POLINO, MARIO

POLINO, MARIO  

DIPARTIMENTO DI ELETTRONICA, INFORMAZIONE E BIOINGEGNERIA  

Mostra records
Risultati 1 - 20 di 29 (tempo di esecuzione: 0.072 secondi).
Titolo Data di pubblicazione Autori File
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware 1-gen-2022 Galloro, NicolaPolino, MarioCarminati, MicheleContinella, AndreaZanero, Stefano
Advancing Fraud Detection Systems through Online Learning 1-gen-2023 T. PaladiniM. Bernasconi de LucaM. CarminatiM. PolinoF. Trovo'S. Zanero
Amaretto: An Active Learning Framework for Money Laundering Detection 1-gen-2022 Labanca, DaniloPolino, MarioCarminati, MicheleZanero, Stefano +
An Experimental Security Analysis of an Industrial Robot Controller 1-gen-2017 Quarta, DavidePogliani, MarcelloPolino, MarioMaggi, FedericoZanchettin, ANDREA MARIAZanero, Stefano
Apícula: Static Detection of API Calls in Generic Streams of Bytes 1-gen-2022 D’Onghia, MarioSalvadore, MatteoCarminati, MichelePolino, MarioZanero, Stefano +
BINO: Automatic Recognition of Inline Binary Functions from Template Classes 1-gen-2023 Lorenzo BinosiMario PolinoMichele CarminatiStefano Zanero
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks 1-gen-2022 de Faveri Tron, AlviseLongari, StefanoCarminati, MichelePolino, MarioZanero, Stefano
CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment 1-gen-2024 Longari, StefanoPozone, AlessandroLeoni, JessicaPolino, MarioCarminati, MicheleTanelli, MaraZanero, Stefano
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation 1-gen-2018 DE NICOLAO, PIETROMarcello PoglianiMario PolinoMichele CarminatiDavide QuartaStefano Zanero
Evasion Attacks against Banking Fraud Detection Systems 1-gen-2020 M. CarminatiM. PolinoS. Zanero +
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies 1-gen-2023 Paladini, TommasoMonti, FrancescoPolino, MarioCarminati, MicheleZanero, Stefano
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy 1-gen-2016 Mario Polino +
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries 1-gen-2015 POLINO, MARIOMAGGI, FEDERICOZANERO, STEFANO +
Janus: A Trusted Execution Environment Approach for Attack Detection in Industrial Robot Controllers In corso di stampa Longari, StefanoJannone, JacopoPolino, MarioCarminati, MicheleZanchettin, AndreaTanelli, MaraZanero, Stefano
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors 1-gen-2023 D'Onghia, MarioCarminati, MichelePolino, MarioZanero, Stefano +
Measuring and Defeating Anti-Instrumentation-Equipped Malware 1-gen-2017 Mario PolinoStefano Zanero
Measuring and Defeating Anti-Instrumentation-Equipped Malware 1-gen-2017 POLINO, MARIOCONTINELLA, ANDREAD'ALESSIO, STEFANOFONTANA, LORENZOZANERO, STEFANO +
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services 1-gen-2020 Michele CarminatiMario PolinoStefano Zanero +
Prometheus: Analyzing WebInject-based information stealers 1-gen-2017 CONTINELLA, ANDREACARMINATI, MICHELEPOLINO, MARIOZANERO, STEFANOMAGGI, FEDERICO +
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing 1-gen-2023 Binosi, LorenzoPolino, MarioCarminati, MicheleZanero, Stefano +