Browsing by Subject Malware (Computer software)

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 11 to 24 of 24 < previous 
Issue DateTitleAuthor(s)
2019Hooking Android apps for just-in-time memory dumpingBellizzi, Jennifer; Vella, Mark Joseph; Colombo, Christian
2023The impact of Android UI attacks on malware forensic footprintsBugeja, Manwel (2023)
2019Living off Android’s accessible landLeguesse, Yonas; Vella, Mark Joseph; Colombo, Christian
2020Memory forensics of QakbotBorg, Steve (2020)
2021PoPL : proof-of-presence and locality, or how to secure financial transactions on your smartphoneLeguesse, Yonas; Colombo, Christian; Vella, Mark Joseph; Hernandez-Castro, Julio
2017-07-23Ransomware taking digital data hostageKosciejew, Marc
2020Reducing the forensic footprint with Android accessibility attacksLeguesse, Yonas; Vella, Mark Joseph; Colombo, Christian; Hernandez-Castro, Julio
2019Responding to Ethereum web-application attacksSciberras, Franklyn Josef
2019Responding to PowerShell attacksSciberras, Neil
2023Responding to stealthy attacks on android using timely-captured memory dumpsBellizzi, Jennifer (2023)
2021Runtime verification for trustworthy secure shell deploymentCurmi, Axel; Colombo, Christian; Vella, Mark Joseph
2021RV-TEE : secure cryptographic protocol execution based on runtime verificationVella, Mark Joseph; Colombo, Christian; Abela, Robert; Špaček, Peter
2022RV-TEE-based trustworthy secure shell deployment : an empirical evaluationCurmi, Axel; Colombo, Christian; Vella, Mark Joseph
2020SpotCheck : on-device anomaly detection for AndroidMark Joseph; Colombo, Christian