POLINO, MARIO

POLINO, MARIO  

DIPARTIMENTO DI ELETTRONICA, INFORMAZIONE E BIOINGEGNERIA  

Mostra records
Risultati 1 - 20 di 28 (tempo di esecuzione: 0.036 secondi).
Titolo Data di pubblicazione Autori File
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware 1-gen-2022 Galloro, NicolaPolino, MarioCarminati, MicheleContinella, AndreaZanero, Stefano
Advancing Fraud Detection Systems through Online Learning 1-gen-2023 T. PaladiniM. Bernasconi de LucaM. CarminatiM. PolinoF. Trovo'S. Zanero
Amaretto: An Active Learning Framework for Money Laundering Detection 1-gen-2022 Labanca, DaniloPolino, MarioCarminati, MicheleZanero, Stefano +
An Experimental Security Analysis of an Industrial Robot Controller 1-gen-2017 Quarta, DavidePogliani, MarcelloPolino, MarioMaggi, FedericoZanchettin, ANDREA MARIAZanero, Stefano
Apícula: Static Detection of API Calls in Generic Streams of Bytes 1-gen-2022 D’Onghia, MarioSalvadore, MatteoCarminati, MichelePolino, MarioZanero, Stefano +
BINO: Automatic Recognition of Inline Binary Functions from Template Classes 1-gen-2023 Lorenzo BinosiMario PolinoMichele CarminatiStefano Zanero
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks 1-gen-2022 de Faveri Tron, AlviseLongari, StefanoCarminati, MichelePolino, MarioZanero, Stefano
CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment 1-gen-2023 Longari, StefanoPozone, AlessandroLeoni, JessicaPolino, MarioCarminati, MicheleTanelli, MaraZanero, Stefano
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation 1-gen-2018 DE NICOLAO, PIETROMarcello PoglianiMario PolinoMichele CarminatiDavide QuartaStefano Zanero
Evasion Attacks against Banking Fraud Detection Systems 1-gen-2020 M. CarminatiM. PolinoS. Zanero +
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies 1-gen-2023 Paladini, TommasoMonti, FrancescoPolino, MarioCarminati, MicheleZanero, Stefano
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy 1-gen-2016 Mario Polino +
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries 1-gen-2015 POLINO, MARIOMAGGI, FEDERICOZANERO, STEFANO +
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors 1-gen-2023 D'Onghia, MarioCarminati, MichelePolino, MarioZanero, Stefano +
Measuring and Defeating Anti-Instrumentation-Equipped Malware 1-gen-2017 Mario PolinoStefano Zanero
Measuring and Defeating Anti-Instrumentation-Equipped Malware 1-gen-2017 POLINO, MARIOCONTINELLA, ANDREAD'ALESSIO, STEFANOFONTANA, LORENZOZANERO, STEFANO +
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services 1-gen-2020 Michele CarminatiMario PolinoStefano Zanero +
Prometheus: Analyzing WebInject-based information stealers 1-gen-2017 CONTINELLA, ANDREACARMINATI, MICHELEPOLINO, MARIOZANERO, STEFANOMAGGI, FEDERICO +
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing 1-gen-2023 Binosi, LorenzoPolino, MarioCarminati, MicheleZanero, Stefano +
Security Evaluation of a Banking Fraud Analysis System 1-gen-2018 Carminati, MichelePolino, MarioCONTINELLA, ANDREAMaggi, FedericoZANERO, STEFANO +