Talks

The Data Distribution Service (DDS) Protocol is Critical: Let's Use it Securely!

Authors: Ta-Lun Yen, Federico Maggi, Erik Boasson
Talk
Link Cite

Small Wonder: Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity

Authors: Víctor Mayoral-Vilches, Federico Maggi
Talk
Link Cite

Hidden Attack Surfaces of Modern Industrial Automation Systems

Authors: Federico Maggi
Talk
Link Cite

Guarding the Factory Floor: Catching Insecure Industrial Robot Programs

Authors: Federico Maggi, Marcello Pogliani, Davide Quarta, Stefano Zanero, Marco Balduzzi
Talk
PDF Link Cite

OTRazor: Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts

Authors: Federico Maggi, Marcello Pogliani, Davide Quarta, Stefano Zanero, Marco Balduzzi
Talk
PDF Link Cite

Hey Operator, Where’s Your Crane? Attacking Industrial Remote Controllers

Authors: Marco Balduzzi, Federico Maggi
PDF Link Cite

RFQuack: The RF-Analysis Tool That Quacks

Authors: Federico Maggi
Talk
PDF Link Cite

Machine-to-Machine Protocol Security: The Case of MQTT and CoAP

Authors: Federico Maggi
Talk
Link Cite

When Machines Can't Talk: Security and Privacy Issues of Machine-to-Machine Data Protocols

Authors: Federico Maggi, Davide Quarta
Talk
PDF Link Cite

Using Machine-Learning to Investigate Web Campaigns at Large

Authors: Federico Maggi
Talk
PDF Link Cite

Safety Risks and Threats in Industrial Automation Systems: The Case of Industrial Radio Remote Controllers

Authors: Federico Maggi
Talk
PDF Link Cite

The impact of legacy machines on future manufacturing cybersecurity

Authors: Federico Maggi
Talk
Link Cite

ShieldFS: The Last Word in Ransomware-resilient File Systems

Authors: Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi
Talk
PDF Link Cite

DefPloreX: A Machine Learning Toolkit for Large-scale e-Crime Forensics

Authors: Marco Balduzzi, Federico Maggi, Vincenzo Ciancaglini, Ryan Flores, Lion Gu
Talk
PDF Link Cite

Breaking the Laws of Robotics: Attacking Industrial Robots

Authors: Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Zanero Stefano
Talk
PDF Link Cite

Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking

Authors: Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Giovanni Vigna, Christopher Kruegel
Talk
PDF Link Cite

Pocket-sized Badness: Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game

Authors: Federico Maggi, Stefano Zanero
Talk
PDF Link Cite

Fast and Transparent Online Banking Fraud Detection and Investigation

Authors: Federico Maggi
Hek.si
Talk
PDF Cite

Malware on Mobile: The What, The Why, and The How

Authors: Federico Maggi, Yanick Fratantonio
Science and Engineering Council of Santa Barbara
Talk
Cite

A walk through the construction of the first mobile malware tracker

Authors: Federico Maggi
Talk
Link Cite

Mobile Ransomware

Authors: Federico Maggi
Link Cite

From Cybercrime to Threat Analysis

Authors: Federico Maggi
Talk
Cite

From Cybercrime to Threat Analysis

Authors: Federico Maggi
Talk
Link Cite

Current and Future Cybercrime Tactics

Authors: Federico Maggi
Link Cite

Come to the Dark Side: We have Apps!

Authors: Federico Maggi
Talk
Link Cite

Static Analysis of Android Applications

Authors: Federico Maggi
Talk
PDF Link Cite

Virtualization

Authors: Federico Maggi
PDF Link Cite

Tracking and Characterizing Botnets Using Automatically Generated Domains

Authors: Federico Maggi
Honeynet Workshop
Talk
PDF Cite

Phoenix & Cerberus: Botnet Tracking via Precise DGA Characterization

Authors: Federico Maggi
Google Tech Talk
Talk
PDF Cite

Malicious Android Apps: Overview, Status and Dilemmas

Authors: Federico Maggi
Talk
PDF Link Cite

Modern Botnets and the Rise of Automatically Generated Domains

Authors: Federico Maggi
InfoSek
Talk
PDF Cite

AndroTotal: A Scalable Framework for Android Antivirus Testing

Authors: Federico Maggi
InfoSek
Talk
PDF Cite

AndroTotal: A Scalable Framework for Android Antimalware Testing

Authors: Federico Maggi
Secure
Talk
PDF Cite

AndroTotal: A Scalable Framework for Android Antimalware Testing

Authors: Federico Maggi
MIT CSAIL-POLIMI Workshop
Talk
PDF Cite

Our Face are Belong to us: Breaking Facebook's Social Authentication

Authors: Federico Maggi
Hek.si
Talk
PDF Cite

The Long Story of Short URLs

Authors: Federico Maggi
ISG Research Seminars
Talk
PDF Cite

iSnoop: How to Steal Secrets From Touchscreen Devices

Authors: Federico Maggi, Alberto Volpatto, Stefano Zanero
Talk
PDF Link Cite

Detecting Anomalous Behaviors in Computer Infrastructures

Authors: Federico Maggi
Talk
PDF Cite

Just-in-Time Training of Anomaly Detectors

Authors: Federico Maggi
Computer Systems Seminar
Talk
PDF Cite