scispace - formally typeset
L

Ludovico Cavedon

Researcher at University of California, Santa Barbara

Publications -  8
Citations -  476

Ludovico Cavedon is an academic researcher from University of California, Santa Barbara. The author has contributed to research in topics: The Internet & Web application. The author has an hindex of 7, co-authored 8 publications receiving 441 citations. Previous affiliations of Ludovico Cavedon include Lastline.

Papers
More filters
Proceedings Article

Toward automated detection of logic vulnerabilities in web applications

TL;DR: This paper uses dynamic analysis and observes the normal operation of a web application to infer a simple set of behavioral specifications, and uses model checking over symbolic input to identify program paths that are likely to violate these specifications under specific conditions, indicating the presence of a certain type of web application logic flaws.
Proceedings Article

Enemy of the state: a state-aware black-box web vulnerability scanner

TL;DR: It is shown that the state-aware black-box web vulnerability scanner is able to not only exercise more code of the web application, but also discover vulnerabilities that other vulnerability scanners miss.
Proceedings ArticleDOI

Hit 'em where it hurts: a live security exercise on cyber situational awareness

TL;DR: Cyber Situational Awareness metrics are defined to characterize the toxicity and effectiveness of the attacks performed by the participants with respect to the missions carried out by the targets of the attack.
Book ChapterDOI

Organizing large scale hacking competitions

TL;DR: In 2008 and 2009, two completely new types of competition were introduced: a security "treasure hunt" and a botnet-inspired competition, which represent the largest live security exercises ever attempted and involved hundreds of students across the globe.
Patent

Methods and systems for malware detection based on environment-dependent behavior

TL;DR: In this paper, the authors present methods and systems for malware detection based on environment-dependent behavior, which is used to determine how input collected from an execution environment is used by suspicious software.