Follow
Yanick Fratantonio
Yanick Fratantonio
Senior Research Scientist, Google
Verified email at fratantonio.me - Homepage
Title
Cited by
Cited by
Year
An Empirical Study of Cryptographic Misuse in Android Applications
M Egele, D Brumley, Y Fratantonio, C Kruegel
Proceedings of the ACM SIGSAC Conference on Computer & Communications Security, 2013
6342013
Drammer: Deterministic rowhammer attacks on mobile platforms
V van der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
Proceedings of ACM SIGSAC Conference on Computer and Communications Security …, 2016
4392016
ANDRUBIS-1,000,000 Apps Later: A View on Current Android Malware Behaviors
M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ...
Proceedings of the International Workshop on Building Analysis Datasets and …, 2014
4232014
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications
S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna
Proceedings of the Annual Network & Distributed System Security Symposium (NDSS), 2014
4112014
Understanding Linux Malware
E Cozzi, M Graziano, Y Fratantonio, D Balzarotti
IEEE Security and Privacy, 2018
2832018
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
Proceedings of the Annual Network & Distributed System Security Symposium (NDSS), 2015
2492015
TriggerScope: Towards Detecting Logic Bombs in Android Applications
Y Fratantonio, A Bianchi, W Robertson, E Kirda, C Kruegel, G Vigna
IEEE Security and Privacy, 2016
2322016
What the App is That? Deception and Countermeasures in the Android User Interface
A Bianchi, J Corbetta, L Invernizzi, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2015
2142015
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
Y Fratantonio, C Qian, SP Chung, W Lee
IEEE Symposium on Security and Privacy (Oakland), 2017
1602017
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
1562019
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis
A Continella, Y Fratantonio, M Lindorfer, A Puccetti, A Zand, C Kruegel, ...
NDSS, 2017
1542017
Going native: Using a large-scale analysis of android apps to create a practical native-code sandboxing policy
V Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, P de Geus, ...
The Network and Distributed System Security Symposium 2016, 1-15, 2016
1432016
Andrubis: Android Malware Under the Magnifying Glass
L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ...
Vienna University of Technology, Tech. Rep. TRISECLAB-0414-001, 2014
1282014
Guardion: Practical mitigation of dma-based rowhammer attacks on arm
V Van der Veen, M Lindorfer, Y Fratantonio, H Padmanabha Pillai, ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018
1042018
How machine learning is solving the binary function similarity problem
A Marcelli, M Graziano, X Ugarte-Pedrero, Y Fratantonio, M Mansouri, ...
31st USENIX Security Symposium (USENIX Security 22), 2099-2116, 2022
1032022
Retracer: Triaging crashes by reverse execution from partial memory dumps
W Cui, M Peinado, SK Cha, Y Fratantonio, VP Kemerlis
Proceedings of the 38th International Conference on Software Engineering …, 2016
982016
Baredroid: Large-scale analysis of android apps on real devices
S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015
912015
Ten Years of iCTF: The Good, The Bad, and The Ugly
G Vigna, K Borgolte, J Corbetta, A Doupe, Y Fratantonio, L Invernizzi, ...
Proceedings of the USENIX Summit on Gaming, Games, and Gamification in …, 2014
872014
Phishing attacks on modern android
S Aonzo, A Merlo, G Tavella, Y Fratantonio
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
842018
BootStomp: On the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017
832017
The system can't perform the operation now. Try again later.
Articles 1–20