With this function you can construct your weekly calendar of lessons, which is customized on the basis of the courses that you intend to follow. Warning: the personal schedule does not replace the presentation of the study plan! It's an informal tool that can help you better manage the organization of class attendance before the study plan presentation. After the study plan presentation we recommend you to use the Lecture timetable service in your Online Services.
To create your customized schedule follow these instructions:
- Click on the "Enable" link to proceed. You will be asked your surname and first name in order to determine your alphabetic grouping.
-
To add or remove courses from your personal schedule, use the small icons which are found next to the courses:
addition of the course
removal of the course
selection of the section of the Laboratory of Architecture (Note: the effective area in which the teaching will be carried out will be determined after the presentation of the Study Plans)
-
The sidebar on the left displays the number of lessons included in schedule.
There are also these commands:
View the schedule: allows the viewing of the weekly synoptic schedule
Delete the schedule: cancels the selections made
When you have finished the entry, you can print the calendar you have made.
Semester (Sem) | 1 | First Semester | 2 | Second Semester | A | Annual course | (1) | First Half-semester | (2) | Second Half-semester |
Language
|
|
Course completely offered in italian
|
|
Course completely offered in english
|
--
|
Not available
|
Note on the teaching activities
|
The calculation of the number of students enrolled only considers students enrolled in the academic year in question and does not include any possible students who may be attending but who are enrolled in previous academic years.
In case of structured courses taught by more professors, the number of students enrolled is related to the course as a whole, while the students opinion of the teaching is related to individual modules and individual professors.
The data related to the last academic years (number of students enrolled and students opinion of the teaching) have not yet been defined.
|
|
Information on didactic, research and institutional assignments on this page are certified by the University; more information, prepared by the professor, are available on the personal web page and in the curriculum vitae indicated on this webpage.
Professor's office hours | Department | Floor | Office | Day | Timetable | Telephone | Fax | Notes |
---|
DEIB | 3411 | 118 | Monday | From 13:00 To 14:00 | 4017 | 3411 | Please send me an email to ensure I have time to receive you | DEIB | -- | Laboratorio NECST | Tuesday | From 13:00 To 14:30 | 3564 | -- | Meeting dedicated to M.Sc. thesis development |
| E-mail | stefano.zanero@polimi.it | Professor's personal website | http://home.deib.polimi.it/zanero/ |
List of publications and reserach products for the year 2021 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Conference proceedings |
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System (Show >>)(Hide <<)
|
Author/s |
Maggi, Federico; Balduzzi, Marco; Vosseler, Rainer; Rösler, Martin; Quadrini, Walter; Tavola, Giacomo; Pogliani, Marcello; Quarta, Davide; Zanero, Stefano |
Title of the convention |
International Conference on Industry 4.0 and Smart Manufacturing |
Location of the convention |
Virtual |
Period of the convention |
23/11/2020-25/11/2020 |
Title of the review |
PROCEDIA COMPUTER SCIENCE (ISSN: 1877-0509)
|
Pages |
666 - 675 |
Item link |
http://hdl.handle.net/11311/1162312 |
|
List of publications and reserach products for the year 2020 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Conference proceedings |
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems (Show >>)(Hide <<)
|
Author/s |
Erba, Alessandro; Taormina, Riccardo; Galelli, Stefano; Pogliani, Marcello; Carminati, Michele; Zanero, Stefano; Tippenhauer, Nils Ole |
Title of the convention |
ACSAC '20: Annual Computer Security Applications Conference |
Location of the convention |
Austin, TX |
Title of the review |
--
|
Pages |
480 - 495 |
Item link |
http://hdl.handle.net/11311/1156194 |
|
Detecting Insecure Code Patterns in Industrial Robot Programs (Show >>)(Hide <<)
|
Author/s |
Pogliani, Marcello; Maggi, Federico; Balduzzi, Marco; Quarta, Davide; Zanero, Stefano |
Title of the convention |
ACM Asia Conference on Computer and Communications Security |
Location of the convention |
Taipei, Taiwan |
Period of the convention |
05/10/2020-09/10/2020 |
Title of the review |
--
|
Pages |
759 - 771 |
Item link |
http://hdl.handle.net/11311/1151650 |
|
Evasion Attacks against Banking Fraud Detection Systems (Show >>)(Hide <<)
|
Author/s |
Carminati, M.; Santini, L.; Polino, M.; Zanero, S. |
Title of the convention |
23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020) |
Location of the convention |
Virtual Conference |
Period of the convention |
14/10/2020 - 16/10/2020 |
Title of the review |
--
|
Pages |
285 - 300 |
Item link |
http://hdl.handle.net/11311/1148029 |
|
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services (Show >>)(Hide <<)
|
Author/s |
Ferrari, Dario; Carminati, Michele; Polino, Mario; Zanero, Stefano |
Title of the convention |
ACSAC '20: Annual Computer Security Applications Conference |
Location of the convention |
Austin, TX |
Title of the review |
--
|
Pages |
567 - 581 |
Item link |
http://hdl.handle.net/11311/1156196 |
|
Journal Articles |
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network (Show >>)(Hide <<)
|
Author/s |
Longari, Stefano; Valcarcel, Daniel Humberto Nova; Zago, Mattia; Carminati, Michele; Zanero, Stefano |
Title of the review |
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (ISSN: 1932-4537) |
Volume |
early access |
Brochure |
-- |
Pages |
1 - 12 |
Item link |
http://hdl.handle.net/11311/1152605 |
|
ReCAN – Dataset for reverse engineering of Controller Area Networks (Show >>)(Hide <<)
|
Author/s |
Zago, Mattia; Longari, Stefano; Tricarico, Andrea; Carminati, Michele; Pérez, Manuel Gil; Pérez, Gregorio Marínez; Zanero, Stefano |
Title of the review |
DATA IN BRIEF (ISSN: 2352-3409) |
Volume |
29 |
Brochure |
-- |
Pages |
1 - 15 |
Item link |
http://hdl.handle.net/11311/1130436 |
|
Remote monitoring of cardiac implanted electronic devices: legal requirements and ethical principles - ESC Regulatory Affairs Committee/EHRA joint task force report (Show >>)(Hide <<)
|
Author/s |
Nielsen, Jens Cosedis; Kautzner, Josef; Casado-Arroyo, Ruben; Burri, Haran; Callens, Stefaan; Cowie, Martin R; Dickstein, Kenneth; Drossart, Inga; Geneste, Ginger; Erkin, Zekeriya; Hyafil, Fabien; Kraus, Alexander; Kutyifa, Valentina; Marin, Eduard; Schulze, Christian; Slotwiner, David; Stein, Kenneth; Zanero, Stefano; Heidbuchel, Hein; Fraser, Alan G |
Title of the review |
EUROPACE (ISSN: 1099-5129) |
Volume |
22 |
Brochure |
11 |
Pages |
1742 - 1758 |
Item link |
http://hdl.handle.net/11311/1144067 |
|
List of publications and reserach products for the year 2019 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Poster |
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems (Show >>)(Hide <<)
|
Author/s |
Pogliani, Marcello; Barlocco, Mattia; Pesatori, Mirko; Zanero, Stefano |
Title of the book |
IEEE Symposium on Security and Privacy |
Item link |
http://hdl.handle.net/11311/1099143 |
|
Conference proceedings |
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis (Show >>)(Hide <<)
|
Author/s |
Longari, Stefano; Cannizzo, Andrea; Carminati, Michele; Zanero, Stefano |
Title of the convention |
IEEE Vehicular Networking Conference |
Location of the convention |
Los Angeles |
Title of the review |
--
|
Pages |
99 - 106 |
Item link |
http://hdl.handle.net/11311/1120902 |
|
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots (Show >>)(Hide <<)
|
Author/s |
Ferretti, Pietro; Pogliani, Marcello; Zanero, Stefano |
Title of the convention |
ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC ’19) |
Location of the convention |
London, UK |
Period of the convention |
11/11/2019 |
Title of the review |
--
|
Pages |
51 - 61 |
Item link |
http://hdl.handle.net/11311/1100010 |
|
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network (Show >>)(Hide <<)
|
Author/s |
Longari, Stefano; Penco, Matteo; Carminati, Michele; Zanero, Stefano |
Title of the convention |
ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC ’19) |
Location of the convention |
London |
Title of the review |
--
|
Pages |
1 - 12 |
Item link |
http://hdl.handle.net/11311/1104918 |
|
Journal Articles |
Security of controlled manufacturing systems in the connected factory: the case of industrial robots (Show >>)(Hide <<)
|
Author/s |
Pogliani, Marcello; Quarta, Davide; Polino, Mario; Vittone, Martino; Maggi, Federico; Zanero, Stefano |
Title of the review |
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (ISSN: 2274-2042) |
Volume |
15 |
Brochure |
3 |
Pages |
161 - 175 |
Item link |
http://hdl.handle.net/11311/1074997 |
|
List of publications and reserach products for the year 2018 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Conference proceedings |
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation (Show >>)(Hide <<)
|
Author/s |
DE NICOLAO, Pietro; Pogliani, Marcello; Polino, Mario; Carminati, Michele; Quarta, Davide; Zanero, Stefano |
Title of the convention |
15th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) |
Location of the convention |
Paris |
Title of the review |
--
|
Pages |
1 - 21 |
Item link |
http://hdl.handle.net/11311/1053282 |
|
Extended Abstract: Toward Systematically Exploring Antivirus Engines (Show >>)(Hide <<)
|
Author/s |
Quarta, Davide; Salvioni, Federico; Continella, Andrea; Zanero, Stefano |
Title of the convention |
International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2018 |
Location of the convention |
Paris |
Title of the review |
--
|
Pages |
393 - 403 |
Item link |
http://hdl.handle.net/11311/1057196 |
|
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds (Show >>)(Hide <<)
|
Author/s |
Carminati, Michele; Baggio, Alessandro; Maggi, Federico; Spagnolini, Umberto; Zanero, Stefano |
Title of the convention |
International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2018 |
Location of the convention |
Paris |
Title of the review |
--
|
Pages |
211 - 233 |
Item link |
http://hdl.handle.net/11311/1057195 |
|
SysTaint: Assisting Reversing of Malicious Network Communications (Show >>)(Hide <<)
|
Author/s |
Viglianisi, Gabriele; Carminati, Michele; Polino, Mario; Continella, Andrea; Zanero, Stefano |
Title of the convention |
8th Software Security, Protection, and Reverse Engineering Workshop |
Location of the convention |
San Juan, Puerto Rico, USA |
Period of the convention |
DEC 03-04, 2018 |
Title of the review |
--
|
Pages |
1 - 12 |
Item link |
http://hdl.handle.net/11311/1071459 |
|
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets (Show >>)(Hide <<)
|
Author/s |
Continella, Andrea; Polino, Mario; Pogliani, Marcello; Zanero, Stefano |
Title of the convention |
2018 Annual Computer Security Applications Conference (ACSAC ’18) |
Location of the convention |
San Juan, PR, USA |
Period of the convention |
3/12/2018 - 7/12/2018 |
Title of the review |
--
|
Pages |
702 - 711 |
Item link |
http://hdl.handle.net/11311/1065367 |
|
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems (Show >>)(Hide <<)
|
Author/s |
Zanero, Stefano |
Title of the convention |
IEEE SENSORS 2018 |
Location of the convention |
New Delhi, India |
Period of the convention |
28/10/2018 - 31/10/2018 |
Title of the review |
--
|
Pages |
1 - 4 |
Item link |
http://hdl.handle.net/11311/1071684 |
|
Journal Articles |
Security Evaluation of a Banking Fraud Analysis System (Show >>)(Hide <<)
|
Author/s |
Carminati, Michele; Polino, Mario; Continella, Andrea; Lanzi, Andrea; Maggi, Federico; Zanero, Stefano |
Title of the review |
ACM TRANSACTIONS ON PRIVACY AND SECURITY (ISSN: 2471-2566) |
Volume |
21 |
Brochure |
3 |
Pages |
1 - 31 |
Item link |
http://hdl.handle.net/11311/1057194 |
|
List of publications and reserach products for the year 2017 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Abstract in Atti di convegno |
Measuring and Defeating Anti-Instrumentation-Equipped Malware (Show >>)(Hide <<)
|
Author/s |
Mario, Polino; Stefano, Zanero |
Title of the book |
Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281) |
Author/s of the book |
S. Zennou, S.K. Debray, T. Dullien, A. Lakhothia |
Item link |
http://hdl.handle.net/11311/1042940 |
|
Poster |
Poster: Detecting WebInjects through Live Memory Inspection (Show >>)(Hide <<)
|
Author/s |
Mariani, Nicola; Continella, Andrea; Pogliani, Marcello; Carminati, Michele; Maggi, Federico; Zanero, Stefano |
Title of the book |
IEEE Symposium on Security and Privacy |
Item link |
http://hdl.handle.net/11311/1032263 |
|
Conference proceedings |
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks (Show >>)(Hide <<)
|
Author/s |
Palanca, Andrea; Evenchick, Eric; Maggi, Federico; Zanero, Stefano |
Title of the convention |
DIMVA 2017 |
Location of the convention |
Bonn |
Period of the convention |
July 2017 |
Title of the review |
--
|
Pages |
185 - 206 |
Item link |
http://hdl.handle.net/11311/1030098 |
|
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System (Show >>)(Hide <<)
|
Author/s |
Carminati, Michele; Valentini, Luca; Zanero, Stefano |
Title of the convention |
Cyber Security Cryptography and Machine Learning (CSCML 2017) |
Location of the convention |
Tel Aviv, Israel |
Title of the review |
--
|
Pages |
215 - 233 |
Item link |
http://hdl.handle.net/11311/1027399 |
|
An Experimental Security Analysis of an Industrial Robot Controller (Show >>)(Hide <<)
|
Author/s |
Quarta, Davide; Pogliani, Marcello; Polino, Mario; Maggi, Federico; Zanchettin, ANDREA MARIA; Zanero, Stefano |
Title of the convention |
2017 IEEE Symposium on Security and Privacy (SP) |
Location of the convention |
San Jose, CA |
Period of the convention |
May 2017 |
Title of the review |
--
|
Pages |
268 - 286 |
Item link |
http://hdl.handle.net/11311/1030104 |
|
GreatEatlon: Fast, Static Detection of Mobile Ransomware (Show >>)(Hide <<)
|
Author/s |
Zheng, Chengyu; Dellarocca, Nicola; Andronio, Niccolò; Zanero, Stefano; Maggi, Federico |
Title of the convention |
SecureComm 2016 |
Location of the convention |
Cina |
Title of the review |
--
|
Pages |
617 - 636 |
Item link |
http://hdl.handle.net/11311/1030131 |
|
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities (Show >>)(Hide <<)
|
Author/s |
Marastoni, Niccolò; Continella, Andrea; Quarta, Davide; Zanero, Stefano; Preda, Mila Dalla |
Title of the convention |
7th Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop |
Location of the convention |
Orlando FL |
Period of the convention |
05/12/2017 - 06/12/2017 |
Title of the review |
--
|
Pages |
1 - 12 |
Item link |
http://hdl.handle.net/11311/1042939 |
|
Measuring and Defeating Anti-Instrumentation-Equipped Malware (Show >>)(Hide <<)
|
Author/s |
Polino, Mario; Continella, Andrea; Mariani, Sebastiano; D'Alessio, Stefano; Fontana, Lorenzo; Gritti, Fabio; Zanero, Stefano |
Title of the convention |
DIMVA 2017 |
Location of the convention |
Bonn |
Period of the convention |
July 2017 |
Title of the review |
--
|
Pages |
73 - 96 |
Item link |
http://hdl.handle.net/11311/1030092 |
|
Journal Articles |
|
Prometheus: Analyzing WebInject-based information stealers (Show >>)(Hide <<)
|
Author/s |
Continella, Andrea; Carminati, Michele; Polino, Mario; Lanzi, Andrea; Zanero, Stefano; Maggi, Federico |
Title of the review |
JOURNAL OF COMPUTER SECURITY (ISSN: 0926-227X) |
Volume |
25 |
Brochure |
2 |
Pages |
117 - 137 |
Item link |
http://hdl.handle.net/11311/1021917 |
|
|
|