Federico Maggi

Federico Maggi

Senior Researcher

Trend Micro, Inc.

I enjoy working on various cyber-security topics. I’ve done offensive and defensive research on web applications, network protocols and devices, embedded systems, radio-frequency control systems, industrial robots, cars, and mobile devices.

I work with Trend Micro Research in a global team that focuses on technology and cyber-crime research. After more than 10 years, I concluded that I’m still around in the infosec area because it gives me so many opportunities to solve new exciting problems every day.

Interests

  • Systems Security
  • Applied Security
  • Data Analysis

Education

  • PhD in Computer Engineering, 2010

    Politecnico di Milano

  • MSc in Computer Engineering, 2007

    Politecnico di Milano

Recent Posts

Smart Manufacturing Security

How do we secure a smart manufacturing system, or a smart factory? Recent incidents such as the ransomware infection that halted production at a major semiconductor foundry in 2018 have already shown the impact of IT-to-OT lateral movement. Moreover, while smart manufacturing systems are isolated from other networks, there is a trend toward less isolation between IT and OT systems.

Smart working, figli, tecnologia e didattica: il racconto e i consigli di un papà che lavora da casa da 4 anni e più

Ci voleva il termine “smart working," perché “lavoro da casa” in Italia, per molti, proprio non va giù. Sarà cultura, sarà mentalità, sarà la scarsa alfabetizzazione digitale, sta di fatto che è ancora guardato con sospetto da molti datori di lavoro, e con ammirazione e un pizzico di divertimento—quasi ironico (“ah ah ah, guardami lavoro dal divano!

Al lupo, al lupo! Tutti gli smartphone (non) sono sotto attacco!

È arrivato il momento di fare chiarezza sulle tante notizie che da circa un mese stiamo leggendo in materia di cellulari vulnerabili, sotto attacco, con buchi irreparabili, e chi più ne ha più ne metta.

Da uno smart (Un)lock aperto in pochi secondi all'importanza della visione d'insieme

Un ricercatore ha forzato l’ennesimo smart lock in pochi secondi. Non mi sorprende affatto, ma mi permette di fare una breve riflessione. Non l’ha pagato tanto, ma neanche poco, quindi si aspettava una certa difficoltà.

Conferenze: dalle vulnerabilita nei protocolli di comunicazione via radio ai video pericolosi su YouTube

Sabato mattina al Centro Congressi di Bergamo, durante la conferenza NoHat, terrò una lezione tecnica—ma davvero accessibile a tutti—su come analizzare sistemi di comunicazione via radio, pre-requisito fondamentale per poi farne un’analisi di sicurezza.

Recent & Upcoming Talks

Guarding the Factory Floor: Catching Insecure Industrial Robot Programs

What if a perfectly patched industrial manufacturing machine can still harbor for vulnerabilities where no one is looking? What if the …

OTRazor: Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts

In this talk, we delve into industrial robot programming, focusing on the security issues arising from the design and implementation …

Hey Operator, Where’s Your Crane? Attacking Industrial Remote Controllers

Radio-frequency (RF) remote controllers are widely used in multiple industrial applications like manufacturing, construction and …

RFQuack: The RF-Analysis Tool That Quacks

RFQuack is the versatile RF-analysis tool that quacks! It’s a library firmware that allows you to sniff, manipulate, and transmit …

Machine-to-Machine Protocol Security: The Case of MQTT and CoAP

MQTT and CoAP provide data connectivity for practically any kind of “machines”. This talk will cover the results of our …

Recent Publications

Detecting Unsafe Code Patterns in Industrial Robot Programs

To appear

Rogue Automation: Vulnerable and Malicious Code in Industrial Programming

In this research paper, we reveal previously unknown design flaws that malicious actors could exploit to hide malicious functionalities …

Attacks on Smart Manufactururing Systems: A Forward-looking Security Analysis

This research presents a systematic security analysis that we performed to explore a variety of attack vectors on a real smart …

Caught in the Act: Running a Realistic Factory Honeypot to Capture Real Threats

Different critical infrastructures have been hit with attacks such as those that involved the infamous Stuxnet malware1 and the more …

A Security Evaluation of Industrial Radio Remote Controllers

Heavy industrial machinery is a primary asset for the operation of key sectors such as construction, manufacturing, and logistics. …

Experience

Also check the CV section and my LinkedIn profile.

 
 
 
 
 

Senior Researcher

Trend Micro, Inc.

Jul 2016 – Present Anywhere on Earth
R&D in the cyber-security area.
 
 
 
 
 

Adjunct (a.k.a. Contract) Professor

Politecnico di Milano

Jun 2016 – Jun 2017 Milano, Italy
Teaching (Computer Security).
 
 
 
 
 

Visiting Professor

UC Santa Barbara

Oct 2015 – Feb 2016 California, United States
Scientific research in the cyber-security area.
 
 
 
 
 

Assistant Professor

Politecnico di Milano

Jan 2014 – Jun 2016 Milano, Italy
Scientific research in the cyber-security area, teaching (Computer Security), research management.
 
 
 
 
 

Post-doctoral Researcher

Politecnico di Milano

Jan 2010 – Dec 2014 Milano, Italy
Scientific research in the cyber-security area, teaching (Computer Security, Computer Forensics, Programming).
 
 
 
 
 

Visiting Research Scholar

UC Santa Barbara

Sep 2008 – Jun 2009 California, United States
Scientific research in the cyber-security area.
 
 
 
 
 

Junior Penetration-testing Consultant

SecureNetwork s.r.l.

Jan 2005 – Dec 2016 Northern Italy
R&D, teaching (Information Security, Malware Analysis), web penetration testing, and vulnerability assessment.
 
 
 
 
 

IT Consultant

B.M.S. s.r.l.

Jan 2002 – Dec 2006 Northern Italy
IT and network engineering, deployment, and administration.
 
 
 
 
 

IT Consultant

Freelance

Jan 2000 – Jun 2016 Northern Italy

Contacts

The best way to contact me is via e-mail. Guess what the address might be? I usually answer within 1 day. If that doesn’t happen, feel free to ping me via instant messaging, Slack or IRC (mainly on Freenode), where I go by “phretor”.

If you need to communicate with my privately, use my GPG public key. Its fingerprint is C42B 0CC7 6191 5B69 2C68 E88F 9693 4CDE C0BB EBCF. If you prefer modern alternatives, yes, I use Signal (and you should, too), and Twitter.

Postal Office Address

Trend Micro Italy s.r.l. c/o Federico Maggi
Viale T. Edison 110
20099 Sesto San Giovanni
Milano, Italy