logo-polimi
Loading...
Degree programme
Programme Structure
Show/Search Programme
Degree Programme
Quantitative data
International context
Customized Schedule
Your customized time schedule has been disabled
Enable
Search
Search a Lecturer
Lecturer's activities
Search a Course
Search a Course (system prior D.M. n. 509)
Search Lessons taught in English
Information on didactic, research and institutional assignments on this page are certified by the University; more information, prepared by the lecturer, are available on the personal web page and in the curriculum vitae indicated on this webpage.
Information
LecturerZanero Stefano
QualificationFull professor full time
Belonging DepartmentDipartimento di Elettronica, Informazione e Bioingegneria
Scientific-Disciplinary SectorING-INF/05 - Information Processing Systems
Curriculum VitaeDownload CV (144.21Kb - 04/07/2023)
OrcIDhttps://orcid.org/0000-0003-4710-5283

Contacts
Office hours
DepartmentFloorOfficeDayTimetableTelephoneFaxNotes
DEIB1131WednesdayFrom 12:30
To 14:00
40173411Please send me an email to ask for a meeting
DEIB---Laboratorio NECSTWednesdayFrom 10:00
To 11:00
3564---Meeting dedicated to M.Sc. thesis development
E-mailstefano.zanero@polimi.it
Personal websitehttps://zanero.faculty.polimi.it/

Data source: RE.PUBLIC@POLIMI - Research Publications at Politecnico di Milano

List of publications and reserach products for the year 2024 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Conference proceedings
Investigating the Impact of Evasion Attacks Against Automotive Intrusion Detection Systems (Show >>)
Securing LiDAR Communication through Watermark-based Tampering Detection (Show >>)


List of publications and reserach products for the year 2023 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Conference proceedings
Advancing Fraud Detection Systems through Online Learning (Show >>)
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks (Show >>)
DJM-CYBER: A Joint Master in Advanced Cybersecurity (Show >>)
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks (Show >>)
HACK: a Holistic modeling Approach for Cubesat cyberattacKs (Show >>)
HAMLET: A Transformer Based Approach for Money Laundering Detection (Show >>)
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors (Show >>)
Quantum Eigenfaces: Linear Feature Mapping and Nearest Neighbor Classification with Outlier Detection (Show >>)
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing (Show >>)
Task Aware Intrusion Detection for Industrial Robots (Show >>)
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis (Show >>)
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation (Show >>)
Journal Articles
A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems (Show >>)
A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids (Show >>)
BINO: Automatic Recognition of Inline Binary Functions from Template Classes (Show >>)
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN (Show >>)
Coming of Age (Show >>)
CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment (Show >>)
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies (Show >>)


List of publications and reserach products for the year 2022 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Patents
COMPUTER-IMPLEMENTED REAL-TIME CONTROL SYSTEM FOR CONTROLLING A PHYSICAL SYSTEM OR DEVICE (Show >>)
Conference proceedings
A Natural Language Processing Approach for Financial Fraud Detection (Show >>)
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks (Show >>)
Journal Articles
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware (Show >>)
Amaretto: An Active Learning Framework for Money Laundering Detection (Show >>)
Apícula: Static Detection of API Calls in Generic Streams of Bytes (Show >>)
Quantum algorithms for SVD-based data representation and analysis (Show >>)
Quantum matching pursuit: A quantum algorithm for sparse representations (Show >>)


List of publications and reserach products for the year 2021 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Patents
Sistema di riconoscimento di manomissione del codice di un sistema di controllo mediante uso di processori con memoria trusted (Show >>)
Conference proceedings
A Novel Methodology to Validate and Evaluate Combined Cyber Attacks in Automated Power Systems Using Real Time Digital Simulation (Show >>)
A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation (Show >>)
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System (Show >>)
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning (Show >>)
Journal Articles
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network (Show >>)
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems (Show >>)


List of publications and reserach products for the year 2020 (Show all details | Hide all details)
Type Title of the Publicaiton/Product
Patents
DETECTING UNSECURE DATA FLOW IN AUTOMATION TASK PROGRAMS (Show >>)
Conference proceedings
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems (Show >>)
Detecting Insecure Code Patterns in Industrial Robot Programs (Show >>)
Evasion Attacks against Banking Fraud Detection Systems (Show >>)
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services (Show >>)
Journal Articles
ReCAN – Dataset for reverse engineering of Controller Area Networks (Show >>)
Remote monitoring of cardiac implanted electronic devices: legal requirements and ethical principles - ESC Regulatory Affairs Committee/EHRA joint task force report (Show >>)
manifesti v. 3.7.0 / 3.7.0
Area Servizi ICT
19/06/2024