Sfoglia per Autore  

Opzioni
Mostrati risultati da 51 a 100 di 144
Titolo Data di pubblicazione Autori File
A Comprehensive Black-box Methodology for Testing the Forensic Characteristics of Solid-state Drives 1-gen-2013 FROSSI, ALESSANDROMAGGI, FEDERICOZANERO, STEFANO +
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors 1-gen-2013 MAGGI, FEDERICOZANERO, STEFANO +
Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures 1-gen-2013 MAGGI, FEDERICOFROSSI, ALESSANDROZANERO, STEFANO +
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of “Crypto Wars” in Security Research 1-gen-2014 ZANERO, STEFANO +
A Practical Attack Against a KNX-based Building Automation System 1-gen-2014 ANTONINI, ALESSIOMAGGI, FEDERICOZANERO, STEFANO
Jackdaw: Automatic, unsupervised, scalable extraction and semantic tagging of (interesting) behaviors 1-gen-2014 ZANERO, STEFANO
AndRadar: Fast Discovery of Android Applications in Alternative Markets 1-gen-2014 MAGGI, FEDERICOZANERO, STEFANO +
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned 1-gen-2014 MAGGI, FEDERICOZANERO, STEFANO +
Black-box forensic and antiforensic characteristics of solid-state drives 1-gen-2014 FROSSI, ALESSANDROMAGGI, FEDERICOZANERO, STEFANO +
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication 1-gen-2014 MAGGI, FEDERICOZANERO, STEFANO +
BankSealer: An Online Banking Fraud Analysis and Decision Support System 1-gen-2014 CARMINATI, MICHELEMAGGI, FEDERICOEPIFANI, ILENIAZANERO, STEFANO +
BitIodine: Extracting Intelligence from the Bitcoin Network 1-gen-2014 MAGGI, FEDERICOZANERO, STEFANO +
Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services 1-gen-2014 MAGGI, FEDERICOZANERO, STEFANO +
ZARATHUSTRA: Extracting Webinject signatures from banking trojans 1-gen-2014 CRISCIONE, CLAUDIOZANERO, STEFANOMAGGI, FEDERICO +
Phoenix: DGA-Based Botnet Tracking and Intelligence 1-gen-2014 MAGGI, FEDERICOZANERO, STEFANO +
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications 1-gen-2015 ZANERO, STEFANOMAGGI, FEDERICO +
Practical Exploit Generation for Intent Message Vulnerabilities in Android 1-gen-2015 ZANERO, STEFANO +
HelDroid: Dissecting and Detecting Mobile Ransomware 1-gen-2015 ZANERO, STEFANOMAGGI, FEDERICO +
BankSealer: A decision support system for online banking fraud analysis and investigation 1-gen-2015 CARMINATI, MICHELEMAGGI, FEDERICOEPIFANI, ILENIAZANERO, STEFANO +
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries 1-gen-2015 POLINO, MARIOMAGGI, FEDERICOZANERO, STEFANO +
Scalable Testing of Mobile Antivirus Applications 1-gen-2015 QUARTA, DAVIDEZANERO, STEFANOMAGGI, FEDERICO +
Protection system and method for protecting a computer system against ransomware attack 1-gen-2016 A. BarenghiS. ZaneroF. MaggiA. ContinellaG. De PasqualeA. Guagnelli +
Up Close and Personal: Cybersecurity in Medical IoT Devices 1-gen-2016 ZANERO, STEFANO +
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners 1-gen-2016 MAGGI, FEDERICOZANERO, STEFANO +
On-chip system call tracing: A feasibility study and open prototype 1-gen-2016 ZHENG, CHENGYUZANERO, STEFANOMAGGI, FEDERICO +
Trellis: Privilege Separation for Multi-user Applications Made Easy 1-gen-2016 MAMBRETTI, ANDREAMAGGI, FEDERICOZANERO, STEFANO +
Editorial 1-gen-2016 ZANERO, STEFANO +
ShieldFS: a self-healing, ransomware-aware filesystem 1-gen-2016 CONTINELLA, ANDREABARENGHI, ALESSANDROZANERO, STEFANOMAGGI, FEDERICO +
Poster: Detecting WebInjects through Live Memory Inspection 1-gen-2017 Continella, AndreaPogliani, MarcelloCarminati, MicheleMaggi, FedericoZanero, Stefano +
Measuring and Defeating Anti-Instrumentation-Equipped Malware 1-gen-2017 Mario PolinoStefano Zanero
Cyber-Physical Systems 1-gen-2017 ZANERO, STEFANO
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities 1-gen-2017 Continella, AndreaQuarta, DavideZanero, Stefano +
An Experimental Security Analysis of an Industrial Robot Controller 1-gen-2017 Quarta, DavidePogliani, MarcelloPolino, MarioMaggi, FedericoZanchettin, ANDREA MARIAZanero, Stefano
Measuring and Defeating Anti-Instrumentation-Equipped Malware 1-gen-2017 POLINO, MARIOCONTINELLA, ANDREAD'ALESSIO, STEFANOFONTANA, LORENZOZANERO, STEFANO +
Prometheus: Analyzing WebInject-based information stealers 1-gen-2017 CONTINELLA, ANDREACARMINATI, MICHELEPOLINO, MARIOZANERO, STEFANOMAGGI, FEDERICO +
GreatEatlon: Fast, Static Detection of Mobile Ransomware 1-gen-2017 ZHENG, CHENGYUZANERO, STEFANOMAGGI, FEDERICO +
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks 1-gen-2017 MAGGI, FEDERICOZANERO, STEFANO +
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System 1-gen-2017 CARMINATI, MICHELEZANERO, STEFANO +
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation 1-gen-2018 DE NICOLAO, PIETROMarcello PoglianiMario PolinoMichele CarminatiDavide QuartaStefano Zanero
Security Evaluation of a Banking Fraud Analysis System 1-gen-2018 Carminati, MichelePolino, MarioCONTINELLA, ANDREAMaggi, FedericoZANERO, STEFANO +
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets 1-gen-2018 Continella, AndreaPolino, MarioPogliani, MarcelloZanero, Stefano
Extended Abstract: Toward Systematically Exploring Antivirus Engines 1-gen-2018 QUARTA, DAVIDEContinella, AndreaZanero, Stefano +
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds 1-gen-2018 Carminati, MicheleMaggi, FedericoSpagnolini, UmbertoZanero, Stefano +
SysTaint: Assisting Reversing of Malicious Network Communications 1-gen-2018 Carminati, MichelePolino, MarioContinella, AndreaZanero, Stefano +
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems 1-gen-2018 Stefano Zanero
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems 1-gen-2019 Pogliani, MarcelloZanero, Stefano +
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis 1-gen-2019 Stefano LongariMichele CarminatiStefano Zanero +
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network 1-gen-2019 LONGARI, STEFANOCarminati, MicheleZanero, Stefano +
Security of controlled manufacturing systems in the connected factory: the case of industrial robots 1-gen-2019 Pogliani, MarcelloQuarta, DavidePolino, MarioZanero, Stefano +
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots 1-gen-2019 FERRETTI, PIETROPogliani, MarcelloZanero, Stefano
Mostrati risultati da 51 a 100 di 144
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile