Follow
Marcello Pogliani
Marcello Pogliani
Unknown affiliation
Verified email at polimi.it
Title
Cited by
Cited by
Year
An Experimental Security Analysis of an Industrial Robot Controller
D Quarta, M Pogliani, M Polino, F Maggi, AM Zanchettin, S Zanero
38th IEEE Symposium on Security and Privacy, 2017
2042017
Rogue Robots: Testing the Limits of an Industrial Robot’s Security
F Maggi, D Quarta, M Pogliani, M Polino, AM Zanchettin, S Zanero
Technical Report, Trend Micro TrendLabs Research Paper, 2017
622017
Constrained concealment attacks against reconstruction-based anomaly detectors in industrial control systems
A Erba, R Taormina, S Galelli, M Pogliani, M Carminati, S Zanero, ...
Annual Computer Security Applications Conference, 480-495, 2020
482020
Security of controlled manufacturing systems in the connected factory: the case of industrial robots
M Pogliani, D Quarta, M Polino, M Vittone, F Maggi, S Zanero
Journal of Computer Virology and Hacking Techniques 15 (3), 161-175, 2019
382019
There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets
A Continella, M Polino, M Pogliani, S Zanero
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
362018
Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems
A Erba, R Taormina, S Galelli, M Pogliani, M Carminati, S Zanero, ...
arXiv preprint arXiv:1907.07487, 2019
232019
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots
P Ferretti, M Pogliani, S Zanero
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy …, 2019
222019
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System
F Maggi, M Balduzzi, R Vosseler, M Rösler, W Quadrini, G Tavola, ...
Procedia Computer Science 180, 666-675, 2021
202021
ELISA: ELiciting ISA of raw binaries for fine-grained code and data separation.
P De Nicolao, M Pogliani, M Polino, M Carminati, D Quarta, S Zanero
15th Conference on Detection of Intrusions and Malware & Vulnerability …, 2018
152018
Detecting Insecure Code Patterns in Industrial Robot Programs
M Pogliani, F Maggi, M Balduzzi, D Quarta, S Zanero
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
132020
Attacks on Smart Manufacturing Systems
F Maggi, M Pogliani
10*
Runtime Resource Management in Heterogeneous System Architectures: The SAVE Approach
GC Durelli, M Pogliani, A Miele, C Plessl, H Riebler, MD Santambrogio, ...
2014 IEEE International Symposium on Parallel and Distributed Processing …, 2014
62014
Detecting unsecure data flow in automation task programs
F Maggi, M Pogliani, D Quarta, M Vittone, S Zanero
US Patent 11,440,190, 2022
22022
Quality of Service Driven Runtime Resource Allocation in Reconfigurable HPC Architectures
M Pogliani, GC Durelli, A Miele, T Becker, P Sanders, C Bolchini, ...
2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and …, 2016
22016
Quality of Service Driven Runtime Resource Allocation in Reconfigurable HPC Architectures
M Pogliani, GC Durelli, AR Miele, T Becker, P Sanders, C Bolchini, ...
14th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2016
22016
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems
M Pogliani, M Barlocco, M Pesatori, S Zanero
2019
Industria 4.0 e protezione del dato: La difesa della fabbrica connessa
M Pogliani
2018
Poster: Detecting WebInjects through Live Memory Inspection
N Mariani, A Continella, M Pogliani, M Carminati, F Maggi, S Zanero
38th IEEE Symposium on Security and Privacy (Poster Abstract), 2017
2017
Rogue Automation
F Maggi, M Pogliani
Designing and Evaluating Resource Management Policies for Heterogeneous System Architectures
C Bolchini, GC Durelli, A Miele, G Pallotta, M Pogliani, MD Santambrogio
The system can't perform the operation now. Try again later.
Articles 1–20