Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 50 di 158
Titolo Data di pubblicazione Autori File
Confidential Computing: A Security Overview and Future Research Directions In corso di stampa Alessandro BertaniStefano ZaneroMario Polino +
PackHero: A Scalable Graph-based Approach for Efficient Packer Identification In corso di stampa Di Gennaro, MarcoD'Onghia, MarioPolino, MarioZanero, StefanoCarminati, Michele
CANter: data-link layer detection of drop-and-spoof attacks on CAN and CAN FD In corso di stampa S. LongariS. Zanero +
Evaluating the potential of quantum machine learning in cybersecurity: A case-study on PCA-based intrusion detection systems In corso di stampa Bellante, ArmandoCarminati, MicheleZanero, Stefano +
Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation In corso di stampa Daniele MammoneMichele CarminatiStefano ZaneroStefano Longari +
Guessing as a service: large language models are not yet ready for vulnerability detection 1-gen-2025 F. PanebiancoS. LongariS. ZaneroM. Carminati +
A Deep Learning Approach for False Data Injection Attacks Detection in Smart Water Infrastructure 1-gen-2025 T. GiorgeschiM. CarminatiS. ZaneroS. Longari +
Investigating the Impact of Evasion Attacks Against Automotive Intrusion Detection Systems 1-gen-2024 S. LongariM. CarminatiS. Zanero +
Janus: A Trusted Execution Environment Approach for Attack Detection in Industrial Robot Controllers 1-gen-2024 Longari, StefanoJannone, JacopoPolino, MarioCarminati, MicheleZanchettin, AndreaTanelli, MaraZanero, Stefano
CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment 1-gen-2024 Longari, StefanoPozone, AlessandroLeoni, JessicaPolino, MarioCarminati, MicheleTanelli, MaraZanero, Stefano
You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence 1-gen-2024 Tommaso PaladiniMario PolinoStefano ZaneroMichele Carminati +
Securing LiDAR Communication through Watermark-based Tampering Detection 1-gen-2024 S. LongariM. CarminatiS. Zanero +
The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations 1-gen-2024 Lorenzo BinosiMichele CarminatiStefano ZaneroMario Polino +
Do You Trust Your Device? Open Challenges in IoT Security Analysis 1-gen-2024 Binosi, LorenzoCarminati, MicheleZanero, StefanoPolino, Mario +
Tarallo: Evading Behavioral Malware Detectors in the Problem Space 1-gen-2024 Digregorio, GabrieleD'Onghia, MarioCarminati, MichelePolino, MarioZanero, Stefano +
Amatriciana: Exploiting Temporal GNNs for Robust and Efficient Money Laundering Detection 1-gen-2024 Di Gennaro, MarcoPanebianco, FrancescoZanero, StefanoCarminati, Michele +
Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection 1-gen-2024 Digregorio, GabrieleCainazzo, ElisabettaLongari, StefanoCarminati, MicheleZanero, Stefano
BOTQUAS: Blockchain-based Solutions for Trustworthy Data Sharing in Sustainable and Circular Economy 1-gen-2024 Cesana, MatteoDigregorio, GabrieleInnamorati, CorradoLongari, StefanoPlebani, PierluigiTanca, LetiziaZanero, Stefano +
HAMLET: A Transformer Based Approach for Money Laundering Detection 1-gen-2023 Paladini, TommasoD’Onghia, MarioCarminati, MicheleZanero, Stefano +
Task Aware Intrusion Detection for Industrial Robots 1-gen-2023 Stefano LongariMario PolinoMichele CarminatiAndrea Maria ZanchettinMara TanelliStefano Zanero +
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks 1-gen-2023 Longari, StefanoNoseda, FrancescoCarminati, MicheleZanero, Stefano
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks 1-gen-2023 Longari, StefanoCarminati, MicheleZanero, Stefano +
HACK: a Holistic modeling Approach for Cubesat cyberattacKs 1-gen-2023 Borgia, S.Topputo, F.Zanero, S.
Quantum Eigenfaces: Linear Feature Mapping and Nearest Neighbor Classification with Outlier Detection 1-gen-2023 Bellante, ArmandoVanerio, StefanoZanero, Stefano +
BINO: Automatic Recognition of Inline Binary Functions from Template Classes 1-gen-2023 Lorenzo BinosiMario PolinoMichele CarminatiStefano Zanero
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN 1-gen-2023 Longari, StefanoCarminati, MicheleZanero, Stefano +
Coming of Age 1-gen-2023 Zanero, Stefano
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis 1-gen-2023 Bertani, AlessandroPolino, MarioCarminati, MicheleZanero, Stefano +
Advancing Fraud Detection Systems through Online Learning 1-gen-2023 T. PaladiniM. Bernasconi de LucaM. CarminatiM. PolinoF. Trovo'S. Zanero
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation 1-gen-2023 Alessandro BertaniLorenzo BinosiMichele CarminatiStefano ZaneroMario Polino +
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies 1-gen-2023 Paladini, TommasoMonti, FrancescoPolino, MarioCarminati, MicheleZanero, Stefano
A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems 1-gen-2023 Hussain S.Hemmati M.Iqbal A.Zanero S.Ragaini E.Gruosso G. +
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors 1-gen-2023 D'Onghia, MarioCarminati, MichelePolino, MarioZanero, Stefano +
A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids 1-gen-2023 Hussain, ShahbazZanero, StefanoRagaini, Enrico +
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing 1-gen-2023 Binosi, LorenzoPolino, MarioCarminati, MicheleZanero, Stefano +
DJM-CYBER: A Joint Master in Advanced Cybersecurity 1-gen-2023 Zanero, Stefano +
COMPUTER-IMPLEMENTED REAL-TIME CONTROL SYSTEM FOR CONTROLLING A PHYSICAL SYSTEM OR DEVICE 1-gen-2022 S. LONGARIA. POZONEM. TANELLIS. ZANERO
Amaretto: An Active Learning Framework for Money Laundering Detection 1-gen-2022 Labanca, DaniloPolino, MarioCarminati, MicheleZanero, Stefano +
A Natural Language Processing Approach for Financial Fraud Detection 1-gen-2022 Michele PapaleMichele CarminatiStefano Zanero +
Apícula: Static Detection of API Calls in Generic Streams of Bytes 1-gen-2022 D’Onghia, MarioSalvadore, MatteoCarminati, MichelePolino, MarioZanero, Stefano +
Quantum matching pursuit: A quantum algorithm for sparse representations 1-gen-2022 Bellante, ArmandoZanero, Stefano
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks 1-gen-2022 de Faveri Tron, AlviseLongari, StefanoCarminati, MichelePolino, MarioZanero, Stefano
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware 1-gen-2022 Galloro, NicolaPolino, MarioCarminati, MicheleContinella, AndreaZanero, Stefano
Quantum algorithms for SVD-based data representation and analysis 1-gen-2022 Bellante, ArmandoLuongo, AlessandroZanero, Stefano
Sistema di riconoscimento di manomissione del codice di un sistema di controllo mediante uso di processori con memoria trusted 1-gen-2021 Zanero S.Tanelli M.Longari S.Pozone A.
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning 1-gen-2021 Ruaro, NicolaPolino, MarioContinella, AndreaZanero, Stefano +
A Novel Methodology to Validate and Evaluate Combined Cyber Attacks in Automated Power Systems Using Real Time Digital Simulation 1-gen-2021 Hussain, ShahbazZanero, StefanoRagaini, Enrico +
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System 1-gen-2021 Maggi, FedericoQuadrini, WalterTavola, GiacomoPogliani, MarcelloQuarta, DavideZanero, Stefano +
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network 1-gen-2021 Longari, StefanoCarminati, MicheleZanero, Stefano +
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems 1-gen-2021 Maffiola, DavideLongari, StefanoCarminati, MicheleTanelli, MaraZanero, Stefano
Mostrati risultati da 1 a 50 di 158
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile