default search action
Federico Maggi
Person information
- affiliation: Politecnico di Milano, Milan, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [e3]Federico Maggi, Manuel Egele, Mathias Payer, Michele Carminati:
Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings. Lecture Notes in Computer Science 14828, Springer 2024, ISBN 978-3-031-64170-1 [contents] - 2023
- [e2]Daniel Gruss, Federico Maggi, Mathias Fischer, Michele Carminati:
Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12-14, 2023, Proceedings. Lecture Notes in Computer Science 13959, Springer 2023, ISBN 978-3-031-35503-5 [contents] - 2022
- [j14]Victor Mayoral Vilches, Alfonso Glera-Picón, Unai Ayucar Carbajo, Stefan Rass, Martin Pinzger, Federico Maggi, Endika Gil-Uriarte:
Hacking planned obsolescense in robotics, towards security-oriented robot teardown. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - 2021
- [i8]Federico Maggi, Andrea Guglielmini:
RFQuack: A Universal Hardware-Software Toolkit for Wireless Protocol (Security) Analysis and Research. CoRR abs/2104.02551 (2021) - 2020
- [j13]Fiona H. M. Tang, Daniele la Cecilia, R. Willem Vervoort, Nicholas V. Coleman, Chris Conoley, Federico Maggi:
A simple pre-factor for contaminant biodegradation potential and its application to pesticides risk assessment. Math. Comput. Simul. 175: 108-120 (2020) - [j12]Daniele la Cecilia, Federico Maggi:
Influential sources of uncertainty in glyphosate biochemical degradation in soil. Math. Comput. Simul. 175: 121-139 (2020) - [c48]Marcello Pogliani, Federico Maggi, Marco Balduzzi, Davide Quarta, Stefano Zanero:
Detecting Insecure Code Patterns in Industrial Robot Programs. AsiaCCS 2020: 759-771 - [c47]Federico Maggi, Marco Balduzzi, Rainer Vosseler, Martin Rösler, Walter Quadrini, Giacomo Tavola, Marcello Pogliani, Davide Quarta, Stefano Zanero:
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System. ISM 2020: 666-675
2010 – 2019
- 2019
- [j11]Marcello Pogliani, Davide Quarta, Mario Polino, Martino Vittone, Federico Maggi, Stefano Zanero:
Security of controlled manufacturing systems in the connected factory: the case of industrial robots. J. Comput. Virol. Hacking Tech. 15(3): 161-175 (2019) - [c46]Federico Maggi, Marco Balduzzi, Jonathan Andersson, Philippe Lin, Stephen Hilt, Akira Urano, Rainer Vosseler:
A Security Evaluation of Industrial Radio Remote Controllers. DIMVA 2019: 133-153 - [i7]Federico Maggi:
BRTSim, a general-purpose computational solver for hydrological, biogeochemical, and ecosystem dynamics. CoRR abs/1903.07015 (2019) - 2018
- [j10]Michele Carminati, Mario Polino, Andrea Continella, Andrea Lanzi, Federico Maggi, Stefano Zanero:
Security Evaluation of a Banking Fraud Analysis System. ACM Trans. Priv. Secur. 21(3): 11:1-11:31 (2018) - [c45]Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini:
Investigating Web Defacement Campaigns at Large. AsiaCCS 2018: 443-456 - [c44]Michele Carminati, Alessandro Baggio, Federico Maggi, Umberto Spagnolini, Stefano Zanero:
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds. DIMVA 2018: 211-233 - 2017
- [j9]Andrea Continella, Michele Carminati, Mario Polino, Andrea Lanzi, Stefano Zanero, Federico Maggi:
Prometheus: Analyzing WebInject-based information stealers. J. Comput. Secur. 25(2): 117-137 (2017) - [j8]Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna:
On the Privacy and Security of the Ultrasound Ecosystem. Proc. Priv. Enhancing Technol. 2017(2): 95-112 (2017) - [j7]Mila Dalla Preda, Federico Maggi:
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology. J. Comput. Virol. Hacking Tech. 13(3): 209-232 (2017) - [c43]Andrea Palanca, Eric Evenchick, Federico Maggi, Stefano Zanero:
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks. DIMVA 2017: 185-206 - [c42]Apostolis Zarras, Federico Maggi:
Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks. PST 2017: 355-364 - [c41]Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero:
An Experimental Security Analysis of an Industrial Robot Controller. IEEE Symposium on Security and Privacy 2017: 268-286 - [c40]Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert:
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing. WOOT 2017 - [c39]Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi:
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery. WOOT 2017 - [i6]Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi:
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery. CoRR abs/1704.02786 (2017) - [i5]Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert:
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing. CoRR abs/1706.00206 (2017) - 2016
- [c38]Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi:
ShieldFS: a self-healing, ransomware-aware filesystem. ACSAC 2016: 336-347 - [c37]Chengyu Zheng, Mila Dalla Preda, Jorge Granjal, Stefano Zanero, Federico Maggi:
On-chip system call tracing: A feasibility study and open prototype. CNS 2016: 73-81 - [c36]Alberto Coletta, Victor van der Veen, Federico Maggi:
DroydSeuss: A Mobile Banking Trojan Tracker (Short Paper). Financial Cryptography 2016: 250-259 - [c35]Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero:
Trellis: Privilege Separation for Multi-user Applications Made Easy. RAID 2016: 437-456 - [c34]Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero:
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners. SEC 2016: 243-258 - [c33]Chengyu Zheng, Nicola Dellarocca, Niccolò Andronio, Stefano Zanero, Federico Maggi:
GreatEatlon: Fast, Static Detection of Mobile Ransomware. SecureComm 2016: 617-636 - 2015
- [j6]Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero:
BankSealer: A decision support system for online banking fraud analysis and investigation. Comput. Secur. 53: 175-186 (2015) - [j5]Andrea Valdi, Eros Lever, Simone Benefico, Davide Quarta, Stefano Zanero, Federico Maggi:
Scalable Testing of Mobile Antivirus Applications. Computer 48(11): 60-68 (2015) - [c32]Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi:
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications. ACSAC 2015: 201-210 - [c31]Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis:
Face/Off: Preventing Privacy Leakage From Photos in Social Networks. CCS 2015: 781-792 - [c30]Mario Polino, Andrea Scorti, Federico Maggi, Stefano Zanero:
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries. DIMVA 2015: 121-143 - [c29]Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, Sotiris Ioannidis:
Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software. DIMVA 2015: 165-184 - [c28]Nicoló Andronio, Stefano Zanero, Federico Maggi:
HelDroid: Dissecting and Detecting Mobile Ransomware. RAID 2015: 382-404 - [e1]Magnus Almgren, Vincenzo Gulisano, Federico Maggi:
Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings. Lecture Notes in Computer Science 9148, Springer 2015, ISBN 978-3-319-20549-6 [contents] - [i4]Federico Maggi, Stefano Zanero, Evangelos P. Markatos:
European Cyber-Security Research and Innovation. ERCIM News 2015(100) (2015) - 2014
- [j4]Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero:
Black-box forensic and antiforensic characteristics of solid-state drives. J. Comput. Virol. Hacking Tech. 10(4): 255-271 (2014) - [c27]Iasonas Polakis, Federico Maggi, Stefano Zanero, Angelos D. Keromytis:
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned. BADGERS@ESORICS 2014: 18-29 - [c26]Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis:
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication. CCS 2014: 501-512 - [c25]Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis:
AndRadar: Fast Discovery of Android Applications in Alternative Markets. DIMVA 2014: 51-71 - [c24]Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero:
Phoenix: DGA-Based Botnet Tracking and Intelligence. DIMVA 2014: 192-211 - [c23]Michele Spagnuolo, Federico Maggi, Stefano Zanero:
BitIodine: Extracting Intelligence from the Bitcoin Network. Financial Cryptography 2014: 457-468 - [c22]Alessio Antonini, Federico Maggi, Stefano Zanero:
A Practical Attack Against a KNX-based Building Automation System. ICS-CSR 2014 - [c21]Claudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico Maggi:
ZARATHUSTRA: Extracting Webinject signatures from banking trojans. PST 2014: 139-148 - [c20]Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero:
BankSealer: An Online Banking Fraud Analysis and Decision Support System. SEC 2014: 380-394 - [c19]Nick Nikiforakis, Federico Maggi, Gianluca Stringhini, M. Zubair Rafique, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna, Stefano Zanero:
Stranger danger: exploring the ecosystem of ad-based URL shortening services. WWW 2014: 51-62 - [i3]Andrea Gianazza, Federico Maggi, Aristide Fattori, Lorenzo Cavallaro, Stefano Zanero:
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications. CoRR abs/1402.4826 (2014) - [i2]Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero:
XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners. CoRR abs/1410.4207 (2014) - 2013
- [j3]Andrea Dardanelli, Federico Maggi, Mara Tanelli, Stefano Zanero, Sergio M. Savaresi, R. Kochanek, Thorsten Holz:
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth. IEEE Embed. Syst. Lett. 5(3): 34-37 (2013) - [c18]Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero:
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives. ACSAC 2013: 269-278 - [c17]Federico Maggi, Andrea Valdi, Stefano Zanero:
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors. SPSM@CCS 2013: 49-54 - [c16]Federico Maggi, Alessandro Frossi, Stefano Zanero, Gianluca Stringhini, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna:
Two years of short URLs internet measurement: security threats and countermeasures. WWW 2013: 861-872 - [i1]Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero:
Tracking and Characterizing Botnets Using Automatically Generated Domains. CoRR abs/1311.5612 (2013) - 2012
- [c15]Martina Lindorfer, Alessandro Di Federico, Federico Maggi, Paolo Milani Comparetti, Stefano Zanero:
Lines of malicious code: insights into the malicious software industry. ACSAC 2012: 349-358 - [c14]Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, Stefano Zanero:
All your face are belong to us: breaking Facebook's social authentication. ACSAC 2012: 399-408 - [c13]Federico Maggi, Stefano Zanero:
Integrated detection of anomalous behavior of computer infrastructures. NOMS 2012: 866-871 - 2011
- [c12]Federico Maggi, Simone Gasparini, Giacomo Boracchi:
A fast eavesdropping attack against touchscreens. IAS 2011: 320-325 - [c11]Federico Maggi, Alessandro Sisto, Stefano Zanero:
A social-engineering-centric data collection initiative to study phishing. BADGERS@EuroSys 2011: 107-108 - [c10]Federico Maggi, Stefano Zanero:
Systems Security Research at Politecnico di Milano. SysSec@DIMVA 2011: 127-130 - [c9]Federico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero:
Finding Non-trivial Malware Naming Inconsistencies. ICISS 2011: 144-159 - [c8]Francesco Roveta, Giorgio Caviglia, Luca Di Mario, Stefano Zanero, Federico Maggi, Paolo Ciuccarelli:
BURN: baring unknown rogue networks. VizSEC 2011: 6 - 2010
- [j2]Federico Maggi, Matteo Matteucci, Stefano Zanero:
Detecting Intrusions through System Call Sequence and Argument Analysis. IEEE Trans. Dependable Secur. Comput. 7(4): 381-395 (2010) - [c7]Federico Maggi:
A Recognizer of Rational Trace Languages. CIT 2010: 257-264 - [c6]Federico Maggi:
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds. CIT 2010: 824-831 - [c5]Alberto Volpatto, Federico Maggi, Stefano Zanero:
Effective Multimodel Anomaly Detection Using Cooperative Negotiation. GameSec 2010: 180-191 - [c4]William K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna:
Effective Anomaly Detection with Scarce Training Data. NDSS 2010
2000 – 2009
- 2009
- [j1]Federico Maggi, Matteo Matteucci, Stefano Zanero:
Reducing false positives in anomaly detectors through fuzzy alert aggregation. Inf. Fusion 10(4): 300-311 (2009) - [c3]Alessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero:
Selecting and Improving System Call Models for Anomaly Detection. DIMVA 2009: 206-223 - [c2]Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna:
Protecting a Moving Target: Addressing Web Application Concept Drift. RAID 2009: 21-40 - 2007
- [c1]Federico Maggi, Stefano Zanero:
On the Use of Different Statistical Tests for Alert Correlation - Short Paper. RAID 2007: 167-177
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint