Antonio Bianchi
Antonio Bianchi
Assistant Professor, Purdue University
Verified email at - Homepage
Cited by
Cited by
Execute this! analyzing unsafe and malicious dynamic code loading in android applications.
S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna
NDSS 14, 23-26, 2014
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
Triggerscope: Towards detecting logic bombs in android applications
Y Fratantonio, A Bianchi, W Robertson, E Kirda, C Kruegel, G Vigna
2016 IEEE symposium on security and privacy (SP), 377-396, 2016
What the App is That? Deception and Countermeasures in the Android User Interface
A Bianchi, J Corbetta, L Invernizzi, Y Fratantonio, C Kruegel, G Vigna
Security and Privacy (SP), 2015 IEEE Symposium on, 931-948, 2015
Ramblr: Making Reassembly Great Again.
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
NDSS, 2017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
VM Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, PL de Geus, ...
NDSS, 2016
Baredroid: Large-scale analysis of android apps on real devices
S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015
{HeapHopper}: Bringing bounded model checking to heap implementation security
M Eckert, A Bianchi, R Wang, Y Shoshitaishvili, C Kruegel, G Vigna
27th USENIX Security Symposium (USENIX Security 18), 99-116, 2018
{BootStomp}: On the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017
DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ...
Njas: Sandboxing unmodified applications in non-rooted devices running stock android
A Bianchi, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
Blacksheep: Detecting compromised hosts in homogeneous crowds
A Bianchi, Y Shoshitaishvili, C Kruegel, G Vigna
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
{BLESA}: Spoofing attacks against reconnections in bluetooth low energy
J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu
14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020
Broken Fingers: On the Usage of the Fingerprint API in Android.
A Bianchi, Y Fratantonio, A Machiry, C Kruegel, G Vigna, SPH Chung, ...
NDSS, 2018
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles
H Kim, MO Ozmen, A Bianchi, ZB Celik, D Xu
Clapp: Characterizing loops in android applications
Y Fratantonio, A Machiry, A Bianchi, C Kruegel, G Vigna
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
{LIGHTBLUE}: Automatic {Profile-Aware} Debloating of Bluetooth Stacks
J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu, DJ Tian, ...
30th USENIX Security Symposium (USENIX Security 21), 339-356, 2021
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
{M2MON}: Building an {MMIO-based} security reference monitor for unmanned vehicles
A Khan, H Kim, B Lee, D Xu, A Bianchi, DJ Tian
30th USENIX Security Symposium (USENIX Security 21), 285-302, 2021
The system can't perform the operation now. Try again later.
Articles 1–20