Davide Maiorca
Davide Maiorca
Assistant Professor of Computer Engineering at University of Cagliari, Italy
Verified email at
Cited by
Cited by
Evasion attacks against machine learning at test time
B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ...
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2013
Adversarial malware binaries: Evading deep learning for malware detection in executables
B Kolosnjaji, A Demontis, B Biggio, D Maiorca, G Giacinto, C Eckert, ...
2018 26th European signal processing conference (EUSIPCO), 533-537, 2018
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ...
IEEE Transactions on Dependable and Secure Computing, 2017
Stealth attacks: An extended insight into the obfuscation effects on android malware
D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto
Computers & Security 51, 16-31, 2015
A pattern recognition system for malicious pdf files detection
D Maiorca, G Giacinto, I Corona
International workshop on machine learning and data mining in pattern …, 2012
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection
D Maiorca, I Corona, G Giacinto
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
R-PackDroid: API package-based characterization and detection of mobile ransomware
D Maiorca, F Mercaldo, G Giacinto, CA Visaggio, F Martinelli
Proceedings of the symposium on applied computing, 1718-1723, 2017
Security evaluation of support vector machines in adversarial environments
B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ...
Support vector machines applications, 105-153, 2014
On the effectiveness of system API-related information for Android ransomware detection
M Scalas, D Maiorca, F Mercaldo, CA Visaggio, F Martinelli, G Giacinto
Computers & Security 86, 168-182, 2019
Towards adversarial malware detection: Lessons learned from PDF-based attacks
D Maiorca, B Biggio, G Giacinto
ACM Computing Surveys (CSUR) 52 (4), 1-36, 2019
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references
I Corona, D Maiorca, D Ariu, G Giacinto
Proceedings of the 2014 workshop on artificial intelligent and security …, 2014
On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms?
T Hupperich, D Maiorca, M Kührer, T Holz, G Giacinto
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
Explaining black-box android malware detection
M Melis, D Maiorca, B Biggio, G Giacinto, F Roli
2018 26th european signal processing conference (EUSIPCO), 524-528, 2018
A structural and content-based approach for a precise and robust detection of malicious pdf files
D Maiorca, D Ariu, I Corona, G Giacinto
Proceedings of the 1st International Conference on Information Systems …, 2015
Clustering Android Malware Families by Http Traffic
M Aresu, D Ariu, M Ahmadi, D Maiorca, G Giacinto
Digital investigation of pdf files: Unveiling traces of embedded malware
D Maiorca, B Biggio
IEEE Security & Privacy 17 (1), 63-71, 2019
PowerDrive: accurate de-obfuscation and analysis of PowerShell malware
D Ugarte, D Maiorca, F Cara, G Giacinto
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
Do gradient-based explanations tell anything about adversarial robustness to android malware?
M Melis, M Scalas, A Demontis, D Maiorca, B Biggio, G Giacinto, F Roli
International journal of machine learning and cybernetics, 1-16, 2022
Evaluating analysis tools for android apps: Status quo and robustness against obfuscation
J Hoffmann, T Rytilahti, D Maiorca, M Winandy, G Giacinto, T Holz
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
Adversarial detection of flash malware: Limitations and open issues
D Maiorca, A Demontis, B Biggio, F Roli, G Giacinto
Computers & Security 96, 101901, 2020
The system can't perform the operation now. Try again later.
Articles 1–20