An Experimental Security Analysis of an Industrial Robot Controller D Quarta, M Pogliani, M Polino, F Maggi, AM Zanchettin, S Zanero Security and Privacy (SP), 2017 IEEE Symposium, 268-286, 2017 | 218 | 2017 |
Rogue robots: Testing the limits of an industrial robot’s security F Maggi, D Quarta, M Pogliani, M Polino, AM Zanchettin, S Zanero Trend Micro, Politecnico di Milano, Tech. Rep, 1-21, 2017 | 69 | 2017 |
Security of controlled manufacturing systems in the connected factory: The case of industrial robots M Pogliani, D Quarta, M Polino, M Vittone, F Maggi, S Zanero Journal of Computer Virology and Hacking Techniques 15, 161-175, 2019 | 41 | 2019 |
The fragility of industrial IoT’s data backbone F Maggi, R Vosseler, D Quarta Trend Micro Inc, 1-65, 2018 | 36 | 2018 |
Groupdroid: Automatically grouping mobile malware by extracting code similarities N Marastoni, A Continella, D Quarta, S Zanero, MD Preda Proceedings of the 7th Software Security, Protection, and Reverse …, 2017 | 29 | 2017 |
Smart factory security: A case study on a modular smart manufacturing system F Maggi, M Balduzzi, R Vosseler, M Rösler, W Quadrini, G Tavola, ... Procedia Computer Science 180, 666-675, 2021 | 23 | 2021 |
ELISA: ELiciting ISA of raw binaries for fine-grained code and data separation P De Nicolao, M Pogliani, M Polino, M Carminati, D Quarta, S Zanero International Conference on Detection of Intrusions and Malware, and …, 2018 | 17 | 2018 |
Toward systematically exploring antivirus engines D Quarta, F Salvioni, A Continella, S Zanero Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018 | 16 | 2018 |
Detecting insecure code patterns in industrial robot programs M Pogliani, F Maggi, M Balduzzi, D Quarta, S Zanero Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 13 | 2020 |
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone D Quarta, M Ianni, A Machiry, Y Fratantonio, E Gustafson, D Balzarotti, ... Proceedings of the 2021 Research on offensive and defensive techniques in …, 2021 | 5 | 2021 |
Scalable testing of mobile antivirus applications A Valdi, E Lever, S Benefico, D Quarta, S Zanero, F Maggi Computer 48 (11), 60-68, 2015 | 5 | 2015 |
Detecting unsecure data flow in automation task programs F Maggi, M Pogliani, D Quarta, M Vittone, S Zanero US Patent 11,440,190, 2022 | 2 | 2022 |
T: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM’s TrustZone D Quarta, M Ianni, A Machiry, Y Fratantonio, E Gustafson, D Balzarotti, ... | | 2021 |
Embedded system security: attacks, impacts & defenses D Quarta Politecnico di Milano, 2018 | | 2018 |