logo EDITE Davide BALZAROTTI
Identité
Davide BALZAROTTI
État académique
Thèse soutenue le 2006-01-01
Titulaire d'une HDR (ou équivalent) 2015-09-30
Laboratoire: personnel permanent
Direction de thèses (depuis 2007)
5
Voisinage
Ellipse bleue: doctorant, ellipse jaune: docteur, rectangle vert: permanent, rectangle jaune: HDR. Trait vert: encadrant de thèse, trait bleu: directeur de thèse, pointillé: jury d'évaluation à mi-parcours ou jury de thèse.
Productions scientifiques
Conference:Balduzzi-26/03/2012
A security analysis of amazon's elastic compute cloud service
A security analysis of amazon's elastic compute cloud service, SAC@SAC 2012, 11th edition of the Computer Security track at the 27th ACM Symposium on Applied Computing, March 26-30, 2012, Trento, Italy 26/03/2012
http://dx.doi.org/10.1007/978-3-642-22424-9_4
Reverse social engineering attacks in online social networks
Reverse social engineering attacks in online social networks, DIMVA 2011, 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 7-8th, 2011 Amsterdam, The Netherlands / Also published in "Lecture Notes in Computer Science", Vol 6739/2011 07/07/2011
Conference:Balduzzi-29/03/2011
Exposing the lack of privacy in file hosting services
Exposing the lack of privacy in file hosting services, LEET 2011, 4th Usenix Workshop on Large-Scale Exploits and Emergent Threats, March 29th, 2011, Boston, USA 29/03/2011
Conference:Balduzzi-06/02/2011
Automated discovery of parameter pollution vulnerabilities in web applications
Automated discovery of parameter pollution vulnerabilities in web applications, NDSS'11, 8th Annual Network and Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA 06/02/2011
http://dx.doi.org/10.1007/978-3-642-15512-3_22
Abusing social networks for automated user profiling
Abusing social networks for automated user profiling, RAID'2010, 13th International Symposium on Recent Advances in Intrusion Detection, September 15-17, 2010, Ottawa, Canada / Also published in "LNCS", Volume 6307/2010 15/09/2010
http://dx.doi.org/10.1007/978-88-470-1818-1_13
A summary of two practical attacks against social networks
A summary of two practical attacks against social networks, ITWDC'11, 21st International Tyrrhenian Workshop on Digital Communications: Trustworthy Internet, September 6-8, 2010, Island of Ponza, Italy / Also published as chapter book 13 of "Trustworthy internet", Springer, ISBN: 978-8847018174 06/09/2010
http://dx.doi.org/10.1145/1755688.1755706
A solution for the automated detection of clickjacking attacks
A solution for the automated detection of clickjacking attacks, AsiaCCS 2010, 5th Symposium on Information Computer and Communications Security, April 13-16, 2010, Beijing, China 13/04/2010
http://dx.doi.org/10.1145/1972551.1972556
Thwarting real-time dynamic unpacking
Thwarting real-time dynamic unpacking, EUROSEC 2011, 4th ACM European Workshop on System Security, April 10th, 2011, Salzburg, Austria 10/04/2011
http://dx.doi.org/10.1145/1920261.1920269
G-Free : defeating return-oriented programming through gadget-less binaries
G-Free : defeating return-oriented programming through gadget-less binaries, ACSAC'10, Annual Computer Security Applications Conference, December 6-10, 2010, Austin, Texas, USA 06/12/2010
http://dx.doi.org/10.1145/1526709.1526784
All your contacts are belong to us : automated identity theft attacks on social networks
All your contacts are belong to us : automated identity theft attacks on social networks, WWW'09, 18th International World Wide Web Conference, April 20-24, Madrid, Spain 20/04/2009