Mario Polino
Orcid: 0000-0002-0925-2306
According to our database1,
Mario Polino
authored at least 33 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Emerg. Top. Comput., 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
ACM Trans. Priv. Secur., November, 2023
Comput. Secur., September, 2023
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track, 2023
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis.
Proceedings of the Advances in Information and Computer Security, 2023
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing.
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, 2023
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
2022
Comput. Secur., 2022
Comput. Secur., 2022
IEEE Access, 2022
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Security of controlled manufacturing systems in the connected factory: the case of industrial robots.
J. Comput. Virol. Hacking Tech., 2019
2018
ACM Trans. Priv. Secur., 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 8th Software Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015