Polino, Mario
48  results:
Search for persons X
?
1

Tarallo: Evading Behavioral Malware Detectors in the Proble..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
 
?
2

CyFence: Securing Cyber-Physical Controllers via Trusted Ex..:

Longari, Stefano ; Pozone, Alessandro ; Leoni, Jessica...
IEEE Transactions on Emerging Topics in Computing.  12 (2024)  2 - p. 521-531 , 2024
 
?
4

Lookin' Out My Backdoor! Investigating Backdooring Attacks ..:

, In: Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security,
D'Onghia, Mario ; Di Cesare, Federico ; Gallo, Luigi... - p. 209-220 , 2023
 
?
5

Advancing Fraud Detection Systems Through Online Learning:

, In: Lecture Notes in Computer Science; Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track,
 
?
7

Untangle: Aiding Global Function Pointer Hijacking for Post..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
 
?
8

The Good, the Bad, and the Binary: An LSTM-Based Method for..:

, In: Advances in Information and Computer Security; Lecture Notes in Computer Science,
 
?
9

Fraud Detection under Siege: Practical Poisoning Attacks an..:

Paladini, Tommaso ; Monti, Francesco ; Polino, Mario..
ACM Transactions on Privacy and Security.  26 (2023)  4 - p. 1-35 , 2023
 
?
12

CANflict : Exploiting Peripheral Conflicts for Data-Link..:

, In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security,
 
?
14

SyML: Guiding Symbolic Execution Toward Vulnerable States T..:

, In: 24th International Symposium on Research in Attacks, Intrusions and Defenses,
Ruaro, Nicola ; Zeng, Kyle ; Dresel, Lukas... - p. 456-468 , 2021
 
?
15

NoSQL Breakdown: A Large-scale Analysis of Misconfigured No..:

, In: Annual Computer Security Applications Conference,
 
1-15