Mario Polino

Orcid: 0000-0002-0925-2306

According to our database1, Mario Polino authored at least 27 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies.
ACM Trans. Priv. Secur., November, 2023

BINO: Automatic recognition of inline binary functions from template classes.
Comput. Secur., September, 2023

Advancing Fraud Detection Systems Through Online Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track, 2023

The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis.
Proceedings of the Advances in Information and Computer Security, 2023

Task Aware Intrusion Detection for Industrial Robots.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing.
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, 2023

Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
A Systematical and longitudinal study of evasive behaviors in windows malware.
Comput. Secur., 2022

Apícula: Static detection of API calls in generic streams of bytes.
Comput. Secur., 2022

Amaretto: An Active Learning Framework for Money Laundering Detection.
IEEE Access, 2022

CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2020
Evasion Attacks against Banking Fraud Detection Systems.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Security of controlled manufacturing systems in the connected factory: the case of industrial robots.
J. Comput. Virol. Hacking Tech., 2019

2018
Security Evaluation of a Banking Fraud Analysis System.
ACM Trans. Priv. Secur., 2018

ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

SysTaint: Assisting Reversing of Malicious Network Communications.
Proceedings of the 8th Software Security, 2018

There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Automated malware behavioral analysis.
PhD thesis, 2017

Prometheus: Analyzing WebInject-based information stealers.
J. Comput. Secur., 2017

An Experimental Security Analysis of an Industrial Robot Controller.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Measuring and Defeating Anti-Instrumentation-Equipped Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015


  Loading...