Losiouk, Eleonora

Losiouk, Eleonora  

Dipartimento di Matematica "Tullio Levi-Civita" - DM  

Mostra records
Risultati 1 - 20 di 48 (tempo di esecuzione: 0.042 secondi).
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
A Dataset for Evaluating LLMs Vulnerability Repair Performance in Android Applications: Data/Toolset paper 2025 Braconaro E.Losiouk E. - - Codaspy 2025 Proceedings of the 15th ACM Conference on Data and Application Security and Privacy
Hercules Droidot and the murder on the JNI Express 2025 Samuele DoriaEleonora Losiouk + - - Proceedings of the 34th USENIX Security Symposium
Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities 2025 Simeone PizziSamuele DoriaMauro ContiEleonora Losiouk + - - Proceedings of the 22nd International Conference, DIMVA 2025
VirtualPatch: Distributing Android security patches through Android virtualization 2025 Pizzi S.Doria S.Miazzo N.Losiouk E. COMPUTERS & SECURITY - -
R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android 2024 Zerbini S.Doria S.Losiouk E. + - - Proceedings - Annual Computer Security Applications Conference, ACSAC
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution 2023 Mauro ContiMonica FedeliEleonora Losiouk + JOURNAL OF CYBERSECURITY EDUCATION, RESEARCH & PRACTICE - -
Beware of Pickpockets: A Practical Attack against Blocking Cards 2023 Alessandro BrighenteMauro ContiEleonora Losiouk + - - Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2023)
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem 2023 Casagrande, MarcoLosiouk, EleonoraConti, Mauro + - - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '23)
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks 2023 Conti, MLosiouk, E + - - Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey 2023 Conti, MauroLosiouk, Eleonora + IEEE COMMUNICATIONS SURVEYS AND TUTORIALS - -
The Security of Wireless Communication Protocols Used in Mobile Health Systems 2023 Eleonora Losiouk - - Women in Telecommunications
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics 2023 Losiouk, EleonoraConti, Mauro + JOURNAL OF CYBERSECURITY AND PRIVACY - -
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem 2022 Eleonora LosioukMauro Conti + IACR TRANSACTIONS ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - -
Face Recognition Systems: Are you sure they only consider your face? 2022 Conti M.Losiouk E. + - - Proceedings - 43rd IEEE Symposium on Security and Privacy Workshops, SPW 2022
HolA: Holistic and Autonomous Attestation for IoT Networks 2022 Alessandro VisintinEleonora LosioukMauro Conti + - - Applied Cryptography and Network Security Workshops
Sim2Testbed Transfer: NDN Performance Evaluation 2022 Conti M.Losiouk E. + - - ACM International Conference Proceeding Series
What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels 2022 Conti M.Losiouk E.Visintin A. - - Proceedings of the ACM Symposium on Applied Computing
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN 2021 Losiouk E.Compagno A.Conti M. + INTERNATIONAL JOURNAL OF INFORMATION SECURITY - -
Contact Tracing Made Un-relay-able 2021 Casagrande M.Conti M.Losiouk E. - - CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps 2021 Losiouk E.Conti M. + INTERNATIONAL JOURNAL OF INFORMATION SECURITY - -