Sok:(state of) the art of war: Offensive techniques in binary analysis Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ... 2016 IEEE symposium on security and privacy (SP), 138-157, 2016 | 1397 | 2016 |
An experimental security analysis of an industrial robot controller D Quarta, M Pogliani, M Polino, F Maggi, AM Zanchettin, S Zanero 2017 IEEE Symposium on Security and Privacy (SP), 268-286, 2017 | 229 | 2017 |
Going native: Using a large-scale analysis of android apps to create a practical native-code sandboxing policy V Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, P de Geus, ... The Network and Distributed System Security Symposium 2016, 1-15, 2016 | 143 | 2016 |
Rogue robots: Testing the limits of an industrial robot’s security F Maggi, D Quarta, M Pogliani, M Polino, AM Zanchettin, S Zanero Trend Micro, Politecnico di Milano, Tech. Rep, 1-21, 2017 | 74 | 2017 |
Measuring and defeating anti-instrumentation-equipped malware M Polino, A Continella, S Mariani, S D’Alessio, L Fontana, F Gritti, ... Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017 | 69 | 2017 |
A Systematical and longitudinal study of evasive behaviors in windows malware N Galloro, M Polino, M Carminati, A Continella, S Zanero Computers & security 113, 102550, 2022 | 57 | 2022 |
Security of controlled manufacturing systems in the connected factory: The case of industrial robots M Pogliani, D Quarta, M Polino, M Vittone, F Maggi, S Zanero Journal of Computer Virology and Hacking Techniques 15, 161-175, 2019 | 46 | 2019 |
There's a hole in that bucket! a large-scale analysis of misconfigured s3 buckets A Continella, M Polino, M Pogliani, S Zanero Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 46 | 2018 |
Jackdaw: Towards automatic reverse engineering of large datasets of binaries M Polino, A Scorti, F Maggi, S Zanero Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015 | 46 | 2015 |
Security evaluation of a banking fraud analysis system M Carminati, M Polino, A Continella, A Lanzi, F Maggi, S Zanero ACM Transactions on Privacy and Security (TOPS) 21 (3), 1-31, 2018 | 45 | 2018 |
Amaretto: An active learning framework for money laundering detection D Labanca, L Primerano, M Markland-Montgomery, M Polino, ... IEEE Access 10, 41720-41739, 2022 | 33 | 2022 |
Prometheus: Analyzing WebInject-based information stealers A Continella, M Carminati, M Polino, A Lanzi, S Zanero, F Maggi Journal of Computer Security 25 (2), 117-137, 2017 | 31 | 2017 |
Evasion attacks against banking fraud detection systems M Carminati, L Santini, M Polino, S Zanero 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | 26 | 2020 |
Canflict: exploiting peripheral conflicts for data-link layer attacks on automotive networks A de Faveri Tron, S Longari, M Carminati, M Polino, S Zanero Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 22 | 2022 |
SyML: Guiding symbolic execution toward vulnerable states through pattern learning N Ruaro, K Zeng, L Dresel, M Polino, T Bao, A Continella, S Zanero, ... Proceedings of the 24th International Symposium on Research in Attacks …, 2021 | 18 | 2021 |
ELISA: ELiciting ISA of raw binaries for fine-grained code and data separation P De Nicolao, M Pogliani, M Polino, M Carminati, D Quarta, S Zanero International Conference on Detection of Intrusions and Malware, and …, 2018 | 18 | 2018 |
NoSQL breakdown: a large-scale analysis of misconfigured NoSQL services D Ferrari, M Carminati, M Polino, S Zanero Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 15 | 2020 |
Apícula: Static detection of API calls in generic streams of bytes M D’Onghia, M Salvadore, BM Nespoli, M Carminati, M Polino, S Zanero Computers & Security 119, 102775, 2022 | 7 | 2022 |
Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici R Baldoni, R De Nicola, PE Prinetto, CF Anglano, L Aniello, A Antinori, ... Consorzio Interuniversitario Nazionale per l'Informatica-CINI, 2018 | 6 | 2018 |
Lookin'Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors M D'Onghia, F Di Cesare, L Gallo, M Carminati, M Polino, S Zanero Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security …, 2023 | 5 | 2023 |