Andrea Lanzi bio photo

Andrea Lanzi

If we knew what it was we were doing, it would not be called research, would it? Albert Einstein

. Email Twitter Google Scholar LinkedIn


I'm currently an Assistant Professor at Universita` degli studi di Milano at Computer Science Department, Italy where I'm leading a security Lab, called LaSER (systems and network security lab).

From 2009 to 2013 I've been a Senior Research at Eurecom Graduate School in the S3 lab, located in Sophia Antipolis on the French riviera where I've been part of the iSeclab group. From 2007-2009 I've been Ph.D visiting scholar in Georgia Tech University US, in the GTISC Security Lab led by the Prof. Wenke Lee.

I am interested in several aspects of Cyber Security. In particular, my main area of research deals with Host Intrusion Detection Systems (HIDS), memory errors exploitation, reverse engineering, malware and forensic analysis. In recent years I’ve mainly studied the application of emulation/virtualization and compiler techniques for malware analysis and detection in Android context. In addition I’ve been working on analyzing large-scale security malware datasets to investigate the behavior of current cyber threats.

Recent Selected Publications

ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android Authors: Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio , in Conference on Computer and Communications Security (CCS 2018), 2018.

Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks Authors: Stefano Cristalli, Mattia Pagnozzi, Mariano Graziano, Andrea Lanzi, Davide Balzarotti 25th USENIX Security Symposium (USENIX Security 16), 2016.

Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence Authors: Mariano Graziano, Davide Canali, Leyla Bilge, Andrea Lanzi, Davide Balzarotti 24th USENIX Security Symposium (USENIX Security 15), 2015.