Publications

RFQuack: A Universal Hardware-Software Toolkit for Wireless Protocol (Security) Analysis and Research

Authors: Federico Maggi, Andrea Guglielmini
arXiv
Technical Report
PDF Cite

Smart Factory Security: A Case Study on a Modular SmartManufacturing System

Authors: Federico Maggi, Marco Balduzzi, Rainer Vosseler, Martin Rösler, Walter Quadrini, Giacomo Tavola, Marcello Pogliani, Davide Quarta, Stefano Zanero
International Conference on Industry 4.0 and Smart Manufacturing
Journal Article
PDF Cite

Detecting Unsafe Code Patterns in Industrial Robot Programs

Authors: Marcello Pogliani, Federico Maggi, Marco Balduzzi, Davide Quarta, Stefano Zanero
Proceedings of the 2020 on Asia Conference on Computer and Communications …
Journal Article
PDF Cite

Rogue Automation: Vulnerable and Malicious Code in Industrial Programming

Authors: Federico Maggi, Marcello Pogliani, Martino, Vittone, Davide Quarta, Stefano Zanero, Marco Balduzzi, Rainer Vosseler, Martin Rösler
Trend Micro, Inc.
Trend Micro Research
Technical Report
Cite

Attacks on Smart Manufactururing Systems: A Forward-looking Security Analysis

Authors: Federico Maggi, Marcello Pogliani
Trend Micro, Inc.
Trend Micro Research
Technical Report
Cite

Caught in the Act: Running a Realistic Factory Honeypot to Capture Real Threats

Authors: Stephen Hilt, Federico Maggi, Charles Perine, Lord Remorin, Martin Rösler, Rainer Vosseler
Trend Micro, Inc.
Trend Micro Research
Technical Report
Cite

A Security Evaluation of Industrial Radio Remote Controllers

Authors: Federico Maggi, Marco Balduzzi, Jonathan Andersson, Philippe Lin, Stephen Hilt, Akira Urano, Rainer Vosseler
Proceedings of the 16th International Conference on Detection of Intrusions and …
Journal Article
PDF Cite

Security of controlled manufacturing systems in the connected factory: the case of industrial robots

Authors: Marcello Pogliani, Davide Quarta, Mario Polino, Martino Vittone, Federico Maggi, Stefano Zanero
Journal of Computer Virology and Hacking Techniques
Conference Paper
PDF Cite

A Security Analysis of Radio Remote Controllers for Industrial Applications

Authors: Jonathan Andersson, Marco Balduzzi, Stephen Hilt, Philippe Lin, Federico Maggi, Akira Urano, Rainer Vosseler
Trend Micro, Inc.
Trend Micro Research
Technical Report
PDF Cite

The Fragility of Industrial IoT's Data Backbone: Security and Privacy Issues in MQTT and CoAP Protocols

Authors: Federico Maggi, Rainer Vosseler, Davide Quarta
Trend Micro, Inc.
Trend Micro Research
Technical Report
PDF Cite

Investigating Web Defacement Campaigns at Large

Authors: Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini
Proceedings of the 2018 on Asia Conference on Computer and Communications …
Journal Article
PDF Cite

A Deep Dive into Defacement: How Geopolitical Events Trigger Web Attacks

Authors: Marco Balduzzi, Ryan Flores, Lion Gu, Federico Maggi, Vincenzo Ciancaglini, Roel Reyes, Akira Urano
Trend Micro, Inc.
TrendLabs
Technical Report
PDF Cite

Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks

Authors: Apostolis Zarras, Federico Maggi
Proceedings of the 15th Annual International Conference on Privacy, Security and …
Journal Article
PDF Cite

Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing

Authors: Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert
11th USENIX Workshop on Offensive Technologies USENIX Workshop on Offensive …
Journal Article
PDF Cite

Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery

Authors: Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi
Proceedings of the 11th USENIX Workshop on Offensive Technologies (WOOT 17)
Journal Article
PDF Cite

A Vulnerability in Modern Automotive Standards and How We Exploited It

Authors: Federico Maggi
Trend Micro, Inc.
TrendLabs Security Intelligence Blog
Technical Report
PDF Cite

A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks

Authors: Andrea Palanca, Eric Evenchick, Federico Maggi, Stefano Zanero
Proceedings of the 14th International Conference on Detection of Intrusions and …
Journal Article
PDF Cite

Prometheus: Analyzing WebInject-based information stealers

Authors: Andrea Continella, Michele Carminati, Mario Polino, Andrea Lanzi, Stefano Zanero, Federico Maggi
Journal of Computer Security
Conference Paper
Cite

Rogue Robots: Testing the Limits of an Industrial Robot’s Security

Authors: Federico Maggi, Davide Quarta, Marcello Pogliani, Mario Polino, Andrea M. Zanchettin, Stefano Zanero
Trend Micro, Inc.
TrendLabs
Technical Report
PDF Cite

An Experimental Security Analysis of an Industrial Robot Controller

Authors: Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero
Proceedings of the 38th IEEE Symposium on Security and Privacy
Journal Article
PDF Cite

On the Privacy and Security of the Ultrasound Ecosystem

Authors: Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna
Proceedings of the 17th Privacy Enhancing Technologies Symposium
Journal Article
PDF Cite

ShieldFS: A Self-healing, Ransomware-aware Filesystem

Authors: Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi
Proceedings of the 32nd Annual Computer Security Applications Conference
Journal Article
PDF Cite

GreatEatlon: Fast, Static Detection of Mobile Ransomware

Authors: Chenghyu Zheng, Nicola Della Rocca, Niccolò Andronio, Stefano Zanero, Maggi Federico
Journal Article
PDF Cite

On-Chip System Call Tracing: A Feasibility Study and Open Prototype

Authors: Chenghyu Zheng, Mila Dalla Preda, Jorge Granjal, Stefano Zanero, Federico Maggi
IEEE Conference on Communications and Network Security (CNS)
Journal Article
PDF Cite

Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology

Authors: Mila Dalla Preda, Federico Maggi
Journal of Computer Virology and Hacking Techniques
Conference Paper
PDF Cite

Trellis: Privilege Separation for Multi-User Applications Made Easy

Authors: Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero
International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
Journal Article
PDF Cite

DroydSeuss: A Mobile Banking Trojan Tracker - Short Paper

Authors: Alberto Coletta, Victor Van der Veen, Federico Maggi
Financial Cryptography and Data Security
Journal Article
PDF Cite

Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications

Authors: Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi
Proceedings of the 31st Annual Computer Security Applications Conference
Journal Article
PDF Cite

Scalable Testing of Mobile Antivirus Applications

Authors: Andrea Valdi, Eros Lever, Simone Benefico, Davide Quarta, Stefano Zanero, Federico Maggi
Computer
Conference Paper
PDF Cite

HelDroid: Dissecting and Detecting Mobile Ransomware

Authors: Niccolò Andronio, Stefano Zanero, Federico Maggi
International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
Journal Article
PDF Cite

Face/Off: Preventing Privacy Leakage From Photos in Social Networks

Authors: Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis
Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications …
Journal Article
PDF Cite

Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries

Authors: Mario Polino, Andrea Scorti, Federico Maggi, Stefano Zanero
Detection of Intrusions and Malware, and Vulnerability Assessment
Journal Article
PDF Cite

BankSealer: A decision support system for online banking fraud analysis and investigation

Authors: Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero
Computers & Security
Conference Paper
PDF Cite

European Cyber-Security Research and Innovation

Authors: Federico Maggi, Stefano Zanero, Evangelos Markatos
Technical Report
PDF Cite

Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

Authors: Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …
Journal Article
PDF Cite

XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners

Authors: Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero
arXiv
Technical Report
PDF Cite

Security and Privacy Measurements on Social Networks: Experiences and Lessons Learned

Authors: Iasonas Polakis, Federico Maggi, Stefano Zanero, Angelos D. Keromytis
2014 Third International Workshop on Building Analysis Datasets and Gathering …
Journal Article
PDF Cite

A Practical Attack Against a KNX-based Building Automation System

Authors: Alessio Antonini, Federico Maggi, Stefano Zanero
Proceedings of the 2Nd International Symposium on ICS & SCADA Cyber Security …
Journal Article
PDF Cite

Zarathustra: Extracting WebInject Signatures from Banking Trojans

Authors: Claudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico Maggi
Proceedings of the Twelfth Annual International Conference on Privacy, Security …
Journal Article
PDF Cite

Phoenix: DGA-Based Botnet Tracking and Intelligence

Authors: Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero
Proceedings of the International Conference on Detection of Intrusions and …
Journal Article
PDF Cite

AndRadar: Fast Discovery of Android Applications in Alternative Markets

Authors: Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis
Detection of Intrusions and Malware, and Vulnerability Assessment
Journal Article
PDF Cite

BankSealer: An Online Banking Fraud Analysis and Decision Support System

Authors: Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero
ICT Systems Security and Privacy Protection
Journal Article
PDF Cite

Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services

Authors: Nick Nikiforakis, Federico Maggi, Gianluca Stringhini, M. Zubair Rafique, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna, Stefano Zanero
Proceedings of the 23rd International Conference on World Wide Web
Journal Article
PDF Cite

BitIodine: Extracting Intelligence from the Bitcoin Network

Authors: Michele Spagnuolo, Federico Maggi, Stefano Zanero
Financial Cryptography and Data Security
Journal Article
PDF Cite

PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications

Authors: Andrea Gianazza, Federico Maggi, Aristide Fattori, Lorenzo Cavallaro, Stefano Zanero
arXiv
Technical Report
PDF Cite

A Comprehensive Black-box Methodology for Testing the Forensic Characteristics of Solid-state Drives

Authors: Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero
Proceedings of the 29th Annual Computer Security Applications Conference
Journal Article
PDF Cite

Tracking and Characterizing Botnets Using Automatically Generated Domains

Authors: Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero
arXiv
Technical Report
PDF Cite

AndroTotal: A Flexible, Scalable Toolbox and Service for Testing Mobile Malware Detectors

Authors: Federico Maggi, Andrea Valdi, Stefano Zanero
Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & …
Journal Article
PDF Cite

Adaptive and Flexible Smartphone Power Modeling

Authors: Alessandro Nacci, Francesco Trovò, Federico Maggi, Matteo Ferroni, Andrea Cazzola, Donatella Sciuto, Marco Santambrogio
Mobile Networks and Applications
Conference Paper
PDF Cite

A Security Layer for Smartphone-to-Vehicle Communication over Bluetooth

Authors: Andrea Dardanelli, Federico Maggi, Mara Tanelli, Stefano Zanero, Sergio M Savaresi, Roman Kochanek, Thorsten Holz
Embedded Systems Letters
Conference Paper
PDF Cite

Two years of short URLs internet measurement: security threats and countermeasures

Authors: Federico Maggi, Alessandro Frossi, Stefano Zanero, Gianluca Stringhini, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna
Proceedings of the 22nd international conference on World Wide Web (WWW)
Journal Article
PDF Cite

Lines of Malicious Code: Insights Into the Malicious Software Industry

Authors: Martina Lindorfer, Alessandro Di Federico, Federico Maggi, Paolo Milani Comparetti, Stefano Zanero
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
Journal Article
PDF Cite

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

Authors: Jason Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos Keromytis, Stefano Zanero
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
Journal Article
PDF Cite

Secure Integration of Mobile Devices for Automotive Services

Authors: Roman Kochanek, Andrea Dardanelli, Federico Maggi, Stefano Zanero, Mara Tanelli, Sergio Savaresi, Thorsten Holz
Politecnico di Milano
Technical Report
PDF Cite

Integrated Detection of Anomalous Behavior of Computer Infrastructures

Authors: Federico Maggi, Stefano Zanero
Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS)
Journal Article
PDF Cite

Finding Non-trivial Malware Naming Inconsistencies

Authors: Federico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero
Proceedings of the 7th International Conference on Information Systems Security …
Journal Article
PDF Cite

A Fast Eavesdropping Attack Against Touchscreens

Authors: Federico Maggi, Alberto Volpatto, Simone Gasparini, Giacomo Boracchi, Stefano Zanero
Proceedings of the 7th International Conference on Information Assurance and …
Journal Article
PDF Cite

POSTER: Fast, Automatic iPhone Shoulder Surfing

Authors: Federico Maggi, Alberto Volpatto, Simone Gasparini, Giacomo Boracchi, Stefano Zanero
Proceedings of the 18th Conference on Computer and Communication Security (CCS)
Journal Article
PDF Cite

System Security research at Politecnico di Milano

Authors: Federico Maggi, Stefano Zanero
Proceedings of the 1st SysSec Workshop (SysSec)
Journal Article
PDF Cite

BURN: Baring Unknown Rogue Networks

Authors: Francesco Roveta, Luca Di Mario, Federico Maggi, Giorgio Caviglia, Stefano Zanero, Paolo Ciuccarelli
Proceedings of the 8th International Symposium on Visualization for Cyber …
Journal Article
PDF Cite

Is the future Web more insecure? Distractions and solutions of new-old security issues and measures

Authors: Federico Maggi, Stefano Zanero
Proceedings of the Worldwide Cybersecurity Summit
Journal Article
PDF Cite

A social-engineering-centric data collection initiative to study phishing

Authors: Federico Maggi, Alessandro Sisto, Stefano Zanero
Proceedings of the First Workshop on Building Analysis Datasets and Gathering …
Journal Article
PDF Cite

Effective Multimodel Anomaly Detection Using Cooperative Negotiation

Authors: Alberto Volpatto, Federico Maggi, Stefano Zanero
Proceedings of the Decision and Game Theory for Security (GameSec)
Journal Article
PDF Cite

Rethinking security in a cloudy world

Authors: Federico Maggi, Stefano Zanero
Politecnico di Milano
Technical Report
PDF Cite

Don't touch a word! A practical input eavesdropping attack against mobile touchscreen devices

Authors: Federico Maggi, Alberto Volpatto, Simone Gasparini, Giacomo Boracchi, Stefano Zanero
Politecnico di Milano
Technical Report
PDF Cite

Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds

Authors: Federico Maggi
Proceedings of the International Conference on Computer and Information …
Journal Article
PDF Cite

A Recognizer of Rational Trace Languages

Authors: Federico Maggi
Proceedings of the International Conference on Computer and Information …
Journal Article
PDF Cite

Effective Anomaly Detection with Scarce Training Data

Authors: William Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna
Proceedings of the Network and Distributed System Security Symposium (NDSS)
Journal Article
PDF Cite

Integrated Detection of Anomalous Behavior of Computer Infrastructures

Authors: Federico Maggi
Politecnico di Milano
Thesis
PDF Cite

Integrated Detection of Attacks Against Browsers, Web Applications and Databases

Authors: Claudio Criscione, Federico Maggi, Guido Salvaneschi, Stefano Zanero
Proceedings of the European Conference on Network Defense (EC2ND)
Journal Article
PDF Cite

Reducing false positives in anomaly detectors through fuzzy alert aggregation

Authors: Federico Maggi, Matteo Matteucci, Stefano Zanero
Information Fusion
Conference Paper
PDF Cite

Protecting a Moving Target: Addressing Web Application Concept Drift

Authors: Federico Maggi, William Robertson, Christopher Kruegel, Giovanni Vigna
Proceedings of the International Symposium on Recent Advances in Intrusion …
Journal Article
PDF Cite

Selecting and Improving System Call Models for Anomaly Detection

Authors: Alessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero
Proceedings of the International Conference on Detection of Intrusions and …
Journal Article
PDF Cite

Detecting Intrusions through System Call Sequence and Argument Analysis

Authors: Federico Maggi, Matteo Matteucci, Stefano Zanero
IEEE Transactions on Dependable and Secure Computing (TODS)
Conference Paper
PDF Cite

Specification and Evaluation of an Efficient Recognizer for Rational Trace Languages

Authors: Federico Maggi
Politecnico di Milano
Technical Report
PDF Cite

Seeing the invisible: forensic uses of anomaly detection and machine learning

Authors: Federico Maggi, Stefano Zanero, Vincenzo Iozzo
Operating Systems Review of the ACM Special Interest Group on Operating Systems …
Conference Paper
PDF Cite

A Survey of Probabilistic Record Matching Models, Techniques and Tools

Authors: Federico Maggi
Politecnico di Milano
Technical Report
PDF Cite

On the Use of Different Statistical Tests for Alert Correlation - Short Paper

Authors: Federico Maggi, Stefano Zanero
Proceedings of the International Symposium on Recent Advances in Intrusion …
Journal Article
PDF Cite