Follow
Paolo Milani Comparetti
Paolo Milani Comparetti
Postdoc at International Secure Systems Lab
Verified email at seclab.tuwien.ac.at
Title
Cited by
Cited by
Year
Scalable, behavior-based malware clustering
U Bayer, P Milani Comparetti, C Hlauschek, C Kruegel, E Kirda
Network and Distributed System Security Symposium (NDSS), 2009
9842009
Effective and efficient malware detection at the end host
C Kolbitsch, P Milani Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang
Proceedings of the 18th USENIX security symposium, 351-366, 2009
7282009
Detecting environment-sensitive malware
M Lindorfer, C Kolbitsch, P Milani Comparetti
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
5532011
Prospex: Protocol specification extraction
P Milani Comparetti, G Wondracek, C Kruegel, E Kirda
Security and Privacy, 2009 30th IEEE Symposium on, 110-125, 2009
434*2009
Automatic network protocol analysis
G Wondracek, P Milani Comparetti, C Kruegel, E Kirda
15th Symposium on Network and Distributed System Security (NDSS), 2008
3202008
EVILSEED: A Guided Approach to Finding Malicious Web Pages
L Invernizzi, UC Santa Barbara, S Benvenuti, M Cova, ...
Security and Privacy (SP), 2011 IEEE Symposium on, 2012
2652012
Identifying dormant functionality in malware programs
P Milani Comparetti, G Salvaneschi, E Kirda, C Kolbitsch, C Kruegel, ...
Security and Privacy (SP), 2010 IEEE Symposium on, 61-76, 2010
163*2010
A static, packer-agnostic filter to detect similar malware samples
G Jacob, M Neugschwandtner, P Milani Comparetti, C Kruegel, G Vigna
Department of Computer Science University of California Santa Barbara …, 2010
1092010
Lines of Malicious Code: Insights Into the Malicious Software Industry
M Lindorfer, A Di Federico, F Maggi, P Milani Comparetti, S Zanero
952012
The borg: Nanoprobing binaries for buffer overreads
M Neugschwandtner, P Milani Comparetti, I Haller, H Bos
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
762015
FORECAST: skimming off the malware cream
M Neugschwandtner, P Milani Comparetti, G Jacob, C Kruegel
Proceedings of the 27th Annual Computer Security Applications Conference, 11-20, 2011
442011
Detecting malware's failover C&C strategies with squeeze
M Neugschwandtner, P Milani Comparetti, C Platzer
Proceedings of the 27th Annual Computer Security Applications Conference, 21-30, 2011
392011
dAnubis–dynamic device driver analysis based on virtual machine introspection
M Neugschwandtner, C Platzer, P Milani Comparetti, U Bayer
Detection of Intrusions and Malware, and Vulnerability Assessment, 41-60, 2010
302010
Methods and systems for reciprocal generation of watch-lists and malware signatures
C Kolbitsch, PM Comparetti, L Cavedon
US Patent 8,910,285, 2014
272014
Methods and systems for malware detection based on environment-dependent behavior
C Kolbitsch, PM Comparetti, L Cavedon
US Patent 9,361,459, 2016
192016
Lobotomy: An architecture for jit spraying mitigation
M Jauernig, M Neugschwandtner, C Platzer, PM Comparetti
2014 Ninth International Conference on Availability, Reliability and …, 2014
112014
ForeCast
M Neugschwandtner, PM Comparetti, G Jacob, C Kruegel
Proceedings of the 27th Annual Computer Security Applications Conference on …, 2011
2011
dAnubis
U Bayer, P Milani Comparetti, M Neugschwandtner, C Platzer
DIMVA 2010, July 8-9, 2010, Paris, France, 2010
2010
Reference clustering
P Milani Comparetti
2010
Effective and Efficient Malware Detection at the End Host
P Milani Comparetti, C Kolbitsch, E Kirda, C Krügel, Z Xiaoyong, ...
usenix 2009, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–20