Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 50 di 55
Titolo Data di pubblicazione Autori File
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System 1-gen-2021 Maggi, FedericoQuadrini, WalterTavola, GiacomoPogliani, MarcelloQuarta, DavideZanero, Stefano +
DETECTING UNSECURE DATA FLOW IN AUTOMATION TASK PROGRAMS 1-gen-2020 F. MaggiM. PoglianiD. QuartaS. Zanero +
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds 1-gen-2018 Carminati, MicheleMaggi, FedericoSpagnolini, UmbertoZanero, Stefano +
Security Evaluation of a Banking Fraud Analysis System 1-gen-2018 Carminati, MichelePolino, MarioCONTINELLA, ANDREAMaggi, FedericoZANERO, STEFANO +
GreatEatlon: Fast, Static Detection of Mobile Ransomware 1-gen-2017 ZHENG, CHENGYUZANERO, STEFANOMAGGI, FEDERICO +
An Experimental Security Analysis of an Industrial Robot Controller 1-gen-2017 Quarta, DavidePogliani, MarcelloPolino, MarioMaggi, FedericoZanchettin, ANDREA MARIAZanero, Stefano
Poster: Detecting WebInjects through Live Memory Inspection 1-gen-2017 Continella, AndreaPogliani, MarcelloCarminati, MicheleMaggi, FedericoZanero, Stefano +
Prometheus: Analyzing WebInject-based information stealers 1-gen-2017 CONTINELLA, ANDREACARMINATI, MICHELEPOLINO, MARIOZANERO, STEFANOMAGGI, FEDERICO +
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks 1-gen-2017 MAGGI, FEDERICOZANERO, STEFANO +
Protection system and method for protecting a computer system against ransomware attack 1-gen-2016 A. BarenghiS. ZaneroF. MaggiA. ContinellaG. De PasqualeA. Guagnelli +
On-chip system call tracing: A feasibility study and open prototype 1-gen-2016 ZHENG, CHENGYUZANERO, STEFANOMAGGI, FEDERICO +
Trellis: Privilege Separation for Multi-user Applications Made Easy 1-gen-2016 MAMBRETTI, ANDREAMAGGI, FEDERICOZANERO, STEFANO +
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners 1-gen-2016 MAGGI, FEDERICOZANERO, STEFANO +
ShieldFS: a self-healing, ransomware-aware filesystem 1-gen-2016 CONTINELLA, ANDREABARENGHI, ALESSANDROZANERO, STEFANOMAGGI, FEDERICO +
BankSealer: A decision support system for online banking fraud analysis and investigation 1-gen-2015 CARMINATI, MICHELEMAGGI, FEDERICOEPIFANI, ILENIAZANERO, STEFANO +
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries 1-gen-2015 POLINO, MARIOMAGGI, FEDERICOZANERO, STEFANO +
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications 1-gen-2015 ZANERO, STEFANOMAGGI, FEDERICO +
Scalable Testing of Mobile Antivirus Applications 1-gen-2015 QUARTA, DAVIDEZANERO, STEFANOMAGGI, FEDERICO +
Face/Off: Preventing Privacy Leakage From Photos in Social Networks 1-gen-2015 MAGGI, FEDERICO +
HelDroid: Dissecting and Detecting Mobile Ransomware 1-gen-2015 ZANERO, STEFANOMAGGI, FEDERICO +
A Practical Attack Against a KNX-based Building Automation System 1-gen-2014 ANTONINI, ALESSIOMAGGI, FEDERICOZANERO, STEFANO
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication 1-gen-2014 MAGGI, FEDERICOZANERO, STEFANO +
AndRadar: Fast Discovery of Android Applications in Alternative Markets 1-gen-2014 MAGGI, FEDERICOZANERO, STEFANO +
BankSealer: An Online Banking Fraud Analysis and Decision Support System 1-gen-2014 CARMINATI, MICHELEMAGGI, FEDERICOEPIFANI, ILENIAZANERO, STEFANO +
ZARATHUSTRA: Extracting Webinject signatures from banking trojans 1-gen-2014 CRISCIONE, CLAUDIOZANERO, STEFANOMAGGI, FEDERICO +
Phoenix: DGA-Based Botnet Tracking and Intelligence 1-gen-2014 MAGGI, FEDERICOZANERO, STEFANO +
Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services 1-gen-2014 MAGGI, FEDERICOZANERO, STEFANO +
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned 1-gen-2014 MAGGI, FEDERICOZANERO, STEFANO +
BitIodine: Extracting Intelligence from the Bitcoin Network 1-gen-2014 MAGGI, FEDERICOZANERO, STEFANO +
Black-box forensic and antiforensic characteristics of solid-state drives 1-gen-2014 FROSSI, ALESSANDROMAGGI, FEDERICOZANERO, STEFANO +
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors 1-gen-2013 MAGGI, FEDERICOZANERO, STEFANO +
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth 1-gen-2013 DARDANELLI, ANDREAMAGGI, FEDERICOTANELLI, MARAZANERO, STEFANOSAVARESI, SERGIO MATTEO +
Adaptive and Flexible Smartphone Power Modeling 1-gen-2013 NACCI, ALESSANDRO ANTONIOTROVO', FRANCESCOMAGGI, FEDERICOFERRONI, MATTEOSCIUTO, DONATELLASANTAMBROGIO, MARCO DOMENICO +
Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures 1-gen-2013 MAGGI, FEDERICOFROSSI, ALESSANDROZANERO, STEFANO +
A Comprehensive Black-box Methodology for Testing the Forensic Characteristics of Solid-state Drives 1-gen-2013 FROSSI, ALESSANDROMAGGI, FEDERICOZANERO, STEFANO +
All your face are belong to us: breaking Facebook's social authentication 1-gen-2012 MAGGI, FEDERICOZANERO, STEFANO +
Lines of malicious code: insights into the malicious software industry 1-gen-2012 DI FEDERICO, ALESSANDROMAGGI, FEDERICOZANERO, STEFANO +
Finding Non-trivial Malware Naming Inconsistencies 1-gen-2011 MAGGI, FEDERICOSALVANESCHI, GUIDOZANERO, STEFANO +
Is the future Web more insecure? Distractions and solutions of new-old security issues and measures 1-gen-2011 MAGGI, FEDERICOZANERO, STEFANO
BURN: Baring Unknown Rogue Networks 1-gen-2011 MAGGI, FEDERICOCAVIGLIA, GIORGIOZANERO, STEFANOCIUCCARELLI, PAOLO +
A social-engineering-centric data collection initiative to study phishing 1-gen-2011 MAGGI, FEDERICOZANERO, STEFANO +
POSTER: Fast, Automatic iPhone Shoulder Surfing 1-gen-2011 MAGGI, FEDERICOVOLPATTO, ALBERTOGASPARINI, SIMONEBORACCHI, GIACOMOZANERO, STEFANO
A Fast Eavesdropping Attack Against Touchscreens 1-gen-2011 MAGGI, FEDERICOVOLPATTO, ALBERTOBORACCHI, GIACOMOZANERO, STEFANO +
System Security research at Politecnico di Milano 1-gen-2011 MAGGI, FEDERICOZANERO, STEFANO
Effective Anomaly Detection with Scarce Training Data 1-gen-2010 MAGGI, FEDERICO +
A Recognizer of Rational Trace Languages 1-gen-2010 MAGGI, FEDERICO
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds 1-gen-2010 MAGGI, FEDERICO
Detecting Intrusions through System Call Sequence and Argument Analysis 1-gen-2010 MAGGI, FEDERICOMATTEUCCI, MATTEOZANERO, STEFANO
Effective multimodel anomaly detection using cooperative negotiation 1-gen-2010 VOLPATTO, ALBERTOMAGGI, FEDERICOZANERO, STEFANO
Protecting a Moving Target: Addressing Web Application Concept Drift 1-gen-2009 MAGGI, FEDERICO +
Mostrati risultati da 1 a 50 di 55
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile