Articoli e documenti scientifici

Questa sezione contiene esclusivamente documenti e articoli scientifici, ovvero peer reviewed.

Tesi di dottorato

  • S. Zanero, Unsupervised Learning Algorithms for Intrusion Detection, Tesi di dottorato, DEI Politecnico di Milano, 2006 PDF full text

Pubblicazioni su riviste internazionali

  • P. Perri, S. Zanero, "Lessons Learned from the Italian Law on Privacy". Computer Law and Security Report, vol. 20, issue 4-5, pag. 310-313, 384-389, Elsevier Science, 2004.
  • E. Filiol, M. Helenius, and S. Zanero, "Open Problems in Computer Virology". Journal In Computer Virology, 1(3-4): pag. 55-66, marzo 2006.PDF full text.
  • L.Carettoni, C.Merloni, S.Zanero, "Studying Bluetooth Malware Propagation: the BlueBag Project". IEEE Security and Privacy, vol. 5, no. 2, March/April 2007, pp. 17-25.PDF full text.
  • G. Casale, S.Zanero, "GIVS: Integrity Validation for Grid Security". Internation Journal of Critical Infrastructures, vol. 4, no. 3, pag. 319-333, 2008.
  • F. Maggi, S. Zanero, V. Iozzo. "Seeing the Invisible - Forensic Uses of Anomaly Detection and Machine Learning". ACM Operating Systems Review, vol. 42, no. 3, pag. 52-59, April 2008.
  • F. Maggi, M. Matteucci, S. Zanero. "Reducing False Positives In Anomaly Detectors Through Fuzzy Alert Aggregation". Information Fusion, special issue on ``Information Fusion in Computer Security''. 10(4): 300-311 (2009)
  • S. Zanero. "Wireless Malware Propagation: A Reality Check". IEEE Security and Privacy, vol. 7, no. 5, pp. 70-74, September/October, 2009.
  • F. Maggi, M. Matteucci, and S. Zanero. "Detecting Intrusions through System Call Sequence and Argument Analysis". IEEE Transactions on Dependable and Secure Systems. Vol. 7, n. 4, December 2010.
  • A. Dardanelli, F. Maggi, M. Tanelli, S. Zanero, S. M. Savaresi, R. Kochanek and T. Holz.Secure integration of mobile devices for automotive services. IEEE Embedded System Letters, vol. 5, n. 3, 2013.
  • G. Bonetti, M. Viglione, A. Frossi, F. Maggi, S. Zanero. "Black-box Forensic and Antiforensic Characteristics of Solid-state Drives". Journal of Computer Virology and Hacking Techniques, Vol. 10, No. 4, November 2014..
  • S. Bratus, I. Arce, M. E. Locasto, S. Zanero. "Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of "Crypto Wars" in Security Research". ;login:, USENIX, Vol. 39, No. 4, August 2014.
  • M. Carminati, R. Caron, I. Epifani, F. Maggi, S. Zanero. "BankSealer: A Decision Support System for Online Banking Fraud Analysis and Investigation". Computers & Security, Elsevier, Vol. 53, pp. 175-186, September 2015.
  • A. Valdi, E. Lever, S. Benefico, D. Quarta, S. Zanero, F. Maggi. "Scalable Testing of Mobile Antivirus Apps". IEEE Computer, vol.48, no.11, pp.60-68, Nov. 2015.

Editing di proceedings internazionali

  • S. Zanero, editor, "Proceedings of WISTDCS 2008, WOMBAT Workshop on Internet Security Threat Data Collection and Sharing", 21-22 April 2008, Amsterdam, Netherlands, IEEE Computer Society Press, 2008.
  • E. Huebner and S. Zanero, editors, "Proceedings of the 1st International Workshop on Open Source Software for Computer and Network Forensics - OSSCoNF 2008", held in conjunction with IFIP OSS 2008, 10th September 2008, Milan, Italy

Pubblicazioni su conferenze internazionali

  • G. Serazzi, S. Zanero, "Computer Virus Propagation Models", in M. C. Calzarossa, E. Gelenbe, editor, "Performance Tools and Applications to Networked Systems: Revised Tutorial Lectures Performance Tools and Applications to Networked Systems: Revised Tutorial Lectures" Lecture Notes in Computer Science, vol. 2965, pag. 26-50, Springer-Verlag, Berlino, Germania, 2004. PDF full text.
  • L. Muttoni, G. Casale, F. Granata, S. Zanero, "Optimal Number of Nodes for Computations in a Grid Environment", 12th EuroMicro Conference on Parallel and Distributed Processing, A Coruña, Spain, Feb 2004, pag. 282-289, IEEE conference proceedings. PDF full text.
  • S. Zanero, S. M. Savaresi, "Unsupervised Learning Techniques for an Intrusion Detection System", Proceedings of the ACM Symposium on Applied Computing, ACM SAC 2004, pag. 412-419, 14-17 Mar 2004, Nicosia, Cyprus. PDF full text.
  • S. Zanero, "Behavioral Intrusion Detection", Proceedings of the 19th ISCIS Symposium, Antalya, Turkey, October 2004, pag. 657-666, Lecture Notes in Computer Science 3280, Springer-Verlag 2004. PDF full text.
  • G. Casale, S.Zanero "GIVS: an Integrity Validation Scheme for Grid Security", Proceedings of the 5th International Conference on Computational Science, pag. 69?88, Springer Verlag, 2005. PDF full text.
  • S. Zanero, "Improving Self Organizing Map Performance for Network Intrusion Detection", International Workshop on Clustering High-Dimensional data and its applications, SDM 05 SIAM conference On Data Mining, pag. 30-37, 2005. PDF full text.
  • S. Zanero, "Security and Trust in the Italian Legal Digital Signature Framework", iTrust '05 intl. conf. on Trust Management, pag. 34-44, Lecture Notes in Computer Science, Vol. 3477, Springer-Verlag, May 2005 PDF full text.
  • S. Zanero, "Analyzing TCP Traffic Patterns using Self Organizing Maps", ICIAP 05 - Special session on Pattern Recognition in Computer Security, pag. 83-90, Cagliari, Italy, September 2005, Lecture Notes in Computer Science, vol. 3617, Springer-Verlag. PDF full text.
  • G. Casale, P. Cremonesi, G. Serazzi and S. Zanero, "Performance Issues in Video Streaming Environments", Workshop FIRB-Perf 2005, pag. 3-14, IEEE Press, 2005. PDF full text.
  • S. Zanero, "Flaws and frauds in the evaluation of IDS/IPS technologies", FIRST 2006 - Forum of Incident Response and Security Teams, Sevilla, Spain, June 2007 . PDF full text.
  • F. Maggi, S. Zanero, "On the use of different statistical tests for alert correlation - Short Paper", Proceedings of RAID 2007 - Recent Advances in Intrusion Detection, pag. 167-177, Surfer's Paradise, Australia, September 2007. PDF full text.
  • C. Altheide, C. Merloni, S. Zanero, "A methodology for the repeatable forensic analysis of encrypted drives", Proceedings of the 2008 European ACM SIGOPS Workshop on System Security, Glasgow, Scotland, March 2008. PDF full text.
  • S. Zanero, G. Serazzi, "Unsupervised Learning Algorithms for Intrusion Detection", IEEE Network Operations and Management Symposium 2008, April 2008.
  • S. Zanero. "ULISSE: A Network Intrusion Detection System", In CSIIRW 2008, Cyber Security and Information Intelligence Research Workshop, Oak Ridge TN, USA, ACM Press, 2008.
  • F. Amigoni, F. Basilico, N. Basilico and S. Zanero. "Integrating Partial Models of Network Normality via Cooperative Negotiation - An Approach to Development of Multiagent Intrusion Detection Systems", in 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Sydney, Australia, December 9-12, 2008.
  • A. Galante, A. Kokos and S. Zanero. "BlueBat: Towards Practical Bluetooth Honeypots", in 2009 IEEE International Conference on Communications, Dresden, Germany, June 2009.
  • A. Frossi, F. Maggi, G. L. Rizzo, S. Zanero, "Selecting and Improving System Call Models for Anomaly Detection", Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2009, Como, Italy, July 2009 PDF full text
  • C. Criscione, F. Maggi, G. Salvaneschi, S. Zanero. "Integrated Detection of Attacks Against Browsers, Web Applications and Databases", EC2ND 2009, Milano
  • P. Milani Comparetti, G. Salvaneschi, C. Kolbitsch, E. Kirda, C. Kruegel, S. Zanero. "Identifying Dormant Functionality in Malware Programs", IEEE Symposium on Security and Privacy 2010, Oakland CA
  • A. Volpatto, F. Maggi and S. Zanero. "Effective multimodel anomaly detection using cooperative negotiation", GameSec 2010 Conference on Decision and Game Theory for Security, Berlin, Germany, 22-23 November 2010
  • S. Zanero. "Observing the tidal waves of malware: experiences from the WOMBAT project", VCON 10: 2nd Vaagdevi International Conference on Information Technology for Real World Challenges, invited paper, Warangal, India, 9-11 December 2010.
  • F. Maggi, A. Sisto, S. Zanero. "A social-engineering-centric data collection initiative to study phishing", First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2011). 10 April, 2011, Salzburg, Austria.
  • F. Maggi, S. Zanero. "Is the future Web more insecure? Distractions and solutions of new-old security issues and measures", Worldwide Cybersecurity Summit 2011. 1-2 June, 2011, London, UK
  • F. Maggi, S. Zanero. "System Security research at Politecnico di Milano", 1st SysSec Workshop (SysSec 2011). 6 July, 2011, Amsterdam, The Netherlands.
  • F. Roveta, L. Di Mario, F. Maggi, G. Caviglia, S. Zanero and P. Ciuccarelli. "BURN: Baring Unknown Rogue Networks", VizSec 2011: Symposium on Visualization in Computer Security. July 2011, Pittsburgh PA, Best Paper Award.
  • L. Sportiello, S. Zanero. "File Block Classification by Support Vector Machines", ARES 2011: Sixth International Conference on Availability, Reliability and Security, August 2011.
  • F. Maggi, A. Bellini, G. Salvaneschi, and S. Zanero. "Finding Non-trivial Malware Naming Inconsistencies", 7th International Conference on Information Systems Security (ICISS). 19 December 2011, Jadavpur University, Kolkata, India.
  • F. Maggi, A. Volpatto, S. Gasparini, G. Boracchi, S. Zanero. "A fast eavesdropping attack against touchscreens", 7th International Conference on Information Assurance and Security (IAS). 5-8 December, 2011, Malacca, Malaysia.
  • L. Sportiello, S. Zanero. "Context-based File Block Classification", 8th Annual IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 2012.
  • F. Maggi, S. Zanero. "Integrated Detection of Anomalous Behavior of Computer Infrastructures", IEEE/IFIP Network Operations and Management Symposium (NOMS). 16-20 April 2012, Maui, Hawaii, US.
  • J. Polakis, M. Lancini, G. Kontaxis, F. Maggi, S. Ioannidis, A. Keromytis, S. Zanero.All Your Faces Are Belong to Us: Breaking Facebook's Social Authentication. Proceedings of the Annual Computer Security Applications Conference (ACSAC). December 2012, Orlando, FL, USA.
  • M. Lindorfer, A. Di Federico, F. Maggi, P. Milani Comparetti, S. Zanero.Lines of Malicious Code: Insights Into the Malicious Software Industry. Proceedings of the Annual Computer Security Applications Conference (ACSAC). December 2012, Orlando, FL, USA.
  • F. Maggi, A. Frossi, G. Stringhini, B. Stone-Gross, S. Zanero, C. Kruegel, G. Vigna.Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures. In Proceedings of the 22nd International World Wide Web Conference (WWW2013).May 2013, Rio de Janeiro, Brazil.
  • F. Maggi, A. Valdi, S. Zanero.AndroTotal: A Flexible, Scalable Toolbox and Service for Testing Mobile Malware Detectors. In Proceedings of the 3rd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Berlin, November 2013.
  • G. Bonetti, M. Viglione, A. Frossi, F. Maggi, S. Zanero.A Comprehensive Black-box Methodology for Testing the Forensic Characteristics of Solid-state Drives. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), New Orleans LA, December 2013.
  • N. Nikiforakis, F. Maggi, G. Stringhini, M. Z. Rafique,W. Joosen, C. Kruegel, F. Piessens, G. Vigna and S. Zanero.Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services. In Proceedings of the 23rd International World Wide Web Conference (WWW2014).
  • M. Spagnuolo, F. Maggi and S. Zanero.BitIodine: Extracting Intelligence from the Bitcoin Network. In Proceedings of the 18th International Conference on Financial Cryptography and Data Security, Financial Crypto 2014.
  • M. Carminati, R. Caron, F. Maggi, S. Zanero. "BankSealer: An Online Banking Fraud Analysis and Decision Support System". In Proceedings of the 29th IFIP International Information Security and Privacy Conference. Best paper award.
  • S. Schiavoni, F. Maggi, L. Cavallaro and S. Zanero. "Phoenix: DGA-based Botnet Tracking and Intelligence". In Proceedings of DIMVA 2014.
  • M. Lindorfer, S. Volanis, A. Sisto, M. Neugschwandtner, E. Athanasopoulos, F. Maggi, C. Platzer, S. Zanero and S. Ioannidis. "AndRadar: Fast Discovery of Android Applications in Alternative Markets". In Proceedings of DIMVA 2014.
  • C. Criscione, F. Bosatelli, S. Zanero, F. Maggi. "Zarathustra: Extracting WebInject Signatures from Banking Trojans". In Twelfth Annual International Conference on Privacy, Security and Trust (PST).
  • I. Polakis, F. Maggi, S. Zanero, A. D. Keromytis. "Security and Privacy Measurements on Social Networks: Experiences and Lessons Learned". In Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS'14, Wroclaw, Poland, September 2014.
  • I. Polakis, P. Ilia, F. Maggi, M. Lancini, G. Kontaxis, S. Zanero, S. Ioannidis, A. D. Keromytis. "Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication". In Proceedings of the 21st ACM Conference on Computer and Communications Security, CCS'14, Scottsdale, Arizona, November 2014.
  • D. Gallingani, R. Gjomemo, V.N. Venkatakrishnan, S. Zanero. "Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications". In Proceedings of MoST 2015, San Jose, CA, May 2015.
  • M. Polino, A. Scorti, F. Maggi, S. Zanero. "Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries". In Proceedings of DIMVA 2015, July 2015, Milano, Italy.
  • N. Andronio, S. Zanero, F. Maggi. "HelDroid: Dissecting and Detecting Mobile Ransomware". In Proceedings of RAID 2015, pp. 382-404. November 2014, Kyoto, Japan.
  • L. Falsina, Y. Fratantonio, S. Zanero, C. Kruegel, G. Vigna, F. Maggi. "Grab'n Run: Secure and Practical Dynamic Code Loading for Android Applications". In Proceedings of ACSAC 2015, pp. 201-210, December 2015, Los Angeles CA.

Altre pubblicazioni scientifiche

  • S. Zanero, "Security of the italian legal digital signature scheme", poster presentation, MIRIAM Industrial Days, Workshop on Coding and Cryptography, Milan, 1 Dec 2003. Poster available in PDF.
  • S. Zanero, "Application of unsupervised learning algorithms to intrusion detection in a network-based environment", poster presentation, RAID Symposium (Recent Advances in Intrusion Detection), Sophia-Antipolis, October 2004.
  • D. Gallingani, R. Gjomemo, V.N. Venkatakrishnan, S. Zanero. "Practical Exploit Generation for Intent Message Vulnerabilities in Android". In Proceedings of CODASPY 2015, San Antonio, TX, USA, March 2015. Outstanding Poster Award
Please note that full text of the articles above is provided under the terms of the copyright agreement with the publisher(s). You are permitted to download the text for personal use or to link it, but not to repost it on other servers, without explicit permit of the copyright owner.

Altri documenti di interesse scientifico, ma non peer-reviewed:

  • Il paper che ho scritto sugli attacchi contro i contenuti delle Smart Card (in inglese). Non contiene contributi innovativi, è sostanzialmente una "review" di tutta la letteratura sull'argomento.
  • La mia tesi di laurea in formato pdf.

Siti esterni:

Le mie pubblicazioni su DBLP

Le mie pubblicazioni su Google Scholar Citations