Mark Vella
Título
Citado por
Citado por
Ano
Danger theory and intrusion detection: Possibilities and limitations of the analogy
M Vella, M Roper, S Terzis
International Conference on Artificial Immune Systems, 276-289, 2010
172010
Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study
M Vella, V Rudramurthy
2018 Federated Conference on Computer Science and Information Systems …, 2018
42018
Wexpose: Towards on-line dynamic analysis of web attack payloads using just-in-time binary modification
J Bellizzi, M Vella
2015 12th International Joint Conference on e-Business and …, 2015
42015
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics
Y Leguesse, M Vella, J Ellul
IFIP International Conference on Information Security Theory and Practice …, 2017
32017
Using thumbnail affinity for fragmentation point detection of JPEG files
B Birmingham, RA Farrugia, M Vella
IEEE EUROCON 2017-17th International Conference on Smart Technologies, 3-8, 2017
22017
Achieving anomaly detection effectiveness beyond the symmetric error lower bound, in web-based systems
M Vella, M Roper, S Terzis
Unpublished, 2009
22009
Enhancing Virtual Machine Introspection-Based Memory Analysis with Event Triggers
M Muscat, M Vella
2018 IEEE International Conference on Cloud Computing Technology and Science …, 2018
12018
Memory Forensics of Insecure Android Inter-app Communications.
M Vella, R Cilia
ICISSP, 481-486, 2017
12017
SUDUTA: Script UAF Detection Using Taint Analysis
J Galea, M Vella
International Workshop on Security and Trust Management, 136-151, 2015
12015
Characterization of a Danger Context for Detecting Novel Attacks Targeting Web-Based Systems
M Vella, M Roper, S Terzis
12010
Reducing the Forensic Footprint with Android Accessibility Attacks
Y Leguesse, M Vella, C Colombo, J Hernandez-Castro
International Workshop on Security and Trust Management, 22-38, 2020
2020
Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification.
C Colombo, M Vella
ICISSP, 765-774, 2020
2020
Hooking Android apps for just-in-time memory dumping
J Bellizzi, M Vella, C Colombo
Computer Science Annual Workshop, 15, 2019
2019
Living off Android’s Accessible Land
Y Leguesse, MJ Vella, C Colombo
Computer Science Annual Workshop, 16, 2019
2019
Script Fuzzing with an Attacker’s Mind-Set
J Galea, M Vella
Trust and Trustworthy Computing: 8th International Conference, TRUST 2015 …, 2015
2015
Using dynamic binary analysis for tracking pointer data
J Galea, M Vella
University of Malta. Faculty of ICT, 2014
2014
Challenges faced when forcing malware execution down hidden paths
J Gatt, M Vella, M Micallef
University of Malta. Faculty of ICT, 2014
2014
Cloud and mobile security assurance: a memory forensics approach
M Vella
University of Malta. Faculty of ICT, 2014
2014
Detecting web server take-over attacks through objective verification actions
M Vella, S Terzis
University of Malta. Faculty of ICT, 2013
2013
Towards a tunable, sandbox-independent approach for exploring hidden behavior in malware
J Gatt, M Vella, M Micallef
University of Malta. Faculty of ICT, 2013
2013
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20