Federico Maggi

Orcid: 0000-0003-1073-8036

Affiliations:
  • Politecnico di Milano, Milan, Italy


According to our database1, Federico Maggi authored at least 68 papers between 2007 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Hacking planned obsolescense in robotics, towards security-oriented robot teardown.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

2021
RFQuack: A Universal Hardware-Software Toolkit for Wireless Protocol (Security) Analysis and Research.
CoRR, 2021

2020
A simple pre-factor for contaminant biodegradation potential and its application to pesticides risk assessment.
Math. Comput. Simul., 2020

Influential sources of uncertainty in glyphosate biochemical degradation in soil.
Math. Comput. Simul., 2020

Smart Factory Security: A Case Study on a Modular Smart Manufacturing System.
Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing (ISM 2020), 2020

Detecting Insecure Code Patterns in Industrial Robot Programs.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Security of controlled manufacturing systems in the connected factory: the case of industrial robots.
J. Comput. Virol. Hacking Tech., 2019

BRTSim, a general-purpose computational solver for hydrological, biogeochemical, and ecosystem dynamics.
CoRR, 2019

A Security Evaluation of Industrial Radio Remote Controllers.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Security Evaluation of a Banking Fraud Analysis System.
ACM Trans. Priv. Secur., 2018

FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Investigating Web Defacement Campaigns at Large.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology.
J. Comput. Virol. Hacking Tech., 2017

On the Privacy and Security of the Ultrasound Ecosystem.
Proc. Priv. Enhancing Technol., 2017

Prometheus: Analyzing WebInject-based information stealers.
J. Comput. Secur., 2017

Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

An Experimental Security Analysis of an Industrial Robot Controller.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
GreatEatlon: Fast, Static Detection of Mobile Ransomware.
Proceedings of the Security and Privacy in Communication Networks, 2016

XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Trellis: Privilege Separation for Multi-user Applications Made Easy.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

DroydSeuss: A Mobile Banking Trojan Tracker (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

On-chip system call tracing: A feasibility study and open prototype.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

ShieldFS: a self-healing, ransomware-aware filesystem.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
European Cyber-Security Research and Innovation.
ERCIM News, 2015

Scalable Testing of Mobile Antivirus Applications.
Computer, 2015

BankSealer: A decision support system for online banking fraud analysis and investigation.
Comput. Secur., 2015

HelDroid: Dissecting and Detecting Mobile Ransomware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Face/Off: Preventing Privacy Leakage From Photos in Social Networks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Black-box forensic and antiforensic characteristics of solid-state drives.
J. Comput. Virol. Hacking Tech., 2014

PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications.
CoRR, 2014

XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners.
CoRR, 2014

Stranger danger: exploring the ecosystem of ad-based URL shortening services.
Proceedings of the 23rd International World Wide Web Conference, 2014

BankSealer: An Online Banking Fraud Analysis and Decision Support System.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

ZARATHUSTRA: Extracting Webinject signatures from banking trojans.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

A Practical Attack Against a KNX-based Building Automation System.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

BitIodine: Extracting Intelligence from the Bitcoin Network.
Proceedings of the Financial Cryptography and Data Security, 2014

Phoenix: DGA-Based Botnet Tracking and Intelligence.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

AndRadar: Fast Discovery of Android Applications in Alternative Markets.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth.
IEEE Embed. Syst. Lett., 2013

Tracking and Characterizing Botnets Using Automatically Generated Domains.
CoRR, 2013

Two years of short URLs internet measurement: security threats and countermeasures.
Proceedings of the 22nd International World Wide Web Conference, 2013

AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors.
Proceedings of the SPSM'13, 2013

A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Integrated detection of anomalous behavior of computer infrastructures.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

All your face are belong to us: breaking Facebook's social authentication.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Lines of malicious code: insights into the malicious software industry.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
BURN: baring unknown rogue networks.
Proceedings of the 8th International Symposium on Visualization for Cyber Security, 2011

Finding Non-trivial Malware Naming Inconsistencies.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Systems Security Research at Politecnico di Milano.
Proceedings of the First SysSec Workshop 2011, 2011

A social-engineering-centric data collection initiative to study phishing.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

A fast eavesdropping attack against touchscreens.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Detecting Intrusions through System Call Sequence and Argument Analysis.
IEEE Trans. Dependable Secur. Comput., 2010

Effective Anomaly Detection with Scarce Training Data.
Proceedings of the Network and Distributed System Security Symposium, 2010

Effective Multimodel Anomaly Detection Using Cooperative Negotiation.
Proceedings of the Decision and Game Theory for Security, 2010

Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

A Recognizer of Rational Trace Languages.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Reducing false positives in anomaly detectors through fuzzy alert aggregation.
Inf. Fusion, 2009

Protecting a Moving Target: Addressing Web Application Concept Drift.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Selecting and Improving System Call Models for Anomaly Detection.
Proceedings of the Detection of Intrusions and Malware, 2009

2007
On the Use of Different Statistical Tests for Alert Correlation - Short Paper.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007


  Loading...