With this function you can construct your weekly calendar of lessons, which is customized on the basis of the courses that you intend to follow. Warning: the personal schedule does not replace the presentation of the study plan! It's an informal tool that can help you better manage the organization of class attendance before the study plan presentation. After the study plan presentation we recommend you to use the Lecture timetable service in your Online Services.
To create your customized schedule follow these instructions:
- Click on the "Enable" link to proceed. You will be asked your surname and first name in order to determine your alphabetic grouping.
-
To add or remove courses from your personal schedule, use the small icons which are found next to the courses:
addition of the course
removal of the course
selection of the section of the Laboratory of Architecture (Note: the effective area in which the teaching will be carried out will be determined after the presentation of the Study Plans)
-
The sidebar on the left displays the number of lessons included in schedule.
There are also these commands:
View the schedule: allows the viewing of the weekly synoptic schedule
Delete the schedule: cancels the selections made
When you have finished the entry, you can print the calendar you have made.
Semester (Sem) | 1 | First Semester | 2 | Second Semester | A | Annual course | (1) | First Half-semester | (2) | Second Half-semester |
Language
|
|
Course completely offered in italian
|
|
Course completely offered in english
|
--
|
Not available
|
Note on the teaching activities
|
The calculation of the number of students enrolled only considers students enrolled in the academic year in question and does not include any possible students who may be attending but who are enrolled in previous academic years.
In case of structured courses taught by more professors, the number of students enrolled is related to the course as a whole, while the students opinion of the teaching is related to individual modules and individual professors.
The data related to the last academic years (number of students enrolled and students opinion of the teaching) have not yet been defined.
|
|
Information on didactic, research and institutional assignments on this page are certified by the University; more information, prepared by the professor, are available on the personal web page and in the curriculum vitae indicated on this webpage.
Professor's office hours | Department | Floor | Office | Day | Timetable | Telephone | Fax | Notes |
---|
DEIB | 3411 | 118 | Monday | From 13:00 To 14:00 | 4017 | 3411 | Please send me an email to ensure I have time to receive you | DEIB | -- | Laboratorio NECST | Tuesday | From 13:00 To 14:30 | 3564 | -- | Meeting dedicated to M.Sc. thesis development |
| E-mail | stefano.zanero@polimi.it | Professor's personal website | http://home.deib.polimi.it/zanero/ |
List of publications and reserach products for the year 2019 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Journal Articles |
Security of controlled manufacturing systems in the connected factory: the case of industrial robots (Show >>)(Hide <<)
|
Author/s |
Pogliani, Marcello; Quarta, Davide; Polino, Mario; Vittone, Martino; Maggi, Federico; Zanero, Stefano |
Title of the review |
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (ISSN: 2274-2042) |
Volume |
15 |
Brochure |
3 |
Pages |
161 - 175 |
Item link |
http://hdl.handle.net/11311/1074997 |
|
Conference proceedings |
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots (Show >>)(Hide <<)
|
Author/s |
Ferretti, Pietro; Pogliani, Marcello; Zanero, Stefano |
Title of the convention |
ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC ’19) |
Location of the convention |
London, UK |
Period of the convention |
11/11/2019 |
Title of the review |
--
|
Pages |
51 - 61 |
Item link |
http://hdl.handle.net/11311/1100010 |
|
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network (Show >>)(Hide <<)
|
Author/s |
Longari, Stefano; Penco, Matteo; Carminati, Michele; Zanero, Stefano |
Title of the convention |
ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC ’19) |
Location of the convention |
London |
Title of the review |
--
|
Pages |
1 - 12 |
Item link |
http://hdl.handle.net/11311/1104918 |
|
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis (Show >>)(Hide <<)
|
Author/s |
Longari, Stefano; Cannizzo, Andrea; Carminati, Michele; Zanero, Stefano |
Title of the convention |
IEEE Vehicular Networking Conference |
Location of the convention |
Los Angeles |
Title of the review |
--
|
Pages |
99 - 106 |
Item link |
http://hdl.handle.net/11311/1120902 |
|
Poster |
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems (Show >>)(Hide <<)
|
Author/s |
Pogliani, Marcello; Barlocco, Mattia; Pesatori, Mirko; Zanero, Stefano |
Title of the book |
IEEE Symposium on Security and Privacy |
Item link |
http://hdl.handle.net/11311/1099143 |
|
List of publications and reserach products for the year 2018 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Journal Articles |
Security Evaluation of a Banking Fraud Analysis System (Show >>)(Hide <<)
|
Author/s |
Carminati, Michele; Polino, Mario; Continella, Andrea; Lanzi, Andrea; Maggi, Federico; Zanero, Stefano |
Title of the review |
ACM TRANSACTIONS ON PRIVACY AND SECURITY (ISSN: 2471-2566) |
Volume |
21 |
Brochure |
3 |
Pages |
1 - 31 |
Item link |
http://hdl.handle.net/11311/1057194 |
|
Conference proceedings |
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation (Show >>)(Hide <<)
|
Author/s |
DE NICOLAO, Pietro; Pogliani, Marcello; Polino, Mario; Carminati, Michele; Quarta, Davide; Zanero, Stefano |
Title of the convention |
15th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) |
Location of the convention |
Paris |
Title of the review |
--
|
Pages |
1 - 21 |
Item link |
http://hdl.handle.net/11311/1053282 |
|
Extended Abstract: Toward Systematically Exploring Antivirus Engines (Show >>)(Hide <<)
|
Author/s |
Quarta, Davide; Salvioni, Federico; Continella, Andrea; Zanero, Stefano |
Title of the convention |
International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2018 |
Location of the convention |
Paris |
Title of the review |
--
|
Pages |
393 - 403 |
Item link |
http://hdl.handle.net/11311/1057196 |
|
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds (Show >>)(Hide <<)
|
Author/s |
Carminati, Michele; Baggio, Alessandro; Maggi, Federico; Spagnolini, Umberto; Zanero, Stefano |
Title of the convention |
International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2018 |
Location of the convention |
Paris |
Title of the review |
--
|
Pages |
211 - 233 |
Item link |
http://hdl.handle.net/11311/1057195 |
|
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets (Show >>)(Hide <<)
|
Author/s |
Continella, Andrea; Polino, Mario; Pogliani, Marcello; Zanero, Stefano |
Title of the convention |
2018 Annual Computer Security Applications Conference (ACSAC ’18) |
Location of the convention |
San Juan, PR, USA |
Period of the convention |
3/12/2018 - 7/12/2018 |
Title of the review |
--
|
Pages |
702 - 711 |
Item link |
http://hdl.handle.net/11311/1065367 |
|
SysTaint: Assisting Reversing of Malicious Network Communications (Show >>)(Hide <<)
|
Author/s |
Viglianisi, Gabriele; Carminati, Michele; Polino, Mario; Continella, Andrea; Zanero, Stefano |
Title of the convention |
8th Software Security, Protection, and Reverse Engineering Workshop |
Location of the convention |
San Juan, Puerto Rico, USA |
Period of the convention |
DEC 03-04, 2018 |
Title of the review |
--
|
Pages |
1 - 12 |
Item link |
http://hdl.handle.net/11311/1071459 |
|
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems (Show >>)(Hide <<)
|
Author/s |
Zanero, Stefano |
Title of the convention |
IEEE SENSORS 2018 |
Location of the convention |
New Delhi, India |
Period of the convention |
28/10/2018 - 31/10/2018 |
Title of the review |
--
|
Pages |
1 - 4 |
Item link |
http://hdl.handle.net/11311/1071684 |
|
List of publications and reserach products for the year 2017 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Journal Articles |
|
Prometheus: Analyzing WebInject-based information stealers (Show >>)(Hide <<)
|
Author/s |
Continella, Andrea; Carminati, Michele; Polino, Mario; Lanzi, Andrea; Zanero, Stefano; Maggi, Federico |
Title of the review |
JOURNAL OF COMPUTER SECURITY (ISSN: 0926-227X) |
Volume |
25 |
Brochure |
2 |
Pages |
117 - 137 |
Item link |
http://hdl.handle.net/11311/1021917 |
|
Conference proceedings |
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System (Show >>)(Hide <<)
|
Author/s |
Carminati, Michele; Valentini, Luca; Zanero, Stefano |
Title of the convention |
Cyber Security Cryptography and Machine Learning (CSCML 2017) |
Location of the convention |
Tel Aviv, Israel |
Title of the review |
--
|
Pages |
215 - 233 |
Item link |
http://hdl.handle.net/11311/1027399 |
|
Measuring and Defeating Anti-Instrumentation-Equipped Malware (Show >>)(Hide <<)
|
Author/s |
Polino, Mario; Continella, Andrea; Mariani, Sebastiano; D'Alessio, Stefano; Fontana, Lorenzo; Gritti, Fabio; Zanero, Stefano |
Title of the convention |
DIMVA 2017 |
Location of the convention |
Bonn |
Period of the convention |
July 2017 |
Title of the review |
--
|
Pages |
73 - 96 |
Item link |
http://hdl.handle.net/11311/1030092 |
|
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks (Show >>)(Hide <<)
|
Author/s |
Palanca, Andrea; Evenchick, Eric; Maggi, Federico; Zanero, Stefano |
Title of the convention |
DIMVA 2017 |
Location of the convention |
Bonn |
Period of the convention |
July 2017 |
Title of the review |
--
|
Pages |
185 - 206 |
Item link |
http://hdl.handle.net/11311/1030098 |
|
An Experimental Security Analysis of an Industrial Robot Controller (Show >>)(Hide <<)
|
Author/s |
Quarta, Davide; Pogliani, Marcello; Polino, Mario; Maggi, Federico; Zanchettin, ANDREA MARIA; Zanero, Stefano |
Title of the convention |
2017 IEEE Symposium on Security and Privacy (SP) |
Location of the convention |
San Jose, CA |
Period of the convention |
May 2017 |
Title of the review |
--
|
Pages |
268 - 286 |
Item link |
http://hdl.handle.net/11311/1030104 |
|
GreatEatlon: Fast, Static Detection of Mobile Ransomware (Show >>)(Hide <<)
|
Author/s |
Zheng, Chengyu; Dellarocca, Nicola; Andronio, Niccolò; Zanero, Stefano; Maggi, Federico |
Title of the convention |
SecureComm 2016 |
Location of the convention |
Cina |
Title of the review |
--
|
Pages |
617 - 636 |
Item link |
http://hdl.handle.net/11311/1030131 |
|
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities (Show >>)(Hide <<)
|
Author/s |
Marastoni, Niccolò; Continella, Andrea; Quarta, Davide; Zanero, Stefano; Preda, Mila Dalla |
Title of the convention |
7th Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop |
Location of the convention |
Orlando FL |
Period of the convention |
05/12/2017 - 06/12/2017 |
Title of the review |
--
|
Pages |
1 - 12 |
Item link |
http://hdl.handle.net/11311/1042939 |
|
Abstract in Atti di convegno |
Measuring and Defeating Anti-Instrumentation-Equipped Malware (Show >>)(Hide <<)
|
Author/s |
Mario, Polino; Stefano, Zanero |
Title of the book |
Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281) |
Author/s of the book |
S. Zennou, S.K. Debray, T. Dullien, A. Lakhothia |
Item link |
http://hdl.handle.net/11311/1042940 |
|
Poster |
Poster: Detecting WebInjects through Live Memory Inspection (Show >>)(Hide <<)
|
Author/s |
Mariani, Nicola; Continella, Andrea; Pogliani, Marcello; Carminati, Michele; Maggi, Federico; Zanero, Stefano |
Title of the book |
IEEE Symposium on Security and Privacy |
Item link |
http://hdl.handle.net/11311/1032263 |
|
List of publications and reserach products for the year 2016 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Journal Articles |
Author/s |
Di Natale, Giorgio; Zanero, Stefano |
Title of the review |
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (ISSN: 2168-6750) |
Volume |
4 |
Brochure |
1 |
Pages |
33 - 34 |
Item link |
http://hdl.handle.net/11311/977683 |
|
Conference proceedings |
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners (Show >>)(Hide <<)
|
Author/s |
Bazzoli, Enrico; Criscione, Claudio; Maggi, Federico; Zanero, Stefano |
Title of the convention |
31st IFIP TC 11 International Conference, SEC 2016 |
Location of the convention |
Ghent, Belgium |
Period of the convention |
30/5/2016-01/06/2016 |
Title of the review |
--
|
Pages |
243 - 258 |
Item link |
http://hdl.handle.net/11311/990481 |
|
Trellis: Privilege Separation for Multi-user Applications Made Easy (Show >>)(Hide <<)
|
Author/s |
Mambretti, Andrea; Onarlioglu, Kaan; Mulliner, Collin; Robertson, William; Kirda, Engin; Maggi, Federico; Zanero, Stefano |
Title of the convention |
RAID 2016 |
Location of the convention |
Paris, France |
Period of the convention |
19/9/2016-21/9/2016 |
Title of the review |
--
|
Pages |
437 - 456 |
Item link |
http://hdl.handle.net/11311/998068 |
|
ShieldFS: a self-healing, ransomware-aware filesystem (Show >>)(Hide <<)
|
Author/s |
CONTINELLA, ANDREA; Guagnelli, Alessandro; Zingaro, Giovanni; De Pasquale, Giulio; BARENGHI, ALESSANDRO; ZANERO, STEFANO; MAGGI, FEDERICO |
Title of the convention |
32nd Annual Conference on Computer Security Applications, ACSAC 2016 |
Location of the convention |
Los Angeles, CA, USA |
Period of the convention |
December 5-9, 2016 |
Title of the review |
--
|
Pages |
336 - 347 |
Item link |
http://hdl.handle.net/11311/1006825 |
|
On-chip system call tracing: A feasibility study and open prototype (Show >>)(Hide <<)
|
Author/s |
ZHENG, CHENGYU; Dalla Preda, Mila; Granjal, Jorge; ZANERO, STEFANO; MAGGI, FEDERICO |
Title of the convention |
2016 IEEE Conference on Communications and Network Security (CNS) |
Location of the convention |
Philadelphia, PA, USA |
Period of the convention |
17-19 Oct. 201 |
Title of the review |
--
|
Pages |
73 - 81 |
Item link |
http://hdl.handle.net/11311/1010013 |
|
Abstract in Atti di convegno |
Up Close and Personal: Cybersecurity in Medical IoT Devices (Show >>)(Hide <<)
|
Author/s |
ZANERO, STEFANO; Evenchick, Eric |
Title of the book |
38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2016) |
Title of the convention |
38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2016) |
Location of the convention |
Orlando FL |
Period of the convention |
17 Agosto 2016 |
Item link |
http://hdl.handle.net/11311/1007239 |
|
Patents |
Protection system and method for protecting a computer system against ransomware attack (Show >>)(Hide <<)
|
Author/s |
A. Barenghi; S. Zanero; F. Maggi; A. Continella; G. De Pasquale; A. Guagnelli; G. Zingaro |
Patent owner |
Politecnico di Milano |
Patent number |
US 15/368,465 |
Item link |
http://hdl.handle.net/11311/1041629 |
|
List of publications and reserach products for the year 2015 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Journal Articles |
BankSealer: A decision support system for online banking fraud analysis and investigation (Show >>)(Hide <<)
|
Author/s |
Carminati, Michele; Caron, Roberto; Maggi, Federico; Epifani, Ilenia; Zanero, Stefano |
Title of the review |
COMPUTERS & SECURITY (ISSN: 0167-4048) |
Volume |
53 |
Brochure |
-- |
Pages |
175 - 186 |
Item link |
http://hdl.handle.net/11311/963634 |
|
Author/s |
Valdi, Andrea; Lever, Eros; Benefico, Simone; Quarta, Davide; Zanero, Stefano; Maggi, Federico |
Title of the review |
COMPUTER (ISSN: 0018-9162) |
Volume |
48 |
Brochure |
11 |
Pages |
60 - 68 |
Item link |
http://hdl.handle.net/11311/968572 |
|
Conference proceedings |
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries (Show >>)(Hide <<)
|
Author/s |
POLINO, MARIO; Scorti, Andrea; MAGGI, FEDERICO; ZANERO, STEFANO |
Title of the convention |
Detection of Intrusions and Malware, and Vulnerability Assessment 2015 |
Location of the convention |
Milano, Italy |
Period of the convention |
8/7/2015-10/7/2015 |
Title of the review |
--
|
Pages |
121 - 143 |
Item link |
http://hdl.handle.net/11311/960930 |
|
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications (Show >>)(Hide <<)
|
Author/s |
Falsina, Luca; Fratantonio, Yanick; Zanero, Stefano; Kruegel, Christopher; Vigna, Giovanni; Maggi, Federico |
Title of the convention |
31st Annual Computer Security Applications Conference |
Location of the convention |
Los Angeles CA |
Period of the convention |
5/12/2015-9/12/2015 |
Title of the review |
--
|
Pages |
201 - 210 |
Item link |
http://hdl.handle.net/11311/971410 |
|
HelDroid: Dissecting and Detecting Mobile Ransomware (Show >>)(Hide <<)
|
Author/s |
Andronio, Nicoló; ZANERO, STEFANO; MAGGI, FEDERICO |
Title of the convention |
RAID 2015 |
Location of the convention |
Kyoto, Japan |
Period of the convention |
11/2015 |
Title of the review |
--
|
Pages |
382 - 404 |
Item link |
http://hdl.handle.net/11311/971416 |
|
Poster |
Practical Exploit Generation for Intent Message Vulnerabilities in Android (Show >>)(Hide <<)
|
Author/s |
D. Gallingani; R. Gjomemo; V. Venkatakrishnan; ZANERO, STEFANO |
Title of the book |
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy |
Publisher |
ACM |
Title of the convention |
5th ACM Conference on Data and Application Security and Privacy |
Location of the convention |
San Antonio, TX |
Period of the convention |
2-4 March 2015 |
Pages |
155 - 157 |
Item link |
http://hdl.handle.net/11311/920555 |
|
|
|