Sfoglia per Autore
On the use of different statistical tests for alert correlation - Short Paper
2007-01-01 Maggi, Federico; Zanero, Stefano
Seeing the Invisible - Forensic Uses of Anomaly Detection and Machine Learning
2008-01-01 Maggi, Federico; Zanero, Stefano; V., Iozzo
Integrated Detection of Attacks Against Browsers, Web Applications and Databases
2009-01-01 Criscione, Claudio; Salvaneschi, Guido; Maggi, Federico; Zanero, Stefano
Protecting a Moving Target: Addressing Web Application Concept Drift
2009-01-01 Maggi, Federico; W., Robertson; C., Kruegel; G., Vigna
Reducing False Positives In Anomaly Detectors Through Fuzzy Alert Aggregation
2009-01-01 Maggi, Federico; Matteucci, Matteo; Zanero, Stefano
Selecting and Improving System Call Models for Anomaly Detection
2009-01-01 Frossi, Alessandro; Maggi, Federico; G., Rizzo; Zanero, Stefano
Effective Anomaly Detection with Scarce Training Data
2010-01-01 W., Robertson; Maggi, Federico; C., Kruegel; G., Vigna
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
2010-01-01 Maggi, Federico
A Recognizer of Rational Trace Languages
2010-01-01 Maggi, Federico
Effective multimodel anomaly detection using cooperative negotiation
2010-01-01 Volpatto, Alberto; Maggi, Federico; Zanero, Stefano
Detecting Intrusions through System Call Sequence and Argument Analysis
2010-01-01 Maggi, Federico; Matteucci, Matteo; Zanero, Stefano
BURN: Baring Unknown Rogue Networks
2011-01-01 Francesco, Roveta; Luca Di, Mario; Maggi, Federico; Caviglia, Giorgio; Zanero, Stefano; Ciuccarelli, Paolo
A social-engineering-centric data collection initiative to study phishing
2011-01-01 Maggi, Federico; Alessandro, Sisto; Zanero, Stefano
Is the future Web more insecure? Distractions and solutions of new-old security issues and measures
2011-01-01 Maggi, Federico; Zanero, Stefano
POSTER: Fast, Automatic iPhone Shoulder Surfing
2011-01-01 Maggi, Federico; Volpatto, Alberto; Gasparini, Simone; Boracchi, Giacomo; Zanero, Stefano
System Security research at Politecnico di Milano
2011-01-01 Maggi, Federico; Zanero, Stefano
Finding Non-trivial Malware Naming Inconsistencies
2011-01-01 Maggi, Federico; A., Bellini; Salvaneschi, Guido; Zanero, Stefano
A Fast Eavesdropping Attack Against Touchscreens
2011-01-01 Maggi, Federico; Volpatto, Alberto; S., Gasparini; Boracchi, Giacomo; Zanero, Stefano
All your face are belong to us: breaking Facebook's social authentication
2012-01-01 I., Polakis; M., Lancini; G., Kontaxis; Maggi, Federico; S., Ioannidis; A. D., Keromytis; Zanero, Stefano
Lines of malicious code: insights into the malicious software industry
2012-01-01 M., Lindorfer; DI FEDERICO, Alessandro; Maggi, Federico; P., Milani Comparetti; Zanero, Stefano
Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures
2013-01-01 Maggi, Federico; Frossi, Alessandro; Zanero, Stefano; Gianluca, Stringhini; Brett Stone, Gross; Christopher, Kruegel; Giovanni, Vigna
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth
2013-01-01 Dardanelli, Andrea; Maggi, Federico; Tanelli, Mara; Zanero, Stefano; Savaresi, SERGIO MATTEO; R., Kochanek; T., Holz
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors
2013-01-01 Maggi, Federico; Andrea, Valdi; Zanero, Stefano
Adaptive and Flexible Smartphone Power Modeling
2013-01-01 Nacci, ALESSANDRO ANTONIO; Trovo', Francesco; Maggi, Federico; Ferroni, Matteo; A., Cazzola; Sciuto, Donatella; Santambrogio, MARCO DOMENICO
A Comprehensive Black-box Methodology for Testing the Forensic Characteristics of Solid-state Drives
2013-01-01 Gabriele, Bonetti; Marco, Viglione; Frossi, Alessandro; Maggi, Federico; Zanero, Stefano
A Practical Attack Against a KNX-based Building Automation System
2014-01-01 Antonini, Alessio; Maggi, Federico; Zanero, Stefano
Black-box forensic and antiforensic characteristics of solid-state drives
2014-01-01 Gabriele, Bonetti; Marco, Viglione; Frossi, Alessandro; Maggi, Federico; Zanero, Stefano
Phoenix: DGA-Based Botnet Tracking and Intelligence
2014-01-01 Stefano, Schiavoni; Maggi, Federico; Lorenzo, Cavallaro; Zanero, Stefano
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
2014-01-01 Iasonas, Polakis; Panagiotis, Ilia; Maggi, Federico; Marco, Lancini; Georgios, Kontaxis; Zanero, Stefano; Sotiris, Ioannidis; Angelos D., Keromytis
AndRadar: Fast Discovery of Android Applications in Alternative Markets
2014-01-01 Martina, Lindorfer; Stamatis, Volanis; Alessandro, Sisto; Matthias, Neugschwandtner; Elias, Athanasopoulos; Maggi, Federico; Christian, Platzer; Zanero, Stefano; Sotiris, Ioannidis
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned
2014-01-01 Polakis, Iasonas; Maggi, Federico; Zanero, Stefano; Keromytis, Angelos D.
BitIodine: Extracting Intelligence from the Bitcoin Network
2014-01-01 Michele, Spagnuolo; Maggi, Federico; Zanero, Stefano
BankSealer: An Online Banking Fraud Analysis and Decision Support System
2014-01-01 Carminati, Michele; Roberto, Caron; Maggi, Federico; Epifani, Ilenia; Zanero, Stefano
ZARATHUSTRA: Extracting Webinject signatures from banking trojans
2014-01-01 Criscione, Claudio; Fabio, Bosatelli; Zanero, Stefano; Maggi, Federico
Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services
2014-01-01 N., Nikiforakis; Maggi, Federico; G., Stringhini; M. Z., Rafique; W., Joosen; C., Kruegel; F., Piessens; G., Vigna; Zanero, Stefano
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications
2015-01-01 Falsina, Luca; Fratantonio, Yanick; Zanero, Stefano; Kruegel, Christopher; Vigna, Giovanni; Maggi, Federico
HelDroid: Dissecting and Detecting Mobile Ransomware
2015-01-01 Andronio, Nicoló; Zanero, Stefano; Maggi, Federico
Face/Off: Preventing Privacy Leakage From Photos in Social Networks
2015-01-01 Ilia, Panagiotis; Polakis, Iasonas; Athanasopoulos, Elias; Maggi, Federico; Ioannidis, Sotiris
BankSealer: A decision support system for online banking fraud analysis and investigation
2015-01-01 Carminati, Michele; Caron, Roberto; Maggi, Federico; Epifani, Ilenia; Zanero, Stefano
Scalable Testing of Mobile Antivirus Applications
2015-01-01 Valdi, Andrea; Lever, Eros; Benefico, Simone; Quarta, Davide; Zanero, Stefano; Maggi, Federico
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries
2015-01-01 Polino, Mario; Scorti, Andrea; Maggi, Federico; Zanero, Stefano
Protection system and method for protecting a computer system against ransomware attack
2016-01-01 Barenghi, A.; Zanero, S.; Maggi, F.; Continella, A.; De Pasquale, G.; Guagnelli, A.; Zingaro, G.
Trellis: Privilege Separation for Multi-user Applications Made Easy
2016-01-01 Mambretti, Andrea; Onarlioglu, Kaan; Mulliner, Collin; Robertson, William; Kirda, Engin; Maggi, Federico; Zanero, Stefano
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners
2016-01-01 Bazzoli, Enrico; Criscione, Claudio; Maggi, Federico; Zanero, Stefano
ShieldFS: a self-healing, ransomware-aware filesystem
2016-01-01 Continella, Andrea; Guagnelli, Alessandro; Zingaro, Giovanni; De Pasquale, Giulio; Barenghi, Alessandro; Zanero, Stefano; Maggi, Federico
On-chip system call tracing: A feasibility study and open prototype
2016-01-01 Zheng, Chengyu; Dalla Preda, Mila; Granjal, Jorge; Zanero, Stefano; Maggi, Federico
Poster: Detecting WebInjects through Live Memory Inspection
2017-01-01 Mariani, Nicola; Continella, Andrea; Pogliani, Marcello; Carminati, Michele; Maggi, Federico; Zanero, Stefano
An Experimental Security Analysis of an Industrial Robot Controller
2017-01-01 Quarta, Davide; Pogliani, Marcello; Polino, Mario; Maggi, Federico; Zanchettin, ANDREA MARIA; Zanero, Stefano
Prometheus: Analyzing WebInject-based information stealers
2017-01-01 Continella, Andrea; Carminati, Michele; Polino, Mario; Lanzi, Andrea; Zanero, Stefano; Maggi, Federico
GreatEatlon: Fast, Static Detection of Mobile Ransomware
2017-01-01 Zheng, Chengyu; Dellarocca, Nicola; Andronio, Niccolò; Zanero, Stefano; Maggi, Federico
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile