Picture for Enrico Mariconti

Enrico Mariconti

Cerberus: Exploring Federated Prediction of Security Events

Add code
Sep 07, 2022
Figure 1 for Cerberus: Exploring Federated Prediction of Security Events
Figure 2 for Cerberus: Exploring Federated Prediction of Security Events
Figure 3 for Cerberus: Exploring Federated Prediction of Security Events
Figure 4 for Cerberus: Exploring Federated Prediction of Security Events
Viaarxiv icon

MaMaDroid2.0 -- The Holes of Control Flow Graphs

Add code
Feb 28, 2022
Figure 1 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 2 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 3 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 4 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Viaarxiv icon

Tiresias: Predicting Security Events Through Deep Learning

Add code
May 24, 2019
Figure 1 for Tiresias: Predicting Security Events Through Deep Learning
Figure 2 for Tiresias: Predicting Security Events Through Deep Learning
Figure 3 for Tiresias: Predicting Security Events Through Deep Learning
Figure 4 for Tiresias: Predicting Security Events Through Deep Learning
Viaarxiv icon

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)

Add code
Nov 20, 2017
Figure 1 for MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
Figure 2 for MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
Figure 3 for MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
Figure 4 for MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
Viaarxiv icon