User profiles for M. Balduzzi

Marco Balduzzi

Technical Research Lead at Trend Micro
Verified email at madlab.it
Cited by 2791

[PDF][PDF] EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.

L Bilge, E Kirda, C Kruegel, M Balduzzi - Ndss, 2011 - sites.cs.ucsb.edu
The domain name service (DNS) plays an important role in the operation of the Internet,
providing a two-way mapping between domain names and their numerical identifiers. Given its …

A security evaluation of AIS automated identification system

M Balduzzi, A Pasta, K Wilhoit - … of the 30th annual computer security …, 2014 - dl.acm.org
AIS, Automatic Identification System, is an application of cyber-physical systems (CPS) to
smart transportation at sea. Being primarily used for collision avoidance and traffic monitoring …

[HTML][HTML] Reshaping plant biology: qualitative and quantitative descriptors for plant morphology

M Balduzzi, BM Binder, A Bucksch, C Chang… - Frontiers in Plant …, 2017 - frontiersin.org
An emerging challenge in plant biology is to develop qualitative and quantitative measures
to describe the appearance of plants through the integration of mathematics and biology. A …

Abusing social networks for automated user profiling

M Balduzzi, C Platzer, T Holz, E Kirda… - Recent Advances in …, 2010 - Springer
Recently, social networks such as Facebook have experienced a huge surge in popularity.
The amount of personal information stored on these sites calls for appropriate security …

Reverse social engineering attacks in online social networks

D Irani, M Balduzzi, D Balzarotti, E Kirda… - Detection of Intrusions and …, 2011 - Springer
Social networks are some of the largest and fastest growing online services today. Facebook,
for example, has been ranked as the second most visited site on the Internet, and has …

Differential production of inflammatory cytokines in primary infection with human metapneumovirus and with other common respiratory viruses of infancy

…, MT Ishida, M Balduzzi, M Maccarone… - The Journal of …, 2004 - academic.oup.com
Viral respiratory infections are the most frequent cause of hospital admission for infants and
young children during winter. However, the mechanisms of illness that are associated with …

A security analysis of amazon's elastic compute cloud service

M Balduzzi, J Zaddach, D Balzarotti, E Kirda… - Proceedings of the 27th …, 2012 - dl.acm.org
Cloud services such as Amazon's Elastic Compute Cloud and IBM's SmartCloud are quickly
changing the way organizations are dealing with IT infrastructures and are providing online …

The two PM2. 5 (fine) and PM2. 5–10 (coarse) fractions: evidence of different biological activity

M Diociaiuti, M Balduzzi, B De Berardis, G Cattani… - Environmental …, 2001 - Elsevier
… diameter less than 2.5 m) and coarse (aerodynamic diameter between 2.5 and 10 m)
size fractions. PM samples were collected on polymethylpentaneringed, 2-m-pore size, 37-mm-…

A solution for the automated detection of clickjacking attacks

M Balduzzi, M Egele, E Kirda, D Balzarotti… - Proceedings of the 5th …, 2010 - dl.acm.org
… of M. Since the victim is not aware of the invisible IFRAME, by correctly aligning T over M, an
… she is under the impression of clicking on M. A successful clickjacking attack, for example, …

Automatic extraction of indicators of compromise for web applications

O Catakoglu, M Balduzzi, D Balzarotti - Proceedings of the 25th …, 2016 - dl.acm.org
Indicators of Compromise (IOCs) are forensic artifacts that are used as signs that a system
has been compromised by an attack or that it has been infected with a particular malicious …