Davide Quarta
Davide Quarta
Verified email at
Cited by
Cited by
An Experimental Security Analysis of an Industrial Robot Controller
D Quarta, M Pogliani, M Polino, F Maggi, AM Zanchettin, S Zanero
Security and Privacy (SP), 2017 IEEE Symposium, 268-286, 2017
Rogue robots: Testing the limits of an industrial robot’s security
F Maggi, D Quarta, M Pogliani, M Polino, AM Zanchettin, S Zanero
Trend Micro, Politecnico di Milano, Tech. Rep, 1-21, 2017
Security of controlled manufacturing systems in the connected factory: The case of industrial robots
M Pogliani, D Quarta, M Polino, M Vittone, F Maggi, S Zanero
Journal of Computer Virology and Hacking Techniques 15, 161-175, 2019
The fragility of industrial IoT’s data backbone
F Maggi, R Vosseler, D Quarta
Trend Micro Inc, 2018
Groupdroid: Automatically grouping mobile malware by extracting code similarities
N Marastoni, A Continella, D Quarta, S Zanero, MD Preda
Proceedings of the 7th Software Security, Protection, and Reverse …, 2017
Smart factory security: A case study on a modular smart manufacturing system
F Maggi, M Balduzzi, R Vosseler, M Rösler, W Quadrini, G Tavola, ...
Procedia Computer Science 180, 666-675, 2021
Toward systematically exploring antivirus engines
D Quarta, F Salvioni, A Continella, S Zanero
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018
Elisa: Eliciting isa of raw binaries for fine-grained code and data separation
P De Nicolao, M Pogliani, M Polino, M Carminati, D Quarta, S Zanero
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018
Detecting Insecure Code Patterns in Industrial Robot Programs
M Pogliani, F Maggi, M Balduzzi, D Quarta, S Zanero
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
Scalable testing of mobile antivirus applications
A Valdi, E Lever, S Benefico, D Quarta, S Zanero, F Maggi
Computer 48 (11), 60-68, 2015
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone
D Quarta, M Ianni, A Machiry, Y Fratantonio, E Gustafson, D Balzarotti, ...
Proceedings of the 2021 Research on offensive and defensive techniques in …, 2021
Detecting unsecure data flow in automation task programs
F Maggi, M Pogliani, D Quarta, M Vittone, S Zanero
US Patent 11,440,190, 2022
Embedded system security: attacks, impacts & defenses
Italy, 2018
The system can't perform the operation now. Try again later.
Articles 1–13