Michele Carminati

Orcid: 0000-0001-8284-6074

According to our database1, Michele Carminati authored at least 41 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment.
IEEE Trans. Emerg. Top. Comput., 2024

The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations.
CoRR, 2024

A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications.
CoRR, 2024

Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

Do You Trust Your Device? Open Challenges in IoT Security Analysis.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Tarallo: Evading Behavioral Malware Detectors in the Problem Space.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

2023
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies.
ACM Trans. Priv. Secur., November, 2023

BINO: Automatic recognition of inline binary functions from template classes.
Comput. Secur., September, 2023

CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN.
Comput. Secur., May, 2023

Advancing Fraud Detection Systems Through Online Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track, 2023

The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis.
Proceedings of the Advances in Information and Computer Security, 2023

Task Aware Intrusion Detection for Industrial Robots.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing.
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, 2023

Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

HAMLET: A Transformer Based Approach for Money Laundering Detection.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2022

A Systematical and longitudinal study of evasive behaviors in windows malware.
Comput. Secur., 2022

Apícula: Static detection of API calls in generic streams of bytes.
Comput. Secur., 2022

Amaretto: An Active Learning Framework for Money Laundering Detection.
IEEE Access, 2022

A Natural Language Processing Approach for Financial Fraud Detection.
Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), 2022

CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network.
IEEE Trans. Netw. Serv. Manag., 2021

2020
Evasion Attacks against Banking Fraud Detection Systems.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems.
CoRR, 2019

A Secure-by-Design Framework for Automotive On-board Network Risk Analysis.
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019

CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

2018
Security Evaluation of a Banking Fraud Analysis System.
ACM Trans. Priv. Secur., 2018

ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

SysTaint: Assisting Reversing of Malicious Network Communications.
Proceedings of the 8th Software Security, 2018

2017
Internet banking fraud analysis and detection.
PhD thesis, 2017

Prometheus: Analyzing WebInject-based information stealers.
J. Comput. Secur., 2017

A Supervised Auto-Tuning Approach for a Banking Fraud Detection System.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

2015
BankSealer: A decision support system for online banking fraud analysis and investigation.
Comput. Secur., 2015

2014
BankSealer: An Online Banking Fraud Analysis and Decision Support System.
Proceedings of the ICT Systems Security and Privacy Protection, 2014


  Loading...