Sfoglia per Autore
A Comprehensive Black-box Methodology for Testing the Forensic Characteristics of Solid-state Drives
2013-01-01 Gabriele, Bonetti; Marco, Viglione; Frossi, Alessandro; Maggi, Federico; Zanero, Stefano
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors
2013-01-01 Maggi, Federico; Andrea, Valdi; Zanero, Stefano
Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures
2013-01-01 Maggi, Federico; Frossi, Alessandro; Zanero, Stefano; Gianluca, Stringhini; Brett Stone, Gross; Christopher, Kruegel; Giovanni, Vigna
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of “Crypto Wars” in Security Research
2014-01-01 Sergey, Bratus; Iván, Arce; Michael E., Locasto; Zanero, Stefano
A Practical Attack Against a KNX-based Building Automation System
2014-01-01 Antonini, Alessio; Maggi, Federico; Zanero, Stefano
Jackdaw: Automatic, unsupervised, scalable extraction and semantic tagging of (interesting) behaviors
2014-01-01 Zanero, Stefano
AndRadar: Fast Discovery of Android Applications in Alternative Markets
2014-01-01 Martina, Lindorfer; Stamatis, Volanis; Alessandro, Sisto; Matthias, Neugschwandtner; Elias, Athanasopoulos; Maggi, Federico; Christian, Platzer; Zanero, Stefano; Sotiris, Ioannidis
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned
2014-01-01 Polakis, Iasonas; Maggi, Federico; Zanero, Stefano; Keromytis, Angelos D.
Black-box forensic and antiforensic characteristics of solid-state drives
2014-01-01 Gabriele, Bonetti; Marco, Viglione; Frossi, Alessandro; Maggi, Federico; Zanero, Stefano
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
2014-01-01 Iasonas, Polakis; Panagiotis, Ilia; Maggi, Federico; Marco, Lancini; Georgios, Kontaxis; Zanero, Stefano; Sotiris, Ioannidis; Angelos D., Keromytis
BankSealer: An Online Banking Fraud Analysis and Decision Support System
2014-01-01 Carminati, Michele; Roberto, Caron; Maggi, Federico; Epifani, Ilenia; Zanero, Stefano
BitIodine: Extracting Intelligence from the Bitcoin Network
2014-01-01 Michele, Spagnuolo; Maggi, Federico; Zanero, Stefano
Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services
2014-01-01 N., Nikiforakis; Maggi, Federico; G., Stringhini; M. Z., Rafique; W., Joosen; C., Kruegel; F., Piessens; G., Vigna; Zanero, Stefano
ZARATHUSTRA: Extracting Webinject signatures from banking trojans
2014-01-01 Criscione, Claudio; Fabio, Bosatelli; Zanero, Stefano; Maggi, Federico
Phoenix: DGA-Based Botnet Tracking and Intelligence
2014-01-01 Stefano, Schiavoni; Maggi, Federico; Lorenzo, Cavallaro; Zanero, Stefano
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications
2015-01-01 Falsina, Luca; Fratantonio, Yanick; Zanero, Stefano; Kruegel, Christopher; Vigna, Giovanni; Maggi, Federico
Practical Exploit Generation for Intent Message Vulnerabilities in Android
2015-01-01 D., Gallingani; R., Gjomemo; V., Venkatakrishnan; Zanero, Stefano
HelDroid: Dissecting and Detecting Mobile Ransomware
2015-01-01 Andronio, Nicoló; Zanero, Stefano; Maggi, Federico
BankSealer: A decision support system for online banking fraud analysis and investigation
2015-01-01 Carminati, Michele; Caron, Roberto; Maggi, Federico; Epifani, Ilenia; Zanero, Stefano
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries
2015-01-01 Polino, Mario; Scorti, Andrea; Maggi, Federico; Zanero, Stefano
Scalable Testing of Mobile Antivirus Applications
2015-01-01 Valdi, Andrea; Lever, Eros; Benefico, Simone; Quarta, Davide; Zanero, Stefano; Maggi, Federico
Protection system and method for protecting a computer system against ransomware attack
2016-01-01 Barenghi, A.; Zanero, S.; Maggi, F.; Continella, A.; De Pasquale, G.; Guagnelli, A.; Zingaro, G.
Up Close and Personal: Cybersecurity in Medical IoT Devices
2016-01-01 Zanero, Stefano; Evenchick, Eric
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners
2016-01-01 Bazzoli, Enrico; Criscione, Claudio; Maggi, Federico; Zanero, Stefano
On-chip system call tracing: A feasibility study and open prototype
2016-01-01 Zheng, Chengyu; Dalla Preda, Mila; Granjal, Jorge; Zanero, Stefano; Maggi, Federico
Trellis: Privilege Separation for Multi-user Applications Made Easy
2016-01-01 Mambretti, Andrea; Onarlioglu, Kaan; Mulliner, Collin; Robertson, William; Kirda, Engin; Maggi, Federico; Zanero, Stefano
Editorial
2016-01-01 Di Natale, Giorgio; Zanero, Stefano
ShieldFS: a self-healing, ransomware-aware filesystem
2016-01-01 Continella, Andrea; Guagnelli, Alessandro; Zingaro, Giovanni; De Pasquale, Giulio; Barenghi, Alessandro; Zanero, Stefano; Maggi, Federico
Poster: Detecting WebInjects through Live Memory Inspection
2017-01-01 Mariani, Nicola; Continella, Andrea; Pogliani, Marcello; Carminati, Michele; Maggi, Federico; Zanero, Stefano
Measuring and Defeating Anti-Instrumentation-Equipped Malware
2017-01-01 Polino, Mario; Zanero, Stefano
Cyber-Physical Systems
2017-01-01 Zanero, Stefano
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities
2017-01-01 Marastoni, Niccolò; Continella, Andrea; Quarta, Davide; Zanero, Stefano; Preda, Mila Dalla
An Experimental Security Analysis of an Industrial Robot Controller
2017-01-01 Quarta, Davide; Pogliani, Marcello; Polino, Mario; Maggi, Federico; Zanchettin, ANDREA MARIA; Zanero, Stefano
Measuring and Defeating Anti-Instrumentation-Equipped Malware
2017-01-01 Polino, Mario; Continella, Andrea; Mariani, Sebastiano; D'Alessio, Stefano; Fontana, Lorenzo; Gritti, Fabio; Zanero, Stefano
Prometheus: Analyzing WebInject-based information stealers
2017-01-01 Continella, Andrea; Carminati, Michele; Polino, Mario; Lanzi, Andrea; Zanero, Stefano; Maggi, Federico
GreatEatlon: Fast, Static Detection of Mobile Ransomware
2017-01-01 Zheng, Chengyu; Dellarocca, Nicola; Andronio, Niccolò; Zanero, Stefano; Maggi, Federico
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks
2017-01-01 Palanca, Andrea; Evenchick, Eric; Maggi, Federico; Zanero, Stefano
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System
2017-01-01 Carminati, Michele; Valentini, Luca; Zanero, Stefano
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation
2018-01-01 DE NICOLAO, Pietro; Pogliani, Marcello; Polino, Mario; Carminati, Michele; Quarta, Davide; Zanero, Stefano
Security Evaluation of a Banking Fraud Analysis System
2018-01-01 Carminati, Michele; Polino, Mario; Continella, Andrea; Lanzi, Andrea; Maggi, Federico; Zanero, Stefano; Zanero, Stefano
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets
2018-01-01 Continella, Andrea; Polino, Mario; Pogliani, Marcello; Zanero, Stefano
Extended Abstract: Toward Systematically Exploring Antivirus Engines
2018-01-01 Quarta, Davide; Salvioni, Federico; Continella, Andrea; Zanero, Stefano
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds
2018-01-01 Carminati, Michele; Baggio, Alessandro; Maggi, Federico; Spagnolini, Umberto; Zanero, Stefano
SysTaint: Assisting Reversing of Malicious Network Communications
2018-01-01 Viglianisi, Gabriele; Carminati, Michele; Polino, Mario; Continella, Andrea; Zanero, Stefano
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems
2018-01-01 Zanero, Stefano
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems
2019-01-01 Pogliani, Marcello; Barlocco, Mattia; Pesatori, Mirko; Zanero, Stefano
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis
2019-01-01 Longari, Stefano; Cannizzo, Andrea; Carminati, Michele; Zanero, Stefano
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network
2019-01-01 Longari, Stefano; Penco, Matteo; Carminati, Michele; Zanero, Stefano
Security of controlled manufacturing systems in the connected factory: the case of industrial robots
2019-01-01 Pogliani, Marcello; Quarta, Davide; Polino, Mario; Vittone, Martino; Maggi, Federico; Zanero, Stefano
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots
2019-01-01 Ferretti, Pietro; Pogliani, Marcello; Zanero, Stefano
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile