default search action
Marco Cova
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c27]Thijs van Ede, Hojjat Aghakhani, Noah Spahn, Riccardo Bortolameotti, Marco Cova, Andrea Continella, Maarten van Steen, Andreas Peter, Christopher Kruegel, Giovanni Vigna:
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events. SP 2022: 522-539
2010 – 2019
- 2014
- [i1]Joseph Gardiner, Marco Cova, Shishir Nagaraja:
Command & Control: Understanding, Denying and Detecting. CoRR abs/1408.1136 (2014) - 2013
- [c26]Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware. USENIX Security Symposium 2013: 637-652 - 2012
- [c25]Tom Chothia, Marco Cova, Chris Novakovic, Camilo González Toro:
The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent. SecureComm 2012: 185-202 - [c24]Luca Invernizzi, Paolo Milani Comparetti, Stefano Benvenuti, Christopher Kruegel, Marco Cova, Giovanni Vigna:
EvilSeed: A Guided Approach to Finding Malicious Web Pages. IEEE Symposium on Security and Privacy 2012: 428-442 - [e1]Davide Balzarotti, Salvatore J. Stolfo, Marco Cova:
Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings. Lecture Notes in Computer Science 7462, Springer 2012, ISBN 978-3-642-33337-8 [contents] - 2011
- [j2]Brett Stone-Gross, Marco Cova, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Analysis of a Botnet Takeover. IEEE Secur. Priv. 9(1): 64-72 (2011) - [c23]Corrado Leita, Marco Cova:
HARMUR: storing and analyzing historic data on malicious domains. BADGERS@EuroSys 2011: 46-53 - [c22]Marco Cova:
System Security Research at Birmingham: Current Status and Some Future Work. SysSec@DIMVA 2011: 115-118 - [c21]Alexandros Kapravelos, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Escape from Monkey Island: Evading High-Interaction Honeyclients. DIMVA 2011: 124-143 - [c20]Brett Stone-Gross, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Peering through the iframe. INFOCOM 2011: 411-415 - [c19]Davide Canali, Marco Cova, Giovanni Vigna, Christopher Kruegel:
Prophiler: a fast filter for the large-scale detection of malicious web pages. WWW 2011: 197-206 - 2010
- [j1]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
An Experience in Testing the Security of Real-World Electronic Voting Systems. IEEE Trans. Software Eng. 36(4): 453-473 (2010) - [c18]Adam Doupé, Marco Cova, Giovanni Vigna:
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners. DIMVA 2010: 111-131 - [c17]Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, Ludovico Cavedon, Marco Cova, Manuel Egele, Giovanni Vigna:
Organizing Large Scale Hacking Competitions. DIMVA 2010: 132-152 - [c16]Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Efficient Detection of Split Personalities in Malware. NDSS 2010 - [c15]Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier:
An Analysis of Rogue AV Campaigns. RAID 2010: 442-463 - [c14]Marco Cova, Christopher Krügel, Giovanni Vigna:
Detection and analysis of drive-by-download attacks and malicious JavaScript code. WWW 2010: 281-290
2000 – 2009
- 2009
- [c13]Sean Ford, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Analyzing and Detecting Malicious Flash Advertisements. ACSAC 2009: 363-372 - [c12]Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Your botnet is my botnet: analysis of a botnet takeover. CCS 2009: 635-647 - 2008
- [c11]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248 - [c10]Davide Balzarotti, Marco Cova, Giovanni Vigna:
ClearShot: Eavesdropping on Keyboard Input from Video. SP 2008: 170-183 - [c9]Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. SP 2008: 387-401 - [c8]Fang Yu, Tevfik Bultan, Marco Cova, Oscar H. Ibarra:
Symbolic String Verification: An Automata-Based Approach. SPIN 2008: 306-324 - [c7]Marco Cova, Christopher Kruegel, Giovanni Vigna:
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. WOOT 2008 - 2007
- [c6]Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna:
Multi-module vulnerability analysis of web-based applications. CCS 2007: 25-35 - [c5]Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna:
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. RAID 2007: 63-86 - [p1]Marco Cova, Viktoria Felmetsger, Giovanni Vigna:
Vulnerability Analysis of Web-based Applications. Test and Analysis of Web Services 2007: 363-394 - 2006
- [c4]Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna:
Static Detection of Vulnerabilities in x86 Executables. ACSAC 2006: 269-278 - [c3]Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna:
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. ISC 2006: 343-358 - 2005
- [c2]Paolo Avesani, Conor Hayes, Marco Cova:
Language Games: Solving the Vocabulary Problem in Multi-Case-Base Reasoning. ICCBR 2005: 35-49 - [c1]Paolo Avesani, Marco Cova:
Shared lexicon for distributed annotations on the Web. WWW 2005: 207-214
Coauthor Index
aka: Christopher Kruegel
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint