Search


Current filters:

Start a new search
Add filters:

Use filters to refine the search results.


Results 1-10 of 10 (Search time: 0.008 seconds).
  • previous
  • 1
  • next
Item hits:
Issue DateTitleAuthor(s)
2022Responding to targeted stealthy attacks on android using timely-captured memory dumpsBellizzi, Jennifer; Vella, Mark Joseph; Colombo, Christian; Hernandez-Castro, Julio
2022D-Cloud-Collector : admissible forensic evidence from mobile cloud storageVella, Mark Joseph; Colombo, Christian
2022RV-TEE-based trustworthy secure shell deployment : an empirical evaluationCurmi, Axel; Colombo, Christian; Vella, Mark Joseph
2021RV-TEE : secure cryptographic protocol execution based on runtime verificationVella, Mark Joseph; Colombo, Christian; Abela, Robert; Špaček, Peter
2021Runtime verification for trustworthy secure shell deploymentCurmi, Axel; Colombo, Christian; Vella, Mark Joseph
2019Applying runtime verification to group key establishmentColombo, Christian; González Vasco, María Isabel; Vella, Mark Joseph; Zajac, Pavol
2021Responding to living-off-the-land tactics using just-in-time memory forensics (JIT-MF) for AndroidBellizzi, Jennifer; Vella, Mark Joseph; Colombo, Christian; Hernandez-Castro, Julio
2020Real-time triggering of Android memory dumps for stealthy attack investigationBellizzi, Jennifer; Vella, Mark Joseph; Colombo, Christian; Hernandez-Castro, Julio
2020Reducing the forensic footprint with Android accessibility attacksLeguesse, Yonas; Vella, Mark Joseph; Colombo, Christian; Hernandez-Castro, Julio
2021PoPL : proof-of-presence and locality, or how to secure financial transactions on your smartphoneLeguesse, Yonas; Colombo, Christian; Vella, Mark Joseph; Hernandez-Castro, Julio