Stefano Zanero

Orcid: 0000-0003-4710-5283

Affiliations:
  • Polytechnic University of Milan, Italy


According to our database1, Stefano Zanero authored at least 122 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment.
IEEE Trans. Emerg. Top. Comput., 2024

Model Predictive Control with adaptive resilience for Denial-of-Service Attacks mitigation on a Regulated Dam.
CoRR, 2024

Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

Do You Trust Your Device? Open Challenges in IoT Security Analysis.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Tarallo: Evading Behavioral Malware Detectors in the Problem Space.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies.
ACM Trans. Priv. Secur., November, 2023

BINO: Automatic recognition of inline binary functions from template classes.
Comput. Secur., September, 2023

Coming of Age.
Commun. ACM, September, 2023

CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN.
Comput. Secur., May, 2023

Quantum Eigenfaces: Linear Feature Mapping and Nearest Neighbor Classification with Outlier Detection.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023

Advancing Fraud Detection Systems Through Online Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track, 2023

The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis.
Proceedings of the Advances in Information and Computer Security, 2023

Task Aware Intrusion Detection for Industrial Robots.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing.
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, 2023

Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

HAMLET: A Transformer Based Approach for Money Laundering Detection.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

DJM-CYBER: A Joint Master in Advanced Cybersecurity.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2022

Quantum algorithms for SVD-based data representation and analysis.
Quantum Mach. Intell., 2022

A Systematical and longitudinal study of evasive behaviors in windows malware.
Comput. Secur., 2022

Apícula: Static detection of API calls in generic streams of bytes.
Comput. Secur., 2022

Amaretto: An Active Learning Framework for Money Laundering Detection.
IEEE Access, 2022

A Natural Language Processing Approach for Financial Fraud Detection.
Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), 2022

CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network.
IEEE Trans. Netw. Serv. Manag., 2021

Quantum Algorithms for Data Representation and Analysis.
CoRR, 2021

SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2020
Evasion Attacks against Banking Fraud Detection Systems.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Smart Factory Security: A Case Study on a Modular Smart Manufacturing System.
Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing (ISM 2020), 2020

Detecting Insecure Code Patterns in Industrial Robot Programs.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Security of controlled manufacturing systems in the connected factory: the case of industrial robots.
J. Comput. Virol. Hacking Tech., 2019

Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems.
CoRR, 2019

A Secure-by-Design Framework for Automotive On-board Network Risk Analysis.
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019

CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

2018
Security Evaluation of a Banking Fraud Analysis System.
ACM Trans. Priv. Secur., 2018

When Cyber Got Real: Challenges in Securing Cyber-Physical Systems.
Proceedings of the 2018 IEEE SENSORS, New Delhi, India, October 28-31, 2018, 2018

Extended Abstract: Toward Systematically Exploring Antivirus Engines.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

SysTaint: Assisting Reversing of Malicious Network Communications.
Proceedings of the 8th Software Security, 2018

There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Prometheus: Analyzing WebInject-based information stealers.
J. Comput. Secur., 2017

Cyber-Physical Systems.
Computer, 2017

An Experimental Security Analysis of an Industrial Robot Controller.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Measuring and Defeating Anti-Instrumentation-Equipped Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

A Supervised Auto-Tuning Approach for a Banking Fraud Detection System.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

2016
Editorial.
IEEE Trans. Emerg. Top. Comput., 2016

GreatEatlon: Fast, Static Detection of Mobile Ransomware.
Proceedings of the Security and Privacy in Communication Networks, 2016

XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Trellis: Privilege Separation for Multi-user Applications Made Easy.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

On-chip system call tracing: A feasibility study and open prototype.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

ShieldFS: a self-healing, ransomware-aware filesystem.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
European Cyber-Security Research and Innovation.
ERCIM News, 2015

Scalable Testing of Mobile Antivirus Applications.
Computer, 2015

BankSealer: A decision support system for online banking fraud analysis and investigation.
Comput. Secur., 2015

HelDroid: Dissecting and Detecting Mobile Ransomware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Practical Exploit Generation for Intent Message Vulnerabilities in Android.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Black-box forensic and antiforensic characteristics of solid-state drives.
J. Comput. Virol. Hacking Tech., 2014

Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of "Crypto Wars" in Security Research.
login Usenix Mag., 2014

PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications.
CoRR, 2014

XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners.
CoRR, 2014

Stranger danger: exploring the ecosystem of ad-based URL shortening services.
Proceedings of the 23rd International World Wide Web Conference, 2014

BankSealer: An Online Banking Fraud Analysis and Decision Support System.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

ZARATHUSTRA: Extracting Webinject signatures from banking trojans.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

A Practical Attack Against a KNX-based Building Automation System.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

BitIodine: Extracting Intelligence from the Bitcoin Network.
Proceedings of the Financial Cryptography and Data Security, 2014

Phoenix: DGA-Based Botnet Tracking and Intelligence.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

AndRadar: Fast Discovery of Android Applications in Alternative Markets.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth.
IEEE Embed. Syst. Lett., 2013

Tracking and Characterizing Botnets Using Automatically Generated Domains.
CoRR, 2013

Two years of short URLs internet measurement: security threats and countermeasures.
Proceedings of the 22nd International World Wide Web Conference, 2013

AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors.
Proceedings of the SPSM'13, 2013

A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
i-Code: Real-Time Malicious Code Identification.
ERCIM News, 2012

Integrated detection of anomalous behavior of computer infrastructures.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Context-Based File Block Classification.
Proceedings of the Advances in Digital Forensics VIII, 2012

All your face are belong to us: breaking Facebook's social authentication.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Lines of malicious code: insights into the malicious software industry.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
BURN: baring unknown rogue networks.
Proceedings of the 8th International Symposium on Visualization for Cyber Security, 2011

Finding Non-trivial Malware Naming Inconsistencies.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Systems Security Research at Politecnico di Milano.
Proceedings of the First SysSec Workshop 2011, 2011

Poster: fast, automatic iPhone shoulder surfing.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

A social-engineering-centric data collection initiative to study phishing.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

File Block Classification by Support Vector Machine.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Detecting Intrusions through System Call Sequence and Argument Analysis.
IEEE Trans. Dependable Secur. Comput., 2010

Identifying Dormant Functionality in Malware Programs.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Effective Multimodel Anomaly Detection Using Cooperative Negotiation.
Proceedings of the Decision and Game Theory for Security, 2010

2009
Reducing false positives in anomaly detectors through fuzzy alert aggregation.
Inf. Fusion, 2009

Wireless Malware Propagation: A Reality Check.
IEEE Secur. Priv., 2009

BlueBat: Towards Practical Bluetooth Honeypots.
Proceedings of IEEE International Conference on Communications, 2009

Selecting and Improving System Call Models for Anomaly Detection.
Proceedings of the Detection of Intrusions and Malware, 2009

2008
GIVS: integrity validation for grid security.
Int. J. Crit. Infrastructures, 2008

Unsupervised learning algorithms for intrusion detection.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Integrating Partial Models of Network Normality via Cooperative Negotiation: An Approach to Development of Multiagent Intrusion Detection Systems.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2008

A methodology for the repeatable forensic analysis of encrypted drives.
Proceedings of the First European Workshop on System Security, 2008

ULISSE, a network intrusion detection system.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
Studying Bluetooth Malware Propagation: The BlueBag Project.
IEEE Secur. Priv., 2007

On the Use of Different Statistical Tests for Alert Correlation - Short Paper.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

2006
Unsupervised learning algorithms for intrusion detection.
PhD thesis, 2006

Open Problems in Computer Virology.
J. Comput. Virol., 2006

2005
Security and Trust in the Italian Legal Digital Signature Framework.
Proceedings of the Trust Management, Third International Conference, 2005

Analyzing TCP Traffic Patterns Using Self Organizing Maps.
Proceedings of the Image Analysis and Processing, 2005

Performance Issues in Video Streaming Environments.
Proceedings of the FIRB-Perf Workshop on Techniques, 2005

2004
Lessons learned from the Italian law on privacy - Part II.
Comput. Law Secur. Rev., 2004

Lessons learned from the Italian law on privacy - Part I.
Comput. Law Secur. Rev., 2004

Unsupervised learning techniques for an intrusion detection system.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Optimal Number of Nodes for Computation in Grid Environments.
Proceedings of the 12th Euromicro Workshop on Parallel, 2004

Behavioral Intrusion Detection.
Proceedings of the Computer and Information Sciences, 2004

2003
Computer Virus Propagation Models.
Proceedings of the Performance Tools and Applications to Networked Systems, 2003


  Loading...