POLINO, MARIO

POLINO, MARIO  

DIPARTIMENTO DI ELETTRONICA, INFORMAZIONE E BIOINGEGNERIA  

Mostra records
Risultati 1 - 20 di 36 (tempo di esecuzione: 0.017 secondi).
Titolo Data di pubblicazione Autori File
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware 1-gen-2022 Galloro, NicolaPolino, MarioCarminati, MicheleContinella, AndreaZanero, Stefano
Advancing Fraud Detection Systems through Online Learning 1-gen-2023 T. PaladiniM. Bernasconi de LucaM. CarminatiM. PolinoF. Trovo'S. Zanero
Amaretto: An Active Learning Framework for Money Laundering Detection 1-gen-2022 Labanca, DaniloPolino, MarioCarminati, MicheleZanero, Stefano +
An Experimental Security Analysis of an Industrial Robot Controller 1-gen-2017 Quarta, DavidePogliani, MarcelloPolino, MarioMaggi, FedericoZanchettin, ANDREA MARIAZanero, Stefano
Apícula: Static Detection of API Calls in Generic Streams of Bytes 1-gen-2022 D’Onghia, MarioSalvadore, MatteoCarminati, MichelePolino, MarioZanero, Stefano +
BINO: Automatic Recognition of Inline Binary Functions from Template Classes 1-gen-2023 Lorenzo BinosiMario PolinoMichele CarminatiStefano Zanero
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks 1-gen-2022 de Faveri Tron, AlviseLongari, StefanoCarminati, MichelePolino, MarioZanero, Stefano
Confidential Computing: A Security Overview and Future Research Directions In corso di stampa Alessandro BertaniStefano ZaneroMario Polino +
CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment 1-gen-2024 Longari, StefanoPozone, AlessandroLeoni, JessicaPolino, MarioCarminati, MicheleTanelli, MaraZanero, Stefano
Do You Trust Your Device? Open Challenges in IoT Security Analysis 1-gen-2024 Binosi, LorenzoCarminati, MicheleZanero, StefanoPolino, Mario +
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation 1-gen-2018 DE NICOLAO, PIETROMarcello PoglianiMario PolinoMichele CarminatiDavide QuartaStefano Zanero
Evasion Attacks against Banking Fraud Detection Systems 1-gen-2020 M. CarminatiM. PolinoS. Zanero +
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies 1-gen-2023 Paladini, TommasoMonti, FrancescoPolino, MarioCarminati, MicheleZanero, Stefano
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy 1-gen-2016 Mario Polino +
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries 1-gen-2015 POLINO, MARIOMAGGI, FEDERICOZANERO, STEFANO +
Janus: A Trusted Execution Environment Approach for Attack Detection in Industrial Robot Controllers 1-gen-2024 Longari, StefanoJannone, JacopoPolino, MarioCarminati, MicheleZanchettin, AndreaTanelli, MaraZanero, Stefano
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors 1-gen-2023 D'Onghia, MarioCarminati, MichelePolino, MarioZanero, Stefano +
Measuring and Defeating Anti-Instrumentation-Equipped Malware 1-gen-2017 Mario PolinoStefano Zanero
Measuring and Defeating Anti-Instrumentation-Equipped Malware 1-gen-2017 POLINO, MARIOCONTINELLA, ANDREAD'ALESSIO, STEFANOFONTANA, LORENZOZANERO, STEFANO +
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services 1-gen-2020 Michele CarminatiMario PolinoStefano Zanero +