Dr Mark Joseph Vella

Dr Mark Joseph Vella

Dr Mark Joseph Vella

 B.Sc.I.T.(Hons),M.Sc.,Ph.D.(Strath.)

Senior Lecturer

Level 1, Block B
Room 4
ICT Building
Msida
  +356 2340 2254
__Biography
  • Binary code analysis for:
  • Intrusion detection
  • Malware analysis
  • Memory Forensics-based Incident Response
  • Software vulnerability detection

Bellizzi, J. & Vella, M. 2015, "WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification", SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015., pp. 5.

Buttigieg, J., Colombo, C. & Vella, M. 2015, "BYOD for Android - Just add Java", Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, ProceedingsSpringer, , pp. 315.

Galea, J. & Vella, M. 2015, "Script Fuzzing with an Attacker's Mind-Set", Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, ProceedingsSpringer, , pp. 317.

Galea, J. & Vella, M. 2015, "SUDUTA: Script UAF Detection Using Taint Analysis" in Security and Trust Management Springer, , pp. 136-151.

Vella, M., Terzis, S. & Roper, M. 2012, "Distress Detection", RAID, pp. 384.

Vella, M., Roper, M. & Terzis, S. 2010, "Danger Theory and Intrusion Detection: Possibilities and Limitations of the Analogy" in Artificial Immune Systems, eds. E. Hart, C. McEwan, J. Timmis & A. Hone, Springer Berlin / Heidelberg, , pp. 276-289.

Cachia, E. & Vella, M. 2007, "Using Weak Bisimulation for Enterprise Integration Architecture Formal Verification--I", Engineering of Computer-Based Systems, IEEE International Conference on the, vol. 0, pp. 63-70.

__Other

https://www.um.edu.mt/_templates/staffprofiles