Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
Bursztein, Elie, Invernizzi, Luca, Král, Karel, Moghimi, Daniel, Picod, Jean-Michel, Zhang, Marina
Published in IACR transactions on cryptographic hardware and embedded systems (18.07.2024)
Published in IACR transactions on cryptographic hardware and embedded systems (18.07.2024)
Get full text
Journal Article
Cloak of Visibility: Detecting When Machines Browse a Different Web
Invernizzi, Luca, Thomas, Kurt, Kapravelos, Alexandros, Comanescu, Oxana, Picod, Jean-Michel, Bursztein, Elie
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Get full text
Conference Proceeding
Journal Article
The ams proteins and the amylovoran biosynthetic pathway: an extensive bioinformatic study
Carlini, Lavinia, Esposito, Alfonso, Ambrosino, Luca, Bharti, Sharda, Invernizzi, Luca Mauro, Piazza, Silvano, Benini, Stefano
Published in Journal of Plant Pathology (01.08.2024)
Published in Journal of Plant Pathology (01.08.2024)
Get full text
Journal Article
What the App is That? Deception and Countermeasures in the Android User Interface
Bianchi, Antonio, Corbetta, Jacopo, Invernizzi, Luca, Fratantonio, Yanick, Kruegel, Christopher, Vigna, Giovanni
Published in 2015 IEEE Symposium on Security and Privacy (01.05.2015)
Published in 2015 IEEE Symposium on Security and Privacy (01.05.2015)
Get full text
Conference Proceeding
Tracking Ransomware End-to-end
Huang, Danny Yuxing, Aliapoulios, Maxwell Matthaios, Li, Vector Guo, Invernizzi, Luca, Bursztein, Elie, McRoberts, Kylie, Levin, Jonathan, Levchenko, Kirill, Snoeren, Alex C., McCoy, Damon
Published in 2018 IEEE Symposium on Security and Privacy (SP) (01.05.2018)
Published in 2018 IEEE Symposium on Security and Privacy (SP) (01.05.2018)
Get full text
Conference Proceeding
EvilSeed: A Guided Approach to Finding Malicious Web Pages
Invernizzi, L., Comparetti, P. M., Benvenuti, S., Kruegel, C., Cova, M., Vigna, G.
Published in 2012 IEEE Symposium on Security and Privacy (01.05.2012)
Published in 2012 IEEE Symposium on Security and Privacy (01.05.2012)
Get full text
Conference Proceeding
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates
Liu, Enze, Kappos, George, Mugnier, Eric, Invernizzi, Luca, Savage, Stefan, Tao, David, Thomas, Kurt, Voelker, Geoffrey M, Meiklejohn, Sarah
Published in arXiv.org (16.09.2024)
Published in arXiv.org (16.09.2024)
Get full text
Paper
Journal Article
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
Bursztein, Elie, Invernizzi, Luca, Král, Karel, Moghimi, Daniel, Picod, Jean-Michel, Zhang, Marina
Year of Publication 12.06.2023
Year of Publication 12.06.2023
Get full text
Journal Article
Magika: AI-Powered Content-Type Detection
Fratantonio, Yanick, Invernizzi, Luca, Farah, Loua, Thomas, Kurt, Zhang, Marina, Albertini, Ange, Galilee, Francois, Metitieri, Giancarlo, Cretin, Julien, Petit-Bianco, Alex, Tao, David, Bursztein, Elie
Year of Publication 18.09.2024
Year of Publication 18.09.2024
Get full text
Journal Article
Geometric control for autonomous underwater vehicles: Overcoming a thruster failure
Andonian, M, Cazzaro, D, Invernizzi, L, Chyba, M, Grammatico, S
Published in 49th IEEE Conference on Decision and Control (CDC) (01.12.2010)
Published in 49th IEEE Conference on Decision and Control (CDC) (01.12.2010)
Get full text
Conference Proceeding