Danger theory and intrusion detection: Possibilities and limitations of the analogy M Vella, M Roper, S Terzis International Conference on Artificial Immune Systems, 276-289, 2010 | 17 | 2010 |
Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study M Vella, V Rudramurthy 2018 Federated Conference on Computer Science and Information Systems …, 2018 | 4 | 2018 |
Wexpose: Towards on-line dynamic analysis of web attack payloads using just-in-time binary modification J Bellizzi, M Vella 2015 12th International Joint Conference on e-Business and …, 2015 | 4 | 2015 |
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics Y Leguesse, M Vella, J Ellul IFIP International Conference on Information Security Theory and Practice …, 2017 | 3 | 2017 |
Using thumbnail affinity for fragmentation point detection of JPEG files B Birmingham, RA Farrugia, M Vella IEEE EUROCON 2017-17th International Conference on Smart Technologies, 3-8, 2017 | 2 | 2017 |
Achieving anomaly detection effectiveness beyond the symmetric error lower bound, in web-based systems M Vella, M Roper, S Terzis Unpublished, 2009 | 2 | 2009 |
Enhancing Virtual Machine Introspection-Based Memory Analysis with Event Triggers M Muscat, M Vella 2018 IEEE International Conference on Cloud Computing Technology and Science …, 2018 | 1 | 2018 |
Memory Forensics of Insecure Android Inter-app Communications. M Vella, R Cilia ICISSP, 481-486, 2017 | 1 | 2017 |
SUDUTA: Script UAF Detection Using Taint Analysis J Galea, M Vella International Workshop on Security and Trust Management, 136-151, 2015 | 1 | 2015 |
Characterization of a Danger Context for Detecting Novel Attacks Targeting Web-Based Systems M Vella, M Roper, S Terzis | 1 | 2010 |
Reducing the Forensic Footprint with Android Accessibility Attacks Y Leguesse, M Vella, C Colombo, J Hernandez-Castro International Workshop on Security and Trust Management, 22-38, 2020 | | 2020 |
Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. C Colombo, M Vella ICISSP, 765-774, 2020 | | 2020 |
Hooking Android apps for just-in-time memory dumping J Bellizzi, M Vella, C Colombo Computer Science Annual Workshop, 15, 2019 | | 2019 |
Living off Android’s Accessible Land Y Leguesse, MJ Vella, C Colombo Computer Science Annual Workshop, 16, 2019 | | 2019 |
Script Fuzzing with an Attacker’s Mind-Set J Galea, M Vella Trust and Trustworthy Computing: 8th International Conference, TRUST 2015 …, 2015 | | 2015 |
Using dynamic binary analysis for tracking pointer data J Galea, M Vella University of Malta. Faculty of ICT, 2014 | | 2014 |
Challenges faced when forcing malware execution down hidden paths J Gatt, M Vella, M Micallef University of Malta. Faculty of ICT, 2014 | | 2014 |
Cloud and mobile security assurance: a memory forensics approach M Vella University of Malta. Faculty of ICT, 2014 | | 2014 |
Detecting web server take-over attacks through objective verification actions M Vella, S Terzis University of Malta. Faculty of ICT, 2013 | | 2013 |
Towards a tunable, sandbox-independent approach for exploring hidden behavior in malware J Gatt, M Vella, M Micallef University of Malta. Faculty of ICT, 2013 | | 2013 |