Federico Maggi

You can download the database of my talks as a BibTeX file, or clone the repository containing the PDFs of the slide decks as well.

Talks

Download talks.bib

Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking
Mavroudis, Vasilios and Hao, Shuang and Fratantonio, Yanick and Maggi, Federico and Vigna, Giovanni and Kruegel, Christopher. Blackhat Europe (Peer-reviewed Talk), London, UK. (November 3, 2016) - Link: https://www.blackhat.com/eu-16/briefings.html [PDF]

Pocket-sized Badness: Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game
Federico Maggi and Stefano Zanero. Blackhat Europe (Peer-reviewed Talk), London, UK. (November 3, 2016) - Link: https://www.blackhat.com/eu-16/briefings.html [PDF]

Fast and Transparent Online Banking Fraud Detection and Investigation
Federico Maggi. Hek.si (Invited Talk), Ljubljana, Slovenia. (April 15, 2016) [PDF]

Malware on Mobile: The What, The Why, and The How
Federico Maggi and Yanick Fratantonio. Science and Engineering Council of Santa Barbara (Invited Talk), Santa Barbara, CA. (November 11, 2015) [PDF]

A Walk Through the Construction of the First Mobile Malware Tracker
Federico Maggi. Android Security Symposium (Invited Talk), Vienna, Austria. (September 11, 2015) - Link: https://usmile.at/symposium/program [PDF]

Mobile Ransomware
Federico Maggi. 6th National Conference on Cyber Warfare (Invited Talk), Milano, Italy. (June 3, 2015) - Link: http://www.infowar.it/ [PDF]

From Cybercrime to Threat Analysis
Federico Maggi. (April 20, 2015) [PDF]

From Cybercrime to Threat Analysis
Federico Maggi. Catedra Europa (Invited Talk),. (March 18, 2015) - Link: http://www.uninorte.edu.co/web/catedra-europa [PDF]

Current and Future Cybercrime Tactics
Federico Maggi. 5th National Conference on Cyber Warfare (Invited Talk), Milano, Italy. (October 13, 2014) - Link: http://www.infowar.it/past/2014_october/index.php [PDF]

Come to the Dark Side: We Have Apps!
Federico Maggi. HackInBo (Invited Talk), Bologna, Italy. (October 11, 2014) - Link: http://www.hackinbo.it/ [PDF]

Static Analysis of Android Applications
Federico Maggi. 2nd SysSec Summer School (Invited Lecture), Amsterdam, The Netherlands. (September 25, 2014) - Link: http://www.syssec-project.eu/events/summer-school-2014/program/ [PDF]

Virtualization
Federico Maggi. 5th Int. Summer School on Information Security and Protection (Invited Lecture), Verona, Italy. (July 27, 2014) - Link: http://issisp2014.di.univr.it/ [PDF]

Tracking and Characterizing Botnets Using Automatically Generated Domains
Federico Maggi. Honeynet Workshop (Invited Talk), Warsaw, Poland. (May 14, 2014) [PDF]

Phoenix & Cerberus: Botnet Tracking via Precise DGA Characterization
Federico Maggi. Google Tech Talk (Invited Talk), Google, Mountain View, CA, USA. (May 2014) [PDF]

Malicious Android Apps: Overview, Status and Dilemmas
Federico Maggi. (January 3, 2014) - Link: http://s.maggi.cc/android-malware-2013 [PDF]

Modern Botnets and the Rise of Automatically Generated Domains
Federico Maggi. InfoSek (Invited Talk), Nova Gorica, Slovenia. (November 20, 2013) [PDF]

AndroTotal: A Scalable Framework for Android Antivirus Testing
Federico Maggi. InfoSek (Invited Talk), Nova Gorica, Slovenia. (November 20, 2013) [PDF]

AndroTotal: A Scalable Framework for Android Antimalware Testing
Federico Maggi. Secure (Invited Talk), Warsaw, Poland. (October 9, 2013) [PDF]

AndroTotal: A Scalable Framework for Android Antimalware Testing
Federico Maggi. MIT CSAIL-POLIMI Workshop (Invited Talk), MIT, Boston, Massachussets, USA. (May 2013) [PDF]

Our Face Are Belong to Us: Breaking Facebook’s Social Authentication
Federico Maggi. Hek.si (Invited Talk), Ljubljana, Slovenia. (April 2013) [PDF]

The Long Story of Short URLs
Federico Maggi. ISG Research Seminars (Invited Talk), Royal Holloway University of London. (May 1, 2012) [PDF]

iSnoop: How to Steal Secrets from Touchscreen Devices
Federico Maggi, Alberto Volpatto, and Stefano Zanero. Black Hat Abu Dhabi (Peer-reviewed Talk), Abu Dhabi. (December 2011) - Link: https://www.blackhat.com/html/bh-ad-11/bh-ad-11-archives.html [PDF]

Detecting Anomalous Behaviors in Computer Infrastructures
Federico Maggi. (February 25, 2010) [PDF]

Just-in-Time Training of Anomaly Detectors
Federico Maggi. Computer Systems Seminar (Invited Talk), Vrije Universiteit, Amsterdam. (January 21, 2010) [PDF]