonio, Antonio Bianchi. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2021. [PDF] [BibTeX]
[34]
Towards HTTPS Everywhere on Android: We Are Not There Yet Andrea Possemato, Yanick Fratantonio. In Proceedings of the USENIX Security Symposium (SEC), 2020. [PDF] [BibTeX]
[33]
Exploring Syscall-Based Semantics Reconstruction of Android Applications Dario Nisi, Antonio Bianchi, Yanick Fratantonio. In Proceedings of the Symposium on Recent Advances in Intrusion Detection (RAID), 2019. [PDF] [BibTeX]
[32]
Toward the Analysis of Embedded Firmware through Automated Re-hosting Eric Gustafson, Marius Muench, Chad Spensky, Nilo Redini, Aravind Machiry, Yanick Fratantonio, Davide Balzarotti, Aurelien Francillon, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna. In Proceedings of the Symposium on Recent Advances in Intrusion Detection (RAID), 2019. [PDF] [BibTeX]
[31]
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations Aravind Machiry, Nilo Redini, Eric Gustafson, Yanick Fratantonio, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2018. [PDF] [BibTeX]
[30]
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android Andrea Possemato, Andrea Lanzi, Pak Chung, Wenke Lee, Yanick Fratantonio. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2018. [PDF] [BibTeX]
[29]
Phishing Attacks on Modern Android Simone Aonzo, Alessio Merlo, Giulio Tavella, Yanick Fratantonio. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2018. [PDF] [BibTeX] [Project Website]
[28]
GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi. In Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2018. [PDF] [BibTeX] [Project Website] [GitHub]
[Press: SlashDot, Ars Technica, Threat Post, Others]
[27]
Understanding Linux Malware Emanuele Cozzi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2018. [PDF] [BibTeX]
[26]
Broken Fingers: On the Usage of the Fingerprint API in Android Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Pak Chung, Wenke Lee. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2018. [PDF] [BibTeX]
[25]
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2017. [PDF] [BibTeX]
[24]
BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna. In Proceedings of the USENIX Security Symposium (SEC), 2017. [PDF] [BibTeX] [GitHub]
[Press: SlashDot, The Hacker News, Bleeping Computer, Others]
[23]
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Yanick Fratantonio, Chenxiong Qian, Pak Chung, Wenke Lee. In Black Hat USA, 2017. [PDF] [BibTeX] [Website & Demos] [Slides] [Talk]
[22]
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Yanick Fratantonio, Chenxiong Qian, Pak Chung, Wenke Lee. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2017. [PDF] [BibTeX] [Website & Demos] [Slides] [Talk]
[Press: NewsWeek, TechCrunch, The Register, Others]
[21]
On the Privacy and Security of the Ultrasound Ecosystem Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Giovanni Vigna, Christopher Kruegel. In Proceedings of the Privacy Enhancing Technologies Symposium (PETS), 2017. [PDF] [BibTeX] [Project Website]
[Press: SlashDot, Fortune, WIRED, Others]
[20]
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, Giovanni Vigna. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2017. [PDF] [BibTeX] [GitHub]
[19]
Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-device Tracking Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Giovanni Vigna, Christopher Kruegel. In Black Hat Europe, 2016. [BibTeX] [Project Website] [Slides]
[Press: SlashDot, Fortune, WIRED, Others]
[18]
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clementine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2016. [PDF] [BibTeX] [Project Website]
[Press: SlashDot, WIRED, Ars Technica, Others]
[17]
TriggerScope: Towards Detecting Logic Bombs in Android Apps Yanick Fratantonio, Antonio Bianchi, William Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2016. [PDF] [BibTeX] [Slides] [Talk]
[16]
RETracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, Vasileios Kemerlis. In Proceedings of the International Conference on Software Engineering (ICSE), 2016. [PDF] [BibTeX]
[15]
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy Vitor Afonso, Antonio Bianchi, Yanick Fratantonio, Adam Doupe, Mario Polino, Paulo de Geus, Christopher Kruegel, Giovanni Vigna. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2016. [PDF] [BibTeX]
[14]
Grab'n Run: Secure and Practical Dynamic Code Loading for Android Applications Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2015. [PDF] [BibTeX] [GitHub]
[13]
BareDroid: Large-Scale Analysis of Android Apps on Real Devices Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2015. [PDF] [BibTeX] [GitHub]
[12]
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running Stock Android Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna. In Proceedings of the ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2015. [PDF] [BibTeX]
[11]
CLAPP: Characterizing Loops in Android Applications Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna. In Proceedings of the ACM Symposium on the Foundations of Software Engineering (FSE), 2015. [PDF] [BibTeX]
[10]
CLAPP: Characterizing Loops in Android Applications (Invited Talk) Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna. In Proceedings of International Workshop on Software Development Lifecycle for Mobile (DeMobile), 2015. [PDF] [BibTeX]
[9]
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users Yanick Fratantonio, Antonio Bianchi, William Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna. In Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2015. [PDF] [BibTeX]
[8]
What the App is That? Deception and Countermeasures in the Android User Interface Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2015. [PDF] [BibTeX] [GitHub]
[7]
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2015. [PDF] [BibTeX]
[6]
Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor van der Veen, Christian Platzer. In Proceedings of the International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014. [PDF] [BibTeX]
[5]
Ten Years of iCTF: The Good, The Bad, and The Ugly Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupe, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, Yan Shoshitaishvili. In Proceedings of the USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE), 2014. [PDF] [BibTeX] [Project Website]
[4]
Andrubis: Android Malware Under The Magnifying Glass Lukas Weichselbaum, Matthias Neugschwandtner, Martina Lindorfer, Yanick Fratantonio, Victor van der Veen, Christian Platzer. In Technical Report TR-ISECLAB-0414-001, 2014. [PDF] [BibTeX]
[3]
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2014. [PDF] [BibTeX]
[2]
An Empirical Study of Cryptographic Misuse in Android Applications Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2013. [PDF] [BibTeX]
[1]
Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna. In Proceedings of the Symposium on Recent Advances in Intrusion Detection (RAID), 2011. [PDF] [BibTeX]