Publications
2024
Machel Reid, Nikolay Savinov, Denis Teplyashin, Dmitry Lepikhin, Timothy Lillicrap, et al. (606 authors)
arXiv, 2024
1591 citationsYanick Fratantonio, Luca Invernizzi, Loua Farah, Kurt Thomas, Marina Zhang, Ange Albertini, Francois Galilee, Giancarlo Metitieri, Julien Cretin, Alex Petit-Bianco, David Tao, Elie Bursztein
arXiv, 2024
2023
Elie Bursztein, Luca Invernizzi, Karel Král, Daniel Moghimi, Jean-Michel Picod, Marina Zhang
arXiv, 2023
13 citations2022
Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Picod Jean-Michel, Luca Invernizzi, Elie Bursztein
ACNS Workshop on Secure Cryptographic Implementation, 2022
18 citations2020
Fabian Kaczmarczyck, Bernhard Grill, Luca Invernizzi, Jennifer Pullman, Cecilia M. Procopiuc, David Tao, Borbala Benko, Elie Bursztein
Annual Computer Security Applications Conference (ACSAC), 2020
8 citations2019
Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein
USENIX Security Symposium, 2019
180 citationsTheo Bertram, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Peter Fleischer, Albin Gustafsson, Jess Hemerly, Chris Hibbert, Luca Invernizzi, Lanah Kammourieh Donnelly, Jason Ketover, Jay Laefer, Paul Nicholas, Yuan Niu, Harjinder Obhi, David Price, Andrew Strait, Kurt Thomas, Al Verney
ACM SIGSAC Conference on Computer and Communications Security, 2019
47 citationsLuca Invernizzi, Elie Bursztein
TDCommons, 2019
2018
Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C Snoeren, Damon McCoy
IEEE Symposium on Security and Privacy (S&P), 2018
314 citationsTheo Bertram, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Peter Fleischer, Albin Gustafsson, Jess Hemerly, Chris Hibbert, Luca Invernizzi, LK Donnelly, J Ketover, Jay Laefer, Paul Nicholas, Yuan Niu, Harjinder Obhi, David Price, Andrew Strait, Kurt Thomas, Al Verney
ArXiv, 2018
24 citations2017
Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou
USENIX security symposium (USENIX Security 17), 2017
2908 citationsKurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, et al
ACM SIGSAC Conference on Computer and Communications Security, 2017
346 citationsCheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna
ACM on Asia Conference on Computer and Communications Security (AsiaCCS), 2017
23 citations2016
Luca Invernizzi, Kurt Thomas, Alexandros Kapravelos, Oxana Comanescu, Jean-Michel Picod, Elie Bursztein
IEEE Security and Privacy (S&P), 2016
124 citations2015
Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna
IEEE Symposium on Security and Privacy (S&P), 2015
228 citationsSimone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna
Annual Computer Security Applications Conference (ACSAC), 2015
94 citationsLuca Invernizzi, Stanislav Miskovic, Ruben Torres, Sabyasachi Saha, Christopher Kruegel, Antonio Nucci, Sung-Ju Lee, Giovanni Vigna
US Patent, 2015
50 citationsLuca Invernizzi
Thesis, 2015
2014
Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Christopher Kruegel, Sabyasachi Saha, Giovanni Vigna, Sung-Ju Lee, Marco Mellia
Annual Network and Distributed Systems Security (NDSS), 2014
201 citationsGiovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupe, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, Yan Shoshitaishvili
USENIX Summit on Gaming Games and Gamification in Security Education (3GSE 14), 2014
88 citationsYan Shoshitaishvili, Luca Invernizzi, Adam Doupe, Giovanni Vigna
Annual ACM Symposium on Applied Computing (ACSAC), 2014
18 citationsJacopo Corbetta, Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
Research in Attacks Intrusions and Defenses (RAID), 2014
13 citations2012
Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna
ACM conference on Computer and communications security, 2012
404 citationsLuca Invernizzi, UC Santa Barbara, Stefano Benvenuti, Marco Cova, Paolo Milani Comparetti, Christopher Kruegel, Giovanni Vigna
IEEE Symposium on Security & Privacy (S&P) and AT&T NYU CSAW best security paper '12 finalist, 2012
271 citationsLuca Invernizzi, Christopher Kruegel, Giovanni Vigna
Annual Computer Security Applications Conference (ACSAC) and in HotPETS12 (workshop), 2012
51 citations2011
Ryan N Smith, Dario Cazzaro, Luca Invernizzi, Giacomo Marani, Song K Choi, Monique Chyba
Acta Applicandae Mathematicae, 2011
9 citations2010
Michael Andonian, Dario Cazzaro, Luca Invernizzi, Monique Chyba, Sergio Grammatico
IEEE Conference on Decision and Control (CDC), 2010
16 citationsMonique Chyba, D Cazzaro, L Invernizzi, M Andonian
International Conference on Computer and IT Applications in the Maritime Industries (COMPIT), 2010
5 citationsRyan N Smith, M Chyba, SB Singh, SK Choi, G Marani
IEEE Journal of Oceanic Engineering, 2010
Open Source
2024
Yanick Fratantonio, Elie Bursztein, Luca Invernizzi, Marina Zhang, Giancarlo Metitieri, Thomas Kurt, Francois Galilee, Alexandre Petit-Bianco, Loua Farah, Ange Albertini
WaseFire is a platform to build secure firmware in a usable way.
2023
Package for efficiently computing similarity, performing fuzzy matching, deduplicating datasets, and clustering data.
2019
Tom O’Malley, Elie Bursztein, James Long, François Chollet, Haifeng Jin, Luca Invernizzi, G de Marmiesse, Y Fu, J Podivìn, F Schäfer
AI-generated summary of my research areas for a quick overview:
Machine Learning Security
Applying ML/AI to security problems like malware detection, file-type identification (Magika), side-channel analysis (SCAAML/GPAM), and abuse/fraud detection (CoinPolice, Giveaway Scams).
System and Network Security
Securing computer systems and networks, including large-scale malware analysis and distribution detection (Nazca, EvilSeed), vulnerability analysis (e.g., outdated libraries), botnet analysis (Mirai), and Android security.
Hardware Security
Analyzing and securing hardware components, focusing on side-channel vulnerabilities in cryptographic hardware (SCAAML/GPAM), security key architectures, post-quantum cryptography implementations, and secure firmware.
Privacy and Abuse Prevention
Protecting user privacy online and combating web abuse. Includes research on credential stuffing risks, cryptojacking, large-scale scam detection, and analysis of privacy policies like the "Right to be Forgotten".
Censorship Resistance
Developing and analyzing techniques to bypass internet censorship and ensure free communication.
Robotics / Autonomous Systems
Earlier work focused on control strategies for autonomous systems, particularly autonomous underwater vehicles (AUVs).