An Experimental Security Analysis of an Industrial Robot Controller D Quarta, M Pogliani, M Polino, F Maggi, AM Zanchettin, S Zanero 38th IEEE Symposium on Security and Privacy, 2017 | 211 | 2017 |
Rogue Robots: Testing the Limits of an Industrial Robot’s Security F Maggi, D Quarta, M Pogliani, M Polino, AM Zanchettin, S Zanero Technical Report, Trend Micro TrendLabs Research Paper, 2017 | 65 | 2017 |
Constrained concealment attacks against reconstruction-based anomaly detectors in industrial control systems A Erba, R Taormina, S Galelli, M Pogliani, M Carminati, S Zanero, ... Annual Computer Security Applications Conference, 480-495, 2020 | 56 | 2020 |
Security of controlled manufacturing systems in the connected factory: the case of industrial robots M Pogliani, D Quarta, M Polino, M Vittone, F Maggi, S Zanero Journal of Computer Virology and Hacking Techniques 15 (3), 161-175, 2019 | 41 | 2019 |
There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets A Continella, M Polino, M Pogliani, S Zanero Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 37 | 2018 |
Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems A Erba, R Taormina, S Galelli, M Pogliani, M Carminati, S Zanero, ... arXiv preprint arXiv:1907.07487, 2019 | 24 | 2019 |
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System F Maggi, M Balduzzi, R Vosseler, M Rösler, W Quadrini, G Tavola, ... Procedia Computer Science 180, 666-675, 2021 | 23 | 2021 |
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots P Ferretti, M Pogliani, S Zanero Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy …, 2019 | 22 | 2019 |
ELISA: ELiciting ISA of raw binaries for fine-grained code and data separation. P De Nicolao, M Pogliani, M Polino, M Carminati, D Quarta, S Zanero 15th Conference on Detection of Intrusions and Malware & Vulnerability …, 2018 | 16 | 2018 |
Attacks on Smart Manufacturing Systems F Maggi, M Pogliani | 14* | |
Detecting Insecure Code Patterns in Industrial Robot Programs M Pogliani, F Maggi, M Balduzzi, D Quarta, S Zanero Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 13 | 2020 |
Runtime Resource Management in Heterogeneous System Architectures: The SAVE Approach GC Durelli, M Pogliani, A Miele, C Plessl, H Riebler, MD Santambrogio, ... 2014 IEEE International Symposium on Parallel and Distributed Processing …, 2014 | 7 | 2014 |
Detecting unsecure data flow in automation task programs F Maggi, M Pogliani, D Quarta, M Vittone, S Zanero US Patent 11,440,190, 2022 | 2 | 2022 |
Quality of Service Driven Runtime Resource Allocation in Reconfigurable HPC Architectures M Pogliani, GC Durelli, A Miele, T Becker, P Sanders, C Bolchini, ... 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and …, 2016 | 2 | 2016 |
Quality of Service Driven Runtime Resource Allocation in Reconfigurable HPC Architectures M Pogliani, GC Durelli, AR Miele, T Becker, P Sanders, C Bolchini, ... 14th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2016 | 2 | 2016 |
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems M Pogliani, M Barlocco, M Pesatori, S Zanero | | 2019 |
Industria 4.0 e protezione del dato: La difesa della fabbrica connessa M Pogliani | | 2018 |
Poster: Detecting WebInjects through Live Memory Inspection N Mariani, A Continella, M Pogliani, M Carminati, F Maggi, S Zanero 38th IEEE Symposium on Security and Privacy (Poster Abstract), 2017 | | 2017 |
Rogue Automation F Maggi, M Pogliani | | |
Designing and Evaluating Resource Management Policies for Heterogeneous System Architectures C Bolchini, GC Durelli, A Miele, G Pallotta, M Pogliani, MD Santambrogio | | |