Publications

For a complete list of my publications, please visit my Google Scholar profile.

2024

Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context

Machel Reid, Nikolay Savinov, Denis Teplyashin, Dmitry Lepikhin, Timothy Lillicrap, et al. (606 authors)

arXiv, 2024

1591 citations
Magika: AI-Powered Content-Type Detection

Yanick Fratantonio, Luca Invernizzi, Loua Farah, Kurt Thomas, Marina Zhang, Ange Albertini, Francois Galilee, Giancarlo Metitieri, Julien Cretin, Alex Petit-Bianco, David Tao, Elie Bursztein

arXiv, 2024

Machine LearningSecurity

2023

Generalized power attacks against crypto hardware using long-range deep learning

Elie Bursztein, Luca Invernizzi, Karel Král, Daniel Moghimi, Jean-Michel Picod, Marina Zhang

arXiv, 2023

13 citations
Machine LearningHardware

2022

Hybrid Post-Quantum Signatures in Hardware Security Keys

Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Picod Jean-Michel, Luca Invernizzi, Elie Bursztein

ACNS Workshop on Secure Cryptographic Implementation, 2022

18 citations
🏆 Best Paper AwardHardwareSecurity

2020

CoinPolice: Detecting Hidden Cryptojacking Attacks with Neural Networks

Ivan Petrov, Luca Invernizzi, Elie Bursztein

http://arxiv.org/abs/, 2020

31 citations
Machine LearningSecurity
Spotlight: Malware Lead Generation at Scale

Fabian Kaczmarczyck, Bernhard Grill, Luca Invernizzi, Jennifer Pullman, Cecilia M. Procopiuc, David Tao, Borbala Benko, Elie Bursztein

Annual Computer Security Applications Conference (ACSAC), 2020

8 citations
Security

2019

Protecting accounts from credential stuffing with password breach alerting

Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein

USENIX Security Symposium, 2019

180 citations
🏆 Best Paper AwardSecurityPrivacy
Five years of the right to be forgotten

Theo Bertram, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Peter Fleischer, Albin Gustafsson, Jess Hemerly, Chris Hibbert, Luca Invernizzi, Lanah Kammourieh Donnelly, Jason Ketover, Jay Laefer, Paul Nicholas, Yuan Niu, Harjinder Obhi, David Price, Andrew Strait, Kurt Thomas, Al Verney

ACM SIGSAC Conference on Computer and Communications Security, 2019

47 citations
Serverless Cybersecurity Training

Luca Invernizzi, Elie Bursztein

TDCommons, 2019

2018

Tracking ransomware end-to-end

Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C Snoeren, Damon McCoy

IEEE Symposium on Security and Privacy (S&P), 2018

314 citations
Three years of the Right to be Forgotten

Theo Bertram, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Peter Fleischer, Albin Gustafsson, Jess Hemerly, Chris Hibbert, Luca Invernizzi, LK Donnelly, J Ketover, Jay Laefer, Paul Nicholas, Yuan Niu, Harjinder Obhi, David Price, Andrew Strait, Kurt Thomas, Al Verney

ArXiv, 2018

24 citations

2017

Understanding the mirai botnet

Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou

USENIX security symposium (USENIX Security 17), 2017

2908 citations
Security
Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials

Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, et al

ACM SIGSAC Conference on Computer and Communications Security, 2017

346 citations
SecurityPrivacy
Gossip: Automatically identifying malicious domains from mailing list discussions

Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna

ACM on Asia Conference on Computer and Communications Security (AsiaCCS), 2017

23 citations

2016

Cloak of Visibility: Detecting When Machines Browse A Different Web

Luca Invernizzi, Kurt Thomas, Alexandros Kapravelos, Oxana Comanescu, Jean-Michel Picod, Elie Bursztein

IEEE Security and Privacy (S&P), 2016

124 citations

2015

What the app is that? deception and countermeasures in the android user interface

Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna

IEEE Symposium on Security and Privacy (S&P), 2015

228 citations
Baredroid: Large-scale analysis of android apps on real devices

Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna

Annual Computer Security Applications Conference (ACSAC), 2015

94 citations
Detecting malware infestations in large-scale networks

Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Sabyasachi Saha, Christopher Kruegel, Antonio Nucci, Sung-Ju Lee, Giovanni Vigna

US Patent, 2015

50 citations

2014

Nazca: Detecting Malware Distribution in Large-Scale Networks.

Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Christopher Kruegel, Sabyasachi Saha, Giovanni Vigna, Sung-Ju Lee, Marco Mellia

Annual Network and Distributed Systems Security (NDSS), 2014

201 citations
Ten Years of {iCTF}: The Good, The Bad, and The Ugly

Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupe, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, Yan Shoshitaishvili

USENIX Summit on Gaming Games and Gamification in Security Education (3GSE 14), 2014

88 citations
Do you feel lucky? A large-scale analysis of risk-rewards trade-offs in cyber security

Yan Shoshitaishvili, Luca Invernizzi, Adam Doupe, Giovanni Vigna

Annual ACM Symposium on Applied Computing (ACSAC), 2014

18 citations
Eyes of a human, eyes of a program: Leveraging different views of the web for analysis and detection

Jacopo Corbetta, Luca Invernizzi, Christopher Kruegel, Giovanni Vigna

Research in Attacks Intrusions and Defenses (RAID), 2014

13 citations

2012

You are what you include: large-scale evaluation of remote javascript inclusions

Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna

ACM conference on Computer and communications security, 2012

404 citations
EVILSEED: A Guided Approach to Finding Malicious Web Pages

Luca Invernizzi, UC Santa Barbara, Stefano Benvenuti, Marco Cova, Paolo Milani Comparetti, Christopher Kruegel, Giovanni Vigna

IEEE Symposium on Security & Privacy (S&P) and AT&T NYU CSAW best security paper '12 finalist, 2012

271 citations
Security
Message In A Bottle: Sailing Past Censorship

Luca Invernizzi, Christopher Kruegel, Giovanni Vigna

Annual Computer Security Applications Conference (ACSAC) and in HotPETS12 (workshop), 2012

51 citations
Censorship

2011

A geometric approach to trajectory design for an autonomous underwater vehicle: Surveying the bulbous bow of a ship

Ryan N Smith, Dario Cazzaro, Luca Invernizzi, Giacomo Marani, Song K Choi, Monique Chyba

Acta Applicandae Mathematicae, 2011

9 citations

2010

Geometric control for autonomous underwater vehicles: overcoming a thruster failure

Michael Andonian, Dario Cazzaro, Luca Invernizzi, Monique Chyba, Sergio Grammatico

IEEE Conference on Decision and Control (CDC), 2010

16 citations
Robotics
Trajectory design for autonomous underwater vehicles for basin exploration

Monique Chyba, D Cazzaro, L Invernizzi, M Andonian

International Conference on Computer and IT Applications in the Maritime Industries (COMPIT), 2010

5 citations
Designing Practical Motions for Autonomous Underwater Vehicles: A Ship Hull Survey Mission

Ryan N Smith, M Chyba, SB Singh, SK Choi, G Marani

IEEE Journal of Oceanic Engineering, 2010

Open Source

These are some of the projects I contributed to. For a better overview of my open source projects, please visit my GitHub Profile

2024

Magika content-type scanner

Yanick Fratantonio, Elie Bursztein, Luca Invernizzi, Marina Zhang, Giancarlo Metitieri, Thomas Kurt, Francois Galilee, Alexandre Petit-Bianco, Loua Farah, Ange Albertini

3 citations
WaseFire

WaseFire is a platform to build secure firmware in a usable way.

2023

UniSim

Package for efficiently computing similarity, performing fuzzy matching, deduplicating datasets, and clustering data.

2019

Keras Tuner

Tom O’Malley, Elie Bursztein, James Long, François Chollet, Haifeng Jin, Luca Invernizzi, G de Marmiesse, Y Fu, J Podivìn, F Schäfer

917 citations
Research Areas

AI-generated summary of my research areas for a quick overview:

  • Machine Learning Security

    Applying ML/AI to security problems like malware detection, file-type identification (Magika), side-channel analysis (SCAAML/GPAM), and abuse/fraud detection (CoinPolice, Giveaway Scams).

  • System and Network Security

    Securing computer systems and networks, including large-scale malware analysis and distribution detection (Nazca, EvilSeed), vulnerability analysis (e.g., outdated libraries), botnet analysis (Mirai), and Android security.

  • Hardware Security

    Analyzing and securing hardware components, focusing on side-channel vulnerabilities in cryptographic hardware (SCAAML/GPAM), security key architectures, post-quantum cryptography implementations, and secure firmware.

  • Privacy and Abuse Prevention

    Protecting user privacy online and combating web abuse. Includes research on credential stuffing risks, cryptojacking, large-scale scam detection, and analysis of privacy policies like the "Right to be Forgotten".

  • Censorship Resistance

    Developing and analyzing techniques to bypass internet censorship and ensure free communication.

  • Robotics / Autonomous Systems

    Earlier work focused on control strategies for autonomous systems, particularly autonomous underwater vehicles (AUVs).