Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Federico Maggi
@proceedings{DBLP:conf/dimva/2023, editor = {Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati}, title = {Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, {DIMVA} 2023, Hamburg, Germany, July 12-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13959}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35504-2}, doi = {10.1007/978-3-031-35504-2}, isbn = {978-3-031-35503-5}, timestamp = {Tue, 20 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/VilchesGCRPMG22, author = {Victor Mayoral Vilches and Alfonso Glera{-}Pic{\'{o}}n and Unai Ayucar Carbajo and Stefan Rass and Martin Pinzger and Federico Maggi and Endika Gil{-}Uriarte}, title = {Hacking planned obsolescense in robotics, towards security-oriented robot teardown}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {80}, year = {2022}, url = {https://doi.org/10.14279/tuj.eceasst.80.1189}, doi = {10.14279/TUJ.ECEASST.80.1189}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eceasst/VilchesGCRPMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-02551, author = {Federico Maggi and Andrea Guglielmini}, title = {RFQuack: {A} Universal Hardware-Software Toolkit for Wireless Protocol (Security) Analysis and Research}, journal = {CoRR}, volume = {abs/2104.02551}, year = {2021}, url = {https://arxiv.org/abs/2104.02551}, eprinttype = {arXiv}, eprint = {2104.02551}, timestamp = {Tue, 13 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-02551.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcs/TangCVCCM20, author = {Fiona H. M. Tang and Daniele la Cecilia and R. Willem Vervoort and Nicholas V. Coleman and Chris Conoley and Federico Maggi}, title = {A simple pre-factor for contaminant biodegradation potential and its application to pesticides risk assessment}, journal = {Math. Comput. Simul.}, volume = {175}, pages = {108--120}, year = {2020}, url = {https://doi.org/10.1016/j.matcom.2019.08.009}, doi = {10.1016/J.MATCOM.2019.08.009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mcs/TangCVCCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcs/CeciliaM20, author = {Daniele la Cecilia and Federico Maggi}, title = {Influential sources of uncertainty in glyphosate biochemical degradation in soil}, journal = {Math. Comput. Simul.}, volume = {175}, pages = {121--139}, year = {2020}, url = {https://doi.org/10.1016/j.matcom.2020.01.003}, doi = {10.1016/J.MATCOM.2020.01.003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mcs/CeciliaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PoglianiMBQZ20, author = {Marcello Pogliani and Federico Maggi and Marco Balduzzi and Davide Quarta and Stefano Zanero}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Detecting Insecure Code Patterns in Industrial Robot Programs}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {759--771}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384735}, doi = {10.1145/3320269.3384735}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PoglianiMBQZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ism2/MaggiBVRQTPQZ20, author = {Federico Maggi and Marco Balduzzi and Rainer Vosseler and Martin R{\"{o}}sler and Walter Quadrini and Giacomo Tavola and Marcello Pogliani and Davide Quarta and Stefano Zanero}, editor = {Francesco Longo and Michael Affenzeller and Antonio Padovano}, title = {Smart Factory Security: {A} Case Study on a Modular Smart Manufacturing System}, booktitle = {Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing {(ISM} 2020), Virtual Event, Austria, 23-25 November 2020}, series = {Procedia Computer Science}, volume = {180}, pages = {666--675}, publisher = {Elsevier}, year = {2020}, url = {https://doi.org/10.1016/j.procs.2021.01.289}, doi = {10.1016/J.PROCS.2021.01.289}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ism2/MaggiBVRQTPQZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/PoglianiQPVMZ19, author = {Marcello Pogliani and Davide Quarta and Mario Polino and Martino Vittone and Federico Maggi and Stefano Zanero}, title = {Security of controlled manufacturing systems in the connected factory: the case of industrial robots}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {15}, number = {3}, pages = {161--175}, year = {2019}, url = {https://doi.org/10.1007/s11416-019-00329-8}, doi = {10.1007/S11416-019-00329-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/PoglianiQPVMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MaggiBALHUV19, author = {Federico Maggi and Marco Balduzzi and Jonathan Andersson and Philippe Lin and Stephen Hilt and Akira Urano and Rainer Vosseler}, editor = {Roberto Perdisci and Cl{\'{e}}mentine Maurice and Giorgio Giacinto and Magnus Almgren}, title = {A Security Evaluation of Industrial Radio Remote Controllers}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11543}, pages = {133--153}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22038-9\_7}, doi = {10.1007/978-3-030-22038-9\_7}, timestamp = {Tue, 29 Dec 2020 18:36:17 +0100}, biburl = {https://dblp.org/rec/conf/dimva/MaggiBALHUV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-07015, author = {Federico Maggi}, title = {BRTSim, a general-purpose computational solver for hydrological, biogeochemical, and ecosystem dynamics}, journal = {CoRR}, volume = {abs/1903.07015}, year = {2019}, url = {http://arxiv.org/abs/1903.07015}, eprinttype = {arXiv}, eprint = {1903.07015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-07015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CarminatiPCLMZ18, author = {Michele Carminati and Mario Polino and Andrea Continella and Andrea Lanzi and Federico Maggi and Stefano Zanero}, title = {Security Evaluation of a Banking Fraud Analysis System}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {11:1--11:31}, year = {2018}, url = {https://doi.org/10.1145/3178370}, doi = {10.1145/3178370}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CarminatiPCLMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaggiBFGC18, author = {Federico Maggi and Marco Balduzzi and Ryan Flores and Lion Gu and Vincenzo Ciancaglini}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Investigating Web Defacement Campaigns at Large}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {443--456}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196542}, doi = {10.1145/3196494.3196542}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MaggiBFGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/CarminatiBMSZ18, author = {Michele Carminati and Alessandro Baggio and Federico Maggi and Umberto Spagnolini and Stefano Zanero}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {211--233}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_10}, doi = {10.1007/978-3-319-93411-2\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/CarminatiBMSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ContinellaCPLZM17, author = {Andrea Continella and Michele Carminati and Mario Polino and Andrea Lanzi and Stefano Zanero and Federico Maggi}, title = {Prometheus: Analyzing WebInject-based information stealers}, journal = {J. Comput. Secur.}, volume = {25}, number = {2}, pages = {117--137}, year = {2017}, url = {https://doi.org/10.3233/JCS-15773}, doi = {10.3233/JCS-15773}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ContinellaCPLZM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/MavroudisHFMKV17, author = {Vasilios Mavroudis and Shuang Hao and Yanick Fratantonio and Federico Maggi and Christopher Kruegel and Giovanni Vigna}, title = {On the Privacy and Security of the Ultrasound Ecosystem}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {2}, pages = {95--112}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0018}, doi = {10.1515/POPETS-2017-0018}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/MavroudisHFMKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/PredaM17, author = {Mila Dalla Preda and Federico Maggi}, title = {Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {13}, number = {3}, pages = {209--232}, year = {2017}, url = {https://doi.org/10.1007/s11416-016-0282-2}, doi = {10.1007/S11416-016-0282-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/PredaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/PalancaEMZ17, author = {Andrea Palanca and Eric Evenchick and Federico Maggi and Stefano Zanero}, editor = {Michalis Polychronakis and Michael Meier}, title = {A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July 6-7, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10327}, pages = {185--206}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60876-1\_9}, doi = {10.1007/978-3-319-60876-1\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/PalancaEMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ZarrasM17, author = {Apostolis Zarras and Federico Maggi}, title = {Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {355--364}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00049}, doi = {10.1109/PST.2017.00049}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ZarrasM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/QuartaPPMZZ17, author = {Davide Quarta and Marcello Pogliani and Mario Polino and Federico Maggi and Andrea Maria Zanchettin and Stefano Zanero}, title = {An Experimental Security Analysis of an Industrial Robot Controller}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {268--286}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.20}, doi = {10.1109/SP.2017.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/QuartaPPMZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/ShastryMYRS17, author = {Bhargava Shastry and Federico Maggi and Fabian Yamaguchi and Konrad Rieck and Jean{-}Pierre Seifert}, editor = {William Enck and Collin Mulliner}, title = {Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing}, booktitle = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver, BC, Canada, August 14-15, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/woot17/workshop-program/presentation/shastry}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/ShastryMYRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/UnruhSSMRSY17, author = {Tommi Unruh and Bhargava Shastry and Malte Skoruppa and Federico Maggi and Konrad Rieck and Jean{-}Pierre Seifert and Fabian Yamaguchi}, editor = {William Enck and Collin Mulliner}, title = {Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery}, booktitle = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver, BC, Canada, August 14-15, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/woot17/workshop-program/presentation/unruh}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/woot/UnruhSSMRSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/UnruhSSMRSY17, author = {Tommi Unruh and Bhargava Shastry and Malte Skoruppa and Federico Maggi and Konrad Rieck and Jean{-}Pierre Seifert and Fabian Yamaguchi}, title = {Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery}, journal = {CoRR}, volume = {abs/1704.02786}, year = {2017}, url = {http://arxiv.org/abs/1704.02786}, eprinttype = {arXiv}, eprint = {1704.02786}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/UnruhSSMRSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShastryMYRS17, author = {Bhargava Shastry and Federico Maggi and Fabian Yamaguchi and Konrad Rieck and Jean{-}Pierre Seifert}, title = {Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing}, journal = {CoRR}, volume = {abs/1706.00206}, year = {2017}, url = {http://arxiv.org/abs/1706.00206}, eprinttype = {arXiv}, eprint = {1706.00206}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShastryMYRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ContinellaGZPBZ16, author = {Andrea Continella and Alessandro Guagnelli and Giovanni Zingaro and Giulio De Pasquale and Alessandro Barenghi and Stefano Zanero and Federico Maggi}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {ShieldFS: a self-healing, ransomware-aware filesystem}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {336--347}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991110}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ContinellaGZPBZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhengPGZM16, author = {Chengyu Zheng and Mila Dalla Preda and Jorge Granjal and Stefano Zanero and Federico Maggi}, title = {On-chip system call tracing: {A} feasibility study and open prototype}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {73--81}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860472}, doi = {10.1109/CNS.2016.7860472}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhengPGZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ColettaVM16, author = {Alberto Coletta and Victor van der Veen and Federico Maggi}, editor = {Jens Grossklags and Bart Preneel}, title = {DroydSeuss: {A} Mobile Banking Trojan Tracker (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {250--259}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_14}, doi = {10.1007/978-3-662-54970-4\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ColettaVM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MambrettiOMRKMZ16, author = {Andrea Mambretti and Kaan Onarlioglu and Collin Mulliner and William Robertson and Engin Kirda and Federico Maggi and Stefano Zanero}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Trellis: Privilege Separation for Multi-user Applications Made Easy}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {437--456}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_20}, doi = {10.1007/978-3-319-45719-2\_20}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MambrettiOMRKMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BazzoliCMZ16, author = {Enrico Bazzoli and Claudio Criscione and Federico Maggi and Stefano Zanero}, editor = {Jaap{-}Henk Hoepman and Stefan Katzenbeisser}, title = {{XSS} {PEEKER:} Dissecting the {XSS} Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners}, booktitle = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11 International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {471}, pages = {243--258}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33630-5\_17}, doi = {10.1007/978-3-319-33630-5\_17}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BazzoliCMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhengDAZM16, author = {Chengyu Zheng and Nicola Dellarocca and Niccol{\`{o}} Andronio and Stefano Zanero and Federico Maggi}, editor = {Robert H. Deng and Jian Weng and Kui Ren and Vinod Yegneswaran}, title = {GreatEatlon: Fast, Static Detection of Mobile Ransomware}, booktitle = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {198}, pages = {617--636}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-59608-2\_34}, doi = {10.1007/978-3-319-59608-2\_34}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZhengDAZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CarminatiCMEZ15, author = {Michele Carminati and Roberto Caron and Federico Maggi and Ilenia Epifani and Stefano Zanero}, title = {BankSealer: {A} decision support system for online banking fraud analysis and investigation}, journal = {Comput. Secur.}, volume = {53}, pages = {175--186}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.04.002}, doi = {10.1016/J.COSE.2015.04.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CarminatiCMEZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ValdiLBQZM15, author = {Andrea Valdi and Eros Lever and Simone Benefico and Davide Quarta and Stefano Zanero and Federico Maggi}, title = {Scalable Testing of Mobile Antivirus Applications}, journal = {Computer}, volume = {48}, number = {11}, pages = {60--68}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.320}, doi = {10.1109/MC.2015.320}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ValdiLBQZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FalsinaFZKVM15, author = {Luca Falsina and Yanick Fratantonio and Stefano Zanero and Christopher Kruegel and Giovanni Vigna and Federico Maggi}, title = {Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {201--210}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818042}, doi = {10.1145/2818000.2818042}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FalsinaFZKVM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IliaPAMI15, author = {Panagiotis Ilia and Iasonas Polakis and Elias Athanasopoulos and Federico Maggi and Sotiris Ioannidis}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Face/Off: Preventing Privacy Leakage From Photos in Social Networks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {781--792}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813603}, doi = {10.1145/2810103.2813603}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/IliaPAMI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/PolinoSMZ15, author = {Mario Polino and Andrea Scorti and Federico Maggi and Stefano Zanero}, editor = {Magnus Almgren and Vincenzo Gulisano and Federico Maggi}, title = {Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, {DIMVA} 2015, Milan, Italy, July 9-10, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9148}, pages = {121--143}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20550-2\_7}, doi = {10.1007/978-3-319-20550-2\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/PolinoSMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/PolakisDPMI15, author = {Iasonas Polakis and Michalis Diamantaris and Thanasis Petsas and Federico Maggi and Sotiris Ioannidis}, editor = {Magnus Almgren and Vincenzo Gulisano and Federico Maggi}, title = {Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, {DIMVA} 2015, Milan, Italy, July 9-10, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9148}, pages = {165--184}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20550-2\_9}, doi = {10.1007/978-3-319-20550-2\_9}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/PolakisDPMI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AndronioZM15, author = {Nicol{\'{o}} Andronio and Stefano Zanero and Federico Maggi}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {HelDroid: Dissecting and Detecting Mobile Ransomware}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {382--404}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_18}, doi = {10.1007/978-3-319-26362-5\_18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AndronioZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dimva/2015, editor = {Magnus Almgren and Vincenzo Gulisano and Federico Maggi}, title = {Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, {DIMVA} 2015, Milan, Italy, July 9-10, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9148}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20550-2}, doi = {10.1007/978-3-319-20550-2}, isbn = {978-3-319-20549-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/MaggiZM15, author = {Federico Maggi and Stefano Zanero and Evangelos P. Markatos}, title = {European Cyber-Security Research and Innovation}, journal = {{ERCIM} News}, volume = {2015}, number = {100}, year = {2015}, url = {http://ercim-news.ercim.eu/en100/r-i/european-cyber-security-research-and-innovation}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/MaggiZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BonettiVFMZ14, author = {Gabriele Bonetti and Marco Viglione and Alessandro Frossi and Federico Maggi and Stefano Zanero}, title = {Black-box forensic and antiforensic characteristics of solid-state drives}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {4}, pages = {255--271}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0221-z}, doi = {10.1007/S11416-014-0221-Z}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BonettiVFMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/badgers/PolakisMZK14, author = {Iasonas Polakis and Federico Maggi and Stefano Zanero and Angelos D. Keromytis}, title = {Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned}, booktitle = {Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@ESORICS 2014, Wroclaw, Poland, September 11, 2014}, pages = {18--29}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/BADGERS.2014.9}, doi = {10.1109/BADGERS.2014.9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/badgers/PolakisMZK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PolakisIMLKZIK14, author = {Iasonas Polakis and Panagiotis Ilia and Federico Maggi and Marco Lancini and Georgios Kontaxis and Stefano Zanero and Sotiris Ioannidis and Angelos D. Keromytis}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {501--512}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660317}, doi = {10.1145/2660267.2660317}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PolakisIMLKZIK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/LindorferVSNAMPZI14, author = {Martina Lindorfer and Stamatis Volanis and Alessandro Sisto and Matthias Neugschwandtner and Elias Athanasopoulos and Federico Maggi and Christian Platzer and Stefano Zanero and Sotiris Ioannidis}, editor = {Sven Dietrich}, title = {AndRadar: Fast Discovery of Android Applications in Alternative Markets}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {51--71}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_4}, doi = {10.1007/978-3-319-08509-8\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/LindorferVSNAMPZI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SchiavoniMCZ14, author = {Stefano Schiavoni and Federico Maggi and Lorenzo Cavallaro and Stefano Zanero}, editor = {Sven Dietrich}, title = {Phoenix: DGA-Based Botnet Tracking and Intelligence}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {192--211}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_11}, doi = {10.1007/978-3-319-08509-8\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/SchiavoniMCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SpagnuoloMZ14, author = {Michele Spagnuolo and Federico Maggi and Stefano Zanero}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {BitIodine: Extracting Intelligence from the Bitcoin Network}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {457--468}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_29}, doi = {10.1007/978-3-662-45472-5\_29}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/SpagnuoloMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/AntoniniMZ14, author = {Alessio Antonini and Federico Maggi and Stefano Zanero}, editor = {Helge Janicke and Kevin I. Jones}, title = {A Practical Attack Against a KNX-based Building Automation System}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53231}, timestamp = {Thu, 25 Aug 2016 11:36:27 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/AntoniniMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/CriscioneBZM14, author = {Claudio Criscione and Fabio Bosatelli and Stefano Zanero and Federico Maggi}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {{ZARATHUSTRA:} Extracting Webinject signatures from banking trojans}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {139--148}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890933}, doi = {10.1109/PST.2014.6890933}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/CriscioneBZM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/CarminatiCMEZ14, author = {Michele Carminati and Roberto Caron and Federico Maggi and Ilenia Epifani and Stefano Zanero}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {BankSealer: An Online Banking Fraud Analysis and Decision Support System}, booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, pages = {380--394}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5\_32}, doi = {10.1007/978-3-642-55415-5\_32}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/CarminatiCMEZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NikiforakisMSRJKPVZ14, author = {Nick Nikiforakis and Federico Maggi and Gianluca Stringhini and M. Zubair Rafique and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna and Stefano Zanero}, editor = {Chin{-}Wan Chung and Andrei Z. Broder and Kyuseok Shim and Torsten Suel}, title = {Stranger danger: exploring the ecosystem of ad-based {URL} shortening services}, booktitle = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014}, pages = {51--62}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2566486.2567983}, doi = {10.1145/2566486.2567983}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/NikiforakisMSRJKPVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GianazzaMFCZ14, author = {Andrea Gianazza and Federico Maggi and Aristide Fattori and Lorenzo Cavallaro and Stefano Zanero}, title = {PuppetDroid: {A} User-Centric {UI} Exerciser for Automatic Dynamic Analysis of Similar Android Applications}, journal = {CoRR}, volume = {abs/1402.4826}, year = {2014}, url = {http://arxiv.org/abs/1402.4826}, eprinttype = {arXiv}, eprint = {1402.4826}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GianazzaMFCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BazzoliCMZ14, author = {Enrico Bazzoli and Claudio Criscione and Federico Maggi and Stefano Zanero}, title = {{XSS} Peeker: {A} Systematic Analysis of Cross-site Scripting Vulnerability Scanners}, journal = {CoRR}, volume = {abs/1410.4207}, year = {2014}, url = {http://arxiv.org/abs/1410.4207}, eprinttype = {arXiv}, eprint = {1410.4207}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BazzoliCMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/esl/DardanelliMTZSKH13, author = {Andrea Dardanelli and Federico Maggi and Mara Tanelli and Stefano Zanero and Sergio M. Savaresi and R. Kochanek and Thorsten Holz}, title = {A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth}, journal = {{IEEE} Embed. Syst. Lett.}, volume = {5}, number = {3}, pages = {34--37}, year = {2013}, url = {https://doi.org/10.1109/LES.2013.2264594}, doi = {10.1109/LES.2013.2264594}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/esl/DardanelliMTZSKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BonettiVFMZ13, author = {Gabriele Bonetti and Marco Viglione and Alessandro Frossi and Federico Maggi and Stefano Zanero}, editor = {Charles N. Payne Jr.}, title = {A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {269--278}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523660}, doi = {10.1145/2523649.2523660}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BonettiVFMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaggiVZ13, author = {Federico Maggi and Andrea Valdi and Stefano Zanero}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {49--54}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516768}, doi = {10.1145/2516760.2516768}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MaggiVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/MaggiFZSSKV13, author = {Federico Maggi and Alessandro Frossi and Stefano Zanero and Gianluca Stringhini and Brett Stone{-}Gross and Christopher Kruegel and Giovanni Vigna}, editor = {Daniel Schwabe and Virg{\'{\i}}lio A. F. Almeida and Hartmut Glaser and Ricardo Baeza{-}Yates and Sue B. Moon}, title = {Two years of short URLs internet measurement: security threats and countermeasures}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013}, pages = {861--872}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488388.2488463}, doi = {10.1145/2488388.2488463}, timestamp = {Sun, 22 Sep 2019 18:15:38 +0200}, biburl = {https://dblp.org/rec/conf/www/MaggiFZSSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SchiavoniMCZ13, author = {Stefano Schiavoni and Federico Maggi and Lorenzo Cavallaro and Stefano Zanero}, title = {Tracking and Characterizing Botnets Using Automatically Generated Domains}, journal = {CoRR}, volume = {abs/1311.5612}, year = {2013}, url = {http://arxiv.org/abs/1311.5612}, eprinttype = {arXiv}, eprint = {1311.5612}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SchiavoniMCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LindorferFMCZ12, author = {Martina Lindorfer and Alessandro Di Federico and Federico Maggi and Paolo Milani Comparetti and Stefano Zanero}, editor = {Robert H'obbes' Zakon}, title = {Lines of malicious code: insights into the malicious software industry}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {349--358}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421001}, doi = {10.1145/2420950.2421001}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LindorferFMCZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PolakisLKMIKZ12, author = {Iasonas Polakis and Marco Lancini and Georgios Kontaxis and Federico Maggi and Sotiris Ioannidis and Angelos D. Keromytis and Stefano Zanero}, editor = {Robert H'obbes' Zakon}, title = {All your face are belong to us: breaking Facebook's social authentication}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {399--408}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421008}, doi = {10.1145/2420950.2421008}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PolakisLKMIKZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/MaggiZ12, author = {Federico Maggi and Stefano Zanero}, editor = {Filip De Turck and Luciano Paschoal Gaspary and Deep Medhi}, title = {Integrated detection of anomalous behavior of computer infrastructures}, booktitle = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012, Maui, HI, USA, April 16-20, 2012}, pages = {866--871}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NOMS.2012.6212001}, doi = {10.1109/NOMS.2012.6212001}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/MaggiZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MaggiGB11, author = {Federico Maggi and Simone Gasparini and Giacomo Boracchi}, title = {A fast eavesdropping attack against touchscreens}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {320--325}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122840}, doi = {10.1109/ISIAS.2011.6122840}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MaggiGB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/badgers/MaggiSZ11, author = {Federico Maggi and Alessandro Sisto and Stefano Zanero}, editor = {Engin Kirda and Thorsten Holz}, title = {A social-engineering-centric data collection initiative to study phishing}, booktitle = {Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg, Austria, April 10, 2011}, pages = {107--108}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978672.1978687}, doi = {10.1145/1978672.1978687}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/badgers/MaggiSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MaggiZ11, author = {Federico Maggi and Stefano Zanero}, title = {Systems Security Research at Politecnico di Milano}, booktitle = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands, July 6, 2011}, pages = {127--130}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.30}, doi = {10.1109/SYSSEC.2011.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/MaggiZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MaggiBSZ11, author = {Federico Maggi and Andrea Bellini and Guido Salvaneschi and Stefano Zanero}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Finding Non-trivial Malware Naming Inconsistencies}, booktitle = {Information Systems Security - 7th International Conference, {ICISS} 2011, Kolkata, India, December 15-19, 2011, Procedings}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {144--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25560-1\_10}, doi = {10.1007/978-3-642-25560-1\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/MaggiBSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/RovetaCMZMC11, author = {Francesco Roveta and Giorgio Caviglia and Luca Di Mario and Stefano Zanero and Federico Maggi and Paolo Ciuccarelli}, title = {{BURN:} baring unknown rogue networks}, booktitle = {8th International Symposium on Visualization for Cyber Security, VizSec 2011, Pittsburgh, PA, USA, July 20, 2011}, pages = {6}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2016904.2016910}, doi = {10.1145/2016904.2016910}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/RovetaCMZMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaggiMZ10, author = {Federico Maggi and Matteo Matteucci and Stefano Zanero}, title = {Detecting Intrusions through System Call Sequence and Argument Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {4}, pages = {381--395}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.69}, doi = {10.1109/TDSC.2008.69}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaggiMZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/Maggi10, author = {Federico Maggi}, title = {A Recognizer of Rational Trace Languages}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {257--264}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.77}, doi = {10.1109/CIT.2010.77}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/Maggi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/Maggi10a, author = {Federico Maggi}, title = {Are the Con Artists Back? {A} Preliminary Analysis of Modern Phone Frauds}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {824--831}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.156}, doi = {10.1109/CIT.2010.156}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/Maggi10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/VolpattoMZ10, author = {Alberto Volpatto and Federico Maggi and Stefano Zanero}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Effective Multimodel Anomaly Detection Using Cooperative Negotiation}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {180--191}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_12}, doi = {10.1007/978-3-642-17197-0\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/VolpattoMZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RobertsonMKV10, author = {William K. Robertson and Federico Maggi and Christopher Kruegel and Giovanni Vigna}, title = {Effective Anomaly Detection with Scarce Training Data}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/effective-anomaly-detection-scarce-training-data}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/RobertsonMKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/MaggiMZ09, author = {Federico Maggi and Matteo Matteucci and Stefano Zanero}, title = {Reducing false positives in anomaly detectors through fuzzy alert aggregation}, journal = {Inf. Fusion}, volume = {10}, number = {4}, pages = {300--311}, year = {2009}, url = {https://doi.org/10.1016/j.inffus.2009.01.004}, doi = {10.1016/J.INFFUS.2009.01.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/MaggiMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/FrossiMRZ09, author = {Alessandro Frossi and Federico Maggi and Gian Luigi Rizzo and Stefano Zanero}, editor = {Ulrich Flegel and Danilo Bruschi}, title = {Selecting and Improving System Call Models for Anomaly Detection}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5587}, pages = {206--223}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02918-9\_13}, doi = {10.1007/978-3-642-02918-9\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/FrossiMRZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaggiRKV09, author = {Federico Maggi and William K. Robertson and Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Protecting a Moving Target: Addressing Web Application Concept Drift}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {21--40}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_2}, doi = {10.1007/978-3-642-04342-0\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaggiRKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaggiZ07, author = {Federico Maggi and Stefano Zanero}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {On the Use of Different Statistical Tests for Alert Correlation - Short Paper}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {167--177}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_9}, doi = {10.1007/978-3-540-74320-0\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaggiZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.