Mark Vella
Cited by
Cited by
Danger theory and intrusion detection: Possibilities and limitations of the analogy
M Vella, M Roper, S Terzis
International Conference on Artificial Immune Systems, 276-289, 2010
Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study
M Vella, V Rudramurthy
2018 Federated Conference on Computer Science and Information Systems …, 2018
EtherClue: Digital investigation of attacks on Ethereum smart contracts
SJ Aquilina, F Casino, M Vella, J Ellul, C Patsakis
Blockchain: Research and Applications 2 (4), 100028, 2021
Reducing the Forensic Footprint with Android Accessibility Attacks
Y Leguesse, M Vella, C Colombo, J Hernandez-Castro
International Workshop on Security and Trust Management, 22-38, 2020
Androneo: Hardening android malware sandboxes by predicting evasion heuristics
Y Leguesse, M Vella, J Ellul
Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018
Wexpose: Towards on-line dynamic analysis of web attack payloads using just-in-time binary modification
J Bellizzi, M Vella
2015 12th International Joint Conference on e-Business and …, 2015
Using thumbnail affinity for fragmentation point detection of JPEG files
B Birmingham, RA Farrugia, M Vella
IEEE EUROCON 2017-17th International Conference on Smart Technologies, 3-8, 2017
Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification.
C Colombo, M Vella
ICISSP, 765-774, 2020
RV-TEE: secure cryptographic protocol execution based on runtime verification
M Vella, C Colombo, R Abela, P Špaček
Journal of Computer Virology and Hacking Techniques 17 (3), 229-248, 2021
PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone
Y Leguesse, C Colombo, M Vella, J Hernandez-Castro
IEEE Access 9, 168600-168612, 2021
Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation
J Bellizzi, M Vella, C Colombo, J Hernandez-Castro
Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event …, 2021
Enhancing Virtual Machine Introspection-Based Memory Analysis with Event Triggers
M Muscat, M Vella
2018 IEEE International Conference on Cloud Computing Technology and Science …, 2018
SUDUTA: Script UAF Detection Using Taint Analysis
J Galea, M Vella
International Workshop on Security and Trust Management, 136-151, 2015
Achieving anomaly detection effectiveness beyond the symmetric error lower bound, in web-based systems
M Vella, M Roper, S Terzis
Unpublished, 2009
Secure Implementation of a Quantum-Future GAKE Protocol
R Abela, C Colombo, P Malo, P Sıs, T Fabšič, O Gallo, V Hromada, ...
International Workshop on Security and Trust Management, 103-121, 2021
Responding to Living-Off-the-Land Tactics using Just-in-Time Memory Forensics (JIT-MF) for Android
J Bellizzi, M Vella, C Colombo, J Hernandez-Castro
arXiv preprint arXiv:2105.05510, 2021
SpotCheck: On-Device Anomaly Detection for Android
M Vella, C Colombo
13th International Conference on Security of Information and Networks, 1-6, 2020
Memory Forensics of Insecure Android Inter-app Communications.
M Vella, R Cilia
ICISSP, 481-486, 2017
Characterization of a Danger Context for Detecting Novel Attacks Targeting Web-Based Systems
M Vella, M Roper, S Terzis
Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps
J Bellizzi, M Vella, C Colombo, J Hernandez-Castro
IEEE Access 10, 35172-35218, 2022
The system can't perform the operation now. Try again later.
Articles 1–20