You can find a list of my publications also on my Google Scholar profile.
However, on this page you will find more information and links to
additional material (such as slides, tools, and datasets).
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise EnvironmentsACM Transactions on Privacy and Security (TOPS)
Lost in the Loader: The Many Faces of the Windows PE File FormatSymposium on Research in Attacks, Intrusion, and Defenses (RAID) , San Sebastian
When Malware Changed Its Mind: Characterizing the Variability of Malicious and Unwanted Program Behaviors at Scale29th USENIX Security Symposium (USENIX Security 21) , Boston, MAWinner of the Best Paper Award for 2021 -- CSAW
In the Compression Hornet's Nest: A Security Study of Data Compression in Network ServicesProceedings of the 24rd USENIX Security Symposium (USENIX Security) (acceptance rate: 15.7%)
A Large Scale Analysis of the Security of Embedded FirmwaresProceedings of the 23rd USENIX Security Symposium (USENIX Security) (acceptance rate: 19.0%)
Have things changed now? An empirical study on input validation vulnerabilities in web applicationsJournal on Computers & Security
A Summary of Two Practical Attacks Against Social NetworksTrustworthy Internet (Book Chapter)