Bitiodine: Extracting intelligence from the bitcoin network M Spagnuolo, F Maggi, S Zanero Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 441 | 2014 |
ShieldFS: a self-healing, ransomware-aware filesystem A Continella, A Guagnelli, G Zingaro, G De Pasquale, A Barenghi, ... Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 353 | 2016 |
HelDroid: Dissecting and Detecting Mobile Ransomware N Andronio, S Zanero, F Maggi Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015 | 291 | 2015 |
Phoenix: DGA-based botnet tracking and intelligence S Schiavoni, F Maggi, L Cavallaro, S Zanero Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014 | 287 | 2014 |
An experimental security analysis of an industrial robot controller D Quarta, M Pogliani, M Polino, F Maggi, AM Zanchettin, S Zanero 2017 IEEE Symposium on Security and Privacy (SP), 268-286, 2017 | 211 | 2017 |
Detecting intrusions through system call sequence and argument analysis F Maggi, M Matteucci, S Zanero IEEE Transactions on Dependable and Secure Computing 7 (4), 381-395, 2008 | 207 | 2008 |
Face/Off: Preventing Privacy Leakage From Photos in Social Networks P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 192 | 2015 |
A stealth, selective, link-layer denial-of-service attack against automotive networks A Palanca, E Evenchick, F Maggi, S Zanero Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017 | 159 | 2017 |
BankSealer: A decision support system for online banking fraud analysis and investigation M Carminati, R Caron, F Maggi, I Epifani, S Zanero Computers & Security 53, 175-186, 2015 | 119 | 2015 |
Protecting a moving target: Addressing web application concept drift F Maggi, W Robertson, C Kruegel, G Vigna Recent Advances in Intrusion Detection, 21-40, 2009 | 118 | 2009 |
A fast eavesdropping attack against touchscreens F Maggi, A Volpatto, S Gasparini, G Boracchi, S Zanero Information Assurance and Security (IAS), 2011 7th International Conference …, 2011 | 101 | 2011 |
AndRadar: fast discovery of android applications in alternative markets M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ... Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014 | 96 | 2014 |
Lines of malicious code: insights into the malicious software industry M Lindorfer, A Di Federico, F Maggi, PM Comparetti, S Zanero Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 92 | 2012 |
Two years of short URLs internet measurement: security threats and countermeasures F Maggi, A Frossi, S Zanero, G Stringhini, B Stone-Gross, C Kruegel, ... Proceedings of the 22nd international conference on World Wide Web (WWW'13 …, 2013 | 88 | 2013 |
AndroTotal: A Flexible, Scalable Toolbox and Service for Testing Mobile Malware Detectors F Maggi, A Valdi, S Zanero Proceedings of the 3rd Annual ACM CCS Workshop on Security and Privacy in …, 2013 | 80 | 2013 |
Stranger danger: exploring the ecosystem of ad-based URL shortening services N Nikiforakis, F Maggi, G Stringhini, MZ Rafique, W Joosen, C Kruegel, ... Proceedings of the 23rd international conference on World wide web, 51-62, 2014 | 79 | 2014 |
Reducing false positives in anomaly detectors through fuzzy alert aggregation F Maggi, M Matteucci, S Zanero Information Fusion 10 (4), 300-311, 2009 | 71 | 2009 |
Finding non-trivial malware naming inconsistencies F Maggi, A Bellini, G Salvaneschi, S Zanero Information Systems Security: 7th International Conference, ICISS 2011 …, 2011 | 67 | 2011 |
Rogue robots: Testing the limits of an industrial robot’s security F Maggi, D Quarta, M Pogliani, M Polino, AM Zanchettin, S Zanero Trend Micro, Politecnico di Milano, Tech. Rep, 1-21, 2017 | 65 | 2017 |
All your face are belong to us: breaking Facebook's social authentication I Polakis, M Lancini, G Kontaxis, F Maggi, S Ioannidis, AD Keromytis, ... Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 63 | 2012 |