Mario Polino
Orcid: 0000-0002-0925-2306
According to our database1,
Mario Polino
authored at least 27 papers
between 2015 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
ACM Trans. Priv. Secur., November, 2023
Comput. Secur., September, 2023
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track, 2023
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis.
Proceedings of the Advances in Information and Computer Security, 2023
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing.
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, 2023
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
2022
Comput. Secur., 2022
Comput. Secur., 2022
IEEE Access, 2022
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Security of controlled manufacturing systems in the connected factory: the case of industrial robots.
J. Comput. Virol. Hacking Tech., 2019
2018
ACM Trans. Priv. Secur., 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 8th Software Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015