Follow
Mark Vella
Title
Cited by
Cited by
Year
Danger theory and intrusion detection: Possibilities and limitations of the analogy
M Vella, M Roper, S Terzis
Artificial Immune Systems: 9th International Conference, ICARIS 2010 …, 2010
172010
EtherClue: Digital investigation of attacks on Ethereum smart contracts
SJ Aquilina, F Casino, M Vella, J Ellul, C Patsakis
Blockchain: Research and Applications 2 (4), 100028, 2021
142021
Reducing the forensic footprint with Android accessibility attacks
Y Leguesse, M Vella, C Colombo, J Hernandez-Castro
Security and Trust Management: 16th International Workshop, STM 2020 …, 2020
122020
Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study
M Vella, V Rudramurthy
2018 Federated Conference on Computer Science and Information Systems …, 2018
122018
RV-TEE-Based Trustworthy Secure Shell Deployment: An Empirical Evaluation.
A Curmi, C Colombo, M Vella
J. Object Technol. 21 (2), 2:1-15, 2022
92022
Androneo: Hardening android malware sandboxes by predicting evasion heuristics
Y Leguesse, M Vella, J Ellul
Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018
92018
Using thumbnail affinity for fragmentation point detection of JPEG files
B Birmingham, RA Farrugia, M Vella
IEEE EUROCON 2017-17th International Conference on Smart Technologies, 3-8, 2017
92017
Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps
J Bellizzi, M Vella, C Colombo, J Hernandez-Castro
IEEE Access 10, 35172-35218, 2022
82022
RV-TEE: secure cryptographic protocol execution based on runtime verification
M Vella, C Colombo, R Abela, P Špaček
Journal of Computer Virology and Hacking Techniques 17 (3), 229-248, 2021
72021
Wexpose: Towards on-line dynamic analysis of web attack payloads using just-in-time binary modification
J Bellizzi, M Vella
2015 12th International Joint Conference on e-Business and …, 2015
62015
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage
M Vella, C Colombo
ICT Systems Security and Privacy Protection: 37th IFIP TC 11 International …, 2022
52022
Responding to Living-Off-the-Land Tactics using Just-in-Time Memory Forensics (JIT-MF) for Android
J Bellizzi, M Vella, C Colombo, J Hernandez-Castro
arXiv preprint arXiv:2105.05510, 2021
52021
PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone
Y Leguesse, C Colombo, M Vella, J Hernandez-Castro
IEEE Access 9, 168600-168612, 2021
42021
Secure Implementation of a Quantum-Future GAKE Protocol
R Abela, C Colombo, P Malo, P Sýs, T Fabšič, O Gallo, V Hromada, ...
Security and Trust Management: 17th International Workshop, STM 2021 …, 2021
42021
Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation
J Bellizzi, M Vella, C Colombo, J Hernandez-Castro
Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event …, 2021
42021
Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification.
C Colombo, M Vella
ICISSP, 765-774, 2020
42020
Requirements for a mobile knowledge management system in engineering design
CL Spiteri, JC Borg, E Cachia, M Vella
DS 42: Proceedings of ICED 2007, the 16th International Conference on …, 2007
4*2007
Enhancing Virtual Machine Introspection-Based Memory Analysis with Event Triggers
M Muscat, M Vella
2018 IEEE International Conference on Cloud Computing Technology and Science …, 2018
32018
SUDUTA: Script UAF Detection Using Taint Analysis
J Galea, M Vella
Security and Trust Management: 11th International Workshop, STM 2015, Vienna …, 2015
22015
Achieving anomaly detection effectiveness beyond the symmetric error lower bound, in web-based systems
M Vella, M Roper, S Terzis
Unpublished, 2009
22009
The system can't perform the operation now. Try again later.
Articles 1–20