Follow
Marcello Pogliani
Marcello Pogliani
Secure Network s.r.l. (former Ph.D. candidate, Politecnico di Milano)
Verified email at polimi.it
Title
Cited by
Cited by
Year
An Experimental Security Analysis of an Industrial Robot Controller
D Quarta, M Pogliani, M Polino, F Maggi, AM Zanchettin, S Zanero
38th IEEE Symposium on Security and Privacy, 2017
2292017
Rogue Robots: Testing the Limits of an Industrial Robot’s Security
F Maggi, D Quarta, M Pogliani, M Polino, AM Zanchettin, S Zanero
Technical Report, Trend Micro TrendLabs Research Paper, 2017
742017
Constrained concealment attacks against reconstruction-based anomaly detectors in industrial control systems
A Erba, R Taormina, S Galelli, M Pogliani, M Carminati, S Zanero, ...
Annual Computer Security Applications Conference, 480-495, 2020
662020
Security of controlled manufacturing systems in the connected factory: the case of industrial robots
M Pogliani, D Quarta, M Polino, M Vittone, F Maggi, S Zanero
Journal of Computer Virology and Hacking Techniques 15 (3), 161-175, 2019
462019
There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets
A Continella, M Polino, M Pogliani, S Zanero
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
462018
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System
F Maggi, M Balduzzi, R Vosseler, M Rösler, W Quadrini, G Tavola, ...
Procedia Computer Science 180, 666-675, 2021
282021
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots
P Ferretti, M Pogliani, S Zanero
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy …, 2019
282019
Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems
A Erba, R Taormina, S Galelli, M Pogliani, M Carminati, S Zanero, ...
arXiv preprint arXiv:1907.07487, 2019
252019
ELISA: ELiciting ISA of raw binaries for fine-grained code and data separation.
P De Nicolao, M Pogliani, M Polino, M Carminati, D Quarta, S Zanero
15th Conference on Detection of Intrusions and Malware & Vulnerability …, 2018
182018
Detecting Insecure Code Patterns in Industrial Robot Programs
M Pogliani, F Maggi, M Balduzzi, D Quarta, S Zanero
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
162020
Attacks on Smart Manufacturing Systems
F Maggi, M Pogliani
15*
Runtime Resource Management in Heterogeneous System Architectures: The SAVE Approach
GC Durelli, M Pogliani, A Miele, C Plessl, H Riebler, MD Santambrogio, ...
2014 IEEE International Symposium on Parallel and Distributed Processing …, 2014
72014
Detecting unsecure data flow in automation task programs
F Maggi, M Pogliani, D Quarta, M Vittone, S Zanero
US Patent 11,440,190, 2022
22022
Quality of Service Driven Runtime Resource Allocation in Reconfigurable HPC Architectures
M Pogliani, GC Durelli, A Miele, T Becker, P Sanders, C Bolchini, ...
2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and …, 2016
22016
Quality of Service Driven Runtime Resource Allocation in Reconfigurable HPC Architectures
M Pogliani, GC Durelli, AR Miele, T Becker, P Sanders, C Bolchini, ...
14th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2016
22016
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems
M Pogliani, M Barlocco, M Pesatori, S Zanero
2019
Industria 4.0 e protezione del dato: La difesa della fabbrica connessa
M Pogliani
2018
Poster: Detecting WebInjects through Live Memory Inspection
N Mariani, A Continella, M Pogliani, M Carminati, F Maggi, S Zanero
38th IEEE Symposium on Security and Privacy (Poster Abstract), 2017
2017
Rogue Automation
F Maggi, M Pogliani
Designing and Evaluating Resource Management Policies for Heterogeneous System Architectures
C Bolchini, GC Durelli, A Miele, G Pallotta, M Pogliani, MD Santambrogio
The system can't perform the operation now. Try again later.
Articles 1–20