Follow
Mario Polino
Mario Polino
Verified email at polimi.it - Homepage
Title
Cited by
Cited by
Year
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE symposium on security and privacy (SP), 138-157, 2016
9552016
An experimental security analysis of an industrial robot controller
D Quarta, M Pogliani, M Polino, F Maggi, AM Zanchettin, S Zanero
2017 IEEE Symposium on Security and Privacy (SP), 268-286, 2017
1662017
Going native: Using a large-scale analysis of android apps to create a practical native-code sandboxing policy
V Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, P de Geus, ...
The Network and Distributed System Security Symposium 2016, 1-15, 2016
1202016
Measuring and defeating anti-instrumentation-equipped malware
M Polino, A Continella, S Mariani, S D’Alessio, L Fontana, F Gritti, ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
512017
Rogue robots: Testing the limits of an industrial robot’s security
F Maggi, D Quarta, M Pogliani, M Polino, AM Zanchettin, S Zanero
Trend Micro, Politecnico di Milano, Tech. Rep, 1-21, 2017
492017
Jackdaw: Towards automatic reverse engineering of large datasets of binaries
M Polino, A Scorti, F Maggi, S Zanero
Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015
392015
There's a hole in that bucket! a large-scale analysis of misconfigured s3 buckets
A Continella, M Polino, M Pogliani, S Zanero
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
292018
Security of controlled manufacturing systems in the connected factory: The case of industrial robots
M Pogliani, D Quarta, M Polino, M Vittone, F Maggi, S Zanero
Journal of Computer Virology and Hacking Techniques 15, 161-175, 2019
262019
Security evaluation of a banking fraud analysis system
M Carminati, M Polino, A Continella, A Lanzi, F Maggi, S Zanero
ACM Transactions on Privacy and Security (TOPS) 21 (3), 1-31, 2018
222018
Prometheus: Analyzing WebInject-based information stealers
A Continella, M Carminati, M Polino, A Lanzi, S Zanero, F Maggi
Journal of Computer Security 25 (2), 117-137, 2017
222017
A Systematical and longitudinal study of evasive behaviors in windows malware
N Galloro, M Polino, M Carminati, A Continella, S Zanero
Computers & Security 113, 102550, 2022
102022
Elisa: Eliciting isa of raw binaries for fine-grained code and data separation
P De Nicolao, M Pogliani, M Polino, M Carminati, D Quarta, S Zanero
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018
102018
Nosql breakdown: A large-scale analysis of misconfigured nosql services
D Ferrari, M Carminati, M Polino, S Zanero
Annual computer security applications conference, 567-581, 2020
92020
Evasion attacks against banking fraud detection systems
M Carminati, L Santini, M Polino, S Zanero
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
82020
Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici
C Anglano, L Aniello, A Antinori, A Armando, R Aversa, M Baldi, ...
Consorzio Interuniversitario Nazionale per l'Informatica-CINI, 2018
52018
SysTaint: Assisting Reversing of Malicious Network Communications
G Viglianisi, M Carminati, M Polino, A Continella, S Zanero
Proceedings of the 8th Software Security, Protection, and Reverse …, 2018
22018
Apícula: Static detection of API calls in generic streams of bytes
M D’Onghia, M Salvadore, BM Nespoli, M Carminati, M Polino, S Zanero
Computers & Security 119, 102775, 2022
12022
SyML: Guiding symbolic execution toward vulnerable states through pattern learning
N Ruaro, K Zeng, L Dresel, M Polino, T Bao, A Continella, S Zanero, ...
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
12021
Hiding Pin's Artifacts to Defeat Evasive Malware
M Polino, A Continella, S Mariani, S D’Alessio, L Fontana, F Gritti, ...
Black Hat Europe 2017, 2017
12017
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks
A de Faveri Tron, S Longari, M Carminati, M Polino, S Zanero
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20