BibTeX records: Federico Maggi

download as .bib file

@proceedings{DBLP:conf/dimva/2023,
  editor       = {Daniel Gruss and
                  Federico Maggi and
                  Mathias Fischer and
                  Michele Carminati},
  title        = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 20th International Conference, {DIMVA} 2023, Hamburg, Germany, July
                  12-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13959},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35504-2},
  doi          = {10.1007/978-3-031-35504-2},
  isbn         = {978-3-031-35503-5},
  timestamp    = {Tue, 20 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/VilchesGCRPMG22,
  author       = {Victor Mayoral Vilches and
                  Alfonso Glera{-}Pic{\'{o}}n and
                  Unai Ayucar Carbajo and
                  Stefan Rass and
                  Martin Pinzger and
                  Federico Maggi and
                  Endika Gil{-}Uriarte},
  title        = {Hacking planned obsolescense in robotics, towards security-oriented
                  robot teardown},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {80},
  year         = {2022},
  url          = {https://doi.org/10.14279/tuj.eceasst.80.1189},
  doi          = {10.14279/TUJ.ECEASST.80.1189},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eceasst/VilchesGCRPMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-02551,
  author       = {Federico Maggi and
                  Andrea Guglielmini},
  title        = {RFQuack: {A} Universal Hardware-Software Toolkit for Wireless Protocol
                  (Security) Analysis and Research},
  journal      = {CoRR},
  volume       = {abs/2104.02551},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.02551},
  eprinttype    = {arXiv},
  eprint       = {2104.02551},
  timestamp    = {Tue, 13 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-02551.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcs/TangCVCCM20,
  author       = {Fiona H. M. Tang and
                  Daniele la Cecilia and
                  R. Willem Vervoort and
                  Nicholas V. Coleman and
                  Chris Conoley and
                  Federico Maggi},
  title        = {A simple pre-factor for contaminant biodegradation potential and its
                  application to pesticides risk assessment},
  journal      = {Math. Comput. Simul.},
  volume       = {175},
  pages        = {108--120},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.matcom.2019.08.009},
  doi          = {10.1016/J.MATCOM.2019.08.009},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mcs/TangCVCCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcs/CeciliaM20,
  author       = {Daniele la Cecilia and
                  Federico Maggi},
  title        = {Influential sources of uncertainty in glyphosate biochemical degradation
                  in soil},
  journal      = {Math. Comput. Simul.},
  volume       = {175},
  pages        = {121--139},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.matcom.2020.01.003},
  doi          = {10.1016/J.MATCOM.2020.01.003},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mcs/CeciliaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PoglianiMBQZ20,
  author       = {Marcello Pogliani and
                  Federico Maggi and
                  Marco Balduzzi and
                  Davide Quarta and
                  Stefano Zanero},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Detecting Insecure Code Patterns in Industrial Robot Programs},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {759--771},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384735},
  doi          = {10.1145/3320269.3384735},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PoglianiMBQZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ism2/MaggiBVRQTPQZ20,
  author       = {Federico Maggi and
                  Marco Balduzzi and
                  Rainer Vosseler and
                  Martin R{\"{o}}sler and
                  Walter Quadrini and
                  Giacomo Tavola and
                  Marcello Pogliani and
                  Davide Quarta and
                  Stefano Zanero},
  editor       = {Francesco Longo and
                  Michael Affenzeller and
                  Antonio Padovano},
  title        = {Smart Factory Security: {A} Case Study on a Modular Smart Manufacturing
                  System},
  booktitle    = {Proceedings of the 2nd International Conference on Industry 4.0 and
                  Smart Manufacturing {(ISM} 2020), Virtual Event, Austria, 23-25 November
                  2020},
  series       = {Procedia Computer Science},
  volume       = {180},
  pages        = {666--675},
  publisher    = {Elsevier},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.procs.2021.01.289},
  doi          = {10.1016/J.PROCS.2021.01.289},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ism2/MaggiBVRQTPQZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/PoglianiQPVMZ19,
  author       = {Marcello Pogliani and
                  Davide Quarta and
                  Mario Polino and
                  Martino Vittone and
                  Federico Maggi and
                  Stefano Zanero},
  title        = {Security of controlled manufacturing systems in the connected factory:
                  the case of industrial robots},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {15},
  number       = {3},
  pages        = {161--175},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11416-019-00329-8},
  doi          = {10.1007/S11416-019-00329-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/PoglianiQPVMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MaggiBALHUV19,
  author       = {Federico Maggi and
                  Marco Balduzzi and
                  Jonathan Andersson and
                  Philippe Lin and
                  Stephen Hilt and
                  Akira Urano and
                  Rainer Vosseler},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {A Security Evaluation of Industrial Radio Remote Controllers},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {133--153},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_7},
  doi          = {10.1007/978-3-030-22038-9\_7},
  timestamp    = {Tue, 29 Dec 2020 18:36:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/MaggiBALHUV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-07015,
  author       = {Federico Maggi},
  title        = {BRTSim, a general-purpose computational solver for hydrological, biogeochemical,
                  and ecosystem dynamics},
  journal      = {CoRR},
  volume       = {abs/1903.07015},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.07015},
  eprinttype    = {arXiv},
  eprint       = {1903.07015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-07015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CarminatiPCLMZ18,
  author       = {Michele Carminati and
                  Mario Polino and
                  Andrea Continella and
                  Andrea Lanzi and
                  Federico Maggi and
                  Stefano Zanero},
  title        = {Security Evaluation of a Banking Fraud Analysis System},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {11:1--11:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178370},
  doi          = {10.1145/3178370},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CarminatiPCLMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaggiBFGC18,
  author       = {Federico Maggi and
                  Marco Balduzzi and
                  Ryan Flores and
                  Lion Gu and
                  Vincenzo Ciancaglini},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Investigating Web Defacement Campaigns at Large},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {443--456},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196542},
  doi          = {10.1145/3196494.3196542},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MaggiBFGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/CarminatiBMSZ18,
  author       = {Michele Carminati and
                  Alessandro Baggio and
                  Federico Maggi and
                  Umberto Spagnolini and
                  Stefano Zanero},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {FraudBuster: Temporal Analysis and Detection of Advanced Financial
                  Frauds},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {211--233},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_10},
  doi          = {10.1007/978-3-319-93411-2\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/CarminatiBMSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ContinellaCPLZM17,
  author       = {Andrea Continella and
                  Michele Carminati and
                  Mario Polino and
                  Andrea Lanzi and
                  Stefano Zanero and
                  Federico Maggi},
  title        = {Prometheus: Analyzing WebInject-based information stealers},
  journal      = {J. Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {117--137},
  year         = {2017},
  url          = {https://doi.org/10.3233/JCS-15773},
  doi          = {10.3233/JCS-15773},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ContinellaCPLZM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MavroudisHFMKV17,
  author       = {Vasilios Mavroudis and
                  Shuang Hao and
                  Yanick Fratantonio and
                  Federico Maggi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {On the Privacy and Security of the Ultrasound Ecosystem},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {2},
  pages        = {95--112},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0018},
  doi          = {10.1515/POPETS-2017-0018},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/MavroudisHFMKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/PredaM17,
  author       = {Mila Dalla Preda and
                  Federico Maggi},
  title        = {Testing android malware detectors against code obfuscation: a systematization
                  of knowledge and unified methodology},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {13},
  number       = {3},
  pages        = {209--232},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11416-016-0282-2},
  doi          = {10.1007/S11416-016-0282-2},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/PredaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/PalancaEMZ17,
  author       = {Andrea Palanca and
                  Eric Evenchick and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Michalis Polychronakis and
                  Michael Meier},
  title        = {A Stealth, Selective, Link-Layer Denial-of-Service Attack Against
                  Automotive Networks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July
                  6-7, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10327},
  pages        = {185--206},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60876-1\_9},
  doi          = {10.1007/978-3-319-60876-1\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/PalancaEMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ZarrasM17,
  author       = {Apostolis Zarras and
                  Federico Maggi},
  title        = {Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect
                  Web Attacks},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {355--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00049},
  doi          = {10.1109/PST.2017.00049},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ZarrasM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/QuartaPPMZZ17,
  author       = {Davide Quarta and
                  Marcello Pogliani and
                  Mario Polino and
                  Federico Maggi and
                  Andrea Maria Zanchettin and
                  Stefano Zanero},
  title        = {An Experimental Security Analysis of an Industrial Robot Controller},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {268--286},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.20},
  doi          = {10.1109/SP.2017.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/QuartaPPMZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/ShastryMYRS17,
  author       = {Bhargava Shastry and
                  Federico Maggi and
                  Fabian Yamaguchi and
                  Konrad Rieck and
                  Jean{-}Pierre Seifert},
  editor       = {William Enck and
                  Collin Mulliner},
  title        = {Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing},
  booktitle    = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
                  BC, Canada, August 14-15, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/woot17/workshop-program/presentation/shastry},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/ShastryMYRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/UnruhSSMRSY17,
  author       = {Tommi Unruh and
                  Bhargava Shastry and
                  Malte Skoruppa and
                  Federico Maggi and
                  Konrad Rieck and
                  Jean{-}Pierre Seifert and
                  Fabian Yamaguchi},
  editor       = {William Enck and
                  Collin Mulliner},
  title        = {Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability
                  Discovery},
  booktitle    = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
                  BC, Canada, August 14-15, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/woot17/workshop-program/presentation/unruh},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/UnruhSSMRSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/UnruhSSMRSY17,
  author       = {Tommi Unruh and
                  Bhargava Shastry and
                  Malte Skoruppa and
                  Federico Maggi and
                  Konrad Rieck and
                  Jean{-}Pierre Seifert and
                  Fabian Yamaguchi},
  title        = {Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability
                  Discovery},
  journal      = {CoRR},
  volume       = {abs/1704.02786},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.02786},
  eprinttype    = {arXiv},
  eprint       = {1704.02786},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/UnruhSSMRSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShastryMYRS17,
  author       = {Bhargava Shastry and
                  Federico Maggi and
                  Fabian Yamaguchi and
                  Konrad Rieck and
                  Jean{-}Pierre Seifert},
  title        = {Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing},
  journal      = {CoRR},
  volume       = {abs/1706.00206},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.00206},
  eprinttype    = {arXiv},
  eprint       = {1706.00206},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShastryMYRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ContinellaGZPBZ16,
  author       = {Andrea Continella and
                  Alessandro Guagnelli and
                  Giovanni Zingaro and
                  Giulio De Pasquale and
                  Alessandro Barenghi and
                  Stefano Zanero and
                  Federico Maggi},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {ShieldFS: a self-healing, ransomware-aware filesystem},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {336--347},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991110},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ContinellaGZPBZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhengPGZM16,
  author       = {Chengyu Zheng and
                  Mila Dalla Preda and
                  Jorge Granjal and
                  Stefano Zanero and
                  Federico Maggi},
  title        = {On-chip system call tracing: {A} feasibility study and open prototype},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {73--81},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860472},
  doi          = {10.1109/CNS.2016.7860472},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhengPGZM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ColettaVM16,
  author       = {Alberto Coletta and
                  Victor van der Veen and
                  Federico Maggi},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {DroydSeuss: {A} Mobile Banking Trojan Tracker (Short Paper)},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {250--259},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_14},
  doi          = {10.1007/978-3-662-54970-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ColettaVM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MambrettiOMRKMZ16,
  author       = {Andrea Mambretti and
                  Kaan Onarlioglu and
                  Collin Mulliner and
                  William Robertson and
                  Engin Kirda and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Trellis: Privilege Separation for Multi-user Applications Made Easy},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {437--456},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_20},
  doi          = {10.1007/978-3-319-45719-2\_20},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MambrettiOMRKMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BazzoliCMZ16,
  author       = {Enrico Bazzoli and
                  Claudio Criscione and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Jaap{-}Henk Hoepman and
                  Stefan Katzenbeisser},
  title        = {{XSS} {PEEKER:} Dissecting the {XSS} Exploitation Techniques and Fuzzing
                  Mechanisms of Blackbox Web Application Scanners},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11
                  International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June
                  1, 2016, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {471},
  pages        = {243--258},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-33630-5\_17},
  doi          = {10.1007/978-3-319-33630-5\_17},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BazzoliCMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhengDAZM16,
  author       = {Chengyu Zheng and
                  Nicola Dellarocca and
                  Niccol{\`{o}} Andronio and
                  Stefano Zanero and
                  Federico Maggi},
  editor       = {Robert H. Deng and
                  Jian Weng and
                  Kui Ren and
                  Vinod Yegneswaran},
  title        = {GreatEatlon: Fast, Static Detection of Mobile Ransomware},
  booktitle    = {Security and Privacy in Communication Networks - 12th International
                  Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016,
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {198},
  pages        = {617--636},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-59608-2\_34},
  doi          = {10.1007/978-3-319-59608-2\_34},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhengDAZM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CarminatiCMEZ15,
  author       = {Michele Carminati and
                  Roberto Caron and
                  Federico Maggi and
                  Ilenia Epifani and
                  Stefano Zanero},
  title        = {BankSealer: {A} decision support system for online banking fraud analysis
                  and investigation},
  journal      = {Comput. Secur.},
  volume       = {53},
  pages        = {175--186},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.04.002},
  doi          = {10.1016/J.COSE.2015.04.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CarminatiCMEZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ValdiLBQZM15,
  author       = {Andrea Valdi and
                  Eros Lever and
                  Simone Benefico and
                  Davide Quarta and
                  Stefano Zanero and
                  Federico Maggi},
  title        = {Scalable Testing of Mobile Antivirus Applications},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {60--68},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.320},
  doi          = {10.1109/MC.2015.320},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ValdiLBQZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FalsinaFZKVM15,
  author       = {Luca Falsina and
                  Yanick Fratantonio and
                  Stefano Zanero and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Federico Maggi},
  title        = {Grab 'n Run: Secure and Practical Dynamic Code Loading for Android
                  Applications},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {201--210},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818042},
  doi          = {10.1145/2818000.2818042},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FalsinaFZKVM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IliaPAMI15,
  author       = {Panagiotis Ilia and
                  Iasonas Polakis and
                  Elias Athanasopoulos and
                  Federico Maggi and
                  Sotiris Ioannidis},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Face/Off: Preventing Privacy Leakage From Photos in Social Networks},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {781--792},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813603},
  doi          = {10.1145/2810103.2813603},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/IliaPAMI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/PolinoSMZ15,
  author       = {Mario Polino and
                  Andrea Scorti and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Magnus Almgren and
                  Vincenzo Gulisano and
                  Federico Maggi},
  title        = {Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of
                  Binaries},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 12th International Conference, {DIMVA} 2015, Milan, Italy, July
                  9-10, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9148},
  pages        = {121--143},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20550-2\_7},
  doi          = {10.1007/978-3-319-20550-2\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/PolinoSMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/PolakisDPMI15,
  author       = {Iasonas Polakis and
                  Michalis Diamantaris and
                  Thanasis Petsas and
                  Federico Maggi and
                  Sotiris Ioannidis},
  editor       = {Magnus Almgren and
                  Vincenzo Gulisano and
                  Federico Maggi},
  title        = {Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 12th International Conference, {DIMVA} 2015, Milan, Italy, July
                  9-10, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9148},
  pages        = {165--184},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20550-2\_9},
  doi          = {10.1007/978-3-319-20550-2\_9},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/PolakisDPMI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AndronioZM15,
  author       = {Nicol{\'{o}} Andronio and
                  Stefano Zanero and
                  Federico Maggi},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {HelDroid: Dissecting and Detecting Mobile Ransomware},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {382--404},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_18},
  doi          = {10.1007/978-3-319-26362-5\_18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AndronioZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2015,
  editor       = {Magnus Almgren and
                  Vincenzo Gulisano and
                  Federico Maggi},
  title        = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 12th International Conference, {DIMVA} 2015, Milan, Italy, July
                  9-10, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9148},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20550-2},
  doi          = {10.1007/978-3-319-20550-2},
  isbn         = {978-3-319-20549-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/MaggiZM15,
  author       = {Federico Maggi and
                  Stefano Zanero and
                  Evangelos P. Markatos},
  title        = {European Cyber-Security Research and Innovation},
  journal      = {{ERCIM} News},
  volume       = {2015},
  number       = {100},
  year         = {2015},
  url          = {http://ercim-news.ercim.eu/en100/r-i/european-cyber-security-research-and-innovation},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/MaggiZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BonettiVFMZ14,
  author       = {Gabriele Bonetti and
                  Marco Viglione and
                  Alessandro Frossi and
                  Federico Maggi and
                  Stefano Zanero},
  title        = {Black-box forensic and antiforensic characteristics of solid-state
                  drives},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {4},
  pages        = {255--271},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0221-z},
  doi          = {10.1007/S11416-014-0221-Z},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BonettiVFMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/badgers/PolakisMZK14,
  author       = {Iasonas Polakis and
                  Federico Maggi and
                  Stefano Zanero and
                  Angelos D. Keromytis},
  title        = {Security and Privacy Measurements in Social Networks: Experiences
                  and Lessons Learned},
  booktitle    = {Third International Workshop on Building Analysis Datasets and Gathering
                  Experience Returns for Security, BADGERS@ESORICS 2014, Wroclaw, Poland,
                  September 11, 2014},
  pages        = {18--29},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/BADGERS.2014.9},
  doi          = {10.1109/BADGERS.2014.9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/badgers/PolakisMZK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PolakisIMLKZIK14,
  author       = {Iasonas Polakis and
                  Panagiotis Ilia and
                  Federico Maggi and
                  Marco Lancini and
                  Georgios Kontaxis and
                  Stefano Zanero and
                  Sotiris Ioannidis and
                  Angelos D. Keromytis},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {501--512},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660317},
  doi          = {10.1145/2660267.2660317},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PolakisIMLKZIK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/LindorferVSNAMPZI14,
  author       = {Martina Lindorfer and
                  Stamatis Volanis and
                  Alessandro Sisto and
                  Matthias Neugschwandtner and
                  Elias Athanasopoulos and
                  Federico Maggi and
                  Christian Platzer and
                  Stefano Zanero and
                  Sotiris Ioannidis},
  editor       = {Sven Dietrich},
  title        = {AndRadar: Fast Discovery of Android Applications in Alternative Markets},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {51--71},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_4},
  doi          = {10.1007/978-3-319-08509-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/LindorferVSNAMPZI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SchiavoniMCZ14,
  author       = {Stefano Schiavoni and
                  Federico Maggi and
                  Lorenzo Cavallaro and
                  Stefano Zanero},
  editor       = {Sven Dietrich},
  title        = {Phoenix: DGA-Based Botnet Tracking and Intelligence},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_11},
  doi          = {10.1007/978-3-319-08509-8\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/SchiavoniMCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SpagnuoloMZ14,
  author       = {Michele Spagnuolo and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {BitIodine: Extracting Intelligence from the Bitcoin Network},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {457--468},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_29},
  doi          = {10.1007/978-3-662-45472-5\_29},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/SpagnuoloMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/AntoniniMZ14,
  author       = {Alessio Antonini and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {A Practical Attack Against a KNX-based Building Automation System},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53231},
  timestamp    = {Thu, 25 Aug 2016 11:36:27 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/AntoniniMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/CriscioneBZM14,
  author       = {Claudio Criscione and
                  Fabio Bosatelli and
                  Stefano Zanero and
                  Federico Maggi},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {{ZARATHUSTRA:} Extracting Webinject signatures from banking trojans},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {139--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890933},
  doi          = {10.1109/PST.2014.6890933},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/CriscioneBZM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CarminatiCMEZ14,
  author       = {Michele Carminati and
                  Roberto Caron and
                  Federico Maggi and
                  Ilenia Epifani and
                  Stefano Zanero},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {BankSealer: An Online Banking Fraud Analysis and Decision Support
                  System},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {380--394},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_32},
  doi          = {10.1007/978-3-642-55415-5\_32},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/CarminatiCMEZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/NikiforakisMSRJKPVZ14,
  author       = {Nick Nikiforakis and
                  Federico Maggi and
                  Gianluca Stringhini and
                  M. Zubair Rafique and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna and
                  Stefano Zanero},
  editor       = {Chin{-}Wan Chung and
                  Andrei Z. Broder and
                  Kyuseok Shim and
                  Torsten Suel},
  title        = {Stranger danger: exploring the ecosystem of ad-based {URL} shortening
                  services},
  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic
                  of Korea, April 7-11, 2014},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2566486.2567983},
  doi          = {10.1145/2566486.2567983},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/NikiforakisMSRJKPVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GianazzaMFCZ14,
  author       = {Andrea Gianazza and
                  Federico Maggi and
                  Aristide Fattori and
                  Lorenzo Cavallaro and
                  Stefano Zanero},
  title        = {PuppetDroid: {A} User-Centric {UI} Exerciser for Automatic Dynamic
                  Analysis of Similar Android Applications},
  journal      = {CoRR},
  volume       = {abs/1402.4826},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.4826},
  eprinttype    = {arXiv},
  eprint       = {1402.4826},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GianazzaMFCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BazzoliCMZ14,
  author       = {Enrico Bazzoli and
                  Claudio Criscione and
                  Federico Maggi and
                  Stefano Zanero},
  title        = {{XSS} Peeker: {A} Systematic Analysis of Cross-site Scripting Vulnerability
                  Scanners},
  journal      = {CoRR},
  volume       = {abs/1410.4207},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.4207},
  eprinttype    = {arXiv},
  eprint       = {1410.4207},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BazzoliCMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/esl/DardanelliMTZSKH13,
  author       = {Andrea Dardanelli and
                  Federico Maggi and
                  Mara Tanelli and
                  Stefano Zanero and
                  Sergio M. Savaresi and
                  R. Kochanek and
                  Thorsten Holz},
  title        = {A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth},
  journal      = {{IEEE} Embed. Syst. Lett.},
  volume       = {5},
  number       = {3},
  pages        = {34--37},
  year         = {2013},
  url          = {https://doi.org/10.1109/LES.2013.2264594},
  doi          = {10.1109/LES.2013.2264594},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/esl/DardanelliMTZSKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BonettiVFMZ13,
  author       = {Gabriele Bonetti and
                  Marco Viglione and
                  Alessandro Frossi and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Charles N. Payne Jr.},
  title        = {A comprehensive black-box methodology for testing the forensic characteristics
                  of solid-state drives},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {269--278},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523660},
  doi          = {10.1145/2523649.2523660},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BonettiVFMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaggiVZ13,
  author       = {Federico Maggi and
                  Andrea Valdi and
                  Stefano Zanero},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {AndroTotal: a flexible, scalable toolbox and service for testing mobile
                  malware detectors},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516768},
  doi          = {10.1145/2516760.2516768},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MaggiVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MaggiFZSSKV13,
  author       = {Federico Maggi and
                  Alessandro Frossi and
                  Stefano Zanero and
                  Gianluca Stringhini and
                  Brett Stone{-}Gross and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Daniel Schwabe and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Hartmut Glaser and
                  Ricardo Baeza{-}Yates and
                  Sue B. Moon},
  title        = {Two years of short URLs internet measurement: security threats and
                  countermeasures},
  booktitle    = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
                  Brazil, May 13-17, 2013},
  pages        = {861--872},
  publisher    = {International World Wide Web Conferences Steering Committee / {ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488388.2488463},
  doi          = {10.1145/2488388.2488463},
  timestamp    = {Sun, 22 Sep 2019 18:15:38 +0200},
  biburl       = {https://dblp.org/rec/conf/www/MaggiFZSSKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SchiavoniMCZ13,
  author       = {Stefano Schiavoni and
                  Federico Maggi and
                  Lorenzo Cavallaro and
                  Stefano Zanero},
  title        = {Tracking and Characterizing Botnets Using Automatically Generated
                  Domains},
  journal      = {CoRR},
  volume       = {abs/1311.5612},
  year         = {2013},
  url          = {http://arxiv.org/abs/1311.5612},
  eprinttype    = {arXiv},
  eprint       = {1311.5612},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SchiavoniMCZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LindorferFMCZ12,
  author       = {Martina Lindorfer and
                  Alessandro Di Federico and
                  Federico Maggi and
                  Paolo Milani Comparetti and
                  Stefano Zanero},
  editor       = {Robert H'obbes' Zakon},
  title        = {Lines of malicious code: insights into the malicious software industry},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {349--358},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421001},
  doi          = {10.1145/2420950.2421001},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LindorferFMCZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PolakisLKMIKZ12,
  author       = {Iasonas Polakis and
                  Marco Lancini and
                  Georgios Kontaxis and
                  Federico Maggi and
                  Sotiris Ioannidis and
                  Angelos D. Keromytis and
                  Stefano Zanero},
  editor       = {Robert H'obbes' Zakon},
  title        = {All your face are belong to us: breaking Facebook's social authentication},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {399--408},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421008},
  doi          = {10.1145/2420950.2421008},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PolakisLKMIKZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/MaggiZ12,
  author       = {Federico Maggi and
                  Stefano Zanero},
  editor       = {Filip De Turck and
                  Luciano Paschoal Gaspary and
                  Deep Medhi},
  title        = {Integrated detection of anomalous behavior of computer infrastructures},
  booktitle    = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012,
                  Maui, HI, USA, April 16-20, 2012},
  pages        = {866--871},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/NOMS.2012.6212001},
  doi          = {10.1109/NOMS.2012.6212001},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/MaggiZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MaggiGB11,
  author       = {Federico Maggi and
                  Simone Gasparini and
                  Giacomo Boracchi},
  title        = {A fast eavesdropping attack against touchscreens},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {320--325},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122840},
  doi          = {10.1109/ISIAS.2011.6122840},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MaggiGB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/badgers/MaggiSZ11,
  author       = {Federico Maggi and
                  Alessandro Sisto and
                  Stefano Zanero},
  editor       = {Engin Kirda and
                  Thorsten Holz},
  title        = {A social-engineering-centric data collection initiative to study phishing},
  booktitle    = {Proceedings of the First Workshop on Building Analysis Datasets and
                  Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg,
                  Austria, April 10, 2011},
  pages        = {107--108},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978672.1978687},
  doi          = {10.1145/1978672.1978687},
  timestamp    = {Thu, 24 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/badgers/MaggiSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MaggiZ11,
  author       = {Federico Maggi and
                  Stefano Zanero},
  title        = {Systems Security Research at Politecnico di Milano},
  booktitle    = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands,
                  July 6, 2011},
  pages        = {127--130},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.30},
  doi          = {10.1109/SYSSEC.2011.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/MaggiZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MaggiBSZ11,
  author       = {Federico Maggi and
                  Andrea Bellini and
                  Guido Salvaneschi and
                  Stefano Zanero},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Finding Non-trivial Malware Naming Inconsistencies},
  booktitle    = {Information Systems Security - 7th International Conference, {ICISS}
                  2011, Kolkata, India, December 15-19, 2011, Procedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {144--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25560-1\_10},
  doi          = {10.1007/978-3-642-25560-1\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/MaggiBSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/RovetaCMZMC11,
  author       = {Francesco Roveta and
                  Giorgio Caviglia and
                  Luca Di Mario and
                  Stefano Zanero and
                  Federico Maggi and
                  Paolo Ciuccarelli},
  title        = {{BURN:} baring unknown rogue networks},
  booktitle    = {8th International Symposium on Visualization for Cyber Security, VizSec
                  2011, Pittsburgh, PA, USA, July 20, 2011},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2016904.2016910},
  doi          = {10.1145/2016904.2016910},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/RovetaCMZMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaggiMZ10,
  author       = {Federico Maggi and
                  Matteo Matteucci and
                  Stefano Zanero},
  title        = {Detecting Intrusions through System Call Sequence and Argument Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {7},
  number       = {4},
  pages        = {381--395},
  year         = {2010},
  url          = {https://doi.org/10.1109/TDSC.2008.69},
  doi          = {10.1109/TDSC.2008.69},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaggiMZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/Maggi10,
  author       = {Federico Maggi},
  title        = {A Recognizer of Rational Trace Languages},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {257--264},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.77},
  doi          = {10.1109/CIT.2010.77},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/Maggi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/Maggi10a,
  author       = {Federico Maggi},
  title        = {Are the Con Artists Back? {A} Preliminary Analysis of Modern Phone
                  Frauds},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {824--831},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.156},
  doi          = {10.1109/CIT.2010.156},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/Maggi10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/VolpattoMZ10,
  author       = {Alberto Volpatto and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Effective Multimodel Anomaly Detection Using Cooperative Negotiation},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_12},
  doi          = {10.1007/978-3-642-17197-0\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/VolpattoMZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RobertsonMKV10,
  author       = {William K. Robertson and
                  Federico Maggi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Effective Anomaly Detection with Scarce Training Data},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/effective-anomaly-detection-scarce-training-data},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/RobertsonMKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/MaggiMZ09,
  author       = {Federico Maggi and
                  Matteo Matteucci and
                  Stefano Zanero},
  title        = {Reducing false positives in anomaly detectors through fuzzy alert
                  aggregation},
  journal      = {Inf. Fusion},
  volume       = {10},
  number       = {4},
  pages        = {300--311},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.inffus.2009.01.004},
  doi          = {10.1016/J.INFFUS.2009.01.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/MaggiMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/FrossiMRZ09,
  author       = {Alessandro Frossi and
                  Federico Maggi and
                  Gian Luigi Rizzo and
                  Stefano Zanero},
  editor       = {Ulrich Flegel and
                  Danilo Bruschi},
  title        = {Selecting and Improving System Call Models for Anomaly Detection},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5587},
  pages        = {206--223},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02918-9\_13},
  doi          = {10.1007/978-3-642-02918-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/FrossiMRZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaggiRKV09,
  author       = {Federico Maggi and
                  William K. Robertson and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Protecting a Moving Target: Addressing Web Application Concept Drift},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_2},
  doi          = {10.1007/978-3-642-04342-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaggiRKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaggiZ07,
  author       = {Federico Maggi and
                  Stefano Zanero},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {On the Use of Different Statistical Tests for Alert Correlation -
                  Short Paper},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {167--177},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_9},
  doi          = {10.1007/978-3-540-74320-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaggiZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics