Mario Polino
Mario Polino
Email verificata su polimi.it - Home page
TitoloCitata daAnno
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE Symposium on Security and Privacy (SP), 138-157, 2016
2602016
Going native: Using a large-scale analysis of android apps to create a practical native-code sandboxing policy
V Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, P de Geus, ...
The Network and Distributed System Security Symposium, 1-15, 2016
572016
An experimental security analysis of an industrial robot controller
D Quarta, M Pogliani, M Polino, F Maggi, AM Zanchettin, S Zanero
2017 IEEE Symposium on Security and Privacy (SP), 268-286, 2017
342017
Rogue robots: Testing the limits of an industrial robot’s security
F Maggi, D Quarta, M Pogliani, M Polino, AM Zanchettin, S Zanero
Trend Micro, Politecnico di Milano, Tech. Rep, 2017
142017
Measuring and defeating anti-instrumentation-equipped malware
M Polino, A Continella, S Mariani, S D’Alessio, L Fontana, F Gritti, ...
International Conference on Detection of Intrusions and Malware, and …, 2017
132017
Jackdaw: Towards automatic reverse engineering of large datasets of binaries
M Polino, A Scorti, F Maggi, S Zanero
International Conference on Detection of Intrusions and Malware, and …, 2015
122015
Prometheus: Analyzing WebInject-based information stealers
A Continella, M Carminati, M Polino, A Lanzi, S Zanero, F Maggi
Journal of Computer Security 25 (2), 117-137, 2017
92017
Security Evaluation of a Banking Fraud Analysis System
M Carminati, M Polino, A Continella, A Lanzi, F Maggi, S Zanero
ACM Transactions on Privacy and Security (TOPS) 21 (3), 11, 2018
22018
There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets
A Continella, M Polino, M Pogliani, S Zanero
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
12018
Security of controlled manufacturing systems in the connected factory: the case of industrial robots
M Pogliani, D Quarta, M Polino, M Vittone, F Maggi, S Zanero
Journal of Computer Virology and Hacking Techniques, 1-15, 2019
2019
SysTaint: Assisting Reversing of Malicious Network Communications
G Viglianisi, M Carminati, M Polino, A Continella, S Zanero
Proceedings of the 8th Software Security, Protection, and Reverse …, 2018
2018
ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation
P De Nicolao, M Pogliani, M Polino, M Carminati, D Quarta, S Zanero
International Conference on Detection of Intrusions and Malware, and …, 2018
2018
Automated malware behavioral analysis
M POLINO
Italy, 2017
2017
Jackdaw: automatic behavior extractor and semantic tagger
A SCORTI, M POLINO
Italy, 2013
2013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–14