You can find a list of my publications also on my Google Scholar profile.
However, on this page you will find more information and links to
additional material (such as slides, tools, and datasets).
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model PerformanceProceedings of the 30th ACM conference on Computer and communications security (CCS) , Copenaghen
Humans vs. Machines in Malware Classification32nd USENIX Security Symposium (USENIX Security 23) , Anaheim, CA
Dissecting American fuzzy lop: a FuzzBench evaluationACM Transactions on Software Engineering and Methodology
Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages32nd USENIX Security Symposium (USENIX Security 23) , Anaheim, CA
WHIP}: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborat32nd USENIX Security Symposium (USENIX Security 23) , Anaheim, CA
Lost in the Loader: The Many Faces of the Windows PE File FormatSymposium on Research in Attacks, Intrusion, and Defenses (RAID) , San Sebastian
When Malware Changed Its Mind: Characterizing the Variability of Malicious and Unwanted Program Behaviors at Scale29th USENIX Security Symposium (USENIX Security 21) , Boston, MAWinner of the Best Paper Award for 2021 -- CSAW
In the Compression Hornet's Nest: A Security Study of Data Compression in Network ServicesProceedings of the 24rd USENIX Security Symposium (USENIX Security) (acceptance rate: 15.7%)
A Large Scale Analysis of the Security of Embedded FirmwaresProceedings of the 23rd USENIX Security Symposium (USENIX Security) (acceptance rate: 19.0%)
Have things changed now? An empirical study on input validation vulnerabilities in web applicationsJournal on Computers & Security
A Summary of Two Practical Attacks Against Social NetworksTrustworthy Internet (Book Chapter)