About Me

Cybersecurity keeps giving me the best excuses to find exciting problems to solve. Or, as my wife once said, to “push buttons on my computer”.

Boring Stuff First

Very likely, you came here because you need to quickly copy and paste my short bio, or grab a head shot to post on a conference website. So, here you go!

Short Bio (170 words)

With more than a decade of research experience in the cybersecurity field, Federico Maggi is specialized in doing threat and security analysis on virtually any system. Federico has analyzed web applications, network protocols and devices, embedded systems, radio-frequency control systems, industrial robots, cars, and mobile devices.

Federico has experience on defensive technology and research, through building machine learning-based tools for intrusion and fraud detection. He’s applied data visualization techniques for analyzing botnets, and has gained basic malware analysis and reverse-engineering on Android-based platforms.

Currently employed as a Senior Researcher with security giant Trend Micro (https://trendmicro.com), Federico was an Assistant Professor at Politecnico di Milano, one of the leading engineering technical universities in Italy. Aside his teaching activities, Federico co-directed the security group and has managed hundreds of graduate students.

Federico has given several lectures and talks as an invited speaker at international venues and research schools, and also serves in the review or organizing committees of well-known conferences.

More info about Federico and his work are available online at https://maggi.cc

One-liner Bio (27 words)

Federico Maggi, PhD, is a Senior Researcher with Trend Micro and has been working in cybersecurity for more than a decade with the public and private sector.

Head shots

If you need a head shot, please use one of the following: high resolution, low resolution.

Research Activities

The mission of the team I work with is to scout the future of emerging (or legacy and widely adopted) technologies. This is easier said than done! Of course we don’t have a crystal ball. What we do is we look at a technology from a threat-actor perspective, and make an effort to “see” how things can go bad if a threat actually arise.

This gives us good insights on how to anticipate and prevent emerging security risks and threats. And of course this gives my employer a driver for innovation, to push new updates into existing products, or create new products. Because of this, Trend Micro’s customers will benefit from our research.

This is what I do most of the the time, together with my colleagues in Trend Micro Research. In addition to technology research, we constantly collaborate with law-enforcement agencies in cybercrime investigations.

Research Topics I Love

I have been in the computer security “circus” since 2005.

Although I enjoy doing research in really any area, looking back at my past work, it seems that my main interests revolve around various topics under the “cyber security” and “cyber crime” umbrella terms, such as threat analysis and intelligence, malware analysis, mobile security, fraud analysis and detection, web- and social-network security and data visualization.

If I have to find a distinctive aspect of my work, I like to follow data-driven or learning-based approaches. Indeed, I enjoy doing large-scale measurements.

An Academic Moved to the Industry World

Before joining Trend Micro, until Summer 2016 I was an Assistant Professor at Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB), Politecnico di Milano in Italy, where I co-directed the system-security group at the NECST Laboratory, and led several projects with my colleague and advisor Stefano Zanero.

During my PhD, I made some contributions in the field of anomaly detection and I was using machine learning way before it became mainstream. I developed and tested various anomaly-based tools, for example to detect attacks against web applications or unexpected activities in the kernel (sing of malware infections or compromised processes).

Speaking: The Cherry on The Cake

Let’s be honest: when the hard research work is over, isn’t it just great to get on stage and share the results with the world?

I have given several lectures and talks, mainly peer-reviewed talks, but also as an invited speaker at international venues and research schools.

I’m far from being a professional speaker, but people say I’m quite good at it. Have a look at some of my public speeches to get a sense of my speaking style. I used to hate and be afraid of speaking in public, and I still remember the tension and anxiety I experienced before every single talk. I don’t know exactly when and why, but something happened at some point, and everything turned upside down. Now I try to find every possible excuse to get on stage, because I find it an extremely satisfying and entertaining activity–for myself, at least, and hopefully for the audience as well!

Hacking and Playing Around With Stuff

I’m not a bug hunter, but I do occasionally find and report vulnerabilities as part of my job.

As my work is not focused on a particular product or vertical, I’ve never really grown a technology-specific skillset when it comes to hacking and bug hunting. Rather, I adapt and I’m eager to learn what’s needed for the next challenge. I’ve looked at web applications, desktop and mobile apps, middleware protocols, embedded protocols, and even radio frequency. So, a little bit of everything. As I mentioned at the beginning of this page, cybersecurity is the only field that managed to keep me busy with new problems.

When time permits, I occasionally play CTFs or prepare challenges. Honestly, I haven’t been playing for a looong long time: I think 2004 or something, when we (early memebers of the Tower of Hanoi) played one of the very first editions of the UCSB iCTF. Thanks to @lucacarettoni for sharing this great memory about that game. Yes, that’s the printout of the scoreboard. Amazing times!

With the same team, in 2015 I have led the organization of the PoliCTF contest. Was quite a lot of fun! I’m currently organizing the Capture the Signal (CTS), a contest focused exclusively on RF-hacking.

When time permits, I like to pretend I’m an amateur electronic enthusiast, doing stuff like DYI automation, RF nodes, and stuff like that.

Reviewing Others’ Work

I’m regularly invited to serve in the review board, organizing or technical program committee of conferences. To name a few, I have been the general chair of [DIMVA 2015], PC chair of EUC 2014 and PC member of several conferences and workshops including ACSAC, AsiaCCS, DIMVA, SecureComm.