Warning: pg_query(): Query failed: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 in /dati/webiit-old/includes/database.pgsql.inc on line 138 Warning: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 query: SELECT data, created, headers, expire, serialized FROM cache_page WHERE cid = 'https://www-old.iit.cnr.it/it/taxonomy/term/2142' in /dati/webiit-old/includes/database.pgsql.inc on line 159 Warning: pg_query(): Query failed: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 in /dati/webiit-old/includes/database.pgsql.inc on line 138 Warning: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 query: SELECT data, created, headers, expire, serialized FROM cache_page WHERE cid = 'https://www-old.iit.cnr.it/it/taxonomy/term/2142' in /dati/webiit-old/includes/database.pgsql.inc on line 159 Malware | IIT - CNR - Istituto di Informatica e Telematica
IIT Home Page CNR Home Page

Malware

Pubblicazioni e prodotti editoriali prima del 01/01/2016

Probabilistic Contract Compliance for Mobile Applications

Pubblicazioni e prodotti editoriali dal 01/01/2016

A Fuzzy-based Process Mining Approach for Dynamic Malware Detection

Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences

An Exploratory Study on the Evolution of Android Malware Quality

BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware

Formal Methods Meet Mobile Code Obfuscation

How long does it take before a new Internet node is contacted for the very first time?

Identifying Mobile Repackaged Applications through Formal Methods

LEILA: formaL tool for idEntifying mobIle maLicious behAviour

Machine Learning meets iOS Malware: Identifying Malicious Applications on Apple Environment

Madam: Effective and efficient behavior-based android malware detection and prevention

Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation

Model Checking for Mobile Android Malware Evolution

Phylogenetic Analysis for Ransomware Detection and Classification into Families

Risk analysis of Android applications: A user-centric solution

Risk analysis of Android applications: A user-centric solution.

R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware

Twinkle Twinkle Little DroidDream, How I Wonder What You Are?

Presentazioni e Demo

APT: MIRAI come caso di studio

MIRAI: la botnet responsabile del più grande attacco DDoS della storia di Internet