Name
Affiliation
Papers
STEFANO ZANERO
Dip. di Elettronica e Informazione, Politecnico di Milano, Milano, Italy
77
Collaborators
Citations 
PageRank 
133
736
53.78
Referers 
Referees 
References 
2005
1490
848
Search Limit
1001000
Title
Citations
PageRank
Year
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks00.342022
Quantum algorithms for SVD-based data representation and analysis00.342022
Apícula: Static detection of API calls in generic streams of bytes00.342022
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network30.402021
SyML - Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning.00.342021
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.50.412020
Detecting Insecure Code Patterns in Industrial Robot Programs00.342020
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis00.342019
Security of controlled manufacturing systems in the connected factory: the case of industrial robots10.372019
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network10.382019
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots10.362019
Security Evaluation of a Banking Fraud Analysis System.00.342018
Extended Abstract: Toward Systematically Exploring Antivirus Engines00.342018
Elisa: Eliciting Isa Of Raw Binaries For Fine-Grained Code And Data Separation20.362018
Fraudbuster: Temporal Analysis And Detection Of Advanced Financial Frauds00.342018
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks.50.542017
Cyber-Physical Systems.00.342017
An Experimental Security Analysis of an Industrial Robot Controller100.802017
Prometheus: Analyzing WebInject-based information stealers.30.412017
ShieldFS: a self-healing, ransomware-aware filesystem.311.532016
On-chip system call tracing: A feasibility study and open prototype.00.342016
GreatEatlon: Fast, Static Detection of Mobile Ransomware.00.342016
Xss Peeker: Dissecting The Xss Exploitation Techniques And Fuzzing Mechanisms Of Blackbox Web Application Scanners10.352016
BankSealer: A decision support system for online banking fraud analysis and investigation70.512015
Scalable Testing of Mobile Antivirus Applications10.352015
HelDroid: Dissecting and Detecting Mobile Ransomware.372.342015
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications60.412015
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries50.412015
European Cyber-Security Research and Innovation.00.342015
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of "Crypto Wars" in Security Research.00.342014
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication70.472014
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications.110.512014
XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners.00.342014
Black-box forensic and antiforensic characteristics of solid-state drives.00.342014
Stranger danger: exploring the ecosystem of ad-based URL shortening services160.832014
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned00.342014
ZARATHUSTRA: Extracting Webinject signatures from banking trojans30.422014
A Practical Attack Against a KNX-based Building Automation System10.362014
Phoenix: Dga-Based Botnet Tracking And Intelligence471.582014
Andradar: Fast Discovery Of Android Applications In Alternative Markets220.922014
BitIodine: Extracting Intelligence from the Bitcoin Network.181.472014
Two years of short URLs internet measurement: security threats and countermeasures231.112013
Tracking and Characterizing Botnets Using Automatically Generated Domains.80.622013
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth.20.372013
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives30.442013
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors221.022013
Context-Based File Block Classification.40.382012
Lines of malicious code: insights into the malicious software industry190.702012
All your face are belong to us: breaking Facebook's social authentication150.792012
I-Code: Real-Time Malicious Code Identification00.342012
  • 1
  • 2