Emmanuele Zambon

Orcid: 0000-0002-8079-4087

Affiliations:
  • University of Twente, Enschede, Netherlands


According to our database1, Emmanuele Zambon authored at least 27 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Tale of Two Industroyers: It was the Season of Darkness.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

From Power to Water: Dissecting SCADA Networks Across Different Critical Infrastructures.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

A Methodology to Measure the "Cost" of CPS Attacks: Not all CPS Networks are Created Equal.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

Attacking Operational Technology Without Specialized Knowledge: The Unspecialized OT Threat Actor Profile.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
'Give Me Structure': Synthesis and Evaluation of a (Network) Threat Analysis Process Supporting Tier 1 Investigations in a Security Operation Center.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

ICSvertase: A Framework for Purpose-based Design and Classification of ICS Honeypots.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Characterizing Building Automation System Attacks and Attackers.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2017
Encryption in ICS networks: A blessing or a curse?
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems.
Proceedings of the Network and System Security - 11th International Conference, 2017

ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Specification Mining for Intrusion Detection in Networked Control Systems.
Proceedings of the 25th USENIX Security Symposium, 2016

Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation.
Proceedings of the Critical Information Infrastructures Security, 2016

2015
Modeling Message Sequences for Intrusion Detection in Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection IX, 2015

Sequence-aware Intrusion Detection in Industrial Control Systems.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
On Emulation-Based Network Intrusion Detection Systems.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Through the eye of the PLC: semantic security monitoring for industrial processes.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
On the Feasibility of Device Fingerprinting in Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2013

2012
A<sup>2</sup>thOS: availability analysis and optimisation in SLAs.
Int. J. Netw. Manag., 2012

N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

2011
Model-based qualitative risk assessment for availability of IT infrastructures.
Softw. Syst. Model., 2011

2010
CRAC: Confidentiality risk assessment and IT-infrastructure comparison.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Extended eTVRA vs. security checklist: Experiences in a value-web.
Proceedings of the 31st International Conference on Software Engineering, 2009

2008
IT confidentiality risk assessment for an architecture-based approach.
Proceedings of BDIM 2008, 2008

2007
Model-Based Mitigation of Availability Risks.
Proceedings of BDIM 2007, 2007

2006
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

2005
Poseidon: a 2-tier Anomaly-based Intrusion Detection System
CoRR, 2005


  Loading...