logo-polimi
Loading...
Degree programme
Programme Structure
Show/Search Programme
Degree Programme
International context
Customized Schedule
Your customized time schedule has been disabled
Enable
Search
Search a Professor
Professor's activities
Search a Course
Search a Course (system prior D.M. n. 509)
Search Lessons taught in English
Information on didactic, research and institutional assignments on this page are certified by the University; more information, prepared by the professor, are available on the personal web page and in the curriculum vitae indicated on this webpage.
Information on professor
ProfessorZanero Stefano
QualificationAssociate professor
Belonging DepartmentDipartimento di Elettronica, Informazione e Bioingegneria
Scientific-Disciplinary SectorINF/01 - Informatics
Curriculum VitaeDownload CV (143.52Kb - 09/08/2019)
OrcIDhttps://orcid.org/0000-0003-4710-5283

Contacts
Professor's office hours
DepartmentFloorOfficeDayTimetableTelephoneFaxNotes
DEIB3411118MondayFrom 13:00
To 14:00
40173411Please send me an email to ensure I have time to receive you
DEIB--Laboratorio NECSTTuesdayFrom 13:00
To 14:30
3564--Meeting dedicated to M.Sc. thesis development
E-mailstefano.zanero@polimi.it
Professor's personal websitehttp://home.deib.polimi.it/zanero/

Data source: RE.PUBLIC@POLIMI - Research Publications at Politecnico di Milano

List of publications and reserach products for the year 2019 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
Security of controlled manufacturing systems in the connected factory: the case of industrial robots (Show >>)
Conference proceedings
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots (Show >>)
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network (Show >>)
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis (Show >>)
Poster
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems (Show >>)


List of publications and reserach products for the year 2018 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
Security Evaluation of a Banking Fraud Analysis System (Show >>)
Conference proceedings
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation (Show >>)
Extended Abstract: Toward Systematically Exploring Antivirus Engines (Show >>)
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds (Show >>)
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets (Show >>)
SysTaint: Assisting Reversing of Malicious Network Communications (Show >>)
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems (Show >>)


List of publications and reserach products for the year 2017 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
Cyber-Physical Systems (Show >>)
Prometheus: Analyzing WebInject-based information stealers (Show >>)
Conference proceedings
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System (Show >>)
Measuring and Defeating Anti-Instrumentation-Equipped Malware (Show >>)
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks (Show >>)
An Experimental Security Analysis of an Industrial Robot Controller (Show >>)
GreatEatlon: Fast, Static Detection of Mobile Ransomware (Show >>)
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities (Show >>)
Abstract in Atti di convegno
Measuring and Defeating Anti-Instrumentation-Equipped Malware (Show >>)
Poster
Poster: Detecting WebInjects through Live Memory Inspection (Show >>)


List of publications and reserach products for the year 2016 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
Editorial (Show >>)
Conference proceedings
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners (Show >>)
Trellis: Privilege Separation for Multi-user Applications Made Easy (Show >>)
ShieldFS: a self-healing, ransomware-aware filesystem (Show >>)
On-chip system call tracing: A feasibility study and open prototype (Show >>)
Abstract in Atti di convegno
Up Close and Personal: Cybersecurity in Medical IoT Devices (Show >>)
Patents
Protection system and method for protecting a computer system against ransomware attack (Show >>)


List of publications and reserach products for the year 2015 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Journal Articles
BankSealer: A decision support system for online banking fraud analysis and investigation (Show >>)
Scalable Testing of Mobile Antivirus Applications (Show >>)
Conference proceedings
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries (Show >>)
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications (Show >>)
HelDroid: Dissecting and Detecting Mobile Ransomware (Show >>)
Poster
Practical Exploit Generation for Intent Message Vulnerabilities in Android (Show >>)
manifesti v. 3.1.9 / 3.1.9
Area Servizi ICT
15/12/2019