Marco Balduzzi

According to our database1, Marco Balduzzi authored at least 24 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Security Analysis of CNC Machines in Industry 4.0.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

2022
An Empirical Evaluation of CNC Machines in Industry 4.0 (Short Paper).
Proceedings of the Critical Information Infrastructures Security, 2022

2020
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System.
Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing (ISM 2020), 2020

Detecting Insecure Code Patterns in Industrial Robot Programs.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
A Security Evaluation of Industrial Radio Remote Controllers.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Investigating Web Defacement Campaigns at Large.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Attacks landscape in the dark side of the web.
Proceedings of the Symposium on Applied Computing, 2017

Exploring the Long Tail of (Malicious) Software Downloads.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Automatic Extraction of Indicators of Compromise for Web Applications.
Proceedings of the 25th International Conference on World Wide Web, 2016

Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

MobiPot: Understanding Mobile Telephony Threats with Honeycards.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2014
Soundsquatting: Uncovering the Use of Homophones in Domain Squatting.
Proceedings of the Information Security - 17th International Conference, 2014

A security evaluation of AIS automated identification system.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
The role of phone numbers in understanding cyber-crime schemes.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Targeted attacks detection with SPuNge.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

2012
A security analysis of amazon's elastic compute cloud service.
Proceedings of the ACM Symposium on Applied Computing, 2012

2011
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2011

Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications.
Proceedings of the Network and Distributed System Security Symposium, 2011

Exposing the Lack of Privacy in File Hosting Services.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Reverse Social Engineering Attacks in Online Social Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

2010
Abusing Social Networks for Automated User Profiling.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype.
Proceedings of the Detection of Intrusions and Malware, 2010

A solution for the automated detection of clickjacking attacks.
Proceedings of the 5th ACM Symposium on Information, 2010

Security by virtualization - A novel antivirus for personal computers.
VDM, ISBN: 978-3-639-25624-6, 2010


  Loading...