Danger theory and intrusion detection: Possibilities and limitations of the analogy M Vella, M Roper, S Terzis International Conference on Artificial Immune Systems, 276-289, 2010 | 16 | 2010 |
Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study M Vella, V Rudramurthy 2018 Federated Conference on Computer Science and Information Systems …, 2018 | 8 | 2018 |
EtherClue: Digital investigation of attacks on Ethereum smart contracts SJ Aquilina, F Casino, M Vella, J Ellul, C Patsakis Blockchain: Research and Applications 2 (4), 100028, 2021 | 7 | 2021 |
Reducing the Forensic Footprint with Android Accessibility Attacks Y Leguesse, M Vella, C Colombo, J Hernandez-Castro International Workshop on Security and Trust Management, 22-38, 2020 | 7 | 2020 |
Androneo: Hardening android malware sandboxes by predicting evasion heuristics Y Leguesse, M Vella, J Ellul Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018 | 7 | 2018 |
Wexpose: Towards on-line dynamic analysis of web attack payloads using just-in-time binary modification J Bellizzi, M Vella 2015 12th International Joint Conference on e-Business and …, 2015 | 6 | 2015 |
Using thumbnail affinity for fragmentation point detection of JPEG files B Birmingham, RA Farrugia, M Vella IEEE EUROCON 2017-17th International Conference on Smart Technologies, 3-8, 2017 | 5 | 2017 |
Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. C Colombo, M Vella ICISSP, 765-774, 2020 | 4 | 2020 |
RV-TEE: secure cryptographic protocol execution based on runtime verification M Vella, C Colombo, R Abela, P Špaček Journal of Computer Virology and Hacking Techniques 17 (3), 229-248, 2021 | 3 | 2021 |
PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone Y Leguesse, C Colombo, M Vella, J Hernandez-Castro IEEE Access 9, 168600-168612, 2021 | 2 | 2021 |
Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation J Bellizzi, M Vella, C Colombo, J Hernandez-Castro Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event …, 2021 | 2 | 2021 |
Enhancing Virtual Machine Introspection-Based Memory Analysis with Event Triggers M Muscat, M Vella 2018 IEEE International Conference on Cloud Computing Technology and Science …, 2018 | 2 | 2018 |
SUDUTA: Script UAF Detection Using Taint Analysis J Galea, M Vella International Workshop on Security and Trust Management, 136-151, 2015 | 2 | 2015 |
Achieving anomaly detection effectiveness beyond the symmetric error lower bound, in web-based systems M Vella, M Roper, S Terzis Unpublished, 2009 | 2 | 2009 |
Secure Implementation of a Quantum-Future GAKE Protocol R Abela, C Colombo, P Malo, P Sıs, T Fabšič, O Gallo, V Hromada, ... International Workshop on Security and Trust Management, 103-121, 2021 | 1 | 2021 |
Responding to Living-Off-the-Land Tactics using Just-in-Time Memory Forensics (JIT-MF) for Android J Bellizzi, M Vella, C Colombo, J Hernandez-Castro arXiv preprint arXiv:2105.05510, 2021 | 1 | 2021 |
SpotCheck: On-Device Anomaly Detection for Android M Vella, C Colombo 13th International Conference on Security of Information and Networks, 1-6, 2020 | 1 | 2020 |
Memory Forensics of Insecure Android Inter-app Communications. M Vella, R Cilia ICISSP, 481-486, 2017 | 1 | 2017 |
Characterization of a Danger Context for Detecting Novel Attacks Targeting Web-Based Systems M Vella, M Roper, S Terzis | 1 | 2010 |
Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps J Bellizzi, M Vella, C Colombo, J Hernandez-Castro IEEE Access 10, 35172-35218, 2022 | | 2022 |