POLINO, MARIO

POLINO, MARIO  

DIPARTIMENTO DI ELETTRONICA, INFORMAZIONE E BIOINGEGNERIA  

Mostra records
Risultati 1 - 19 di 19 (tempo di esecuzione: 0.027 secondi).
Titolo Data di pubblicazione Autori File
Advancing Fraud Detection Systems through Online Learning 1-gen-2023 T. PaladiniM. Bernasconi de LucaM. CarminatiM. PolinoF. Trovo'S. Zanero
An Experimental Security Analysis of an Industrial Robot Controller 1-gen-2017 Quarta, DavidePogliani, MarcelloPolino, MarioMaggi, FedericoZanchettin, ANDREA MARIAZanero, Stefano
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks 1-gen-2022 de Faveri Tron, AlviseLongari, StefanoCarminati, MichelePolino, MarioZanero, Stefano
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation 1-gen-2018 DE NICOLAO, PIETROMarcello PoglianiMario PolinoMichele CarminatiDavide QuartaStefano Zanero
Evasion Attacks against Banking Fraud Detection Systems 1-gen-2020 M. CarminatiM. PolinoS. Zanero +
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy 1-gen-2016 Mario Polino +
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries 1-gen-2015 POLINO, MARIOMAGGI, FEDERICOZANERO, STEFANO +
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors 1-gen-2023 D'Onghia, MarioCarminati, MichelePolino, MarioZanero, Stefano +
Measuring and Defeating Anti-Instrumentation-Equipped Malware 1-gen-2017 Mario PolinoStefano Zanero
Measuring and Defeating Anti-Instrumentation-Equipped Malware 1-gen-2017 POLINO, MARIOCONTINELLA, ANDREAD'ALESSIO, STEFANOFONTANA, LORENZOZANERO, STEFANO +
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services 1-gen-2020 Michele CarminatiMario PolinoStefano Zanero +
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing 1-gen-2023 Binosi, LorenzoPolino, MarioCarminati, MicheleZanero, Stefano +
SOK: (State of) the Art of War: Offensive Techniques in Binary Analysis 1-gen-2016 Polino M. +
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning 1-gen-2021 Ruaro, NicolaPolino, MarioContinella, AndreaZanero, Stefano +
SysTaint: Assisting Reversing of Malicious Network Communications 1-gen-2018 Carminati, MichelePolino, MarioContinella, AndreaZanero, Stefano +
Task Aware Intrusion Detection for Industrial Robots 1-gen-2023 Stefano LongariMario PolinoMichele CarminatiAndrea Maria ZanchettinMara TanelliStefano Zanero +
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis 1-gen-2023 Bertani, AlessandroPolino, MarioCarminati, MicheleZanero, Stefano +
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets 1-gen-2018 Continella, AndreaPolino, MarioPogliani, MarcelloZanero, Stefano
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation 1-gen-2023 Alessandro BertaniLorenzo BinosiMichele CarminatiStefano ZaneroMario Polino +