Sledovat
Pierre-Antoine Vervier
Pierre-Antoine Vervier
E-mailová adresa ověřena na: symantec.com
Název
Citace
Citace
Rok
Can I opt out yet? GDPR and the global illusion of cookie control
I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ...
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
2262019
Tiresias: Predicting security events through deep learning
Y Shen, E Mariconti, PA Vervier, G Stringhini
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1902018
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks
PA Vervier, O Thonnard, M Dacier
Network and Distributed System Security (NDSS) Symposium, 2015
1072015
The tangled genealogy of IoT malware
E Cozzi, PA Vervier, M Dell'Amico, Y Shen, L Bilge, D Balzarotti
Proceedings of the 36th Annual Computer Security Applications Conference, 1-16, 2020
722020
Before toasters rise up: A view into the emerging IoT threat landscape
PA Vervier, Y Shen
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
722018
Vistracer: a visual analytics tool to investigate routing anomalies in traceroutes
F Fischer, J Fuchs, PA Vervier, F Mansmann, O Thonnard
Proceedings of the ninth international symposium on visualization for cyber …, 2012
452012
Iot security and privacy labels
Y Shen, PA Vervier
Privacy Technologies and Policy: 7th Annual Privacy Forum, APF 2019, Rome …, 2019
422019
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
P Kotzias, L Bilge, PA Vervier, J Caballero
NDSS, 2019
392019
Visual analytics for BGP monitoring and prefix hijacking identification
E Biersack, Q Jacquemart, F Fischer, J Fuchs, O Thonnard, G Theodoridis, ...
IEEE Network 26 (6), 33-39, 2012
342012
Journey to the center of the cookie ecosystem: Unraveling actors' roles and relationships
I Sanchez-Rola, M Dell'Amico, D Balzarotti, PA Vervier, L Bilge
2021 IEEE Symposium on Security and Privacy (SP), 1990-2004, 2021
322021
Accurate real-time identification of malicious BGP hijacks
Y Shen, HAN Yufei, PA Vervier
US Patent 10,148,690, 2018
282018
Lean on me: Mining internet service dependencies from large-scale dns data
M Dell'Amico, L Bilge, A Kayyoor, P Efstathopoulos, PA Vervier
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
282017
Systems and methods for evaluating infection risks based on profiled user behaviors
HAN Yufei, L Yumer, PA Vervier, M Dell'Amico
US Patent 10,116,680, 2018
252018
When Sally met trackers: Web tracking from the users' perspective
S Dambra, I Sanchez-Rola, L Bilge, D Balzarotti
31st USENIX Security Symposium (USENIX Security 22), 2189-2206, 2022
202022
Understanding worldwide private information collection on android
Y Shen, PA Vervier, G Stringhini
arXiv preprint arXiv:2102.12869, 2021
162021
SpamTracer: How Stealthy Are Spammers?
PA Vervier, O Thonnard
5th IEEE International Traffic Monitoring and Analysis (TMA) Workshop …, 2013
132013
Malicious BGP Hijacks: Appearances Can Be Deceiving
PA Vervier, Q Jacquemart, J Schlamp, O Thonnard, G Carle, ...
ICC CISS 2014, IEEE International Conference on Communications, 10-14 June …, 2014
102014
A large-scale temporal measurement of android malicious apps: Persistence, migration, and lessons learned
Y Shen, PA Vervier, G Stringhini
31st USENIX Security Symposium (USENIX Security 22), 1167-1184, 2022
62022
Systems and methods for mapping internet protocol addresses for an organization
PA Vervier, Y Shen
US Patent 10,440,047, 2019
62019
{FirmSolo}: Enabling dynamic analysis of binary Linux-based {IoT} kernel modules
I Angelakopoulos, G Stringhini, M Egele
32nd USENIX Security Symposium (USENIX Security 23), 5021-5038, 2023
52023
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20