POLINO, MARIO
POLINO, MARIO
DIPARTIMENTO DI ELETTRONICA, INFORMAZIONE E BIOINGEGNERIA
Advancing Fraud Detection Systems through Online Learning
2023-01-01 Paladini, T.; Bernasconi de Luca, M.; Carminati, M.; Polino, M.; Trovo', F.; Zanero, S.
An Experimental Security Analysis of an Industrial Robot Controller
2017-01-01 Quarta, Davide; Pogliani, Marcello; Polino, Mario; Maggi, Federico; Zanchettin, ANDREA MARIA; Zanero, Stefano
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks
2022-01-01 de Faveri Tron, Alvise; Longari, Stefano; Carminati, Michele; Polino, Mario; Zanero, Stefano
Confidential Computing: A Security Overview and Future Research Directions
In corso di stampa Bertani, Alessandro; Caraccio, Danilo; Zanero, Stefano; Polino, Mario
Do You Trust Your Device? Open Challenges in IoT Security Analysis
2024-01-01 Binosi, Lorenzo; Mazzini, Pietro; Sanna, Alessandro; Carminati, Michele; Giacinto, Giorgio; Lazzeretti, Riccardo; Zanero, Stefano; Polino, Mario; Coppa, Emilio; Maiorca, Davide
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation
2018-01-01 DE NICOLAO, Pietro; Pogliani, Marcello; Polino, Mario; Carminati, Michele; Quarta, Davide; Zanero, Stefano
Evasion Attacks against Banking Fraud Detection Systems
2020-01-01 Carminati, M.; Santini, L.; Polino, M.; Zanero, S.
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy
2016-01-01 Afonso, V.; Bianchi, A.; Fratantonio, Y.; Doupè, A.; Polino, Mario; de Geus, P.; Kruegel, C.; Vigna, G.
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries
2015-01-01 Polino, Mario; Scorti, Andrea; Maggi, Federico; Zanero, Stefano
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors
2023-01-01 D'Onghia, Mario; Di Cesare, Federico; Gallo, Luigi; Carminati, Michele; Polino, Mario; Zanero, Stefano
Measuring and Defeating Anti-Instrumentation-Equipped Malware
2017-01-01 Polino, Mario; Zanero, Stefano
Measuring and Defeating Anti-Instrumentation-Equipped Malware
2017-01-01 Polino, Mario; Continella, Andrea; Mariani, Sebastiano; D'Alessio, Stefano; Fontana, Lorenzo; Gritti, Fabio; Zanero, Stefano
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services
2020-01-01 Ferrari, Dario; Carminati, Michele; Polino, Mario; Zanero, Stefano
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing
2023-01-01 Binosi, Lorenzo; Rullo, Luca; Polino, Mario; Carminati, Michele; Zanero, Stefano
SOK: (State of) the Art of War: Offensive Techniques in Binary Analysis
2016-01-01 Shoshitaishvili, Y.; Wang, R.; Salls, C.; Stephens, N.; Polino, M.; Dutcher, A.; Grosen, J.; Feng, S.; Hauser, C.; Kruegel, C.; Vigna, G.
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning
2021-01-01 Ruaro, Nicola; Zeng, Kyle; Dresel, Lukas; Polino, Mario; Bao, Tiffany; Continella, Andrea; Zanero, Stefano; Kruegel, Christopher; Vigna, Giovanni
SysTaint: Assisting Reversing of Malicious Network Communications
2018-01-01 Viglianisi, Gabriele; Carminati, Michele; Polino, Mario; Continella, Andrea; Zanero, Stefano
Tarallo: Evading Behavioral Malware Detectors in the Problem Space
2024-01-01 Digregorio, Gabriele; Maccarrone, Salvatore; D'Onghia, Mario; Gallo, Luigi; Carminati, Michele; Polino, Mario; Zanero, Stefano
Task Aware Intrusion Detection for Industrial Robots
2023-01-01 Avanzi, Davide; Longari, Stefano; Polino, Mario; Carminati, Michele; Zanchettin, ANDREA MARIA; Tanelli, Mara; Zanero, Stefano
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis
2023-01-01 Remigio, Riccardo; Bertani, Alessandro; Polino, Mario; Carminati, Michele; Zanero, Stefano