TORSEC - Security Group
The group performs research in the fields of computer and network security. It is established within the Dipartimento di Automatica e Informatica of the Politecnico di Torino. The group's activity is mainly concerned with - but not restricted to - the following topics:
- Computer security (trusted and trustworthy computing, platform and data privacy)
- Electronic identity, user authentication/authorization and identity management
- Design and optimization of network shields (by means of firewalls and secure channels, such as VPN or TLS/SSL)
- Electronic commerce (Internet and mobile payment systems)
- System security (risk analysis, security planning and audit, intrusion detection and tracing, forensics analysis)
Projects and publications
-
Selected funded research projects
-
INTELLIGENT TRUST AND SECURITY ORCHESTRATION FOR 6G DISTRIBUTED CLOUD ENVIRONMENTS
LIOY ANTONIO
2024 - 2026 (Current) -
QUANTUM-ORIENTED UPDATE TO BROWSERS AND INFRASTRUCTURES FOR THE PQ TRANSITION
LIOY ANTONIO
2023 - 2026 (Current) -
SECURITY AND RIGHTS IN THE CYBERSPACE (SERICS) – SPOKE 8
LIOY ANTONIO
2023 - 2025 (Current) -
SUPERVISIONE ALLE ATTIVITÀ DI RICERCA PER LA PROGETTAZIONE E REALIZZAZIONE DI STRUMENTI PER LA VERIFICA AUTOMATICA DI RESILIENZA AGLI ATTACCHI CYBER IN AMBITO AUTOMOTIVE
BASILE CATALDO
2024 - 2024 (Current) -
A COORDINATED FRAMEWORK FOR CYBER RESILIENT SUPPLY CHAIN SYSTEMS OVER COMPLEX ICT INFRASTRUCTURES
LIOY ANTONIO
2020 - 2023 (Current) -
SUPERVISIONE ALLE ATTIVITÀ DI RICERCA PER LA PROGETTAZIONE E REALIZZAZIONE DI STRUMENTI PER IL SELF-ASSESSMENT DI COMPLIANCE CON STANDARD AVANZATI PER LA CYBERSECURITY DI SISTEMI AUTOMOTIVE (ISO-21434 E UN-ECE WP29)
BASILE CATALDO
2021 - (Current) -
TETRACO - TECNOLOGIE PER TRADING E CONSUMO DI CONTENUTI
LIOY ANTONIO
2009 - (Current) -
VALUTAZIONE DEL SISTEMA DI BIGLIETTERA OVERTICKET
LIOY ANTONIO
2024 - 2024 (Completed) -
VALUTAZIONE DEL SOFTWARE JSTAR PER PATENT BOX
BASILE CATALDO
2024 - 2024 (Completed) -
VALUTAZIONE DEL SISTEMA DI BIGLIETTERIA RANATICK 1.0
LIOY ANTONIO
2024 - 2024 (Completed) -
SUPERVISIONE ALLE ATTIVITÀ DI RICERCA PER LA PROGETTAZIONE E REALIZZAZIONE DI STRUMENTI PER LA VERIFICA AUTOMATICA DI RESILIENZA AGLI ATTACCHI CYBER IN AMBITO AUTOMOTIVE
BASILE CATALDO
2023 - 2024 (Completed) -
SPIRS - SECURE PLATFORM FOR ICT SYSTEMS ROOTED AT THE SILICON MANUFACTURING PROCESS
LIOY ANTONIO
2021 - 2024 (Completed) -
GESTIONE, VALUTAZIONE E PREVISIONE DEI RISCHI AZIENDALI LEGATI ALLA CYBERSECURITY
BASILE CATALDO
2022 - 2023 (Completed) -
VALUTAZIONE DEL SISTEMA DI BIGLIETTERIA ‘EILO’ AL FINE DI OTTENERNE LA CERTIFICAZIONE AI SENSI DELLA NORMATIVA VIGENTE
LIOY ANTONIO
2022 - 2023 (Completed) -
PRACTICAL AUTONOMOUS CYBERHEALTH FOR RESILIENT SMES & MICROENTERPRISES
LIOY ANTONIO
2020 - 2023 (Completed) -
VALUTAZIONE DEL SISTEMA DI BIGLIETTERIA PERSEO DI PGMR ITALIA SRL AL FINE DI OTTENERNE LA CERTIFICAZIONE AI SENSI DELLA NORMATIVA VIGENTE
LIOY ANTONIO
2022 - 2022 (Completed) -
CYBER SECURITY NETWORK OF COMPETENCE CENTRES FOR EUROPE
LIOY ANTONIO, MANTELERO ALESSANDRO
2019 - 2022 (Completed) -
ANALISI SULL’ADEGUATEZZA DELLA SICUREZZA INFORMATICA DELL’ARCHITETTURA CED DELL’ATC
LIOY ANTONIO
2021 - 2021 (Completed) -
MODELLI E METODI PER LA VALUTAZIONE DELLA RESILIENZA AD ATTACCHI CYBER DEI DISPOSITIVI AUTOMOTIVE CONNESSI
BASILE CATALDO, LIOY ANTONIO
2020 - 2021 (Completed) -
ALGORITMI PER L’ANALISI DI PATTERN RICORRENTI E PER LA PREVISIONE DI ATTACCHI CIBERNETICI
LIOY ANTONIO
2020 - 2021 (Completed) -
HIERARCHICAL OPEN MANUFACTURING EUROPE
CHIABERT PAOLO, LIOY ANTONIO
2018 - 2021 (Completed) -
CERTIFICAZIONE DEL SISTEMA DI BIGLIETTERIA MIMS AI SENSI DELLA NORMATIVA VIGENTE
LIOY ANTONIO
2020 - 2020 (Completed) -
VERIFICAZIONE TECNICA PROPOSTA DALLA SOCIETÀ MODIMAR S.R.L. CONTRO IL COMUNE DI SCILLA, NEI CONFRONTI DELLA SOCIETÀ DINAMICA S.R.L., PER L’ANNULLAMENTO, PREVIA SOSPENSIONE DELL’EFFICACIA, DEL PROVVEDIMENTO CON CUI È STATA COMUNICATA LA NON AMMISSIONE DEL COSTITUENDO RAGGRUPPAMENTO TEMPORANEO DI PROFESSIONISTI, COMPOSTO ANCHE DALLA SOCIETÀ MODIMAR S.R.L., IN RELAZIONE ALLA PROCEDURA APERTA TELEMATICA PER L’AFFIDAMENTO DEL SERVIZIO DI PROGETTAZIONE DEFINITIVA ED ESECUTIVA, COORDINAMENTO DELLA SICUREZZA IN FASE DI PROGETTAZIONE, DIREZIONE LAVORI E COORDINAMENTO DELLA SICUREZZA IN FASE DI ESECUZIONE, PER I LAVORI DI “AMMODERNAMENTO DEL PORTO DI SCILLA E DELLE INFRASTRUTTURE DI COLLEGAMENTO”.
LIOY ANTONIO
2020 - 2020 (Completed) -
DIGITAL TRANSFORMATION - IOT E BLOCKCHAIN
LIOY ANTONIO
2020 - 2020 (Completed) -
DEEP-AUGUR 2
LIOY ANTONIO
2019 - 2019 (Completed) -
EID FOR UNIVERSITY
LIOY ANTONIO
2018 - 2019 (Completed) -
PROGETTAZIONE DI UN SISTEMA INFORMATIZZATO PER LA GESTIONE INTEGRATA DELLA PRODUZIONE DALLA PRESA IN CARICO DELLE MATERIE PRIME ALLA TRACCIABILITÀ DEL PRODOTTO FINITO CON FUNZIONALITÀ DI SUPPORTO ALLE DECISIONI E PROTEZIONE DEI DATI RACCOLTI ED ANALIZZATI
LIOY ANTONIO
2018 - 2019 (Completed) -
DEVELOPMENT OF AN EIDAS-OPENNCP CONNECTOR FOR CROSS BORDER EHEALTH
LIOY ANTONIO
2018 - 2019 (Completed) -
FICEP – FIRST ITALIAN CROSSBOARD EIDAS PROXY
LIOY ANTONIO
2016 - 2019 (Completed) -
SECURING AGAINST INTRUDERS AND OTHER THREATS THROUGH A NFV-ENABLED ENVIRONMEN
LIOY ANTONIO
2016 - 2019 (Completed) -
FIRST ITALIAN CROSSBORDER EIDAS PROXY
LIOY ANTONIO
2016 - 2019 (Completed) -
CERTIFICAZIONE AI SENSI DELLA NORMATIVA VIGENTE DEL SISTEMA AUTENTIQUBO 3.0
LIOY ANTONIO
2018 - 2018 (Completed) -
DEEP-AUGUR
LIOY ANTONIO
2018 - 2018 (Completed) -
ARCHITETTURE DEI SERVER E DELLO STORAGE (SOFTWARE DEFINED DATA CENTER); ARCHITETTURE DI RETE (SOFTWARE DEFINED NETWORKS); INFRASTRUTTURE CONVERGENTI; TECNOLOGIE DI VIRTUALIZZAZIONE E CONTAINER PER I SISTEMI OPERATIVI (MICROSOFT, LINUX, SOLARIS); TECNOLOGIA DEI MICROSERVIZI; CLOUD COMPUTING PER I SERVIZI INTERNI (OPENSTACK)”.
LIOY ANTONIO
2017 - 2018 (Completed) -
CERTIFICAZIONE FIRMWARE DI MISURATORI FISCALI OLIVETTI DAL PUNTO DI VISTA DELLA CONFORMITÀ ALLE NORMATIVE MINISTERIALI VIGENTI IN MATERIA DI SICUREZZA FISCALE
LIOY ANTONIO
2017 - 2017 (Completed) -
ASPIRE -ADVANCED SOFTWARE PROTECTION: INTEGRATION, RESEARCH AND EXPLOITATION
LIOY ANTONIO
2013 - 2016 (Completed) -
TENACE - PROTEZIONE DELLE INFRASTRUTTURE CRITICHE NAZIONALI DA MINACCE CIBERNETICHE
LIOY ANTONIO
2013 - 2016 (Completed) -
FIDES - HIGH IMPACT INITIATIVE
LIOY ANTONIO
2015 - 2015 (Completed) -
SECURED -SECURITY AT THE NETWORK EDGE
LIOY ANTONIO
2013 - 2015 (Completed) -
STORK2 - SECURE IDENTITY ACROSS BORDERS LINKED
LIOY ANTONIO
2012 - 2015 (Completed) -
CLIPS-CLOUD APPROACH FOR INNOVATION IN PUBLIC SERVICE
LIOY ANTONIO, PAOLUCCI EMILIO
2014 - 2014 (Completed) -
EIT ICT LABS PGA 2014
LIOY ANTONIO, LOMBARDI PATRIZIA
2014 - 2014 (Completed) -
VALUTAZIONE DELL'ARCHITETTURA DI SICUREZZA DEL SISTEMA SCOONTRI-NO
LIOY ANTONIO
2013 - 2014 (Completed) -
CERTIFICAZIONE DEL SISTEMA DI BIGLIETTERIA ELETTRONICO 18 TICKETS
LIOY ANTONIO
2013 - 2013 (Completed) -
ANALISI DELLA SICUREZZA DEL CHIP E DEL PIN NELLE CARTE DI PAGAMENTO BANCOMAT E PAGO BANCOMAT
LIOY ANTONIO
2012 - 2013 (Completed) -
WEBINOS-SECURE WEBOS APPLICATION DELIVERY ENVIRONMENT
LIOY ANTONIO
2010 - 2013 (Completed) -
TCLOUDS- TRUSTWORTHY CLOUDS - PRIVACY AND RESILIENCE FOT INTERNET-SCALE CRITICAL INFRASTRUCTURE
LIOY ANTONIO
2010 - 2013 (Completed) -
POSECCO-POLICY AND SECURITY CONFIGURATION MANAGEMENT
LIOY ANTONIO
2010 - 2013 (Completed) -
CERTIFICAZIONE (VARIANTE) AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA ACCESSI STADI DI SKIDATA...
LIOY ANTONIO
2012 - 2012 (Completed) -
PERIZIA STRAGIUDIZIALE DI CONGRUITÀ COSTI E FUNZIONALITÀ DEL PROGETTO MOGHI
LIOY ANTONIO
2012 - 2012 (Completed) -
ANALISI DELLA SICUREZZA DEL PIN NELLE CARTE DI PAGAMENTO ELETTRONICHE
LIOY ANTONIO
2011 - 2012 (Completed) -
CERTIFICAZIONE (INTEGRAZIONE) AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA ACCESSI STADI DI SKIDATA
LIOY ANTONIO
2011 - 2011 (Completed) -
CERTIFICAZIONE (VARIANTE AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA ACCESSI STADI ....
LIOY ANTONIO
2011 - 2011 (Completed) -
CERTIFICAZIONE AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA DI BIGLIETTERIA AUTOMATIZZATA WINTIC -JDK VE.2.0
LIOY ANTONIO
2010 - 2010 (Completed) -
CERTIFICAZIONE AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA ACCESSI STADI DI SKIDATA
LIOY ANTONIO
2009 - 2009 (Completed) -
DESEREC - DEPENDABLE SECURITY BY ENHANCED RECONFIGURABILITY
LIOY ANTONIO
2006 - 2009 (Completed) -
OPEN_TC - OPEN TRUSTED COMPUTING
LIOY ANTONIO
2005 - 2009 (Completed) -
STORK-SECURE IDENTITY ACROSS BORDERS LINKED
LIOY ANTONIO, OREGLIA MARCO
2008 - 2008 (Completed) -
ANTICIPANDO GALILEO: PRODOTTI E SERVIZI A SUPPORTO DELLA MOBILITÀ E DELLA SICUREZZA (GAL.PMI)
DALLA CHIARA BRUNO, DOVIS FABIO, LIOY ANTONIO, MALNATI GIOVANNI, MANZINO AMBROGIO
2006 - 2008 (Completed) -
OTTIMIZZAZIONE DI UNA PIATTAFORMA TELEMATICA ESSENZIALE ED APERTA A NUOVI SERVIZI APPLICATA ALLA GESTIONE TELEMATICA DEGLI ACCESSI E DELLA DOMANDA DI TRASPORTO INDIVIDUALE IN AMBITO URBANO - OPENGATE
LIOY ANTONIO, MORISIO MAURIZIO
2006 - 2008 (Completed) -
MESHADPTIVE HOME WIRELENESS NETS - MEADOW
AJMONE MARSAN MARCO GIUSEPPE, BALDI MARIO, LIOY ANTONIO, OLMO GABRIELLA
2005 - 2008 (Completed) -
POSITIF - POLICY-BASED SECURITY TOOLS AND FRAMEWORK
LIOY ANTONIO
2004 - 2007 (Completed) -
NASTEC-BUILDING TRUST IN NETWORKING IN NEWLY ASSOCIATED STATES THROUGH THE USE OF SECURE INFORMATION SOCIETY TECHNOLOGIES
LIOY ANTONIO
2001 - 2003 (Completed) -
SICUREZZA DEI SISTEMI DISTRIBUITI
LIOY ANTONIO
1998 - 2000 (Completed)
-
INTELLIGENT TRUST AND SECURITY ORCHESTRATION FOR 6G DISTRIBUTED CLOUD ENVIRONMENTS
-
Selected recent publications
2024
-
Shaping a Quantum-Resistant Future: Strategies for Post-Quantum PKI
Proceeding
D'Onghia, Grazia; Berbecaru, Diana Gratiela; Lioy, Antonio
In: 2024 IEEE Symposium on Computers and Communications (ISCC)
IEEE
ISCC-2024: IEEE Symposium on Computers and Communications (Paris (FRA)) June 26-29, 2024
pp.6 (pp.1-6) ISBN:9798350354232 DOI:10.1109/iscc61673.2024.10733624 -
Dynamic Security Provisioning for Cloud-Native Networks: An Intent-Based Approach
Proceeding
Settanni, Francesco; Zamponi, Alessandro; Basile, Cataldo
In: Proceedings of 2024 IEEE International Conference on Cyber Security and Resilience (CSR)
IEEE
2024 IEEE International Conference on Cyber Security and Resilience (CSR) (London (UK)) 02-04 September 2024
pp.8 (pp.321-328) ISBN:9798350375367 DOI:10.1109/csr61664.2024.10679397 -
Enhancing OT Threat Modelling: An Effective Rule-Based Approach for Attack Graph Generation
Proceeding
Sunder, Giulio; Colletto, ALBERTO SALVATORE; Raimondi, Sara; Basile, Cataldo; Viticchie', Alessio; Aliberti, Alessandro
In: 2024 4th Intelligent Cybersecurity Conference (ICSC)
IEEE
2024 4th Intelligent Cybersecurity Conference (ICSC) (Valencia (SP)) 17–20 September, 2024
pp.9 ISBN:9798350354775 -
Securing 5G: Trusted Execution Environments for Centrally Controlled IPsec Integrity
Proceeding
D'Onghia, Grazia; Ciravegna, Flavio; Bruno, Giacomo; Elorza Forcada, Mattin Antartiko; Pastor, Antonio; Lioy, Antonio
In: 2024 IFIP Networking Conference
IEEE
2024 IFIP Networking Conference (Thessaloniki (Greece)) June 3-6, 2024
pp.3 (pp.595-597) ISBN:9783903176638 DOI:10.23919/ifipnetworking62109.2024.10619852 -
A Threat Analysis of Cooperative Intelligent Transport Systems: C-Roads scenarios
Proceeding
Gatti, Gabriele; Civera, Marco; Basile, Cataldo; Masi, Massimiliano; La Manna, Michele
In: Proceedings of 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)
IEEE
2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC) (Osaka (JP)) 02-04 July 2024
pp.7 (pp.2399-2405) ISBN:9798350376975 DOI:10.1109/COMPSAC61105.2024.00385 -
On Detecting Anomalous TLS Connections with Artificial Intelligence Models
Proceeding
Berbecaru, Diana Gratiela; Giannuzzi, Stefano
In: 2024 IEEE Symposium on Computers and Communications (ISCC)
IEEE
ISCC-2024: IEEE Symposium on Computers and Communications (Paris (FRA)) 26-29 June 2024
pp.6 (pp.1-6) ISBN:9798350354232 DOI:10.1109/ISCC61673.2024.10733669 -
MATCH-IN: Mutual Attestation for Trusted Collaboration in Heterogeneous IoT Networks
Proceeding
Sisinni, Silvia; Berbecaru, Diana Gratiela; Donnini, Valerio; Lioy, Antonio
In: 2024 IEEE Symposium on Computers and Communications (ISCC)
IEEE
ISCC-2024: IEEE Symposium on Computers and Communications (Paris (FRA)) 26 - 29 June 2024
pp.6 (pp.1-6) ISBN:9798350354232 DOI:10.1109/ISCC61673.2024.10733616 -
On the Evaluation of X.509 Certificate Processing in Transport Layer Security Interceptors
Proceeding
Berbecaru, Diana Gratiela; Sisinni, Silvia; Simone, Matteo
In: ISCC-2024: IEEE Symposium on Computers and Communications
IEEE
2024 IEEE Symposium on Computers and Communications (ISCC) (Paris (FRA)) 26 - 29 June 2024
pp.6 (pp.1-6) DOI:10.1109/ISCC61673.2024.10733685 -
Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections
Proceeding
Berbecaru, Diana Gratiela; Lioy, Antonio
In: ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security
Association for Computing Machinery
19th International Conference on Availability, Reliability and Security (ARES 2024) (Vienna (AT)) 30 July - 02 August 2024
pp.9 (pp.1-9) ISBN:9798400717185 DOI:10.1145/3664476.3670945 -
IKE-less IPsec for Centralized Management of Network Security
Proceeding
Ciravegna, Flavio; Bruno, Giacomo; Lioy, Antonio
CEUR WORKSHOP PROCEEDINGS
In: ITASEC-2024: The Italian Conference on CyberSecurity
CEUR Workshop Proceedings
ITASEC-2024: The Italian Conference on CyberSecurity (Salerno (Italy)) April 8-12, 2024
Vol.3731 pp.13 (pp.1-13) ISSN:1613-0073 -
Standard-Based Remote Attestation: The Veraison Project
Proceeding
Ferro, Lorenzo; Lioy, Antonio
CEUR WORKSHOP PROCEEDINGS
In: Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024)
CEUR-WS
ITASEC-2024: The Italian Conference on CyberSecurity (Salerno (Italy)) April 8-12, 2024
Vol.3731 pp.13 (pp.1-13) ISSN:1613-0073 -
SAFEHIVE: Secure Attestation Framework for Embedded and Heterogeneous IoT Devices in Variable Environments
Proceeding
Ferro, Lorenzo; Bravi, Enrico; Sisinni, Silvia; Lioy, Antonio
In: SaT-CPS '24: Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
ACM
SaT-CPS '24: 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (Porto (Portugal)) 21 June 2024
pp.10 (pp.41-50) ISBN:9798400705557 DOI:10.1145/3643650.3658609 -
Detecting Cryptomining Traffic in IoT Networks
Proceeding
Mannella, Luca; Canavese, Daniele; Regano, Leonardo
In: Proceedings of the 9th International Conference on Smart and Sustainable Technologies – SpliTech 2024
Institute of Electrical and Electronics Engineers (IEEE)
9th International Conference on Smart and Sustainable Technologies (SpliTech 2024) (Split/Bol (HR)) June 25-28, 2024
pp.6 ISBN:9789532901351 DOI:10.23919/SpliTech61897.2024.10612663 -
A Privacy-Preserving Approach for Vulnerability Scanning Detection
Proceeding
Regano, Leonardo; Canavese, Daniele; Mannella, Luca
CEUR WORKSHOP PROCEEDINGS
In: Proceedings of the Italian Conference on Cybersecurity (ITASEC 2024)
CEUR-WS (GERMANIA)
ITASEC 2024: The Italian Conference on CyberSecurity (Salerno (IT)) April 08–12, 2024
Vol.3731 pp.13 (pp.1-13) ISSN:1613-0073 -
Fighting TLS Attacks: an Autoencoder-based Model for Heartbleed Attack Detection
Proceeding
Berbecaru, Diana; Giannuzzi, Stefano
STUDIES IN COMPUTATIONAL INTELLIGENCE
In: Intelligent Distributed Computing XVI: 16th International Symposium on Intelligent Distributed Computing, IDC 2023
Springer
The 16th International Symposium on Intelligent Distributed Computing (Hamburg (DEU)) 13 - 15 September 2023
Vol.1138 pp.15 (pp.40-54) ISSN:1860-949X ISBN:9783031600227 DOI:10.1007/978-3-031-60023-4_9 -
Integrity Management in Softwarized Networks
Proceeding
Bravi, Enrico; Lioy, Antonio; Berbecaru, DIANA GRATIELA
In: NOMS 2024-2024 IEEE Network Operations and Management Symposiumm
IEEE
IEEE/IFIP Network Operations and Management Symposium (Seoul (South Korea)) June 6-10, 2024
pp.7 ISBN:9798350327939 DOI:10.1109/NOMS59830.2024.10574994 -
Security at the Edge for Resource-Limited IoT Devices
Article
Canavese, Daniele; Mannella, Luca; Regano, Leonardo; Basile, Cataldo
SENSORS
Multidisciplinary Digital Publishing Institute (MDPI)
Vol.24 pp.16 (pp.1-16) ISSN:1424-8220 DOI:10.3390/s24020590 -
A novel architecture to virtualise a hardware-bound trusted platform module
Article
DE BENEDICTIS, Marco; Jacquin, Ludovic; Pedone, Ignazio; Atzeni, Andrea; Lioy, Antonio
FUTURE GENERATION COMPUTER SYSTEMS
Elsevier
Vol.150 pp.16 (pp.21-36) ISSN:0167-739X DOI:10.1016/j.future.2023.08.012
-
A Model for Automated Cybersecurity Threat Remediation and Sharing
Proceeding
Settanni, F; Regano, L; Basile, C; Lioy, A
In: NetSoft-2023 - 9th IEEE International Conference on Network Softwarization
IEEE
2023 IEEE 9th International Conference on Network Softwarization (NetSoft) (Madrid (Spain)) June 19-23, 2023
pp.6 (pp.492-497) ISBN:9798350399806 DOI:10.1109/NetSoft57336.2023.10175486 -
A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures
Proceeding
Bravi, Enrico; Berbecaru, Diana; Lioy, Antonio
In: 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
IEEE
IEEE CloudCom2023: 14th IEEE International Conference on Cloud Computing Technology and Science (Naples (ITA)) 4-6 December 2023
pp.8 (pp.91-98) ISBN:9798350339826 DOI:10.1109/CloudCom59040.2023.00027 -
Autoencoder-SAD: An Autoencoder-based Model for Security Attacks Detection
Proceeding
Berbecaru, Diana Gratiela; Giannuzzi, Stefano; Canavese, Daniele
In: 28th IEEE Symposium on Computers and Communications (IEEE ISCC 2023)
IEEE
28th IEEE Symposium on Computers and Communications (IEEE ISCC 2023) (Gammarth (TUN)) 9-12 July 2023
pp.6 (pp.758-763) ISBN:9798350300482 DOI:10.1109/ISCC58397.2023.10217930 -
Exploiting Emercoin Blockchain and Trusted Computing for IoT Scenarios: A Practical Approach
Proceeding
Berbecaru, Diana Gratiela; Pintaldi, Lorenzo
In: 28th IEEE Symposium on Computers and Communications (IEEE ISCC 2023)
IEEE
28th IEEE Symposium on Computers and Communications (IEEE ISCC 2023) (Gammarth (TUN)) 9-12 July 2023
pp.6 (pp.771-776) ISBN:9798350300482 DOI:10.1109/ISCC58397.2023.10217961 -
Exploiting the DICE specification to ensure strong identity and integrity of IoT devices
Proceeding
Bravi, Enrico; Sisinni, Silvia; Lioy, Antonio
In: SpliTech-2023: 8th International Conference on Smart and Sustainable Technologies
IEEE
SpliTech-2023: 8th International Conference on Smart and Sustainable Technologies (Split-Bol (Croatia)) 20-23 June 2023
pp.6 (pp.1-6) ISBN:9789532901283 DOI:10.23919/SpliTech58164.2023.10193517 -
An expert system for automatic cyber risk assessment and its AI-based improvements
Proceeding
Gatti, Gabriele; Basile, Cataldo; Perboli, Guido
In: Proceedings of 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)
IEEE
2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) (Turin (Italy)) 26-30 June 2023
pp.7 (pp.1434-1440) ISBN:9798350326970 DOI:10.1109/COMPSAC57700.2023.00220 -
An Evaluation of X.509 Certificate Revocation and Related Privacy Issues in the Web PKI Ecosystem
Article
Berbecaru, Diana Gratiela; Lioy, Antonio
IEEE ACCESS
IEEE
Vol.11 pp.20 (pp.79156-79175) ISSN:2169-3536 DOI:10.1109/ACCESS.2023.3299357 -
Computer-Aided Reverse Engineering of Protected Software
Proceeding
Canavese, Daniele; Regano, Leonardo; Lioy, Antonio
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE
In: Digital Sovereignty in Cyber Security: New Challenges in Future Vision
Springer
First International Workshop, CyberSec4Europe 2022 (Venice (IT)) April 17–21, 2022
Vol.1807 pp.13 (pp.3-15) ISSN:1865-0929 ISBN:9783031360954 DOI:10.1007/978-3-031-36096-1_1 -
Mitigating Software Integrity Attacks with Trusted Computing in a Time Distribution Network
Article
Berbecaru, DIANA GRATIELA; Sisinni, Silvia; Lioy, Antonio; Rat, Benoit; Margaria, Davide; Vesco, ANDREA GUIDO ANTONIO
IEEE ACCESS
IEEE
Vol.11 pp.18 (pp.50510-50527) ISSN:2169-3536 DOI:10.1109/ACCESS.2023.3276476 -
TLS-Monitor: A Monitor for TLS Attacks
Proceeding
Berbecaru, Diana Gratiela; Petraglia, Giuseppe
In: 2023 IEEE Consumer Communications & Networking Conference (2023)
Institute of Electrical and Electronics Engineers Inc
2023 IEEE Consumer Communications & Networking Conference (2023) (Las Vegas (USA)) 8 - 11 January 2023
pp.6 (pp.1-6) ISBN:9781665497343 DOI:10.1109/CCNC51644.2023.10059989
-
Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030
Article
Contreras, Luis M.; Serrano, Javier; Mamatas, Lefteris; Bernini, Giacomo; Monti, Paolo; Antunes, Mario; Atmojo, Udayanto; Tocker, Eli; Val, Iñaki; Sgambelluri, Andrea; Härri, Jérôme; Lioy, Antonio; Martinez-Julia, Pedro; González, José; Sánchez-Garrido, Jorge; Asaeda, Hitoshi
ITU JOURNAL
International Telecommunication Union
Vol.3 pp.17 (pp.693-709) ISSN:2616-8375 DOI:10.52953/SAMO3073 -
PALANTIR: Zero-trust architecture for Managed Security Service Provider
Proceeding
Compastié, Maxime; Sisinni, Silvia; Gurung, Supreshna; Fernández, Carolina; Jacquin, Ludovic; Mlakar, Izidor; Šafran, Valentino; Lioy, Antonio; Pedone, Ignazio
CEUR WORKSHOP PROCEEDINGS
In: C&ESAR’22: Computer & Electronics Security Application Rendezvous
CEUR Workshop Proceedings (CEUR-WS.org)
C&ESAR’22: Computer & Electronics Security Application Rendezvous (Rennes (France)) 15-16/11/2022
pp.16 (pp.83-98) ISSN:1613-0073 -
An Integrated Framework to Support Bachelor Design Students in 3-D Modeling
Article
Sanna, Andrea; Manuri, Federico; DE PACE, Francesco; Valpreda, Fabrizio; Fornaro, Claudio
IEEE TRANSACTIONS ON LEARNING TECHNOLOGIES
IEEE
Vol.15 pp.12 (pp.673-684) ISSN:1939-1382 DOI:10.1109/TLT.2022.3215208 -
PALANTIR demo: leveraging SecaaS model for managing threats in industrial environments
Proceeding
Fernández, Carolina; Sanvito, Davide; Kompougias, Orestis; ˇ Safran, Valentino; Compastié, Maxime; Pedone, Ignazio; López Martínez, Antonio; Gil Pérez, Manuel; Kourtis, Akis; Xylouris, George; Mlakar, Izidor; Tsarsitalidis, Stylianos; Klonidis, Dimitrios; Canavese, Daniele; Logothetis, Vangelis; Lopez, Diego; Pastor, Antonio; Lioy, Antonio; Jacquin, Ludovic; Gurung, Supreshna; Bifulco, Roberto; Priovolos, Athanasios; Balampanis, Ilias; Rokkas, Theodoros; Papadakis, Nikolaos; Paraschos, Dimitris; Jeran, Primoz; Athanasiou, George; Papadopoulos, Dimitris
In: MeditCom-2022 Proceedings
IEEE
2022 IEEE International Mediterranean Conference on Communications and Networking (Athens (Greece)) 05-08 September 2022
pp.4 (pp.82-85) DOI:10.1109/MeditCom55741.2022.9928648 -
Using MACsec to protect a Network Functions Virtualisation Infrastructure
Proceeding
Lioy, Antonio; Pedone, Ignazio; Sisinni, Silvia
In: ISCC-2022 Proceedings
IEEE
27th IEEE Symposium on Computers and Communications (Rhodes (Greece)) 30/6-3/7/2022
pp.3 (pp.1-3) DOI:10.1109/ISCC55528.2022.9912955 -
Counteracting software integrity attacks on IoT devices with remote attestation: a prototype
Proceeding
Berbecaru, DIANA GRATIELA; Sisinni, Silvia
... INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING.
In: 2022 26th International Conference on System Theory, Control and Computing, ICSTCC 2022 - Proceedings
IEEE
2022 26th International Conference on System Theory, Control and Computing (ICSTCC) (Sinaia (Romania)) 19 - 21 October, 2022
pp.6 (pp.380-385) ISSN:2372-1618 ISBN:9781665467469 DOI:10.1109/ICSTCC55426.2022.9931765 -
A model of capabilities of Network Security Functions
Proceeding
Basile, C.; Canavese, D.; Regano, L.; Pedone, I.; Lioy, A.
In: NetSoft-2022 Proceedings
IEEE
2022 IEEE 8th International Conference on Network Softwarization (Milano (Italy)) 27 June - 1 July 2022
pp.6 (pp.474-479) ISBN:9781665406949 DOI:10.1109/NetSoft54395.2022.9844057 -
Quantum Key Distribution in Kubernetes Clusters
Article
Pedone, Ignazio; Lioy, Antonio
FUTURE INTERNET
MDPI
Vol.14 pp.19 ISSN:1999-5903 DOI:10.3390/fi14060160 -
Integrity Verification of Distributed Nodes in Critical Infrastructures
Article
Sisinni, Silvia; Margaria, Davide; Pedone, Ignazio; Lioy, Antonio; Vesco, ANDREA GUIDO ANTONIO
SENSORS
MDPI
Vol.22 pp.23 ISSN:1424-8220 DOI:10.3390/s22186950 -
Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions
Proceeding
Berbecaru, Diana Gratiela; Lioy, Antonio
STUDIES IN COMPUTATIONAL INTELLIGENCE
In: Intelligent Distributed Computing XIV
Springer, Cham
2021 International Symposium on Intelligent and Distributed Computing (IDC 2021) 16 - 18 September 2021
Vol.1026 pp.11 (pp.203-213) ISSN:1860-949X ISBN:9783030966263 DOI:10.1007/978-3-030-96627-0_19 -
Data set and machine learning models for the classification of network traffic originators
Article
Canavese, D.; Regano, L.; Basile, C.; Ciravegna, G.; Lioy, A.
DATA IN BRIEF
Elsevier Inc.
Vol.41 pp.24 ISSN:2352-3409 DOI:10.1016/j.dib.2022.107968 -
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
Article
Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Ciravegna, Gabriele; Lioy, Antonio
COMPUTERS & ELECTRICAL ENGINEERING
Elsevier Ltd
Vol.97 pp.11 ISSN:0045-7906 DOI:10.1016/j.compeleceng.2021.107621 -
Toward Cybersecurity Personalization in Smart Homes
Article
Bringhenti, Daniele; Valenza, Fulvio; Basile, Cataldo
IEEE SECURITY & PRIVACY
IEEE
Vol.20 pp.9 (pp.45-53) ISSN:1540-7993 DOI:10.1109/MSEC.2021.3117471
-
Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises
Proceeding
Mantas, E.; Papadopoulos, D.; Fernandez, C.; Ortiz, N.; Compastie, M.; Martinez, A. L.; Perez, M. G.; Kourtis, A.; Xylouris, G.; Mlakar, I.; Tsarsitalidis, S.; Klonidis, D.; Pedone, I.; Canavese, D.; Perez, G. M.; Sanvito, D.; Logothetis, V.; Lopez, D.; Pastor, A.; Lioy, A.; Jacquin, L.; Bifulco, R.; Kapodistria, A.; Priovolos, A.; Gardikis, G.; Neokosmidis, I.; Rokkas, T.; Papadakis, N.; Paraschos, D.; Jeran, P.; Litke, A.; Athanasiou, G.
In: MeditCom-2021 Proceedings
IEEE
2021 IEEE International Mediterranean Conference on Communications and Networking (Athens (Greece)) 7-10 September 2021
pp.6 (pp.500-505) ISBN:9781665445054 DOI:10.1109/MeditCom49071.2021.9647609 -
Verification of X.509 Attribute Certificates for Attribute-based Authorization: A Practical Approach
Proceeding
Berbecaru, D.
In: 2021 25th International Conference on System Theory, Control and Computing, ICSTCC 2021 - Proceedings
Institute of Electrical and Electronics Engineers Inc.
25th International Conference on System Theory, Control and Computing, ICSTCC 2021 (Iași (Romania)) October 20 – 23, 2021
pp.6 (pp.346-351) ISBN:9781665414968 DOI:10.1109/ICSTCC52150.2021.9607273 -
On enabling additional natural person and domain-specific attributes in the eIDAS network
Article
Berbecaru, Diana Gratiela; Lioy, Antonio; Cameroni, Cesare
IEEE ACCESS
IEEE
Vol.9 pp.26 (pp.134096-134121) ISSN:2169-3536 DOI:10.1109/ACCESS.2021.3115853 -
Towards a complete software stack to integrate Quantum Key Distribution in a cloud environment
Article
Pedone, I.; Atzeni, A.; Canavese, D.; Lioy, A.
IEEE ACCESS
Institute of Electrical and Electronics Engineers
Vol.9 pp.22 (pp.115270-115291) ISSN:2169-3536 DOI:10.1109/ACCESS.2021.3102313 -
Cybersecurity in ICT supply chains: key challenges and a relevant architecture
Article
Masip-Bruin, X.; Marin-Tordera, E.; Ruiz, J.; Jukan, A.; Trakadas, P.; Cernivec, A.; Lioy, A.; Lopez, D.; Santos, H.; Gonos, A.; Silva, A.; Soriano, J.; Kalogiannis, G.
SENSORS
MDPI
Vol.21 pp.24 ISSN:1424-8220 DOI:10.3390/s21186057 -
Satellite-derived Time for Enhanced Telecom Networks Synchronization: the ROOT Project
Proceeding
Pini, Marco; Minetto, Alex; Vesco, Andrea; Berbecaru, DIANA GRATIELA; Miguel Contreras Murillo, Luis; Nemry, Pierre; De Francesca, Ivan; Rat, Benoit; Callewaert, Krel
In: Proceedings of 2021 IEEE 8th International Workshop on Metrology for AeroSpace (MetroAeroSpace)
Institute of Electrical and Electronics Engineers (IEEE) (STATI UNITI D'AMERICA)
2021 IEEE 8th International Workshop on Metrology for AeroSpace (MetroAeroSpace 2021) (Naples (Italy)) June 23 - 25, 2021
pp.6 (pp.288-293) ISBN:9781728175560 DOI:10.1109/MetroAeroSpace51421.2021.9511780
-
ATEMA: An attribute enablement module for attribute retrieval and transfer through the eIDAS Network
Proceeding
Berbecaru, Diana; Cameroni, Cesare
In: 2020 24th International Conference on System Theory, Control and Computing (ICSTCC)
Institute of Electrical and Electronics Engineers (IEEE) Computer Society
2020 24th International Conference on System Theory, Control and Computing (ICSTCC) (Sinaia, Romania) 8-10 October 2020
pp.8 (pp.532-539) ISBN:9781728198095 DOI:10.1109/ICSTCC50638.2020.9259642 -
Supporting authorize-then-authenticate for wi-fi access based on an electronic identity infrastructure
Article
Berbecaru, D.; Lioy, A.; Cameroni, C.
JOURNAL OF WIRELESS MOBILE NETWORKS, UBIQUITOUS COMPUTING AND DEPENDABLE APPLICATIONS
Innovative Information Science and Technology Research Group
Vol.11 pp.21 (pp.34-54) ISSN:2093-5374 DOI:10.22667/JOWUA.2020.06.30.034 -
Trusted Computing technology and proposals for resolving cloud computing security problems
Book chapter
Pedone, Ignazio; Canavese, Daniele; Lioy, Antonio
Cloud computing security - Foundations and challenges
CRC Press (STATI UNITI D'AMERICA)
pp.14 ISBN:9780429055126 -
Detection of encrypted cryptomining malware connections with machine and deep learning
Article
Pastor, Antonio; Mozo, Alberto; Vakaruk, Stanislav; Canavese, Daniele; Lopez, Diego R.; Regano, Leonardo; Gomez-Canaval, Sandra; Lioy, Antonio
IEEE ACCESS
IEEE
Vol.8 pp.20 (pp.158036-158055) ISSN:2169-3536 DOI:10.1109/access.2020.3019658 -
Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach
Article
Berbecaru, Diana Gratiela; Lioy, Antonio; Cameroni, Cesare
IEEE ACCESS
Institute of Electrical and Electronics Engineers
Vol.8 pp.15 (pp.126186-126200) ISSN:2169-3536 DOI:10.1109/ACCESS.2020.3007998 -
Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure
Proceeding
Berbecaru, Diana; Lioy, Antonio; Cameroni, Cesare
STUDIES IN COMPUTATIONAL INTELLIGENCE
In: Intelligent Distributed Computing XIII
Springer
International Symposium on Intelligent and Distributed Computing (IDC 2019) (Saint-Petersburg (RUS)) 7- 9 Oct. 2019
Vol.868 pp.10 (pp.313-322) ISSN:1860-949X ISBN:9783030322571 DOI:10.1007/978-3-030-32258-8_37 -
Empirical assessment of the effort needed to attack programs protected with client/server code splitting
Article
Viticchie, A.; Regano, L.; Basile, C.; Torchiano, M.; Ceccato, M.; Tonella, P.
EMPIRICAL SOFTWARE ENGINEERING
Springer
Vol.25 pp.48 (pp.1-48) ISSN:1382-3256 DOI:10.1007/s10664-019-09738-1 -
Towards a secure and lightweight Network Function Virtualisation environment
Article
De Benedictis, M.; Lioy, A.; Smiraglia, P.
INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING
Inderscience
Vol.11 pp.10 (pp.243-252) ISSN:1741-847X DOI:10.1504/IJGUC.2020.105539 -
The Rise of Android Banking Trojans
Article
Atzeni, Andrea; Dıaz, Fernando; Lopez, Francisco; Marcelli, Andrea; Sanchez, Antonio; Squillero, Giovanni
IEEE POTENTIALS
IEEE
Vol.39 pp.6 (pp.13-18) ISSN:0278-6648 DOI:10.1109/MPOT.2019.2904744
-
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions
Article
Pedone, Ignazio; Lioy, Antonio; Valenza, Fulvio
SECURITY AND COMMUNICATION NETWORKS
Hindawi
Vol.2019 pp.11 (pp.1-11) ISSN:1939-0114 DOI:10.1155/2019/2425983 -
Electronic identification for universities: Building cross-border services based on the eIDAS infrastructure
Article
Berbecaru, D.; Lioy, A.; Cameroni, C.
INFORMATION
MDPI AG
Vol.10 pp.17 ISSN:2078-2489 DOI:10.3390/info10060210 -
Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps
Article
Berbecaru, D.; Lioy, A.; Cameroni, C.
SOFTWARE-PRACTICE & EXPERIENCE
John Wiley and Sons Ltd
Vol.49 pp.20 (pp.1643-1662) ISSN:0038-0644 DOI:10.1002/spe.2738 -
A proposal for trust monitoring in a Network Functions Virtualisation Infrastructure
Proceeding
De Benedictis, M.; Lioy, A.
In: IEEE NetSoft 2019 - 1st Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-Defined and Virtualized Infrastructures (SecSoft
IEEE
IEEE Conference on Network Softwarization (NetSoft-2019) (Paris (France)) 24/6/2019
pp.9 (pp.1-9) DOI:10.1109/NETSOFT.2019.8806655 -
Integrity verification of Docker containers for a lightweight cloud environment
Article
DE BENEDICTIS, Marco; Lioy, Antonio
FUTURE GENERATION COMPUTER SYSTEMS
Elsevier
Vol.97 pp.11 (pp.236-246) ISSN:0167-739X DOI:10.1016/j.future.2019.02.026 -
Adding Support for Automatic Enforcement of Security Policies in NFV Networks
Article
Basile, Cataldo; Valenza, Fulvio; Lioy, Antonio; Lopez, Diego R.; Pastor Perales, Antonio
IEEE-ACM TRANSACTIONS ON NETWORKING
IEEE/ACM
Vol.27 pp.14 (pp.707-720) ISSN:1063-6692 DOI:10.1109/TNET.2019.2895278 -
A meta-model for software protections and reverse engineering attacks
Article
Basile, Cataldo; Canavese, Daniele; Regano, Leonardo; Falcarin, Paolo; De Sutter, Bjorn
THE JOURNAL OF SYSTEMS AND SOFTWARE
Elsevier Inc.
Vol.150 pp.19 (pp.3-21) ISSN:0164-1212 DOI:10.1016/j.jss.2018.12.025 -
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
Article
Ceccato, Mariano; Tonella, Paolo; Basile, Cataldo; Falcarin, Paolo; Torchiano, Marco; Coppens, Bart; De Sutter, Bjorn
EMPIRICAL SOFTWARE ENGINEERING
Springer
Vol.24 pp.47 (pp.240-286) ISSN:1382-3256 DOI:10.1007/s10664-018-9625-6
-
On integration of academic attributes in the eIDAS infrastructure to support cross-border services
Proceeding
Berbecaru, Diana; Lioy, Antonio
In: 2018 22nd International Conference on System Theory, Control and Computing, ICSTCC 2018 - Proceedings
Institute of Electrical and Electronics Engineers Inc.
22nd International Conference on System Theory, Control and Computing, ICSTCC 2018 (rou) 2018
pp.6 (pp.691-696) ISBN:9781538644447 DOI:10.1109/ICSTCC.2018.8540674 -
On creating digital evidence in IP networks with NetTrack
Book chapter
Berbecaru, Diana
Handbook of Research on Network Forensics and Analysis Techniques
IGI Global
pp.22 (pp.225-246) ISBN:9781522541028 DOI:10.4018/978-1-5225-4100-4.ch012 -
User-oriented Network Security Policy Specification
Article
Valenza, Fulvio; Lioy, Antonio
JOURNAL OF INTERNET SERVICES AND INFORMATION SECURITY
ISYOU
Vol.8 pp.15 (pp.33-47) ISSN:2182-2069 DOI:10.22667/JISIS.2018.05.31.033 -
Countering Android Malware: a Scalable Semi-Supervised Approach for Family-Signature Generation
Article
Atzeni, Andrea; Díaz, Fernando; Marcelli, Andrea; Sánchez, Antonio; Squillero, Giovanni; Tonda, Alberto
IEEE ACCESS
IEEE
pp.17 (pp.59540-59556) ISSN:2169-3536 DOI:10.1109/ACCESS.2018.2874502 -
Container-based design of a Virtual Network Security Function
Proceeding
DE BENEDICTIS, Marco; Lioy, Antonio; Smiraglia, Paolo
In: NETSOFT-2018: IEEE Conference on Network Softwarization
IEEE
NETSOFT-2018: IEEE Conference on Network Softwarization (Montreal (QC, Canada)) 25-29 June 2018
pp.9 (pp.55-63) DOI:10.1109/NETSOFT.2018.8459903 -
Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems
Proceeding
Carelli, Alberto; Cristofanini, Carlo Alberto; Vallero, Alessandro; Basile, Cataldo; Prinetto, Paolo; Di Carlo, Stefano
In: Proceedings of the 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR 2018)
Institute of Electrical and Electronics Engineers Inc. (STATI UNITI D'AMERICA)
IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR 2018) (Cluj-Napoca (Romania)) 24-26 May 2018
pp.6 (pp.1-6) ISBN:9781538622049 DOI:10.1109/AQTR.2018.8402795 -
On the impossibility of effectively using likely-invariants for software attestation purposes
Article
Viticchie', Alessio; Basile, Cataldo; Valenza, Fulvio; Lioy, Antonio
JOURNAL OF WIRELESS MOBILE NETWORKS, UBIQUITOUS COMPUTING AND DEPENDABLE APPLICATIONS
Innovative Information Science & Technology Research Group (ISYOU)
Vol.9 pp.25 (pp.1-25) ISSN:2093-5374 DOI:10.22667/JOWUA.2018.06.30.001 -
Usable security
Book chapter
Atzeni, Andrea; Faily, S.; Galloni, R.
Encyclopedia of Information Science and Technology, Fourth Edition
IGI GLOBAL (STATI UNITI D'AMERICA)
pp.10 (pp.5004-5013) ISBN:9781522522560 DOI:10.4018/978-1-5225-2255-3.ch433
-
Remotely assessing integrity of software applications by monitoring invariants: Present limitations and future directions
Proceeding
Viticchié, Alessio; Basile, Cataldo; Lioy, Antonio
In: CRiSIS-2017: 12th Int. Conf. on Risks and Security of Internet and Systems
Springer
CRiSIS-2017: 12th Int. Conf. on Risks and Security of Internet and Systems (Dinard (France)) September 19-21, 2017
pp.17 (pp.66-82) ISBN:9783319766867 DOI:10.1007/978-3-319-76687-4_5 -
NFV-based network protection: the SHIELD approach
Proceeding
Lioy, Antonio; Gardikis, George; Gaston, Bernat; Jacquin, Ludovic; De Benedictis, Marco; Angelopoulos, Yiannis; Xylouris, Christos
In: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
IEEE
2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) (Berlin (Germany)) November 6-8, 2017
pp.2 (pp.1-2) ISBN:9781538632857 DOI:10.1109/NFV-SDN.2017.8169869 -
Estimating Software Obfuscation Potency with Artificial Neural Networks
Proceeding
Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Viticchie', Alessio
SECURITY AND CRYPTOLOGY
In: STM - 2017: 13th International Workshop on Security and Trust Management
Springer International Publishing (STATI UNITI D'AMERICA)
STM - 2017: 13th International Workshop on Security and Trust Management (Oslo (NO)) September 14–15, 2017
Vol.10547 pp.10 (pp.193-202) ISBN:9783319680620 DOI:10.1007/978-3-319-68063-7_13 -
On the establishment of trust in the cloud-based ETSI NFV framework
Proceeding
DE BENEDICTIS, Marco; Lioy, Antonio
In: SN-2017: IEEE International Workshop on Security in NFV-SDN
IEEE
SN-2017: IEEE International Workshop on Security in NFV-SDN (Berlin (Germany)) November 6-8, 2017
pp.6 (pp.280-285) DOI:10.1109/NFV-SDN.2017.8169864 -
The FICEP Infrastructure - How we deployed the Italian eIDAS Node in the cloud
Proceeding
Smiraglia, Paolo; DE BENEDICTIS, Marco; Atzeni, Andrea; Lioy, Antonio; Pucciarelli, Massimiliano
In: e-Democracy 2017: Privacy-Preserving, Secure, Intelligent e-Government Services
Springer
e-Democracy 2017: Privacy-Preserving, Secure, Intelligent e-Government Services (Athens (Greece)) December 14-15, 2017
pp.15 (pp.196-210) DOI:10.1007/978-3-319-71117-1_14 -
Towards Optimally Hiding Protected Assets in Software Applications
Proceeding
Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Lioy, Antonio
In: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS)
IEEE
2017 IEEE International Conference on Software Quality, Reliability and Security (QRS) (Prague (CZ)) July 25-29, 2017
pp.12 (pp.374-385) ISBN:9781538605929 DOI:10.1109/QRS.2017.47 -
Trust and integrity in distributed systems
Doctoral thesis
Su, Tao
Politecnico di Torino
pp.149 DOI:10.6092/polito/porto/2676918 -
How Professional Hackers Understand Protected Code while Performing Attack Tasks
Proceeding
Mariano, Ceccato; Paolo, Tonella; Basile, Cataldo; Bart, Coppens; Bjorn, De Sutter; Falcarin, Paolo; Torchiano, Marco
In: ICPC 2017: 25th International Conference on Program Comprehension
IEEE Computer Society
ICPC 2017: 25th International Conference on Program Comprehension (Bueno Aires (Argentina)) 22-23 Maggio
pp.11 (pp.154-164) ISBN:9781538605356 DOI:10.1109/ICPC.2017.2 -
Classification and analysis of communication protection policy anomalies
Article
Valenza, Fulvio; Basile, Cataldo; Canavese, Daniele; Lioy, Antonio
IEEE-ACM TRANSACTIONS ON NETWORKING
IEEE
Vol.25 pp.14 (pp.2601-2614) ISSN:1063-6692 DOI:10.1109/TNET.2017.2708096 -
HAIT: Heap Analyzer with Input Tracing
Proceeding
Atzeni, Andrea; Marcelli, Andrea; Muroni, Francesco; Squillero, Giovanni
In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT
SCITEPRESS
SECRYPT 2017 (Madrid, Spain) 24-26 Luglio 2017
Vol.Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT pp.8 (pp.327-334) ISBN:9789897582592 DOI:10.5220/0006420803270334 -
Assessing network authorization policies via reachability analysis
Article
Basile, Cataldo; Canavese, Daniele; Pitscheider, Christian; Lioy, Antonio; Valenza, Fulvio
COMPUTERS & ELECTRICAL ENGINEERING
Elsevier
Vol.64 pp.22 (pp.110-131) ISSN:0045-7906 DOI:10.1016/j.compeleceng.2017.02.019 -
Towards Stronger Data Security in an eID Management Infrastructure
Proceeding
Berbecaru, DIANA GRATIELA; Atzeni, Andrea; DE BENEDICTIS, Marco; Smiraglia, Paolo
In: PDP-2017: 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing
IEEE
PDP-2017: 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (St. Petersburg (Russia)) 06-08 March 2017
pp.5 (pp.391-395) ISBN:9781509060580 DOI:10.1109/PDP.2017.90 -
Trust in SDN/NFV environments
Book chapter
Lioy, Antonio; Su, Tao; Lopez, Diego R.; Pastor, Antonio; Shaw, Adrian L.; Attak, Hamza
Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications
springer
pp.22 (pp.103-124) ISBN:9783319646527 DOI:10.1007/978-3-319-64653-4_4 -
A formal approach for network security policy validation
Article
Valenza, Fulvio; Su, Tao; Spinoso, Serena; Lioy, Antonio; Sisto, Riccardo; Vallini, Marco
JOURNAL OF WIRELESS MOBILE NETWORKS, UBIQUITOUS COMPUTING AND DEPENDABLE APPLICATIONS
Innovative Information Science & Technology Research Group (ISYOU)
Vol.8 pp.22 (pp.79-100) ISSN:2093-5374 DOI:10.22667/JOWUA.2017.03.31.079
-
Efficient Attribute Management in a Federated Identity Management Infrastructure
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio
In: PDP-2016: 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing
PDP-2016: 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (Heraklion (Greece)) 17-19 February 2016
pp.6 (pp.590-595) DOI:10.1109/PDP.2016.102 -
On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio
In: ISCC-2016: IEEE Symposium on Computers and Communication
ISCC-2016: IEEE Symposium on Computers and Communication (Messina (Italy)) June 27-30, 2016
pp.7 (pp.1263-1269) DOI:10.1109/ISCC.2016.7543910 -
A reference architecture for software protection
Proceeding
De Sutter, Bjorn; Falcarin, Paolo; Wyseur, Brecht; Basile, Cataldo; Ceccato, Mariano; Dannoville, Jerome; Zunke, Michael
In: Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016
Institute of Electrical and Electronics Engineers Inc.
13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (Venice (Italy)) 4-8 April 2016
pp.4 (pp.291-294) ISBN:9781509021314 DOI:10.1109/WICSA.2016.43 -
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems
Book chapter
Su, Tao; Lioy, Antonio; Barresi, Nicola
Cloud Computing Security - Foundations and Challenges
Taylor & Francis
pp.14 (pp.345-358) ISBN:9781482260946 -
Cloudification of Public Services in Smart Cities: the CLIPS project
Proceeding
Filograna, Antonio; Smiraglia, Paolo; Gilsanz, Celia; Krco, Srdjan; Medela, Arturo; Su, Tao
In: Proceedings of the 21st IEEE Symposium on Computers and Communications (ISCC'16)
IEEE
21st IEEE Symposium on Computers and Communications (ISCC'16) (Messina (IT)) 2016
pp.6 (pp.153-158) ISBN:9781509006793 DOI:10.1109/ISCC.2016.7543731 -
Automatic generation of high speed elliptic curve cryptography code
Doctoral thesis
Canavese, Daniele
Politecnico di Torino
pp.136 DOI:10.6092/polito/porto/2652694 -
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks
Proceeding
Viticchie', Alessio; Avancini, Andrea; Ceccato, Mariano; Basile, Cataldo; Abrath, Bert; Coppens, Bart
In: 2nd International workshop on software protection
ACM (STATI UNITI D'AMERICA)
2nd International Workshop on Software PROtection (Vienna (Austria)) 28 October 2016
Vol.SPRO '16 Proceedings of the 2016 ACM Workshop on Software PROtection pp.84 ISBN:9781450345767 DOI:10.1145/2995306.2995315 -
Assessment of Source Code Obfuscation Techniques
Proceeding
Viticchie', Alessio; Regano, Leonardo; Torchiano, Marco; Basile, Cataldo; Ceccato, Mariano; Tonella, Paolo; Tiella, Roberto
In: IEEE 16th international working conference on source code analysis and manipulation
IEEE Computer Society
IEEE 16th International Working Conference on Source Code Analysis and Manipulation (Raleigh, NC (USA)) October 2-3, 2016
pp.10 (pp.11-20) ISBN:9781509038480 DOI:10.1109/SCAM.2016.17 -
A novel security information and event management system for enhancing cyber security in a hydroelectric dam
Article
Di Sarno, Cesario; Garofalo, Alessia; Matteucci, Ilaria; Vallini, Marco
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION
Elsevier
Vol.13 pp.13 (pp.39-51) ISSN:1874-5482 DOI:10.1016/j.ijcip.2016.03.002 -
Towards Automatic Risk Analysis and Mitigation of Software Applications
Proceeding
Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Viticchie', Alessio; Lioy, Antonio
In: Information Security Theory and Practice
Springer
WISTP 2016 - IFIP International Conference on Information Security Throey and Practice (Heraklion, Crete (Greece)) September 26–27, 2016
pp.16 (pp.120-135) ISBN:9783319459301 DOI:10.1007/978-3-319-45931-8_8 -
Online and offline security policy assessment
Proceeding
Valenza, Fulvio; Vallini, Marco; Lioy, Antonio
In: Titolo volume non avvalorato
ACM
MIST’16: 8th ACM CCS international workshop on Managing Insider Security Threats (Vienna (Austria)) October 28, 2016
pp.4 (pp.101-104) DOI:10.1145/2995959.2995970 -
Distributed Security Policy Analysis
Doctoral thesis
Pitscheider, Christian
Politecnico di Torino
pp.146 DOI:10.6092/polito/porto/2644186 -
Harmonised security across devices (interview with Prof. Antonio Lioy)
Other
Lioy, Antonio
RESEARCH EU. RESULTS MAGAZINE
European Union (BELGIO)
pp.2 (pp.40-41) ISSN:1831-9947 -
Inter-function anomaly analysis for correct SDN/NFV deployment
Article
Basile, Cataldo; Canavese, Daniele; Lioy, Antonio; Pitscheider, Christian; Valenza, Fulvio
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT
John Wiley & Sons
Vol.26 pp.19 (pp.25-43) ISSN:1055-7148 DOI:10.1002/nem.1917
-
The trust problem in modern network infrastructures
Book chapter
Jacquin, Ludovic; Lioy, Antonio; Lopez, Diego R.; Shaw, Adrian L.; Su, Tao
Cyber Security and Privacy
Springer
pp.12 (pp.116-127) ISBN:9783319253602 DOI:10.1007/978-3-319-25360-2_10 -
Android Apps Risk Evaluation: a methodology
Article
Atzeni, Andrea; Su, Tao; Baltatu, Madalina; D'Alessandro, Rosalia; Pessiva, Giovanni
ICST TRANSACTIONS ON UBIQUITOUS ENVIRONMENTS
ICST
Vol.1 pp.18 (pp.1-18) ISSN:2032-9377 DOI:10.4108/ue.1.4.e5 -
Light combinators for finite fields arithmetic
Article
Canavese, Daniele; Cesena, Emanuele; Ouchary, Rachid; Pedicini, M.; Roversi, L.
SCIENCE OF COMPUTER PROGRAMMING
Elsevier
Vol.111 pp.30 (pp.365-394) ISSN:0167-6423 DOI:10.1016/j.scico.2015.04.001 -
Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt
Article
Berbecaru, DIANA GRATIELA; Lioy, Antonio
SOFTWARE-PRACTICE & EXPERIENCE
John Wiley & Sons
Vol.45 pp.21 (pp.1457-1477) ISSN:0038-0644 DOI:10.1002/spe.2292 -
Towards the Dynamic Provision of Virtualized Security Services
Book chapter
Basile, Cataldo; Pitscheider, Christian; Risso, FULVIO GIOVANNI OTTAVIO; Valenza, Fulvio; Vallini, Marco
Cyber Security and Privacy
Springer International Publishing
pp.12 (pp.65-76) ISBN:9783319253596 DOI:10.1007/978-3-319-25360-2_6 -
A Formal Model of Network Policy Analysis
Proceeding
Valenza, Fulvio; Spinoso, Serena; Basile, Cataldo; Sisto, Riccardo; Lioy, Antonio
In: RTSI 2015 - First International Forum on Research and Technologies for Society and Industry - Proceedings
IEEE (STATI UNITI D'AMERICA)
RTSI 2015 - First International Forum on Research and Technologies for Society and Industry (Torino, Italy) 16-18 September 2015
pp.7 (pp.516-522) ISBN:9781467381666 DOI:10.1109/RTSI.2015.7325150 -
Automatic discovery of software attacks via backward reasoning
Proceeding
Basile, Cataldo; Canavese, Daniele; D’Annoville, Jerome; De Sutter, Bjorn; Valenza, Fulvio
In: International Workshop on Software Protection (SPRO 2015)
IEEE Computer Society
ICSE International Workshop on Software Protection (SPRO 2015) (Firenze) 19 Maggio 2015
Vol.ICSE 2015 International Workshop on Software Protection (SPRO 2015) pp.7 DOI:10.1109/SPRO.2015.17 -
Authentication
Book chapter
Atzeni, Andrea; Lioy, Antonio
Encyclopedia of Information Science and Technology
IGI Global (STATI UNITI D'AMERICA)
pp.9 (pp.4239-4247) ISBN:9781466658882 DOI:10.4018/978-1-4666-5888-2.ch416 -
Offloading personal security applications to a secure and trusted network node
Proceeding
Bonafiglia, Roberto; Ciaccia, F.; Lioy, Antonio; Nemirovsky, M.; Risso, FULVIO GIOVANNI OTTAVIO; Su, Tao
In: Netsoft-2015: 1st IEEE Conference on Network Softwarization
IEEE (STATI UNITI D'AMERICA)
Netsoft-2015: 1st IEEE Conference on Network Softwarization (London (UK)) 13-17 April 2015
pp.2 (pp.1-2) ISBN:9781479978984 DOI:10.1109/NETSOFT.2015.7116171 -
A novel approach for integrating security policy enforcement with dynamic network virtualization
Proceeding
Basile, Cataldo; Lioy, Antonio; Pitscheider, Christian; Valenza, Fulvio; Vallini, Marco
In: 1st IEEE Conference on Network Softwarization (NetSoft-2015)
IEEE
1st IEEE Conference on Network Softwarization (NetSoft-2015) (London (UK)) 13-17 April 2015
pp.5 ISBN:9781479978991 DOI:10.1109/NETSOFT.2015.7116152 -
Virtualized Security at the Network Edge: A User-centric Approach
Article
Montero, D.; Yannuzzi, M.; Shaw, A.; Jacquin, L.; Pastor, A.; Serral Gracià, R.; Lioy, Antonio; Risso, FULVIO GIOVANNI OTTAVIO; Basile, Cataldo; Sassu, Roberto; Nemirovsky, M.; Ciaccia, Francesco; Georgiades, M.; Charalambides, S.; Kuusijarvi, J.; Bosco, F.
IEEE COMMUNICATIONS MAGAZINE
IEEE
Vol.53 pp.11 (pp.176-186) ISSN:0163-6804 DOI:10.1109/MCOM.2015.7081092 -
Hard clues in soft environments: The Cloud's influence on digital forensics
Book chapter
Atzeni, Andrea; Smiraglia, Paolo; Siringo, Andrea
Handbook of Research on Security Considerations in Cloud Computing
IGI Global
pp.27 (pp.258-284) ISBN:9781466683877 DOI:10.4018/978-1-4666-8387-7.ch012 -
Analysis of application-layer filtering policies with application to HTTP
Article
Basile, Cataldo; Lioy, Antonio
IEEE-ACM TRANSACTIONS ON NETWORKING
IEEE
Vol.23 pp.14 (pp.28-41) ISSN:1063-6692 DOI:10.1109/TNET.2013.2293625 -
A formal model of policy reconciliation
Proceeding
Basile, Cataldo; Lioy, Antonio; Pitscheider, Christian; Zhao, Shilong
In: PDP-2015: 23rd EuroMicro International Conference on Parallel, Distributed and network-based Processing
IEEE
PDP-2015: 23rd EuroMicro International Conference on Parallel, Distributed and network-based Processing (Turku (Finland)) March 4-6, 2015
pp.8 (pp.587-594) ISBN:9781479984909 DOI:10.1109/PDP.2015.42 -
Inter-technology conflict analysis for communication protection policies
Proceeding
Valenza, Fulvio; Basile, Cataldo; Canavese, Daniele; Lioy, Antonio
In: Risks and Security of Internet and Systems
Springer
CRiSIS-2014: 9th International Conference on Risks and Security of Internet and Systems (Trento (Italy)) 27-29 August 2014
pp.16 (pp.148-163) ISBN:9783319171265 DOI:10.1007/978-3-319-17127-2_10
-
D7.1 - Project leaflet and portal
Other
Lioy, Antonio; Bosco, Francesca; Risso, FULVIO GIOVANNI OTTAVIO; Smiraglia, Paolo
deliverable of the SECURED project
pp.9 DOI:10.6092/polito/porto/2650350 -
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework
Proceeding
Shamal, Faily; John, Lyle; Ivan, Fléchais; Atzeni, Andrea; Cameroni, Cesare; Hans, Myrhaug; Ayse, Göker; Robert, Kleinfeld
In: HCI'14: 28th Int. BCS Human Computer Interaction Conference 2014
HCI'14: 28th Int. BCS Human Computer Interaction Conference 2014 (Southport (UK)) 9-12 September 2014
pp.6 (pp.189-194) DOI:10.14236/ewic/hci2014.21 -
Closing the loop of SIEM analysis to Secure Critical Infrastructures
Proceeding
Garofalo, A.; Di Sarno, C.; Matteucci, I.; Vallini, Marco; Formicola, V.
In: Titolo volume non avvalorato
The First International Workshop on Real-time Big Data Analytics for Critical Infrastructure Protection (BIG4CIP 2014) (Newcastle (UK)) 13 May 2014
pp.6 -
The TClouds Platform: From the Concept to the Implementation of Benchmark Scenarios
Article
Bessani, A.; Cutillo, LEUCIO ANTONIO; Ramunno, Gianluca; Schirmer, N.; Smiraglia, Paolo
OPERATING SYSTEMS REVIEW
ACM
Vol.48 pp.10 (pp.13-22) ISSN:0163-5980 DOI:10.1145/2694737.2694741 -
How Dangerous is Your Android App? An Evaluation Methodology
Proceeding
Atzeni, Andrea; Su, Tao; M., Baltatu; R., D'Alessandro; G., Pessiva
In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (London, United Kingdom) 02/12/2014-05/12/2014
pp.10 (pp.130-139) DOI:10.4108/icst.mobiquitous.2014.257832 -
Exploiting the network for securing personal devices
Proceeding
Dalton, C.; Lioy, Antonio; Lopez, D.; Risso, FULVIO GIOVANNI OTTAVIO; Sassu, Roberto
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE
In: Cyber Security and Privacy
Springer
Third Cyber Security and Privacy EU Forum (Athens (Greece)) 21-22 May 2014
pp.12 (pp.16-27) ISSN:1865-0929 DOI:10.1007/978-3-319-12574-9_2 -
Network-Security-Policy Analysis
Proceeding
Pitscheider, Christian
In: Titolo volume non avvalorato
International Academy, Research and Industrial Association (IARIA)
DEPEND 2014, The Seventh International Conference on Dependability (Lisbon (Portugal)) November 16- 20, 2014
pp.7 (pp.10-16) -
Offloading security applications into the network
Proceeding
Lioy, Antonio; Pastor, A.; Risso, FULVIO GIOVANNI OTTAVIO; Sassu, Roberto; Shaw, A. L.
In: Titolo volume non avvalorato
IIMC International Information Management Corporation, (REGNO UNITO DI GRAN BRETAGNA)
eChallenges e-2014 (Belfast (UK)) 29-30 October 2014
pp.9 -
Practical assessment of Biba integrity for TCG-enabled platforms
Proceeding
Sassu, Roberto; Ramunno, Gianluca; Lioy, Antonio
In: TRUSTCOM'14: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
TRUSTCOM'14: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Bejing (China)) 24-26 September 2014
pp.10 (pp.495-504) DOI:10.1109/TrustCom.2014.63 -
Lightweight Formal Verification in Real World, A Case Study
Proceeding
Atzeni, Andrea; Su, Tao; Montanaro, Teodoro
LECTURE NOTES IN BUSINESS INFORMATION PROCESSING
In: Advanced Information Systems Engineering Workshops
Springer International Publishing
WISSE 2014: 4th International Workshop on Information Systems Security Engineering (Thessaloniki (Greece)) 17 June 2014
pp.8 (pp.335-342) ISSN:1865-1348 DOI:10.1007/978-3-319-07869-4_31 -
Developing secure‚ unified multi−device and multi−domain platforms: a case study from the webinos project
Book chapter
Atzeni, Andrea; Lyle, J.; Faily, S.
Architectures and Protocols for Secure Information Technology
IGI Global
pp.24 (pp.310-333) ISBN:9781466645141 DOI:10.4018/978-1-4666-4514-1.ch012 -
Can a Light Typing Discipline Be Compatible with an Efficient Implementation of Finite Fields Inversion?
Proceeding
Canavese, Daniele; Cesena, Emanuele; Ouchary, Rachid; Pedicini, M.; Roversi, L.
LECTURE NOTES IN COMPUTER SCIENCE
In: Foundational and Practical Aspects of Resource Analysis
Springer
FOPARA 2013 (Bertinoro) August 2013
Vol.8552 pp.20 (pp.38-57) ISSN:0302-9743 DOI:10.1007/978-3-319-12466-7_3
-
Consulenza scientifica sul PIN delle carte di pagamento elettroniche a marchio BANCOMAT e PagoBANCOMAT
Other
Lioy, Antonio
pp.18 DOI:10.6092/polito/porto/2539489 -
Privacy-by-design cloud computing through decentralization and real life trust
Proceeding
Cutillo, LEUCIO ANTONIO; Lioy, Antonio
In: Peer-to-Peer Computing
P2P-2013: IEEE 13th International Conference on Peer-to-Peer Computing (Trento (Italy)) 9-11 September 2013
pp.2 DOI:10.1109/P2P.2013.6688726 -
The TClouds platform: concept, architecture and instantiations
Proceeding
Bessani, A.; Cutillo, LEUCIO ANTONIO; Ramunno, Gianluca; Schirmer, N.; Smiraglia, Paolo
In: DISCCO'13: 2nd International Workshop on Dependability Issues in Cloud Computing
ACM
DISCCO'13: 2nd International Workshop on Dependability Issues in Cloud Computing (Braga (PT)) September 30, 2013
pp.6 DOI:10.1145/2506155.2506156 -
Towards a unified software attack model to assess software protections
Proceeding
Basile, Cataldo; Ceccato, M.
In: Program Comprehension (ICPC), 2013 IEEE 21st International Conference on
IEEE
IEEE International Conference on Program Comprehension (ICPC) (San Francisco, California (USA)) May 20-21, 2013
pp.4 (pp.219-222) DOI:10.1109/ICPC.2013.6613852 -
Policy-driven system management
Book chapter
Platte, H.; Basile, Cataldo; Paraboschi, S.
Computer and Information Security Handbook
Morgan Kaufmann
pp.20 (pp.773-792) ISBN:9780123943972 -
Detection of conflicts in security policies
Book chapter
Basile, Cataldo; Casalino, M. M.; Mutti, S.; Paraboschi, S.
Computer and Information Security Handbook
Morgan Kaufmann
pp.34 (pp.415-448) ISBN:9780123943972 -
Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies
Proceeding
Faily, S.; Lyle, J.; Flechais, I.; Atzeni, Andrea; Cameroni, Cesare; Myrhaug, H.; Goker, A.; Kleinfeld, R.
In: Proceedings of the workshop on Home Usable Privacy and Security (HUPS) 2013
HUPS-2013: workshop on Home Usable Privacy and Security (Newcastle (UK)) 24-26/7/2013
pp.6 -
Continuous integration for web-based software infrastructures: lessons learned on the webinos project
Proceeding
Su, Tao; Lyle, J.; Atzeni, Andrea; Faily, S.; Virji, H.; Ntanos, C.; Botsikas, C.
LECTURE NOTES IN COMPUTER SCIENCE
In: Hardware and Software: Verification and Testing
Springer
HVC-2013: Ninth Haifa Verification Conference (Haifa (Israel)) 5-7/11/2013
Vol.LNCS-8244 pp.6 (pp.145-150) ISSN:0302-9743 DOI:10.1007/978-3-319-03077-7_10 -
Towards privacy-by-design peer-to-peer cloud computing
Proceeding
Cutillo, LEUCIO ANTONIO; Lioy, Antonio
LECTURE NOTES IN COMPUTER SCIENCE
In: Trust, Privacy, and Security in Digital Business
Springer
TRUSTBUS-2013 (Prague (Czech Republic)) 28-29 August 2013
Vol.8058 pp.12 (pp.85-96) ISSN:0302-9743 DOI:10.1007/978-3-642-40343-9_8 -
Anatomia del malware
Article
Mezzalama, Marco; Lioy, Antonio; Metwalley, H.
MONDO DIGITALE
AICA
pp.20 ISSN:1720-898X -
Building a trusted environment for security applications
Book chapter
Cabiddu, Giovanni; Lioy, Antonio; Ramunno, Gianluca
Theory and Practice of Cryptography Solutions for Secure Information Systems
IGI Global (STATI UNITI D'AMERICA)
pp.27 (pp.334-360) ISBN:9781466640306 DOI:10.4018/978-1-4666-4030-6.ch014 -
Improved reachability analysis for security management
Proceeding
Basile, Cataldo; Canavese, Daniele; Lioy, Antonio; Pitscheider, Christian
In: Titolo volume non avvalorato
IEEE Computer Society Press (STATI UNITI D'AMERICA)
PDP-2013: 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (Belfast (UK)) February 27 - March 1, 2013
pp.8 (pp.534-541) ISBN:9781467353212 DOI:10.1109/PDP.2013.86 -
Personal PKI for the smart device era
Proceeding
Lyle, J.; Paverd, A.; King Lacroix, J.; Atzeni, Andrea; Virji, H.; Flechais, I.; Faily, S.
In: Public Key Infrastructures, Services and Applications
Springer
9th European Workshop EuroPKI 2012 (Pisa (Italy)) September 13-14, 2012
pp.16 (pp.69-84) ISBN:9783642400117 -
FcgiOCSP: a scalable OCSP-based Certificate Validation System exploitingthe FastCGI interface
Article
Berbecaru, DIANA GRATIELA; Casalino, MATTEO MARIA; Lioy, Antonio
SOFTWARE-PRACTICE & EXPERIENCE
John Wiley & Sons
Vol.43 pp.30 (pp.1489-1518) ISSN:0038-0644 DOI:10.1002/spe.2148
-
Model-driven architectural risk analysis using architectural and contextualised attack patterns
Proceeding
Faily, S.; Lyle, J.; Namiluko, C.; Atzeni, Andrea; Cameroni, Cesare
In: Titolo volume non avvalorato
ACM (STATI UNITI D'AMERICA)
MDSec 2012: Workshop on Model-Driven Security, at the 15th ACM/IEEE International Conference on Model Driven Engineering Languages and System (Innsbruck (Austria)) October 1-5, 2012
pp.6 ISBN:9781450318068 DOI:10.1145/2422498.2422501 -
Requirements Sensemaking using Concept Maps
Proceeding
Faily, S.; Lyle, J.; Paul, A.; Atzeni, Andrea; Blomme, D.; Desruelle, H.; Bangalore, K.
LECTURE NOTES IN COMPUTER SCIENCE
In: Titolo volume non avvalorato
Springer
HCSE-2012: 4th International Conference on Human-Centred Software Engineering (Toulouse (France)) October 29-31, 2012
Vol.7623 pp.16 (pp.217-232) ISSN:0302-9743 ISBN:9783642343476 DOI:10.1007/978-3-642-34347-6_13 -
FPGA based remote code integrity verification of programs in distributed embedded systems
Article
Basile, Cataldo; DI CARLO, Stefano; Scionti, A.
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS. PART C, APPLICATIONS AND REVIEWS
IEEE
Vol.42 pp.13 (pp.187-200) ISSN:1094-6977 DOI:10.1109/TSMCC.2011.2106493 -
Network-level access control policy analysis and transformation
Article
Basile, Cataldo; Cappadonia, Alberto; Lioy, Antonio
IEEE-ACM TRANSACTIONS ON NETWORKING
IEEE-ACM
Vol.20 pp.14 (pp.985-998) ISSN:1063-6692 DOI:10.1109/TNET.2011.2178431
-
Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment.
Other
Jim, Clarke; Marcos Gomez, Hidalgo; Lioy, Antonio; Louis, Marinos; Milan, Petkovic; Claire, Vishik; Jeremy, Ward
ENISA (GRECIA)
Vol.ENISA deliverable 2011-10-18 pp.51 -
A unified ontology for the virtualization domain
Proceeding
Silvestro, Jacopo; Canavese, Daniele; Cesena, Emanuele; Smiraglia, Paolo
In: OTM 2011: On the Move to Meaningful Internet Systems
Springer
DOA-SVI 2011: Distributed Objects and Applications and Secure Virtual Infrastructures (Hersonissos (Greece)) October 17-21, 2011
pp.8 (pp.617-624) ISBN:9783642251054 DOI:10.1007/978-3-642-25106-1_14 -
On scalability of remote attestation
Proceeding
Cesena, Emanuele; Ramunno, Gianluca; Sassu, Roberto; Vernizzi, Davide; Lioy, Antonio
In: Titolo volume non avvalorato
STC'11: 6th ACM workshop on Scalable Trusted Computing (Chicago (IL, USA)) October 17, 2011
pp.6 (pp.25-30) DOI:10.1145/2046582.2046588 -
Federating e-identities across Europe, or how to build cross-border e-services
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio; Mezzalama, Marco; Santiano, Giorgio; Venuto, Enrico; Oreglia, Marco
In: Titolo volume non avvalorato
AICA-2011 conference - Smart Tech & Smart Innovation (Torino (Italy)) 15-17/11/2011
pp.10 ISBN:9788890540646 -
Protezione dei sistemi informatici
Book chapter
Lioy, Antonio; Mezzalama, Marco
Ingegneria forense : metodologie, protocolli, casi studio
Flaccovio (ITALIA)
pp.34 (pp.455-488) ISBN:9788857901015 -
Exploiting proxy-based federated identity management in wireless roaming access
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio; Aime, MARCO DOMENICO
LECTURE NOTES IN COMPUTER SCIENCE
In: Titolo volume non avvalorato
Springer
8th International Conference, TrustBus 2011 (Toulouse (FR)) August 29 - September 2, 2011
Vol.6863 pp.11 (pp.13-23) ISSN:0302-9743 ISBN:9783642228896 DOI:10.1007/978-3-642-22890-2_2 -
Here's Johnny: a methodology for developing attacker personas
Proceeding
Atzeni, Andrea; Faily, S.; Lyle, J.; Cameroni, Cesare; Flechais, I.
In: Titolo volume non avvalorato
ARES-2011: 6th Int. Conf. on Availability, Reliability and Security (Vienna (Austria)) 22-26 August 2011
pp.6 (pp.722-727) ISBN:9781457709791 DOI:10.1109/ARES.2011.115 -
Security Plans for SaaS
Book chapter
Aime, MARCO DOMENICO; Lioy, Antonio; Pomi, PAOLO CARLO; Vallini, Marco
New Frontiers in Information and Software as Services: Service and Application Design Challenges in the Cloud
Springer (GERMANIA)
pp.31 (pp.81-111) ISBN:9783642192937 DOI:10.1007/978-3-642-19294-4_4 -
LRAP: A Location-Based Remote Client Authentication Protocol for Mobile Environments
Proceeding
Berbecaru, DIANA GRATIELA
In: Titolo volume non avvalorato
IEEE Computer Society
PDP 2011 - 19th International Euromicro Conference on Parallel, Distributed and Network-Based Computing (Ayia Napa (Cyprus)) 09 - 11 February 2011
pp.5 (pp.141-145) ISBN:9780769543284 DOI:10.1109/PDP.2011.32 -
The Trusted Platform Agent
Article
Cabiddu, G.; Cesena, E.; Sassu, R.; Vernizzi, D.; Ramunno, G.; Lioy, A.
IEEE SOFTWARE
IEEE
Vol.28 pp.7 (pp.35-41) ISSN:0740-7459 DOI:10.1109/MS.2010.160 -
On the performance of secure vehicular communication systems
Article
Calandriello, Giorgio; Papadimitratos, Panagiotis; Hubaux, J. P.; Lioy, Antonio
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
IEEE
Vol.8 pp.15 (pp.898-912) ISSN:1545-5971 DOI:10.1109/TDSC.2010.58 -
Automatic (re)configuration of IT systems for dependability
Article
Aime, MARCO DOMENICO; Lioy, Antonio; Pomi, PAOLO CARLO
IEEE TRANSACTIONS ON SERVICES COMPUTING
IEEE
Vol.4 pp.15 (pp.110-124) ISSN:1939-1374 DOI:10.1109/TSC.2010.31
-
A psychological approach to information technology security
Proceeding
Enrici, I.; Ancilli, M.; Lioy, Antonio
In: Titolo volume non avvalorato
IEEE
HSI-2010: 3rd Int. Conf. on Human System Interactions (Rzeszow (Poland)) May 13-15, 2010
pp.8 (pp.459-466) ISBN:9781424475605 DOI:10.1109/HSI.2010.5514528 -
Performance of two one-time signature schemes in space/time constrained environments
Proceeding
Berbecaru, DIANA GRATIELA
In: Titolo volume non avvalorato
IEEE ISWPC 2010, 5th IEEE International Symposium on Wireless Pervasive Computing (Modena (Italy)) 5-7 May 2010
pp.6 (pp.238-243) ISBN:9781424468553 DOI:10.1109/ISWPC.2010.5483755 -
Towards a Network-Independent Policy Specification
Proceeding
Basile, Cataldo; Lioy, Antonio; Vallini, Marco
In: Titolo volume non avvalorato
IEEE
PDP 2010, 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (Pisa (Italy)) 17-19 Feb. 2010
pp.5 (pp.649-653) ISBN:9781424456727 DOI:10.1109/PDP.2010.45 -
The ForwardDiffSig scheme for multicast authentication
Article
Berbecaru, DIANA GRATIELA; Albertalli, L.; Lioy, Antonio
IEEE-ACM TRANSACTIONS ON NETWORKING
IEEE
Vol.18 pp.14 (pp.1855-1868) ISSN:1063-6692 DOI:10.1109/TNET.2010.2052927 -
Ontology-based Security Policy Translation
Article
Basile, Cataldo; Lioy, Antonio; Scozzi, Salvatore; Vallini, Marco
JOURNAL OF INFORMATION ASSURANCE AND SECURITY
Dynamic Publishers
Vol.5 pp.9 (pp.437-445) ISSN:1554-1010 -
Ontology and algorithms for the dependable configuration of information systems
Article
Aime, MARCO DOMENICO; Pomi, PAOLO CARLO; Vallini, Marco
INTERNATIONAL JOURNAL OF CRITICAL COMPUTER-BASED SYSTEMS
Vol.1 pp.35 (pp.301-335) ISSN:1757-8779 DOI:10.1504/IJCCBS.2010.036603 -
Trusted Computing
Book chapter
Lioy, Antonio; Ramunno, Gianluca
Handbook of Information and Communication Security
Springer
pp.21 (pp.697-717) ISBN:9783642041167 DOI:10.1007/978-3-642-04117-4_32
-
MagicNET: XACML authorization policies for mobile agents
Proceeding
Giambruno, Alessandro; Shibli, M. A.; Muftic, S.; Lioy, Antonio
In: Titolo volume non avvalorato
IEEE
ICITST-2009: Int. Conf. for Internet Technology and Secured Transactions (London (UK)) 9-12 Nov. 2009
pp.7 (pp.1-7) ISBN:9780954662820 -
MagicNET: Security System for Development, Validation and Adoption of Mobile Agents
Proceeding
Shibli, M. A.; Muftic, S.; Giambruno, Alessandro; Lioy, Antonio
In: Titolo volume non avvalorato
IEEE
NSS'09: Int. Conf. on Network and System Security (Gold Coast (Queensland, Australia)) 19-21 Oct. 2009
pp.8 (pp.389-396) ISBN:9781424450879 DOI:10.1109/NSS.2009.33 -
Efficient and Reliable Pseudonymous Authentication
Book chapter
Calandriello, Giorgio; Lioy, Antonio
Automotive Informatics and Communicative Systems: Principles in Vehicular Networks and Data Exchange
IGI Global
pp.17 (pp.247-263) ISBN:9781605663388 DOI:10.4018/978-1-60566-338-8.ch013 -
Toward a formal framework to evaluate wireless sensor network security
Proceeding
ABOU EL KALAM, A; Atzeni, Andrea; Cappadonia, Alberto; Cesena, Emanuele; FISCHER HUBNER, S; Lindskog, S; Martucci, L. A.; Pastrone, C.
In: NEWCOM++ - ACoRN Joint Workshop
-
Automated Dependability Planning in Virtualised Information System
Article
Aime, MARCO DOMENICO; Pomi, PAOLO CARLO; Vallini, Marco
INTERNATIONAL JOURNAL ON ADVANCES IN INTELLIGENT SYSTEMS
Vol.2 pp.20 (pp.457-476) ISSN:1942-2679 -
D06.c2: WYSIWYS application design specification
Other
Cabiddu, Giovanni; Ramunno, Gianluca; Vallini, Marco
Vol.IST-027635/D06c.2/FINAL 1.10 -
D03c.9 Enhancement of Key Management Adaptation (KMA) service source code and documentation
Other
Ramunno, Gianluca; Sassu, Roberto
Vol.IST-027635/D03c.9/FINAL 1.10 -
Problemi di sicurezza delle comunicazioni a distanza
Book chapter
Atzeni, Andrea
Nuove tecnologie e processo penale
Giappichelli Editore (ITALIA)
pp.7 (pp.102-108) ISBN:9788834877982 -
Planning Dependability of Virtualised Networks
Proceeding
Aime, MARCO DOMENICO; Pomi, PAOLO CARLO; Vallini, Marco
In: Second International Workshop on Dependability and Security in Complex and Critical Information Systems
IEEE
DEPEND'09 - 2nd Int. Conf. on Dependability (Athens (Greece)) 18-23 June 2009
pp.6 (pp.46-51) ISBN:9780769536668 DOI:10.1109/DEPEND.2009.13 -
Trusted-Computing Technologies for the Protection of Critical Information Systems
Article
Lioy, Antonio; Ramunno, Gianluca; Vernizzi, Davide
JOURNAL OF INFORMATION ASSURANCE AND SECURITY
Vol.4 pp.9 (pp.449-457) ISSN:1554-1010 -
Ontology-based policy translation
Proceeding
Basile, Cataldo; Lioy, Antonio; Scozzi, Salvatore; Vallini, Marco
In: Titolo volume non avvalorato
Springer
CISIS'09 - Int. Workshop on Computational Intelligence in Security for Information Systems (Burgos (Spain)) 23-26 September 2009
pp.10 (pp.117-126) ISBN:9783642040900 DOI:10.1007/978-3-642-04091-7_15 -
A unified and flexible solution for integrating CRL and OCSP into PKI applications
Article
Berbecaru, DIANA GRATIELA; Desai, AMARKUMAR GUNVANTRAI; Lioy, Antonio
SOFTWARE-PRACTICE & EXPERIENCE
Wiley
Vol.39 pp.31 (pp.891-921) ISSN:0038-0644 DOI:10.1002/spe.918
-
D03c.2 High-level key manager service design specification
Other
Ramunno, Gianluca; Sassu, Roberto
Vol.IST-027635/D03c.2/FINAL 2.00 -
Generation of Diagnostic Plans for Large ICT Systems
Proceeding
Aime, MARCO DOMENICO; Atzeni, Andrea
In: Titolo volume non avvalorato
Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE'08) (Cap Esterel, France) August 25-31, 2008
pp.6 (pp.344-349) ISBN:9780769533292 DOI:10.1109/SECURWARE.2008.56 -
Modern standard-based access control in network services: XACML in action
Article
Scaglioso, PIERVITO GIOVANNI; Basile, Cataldo; Lioy, Antonio
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY
Vol.8, no. 12 pp.10 (pp.296-305) ISSN:1738-7906 -
Integrating Deployment Techniques with Monitoring: The Proactive Configuration Checker (PCC)
Proceeding
Basile, Cataldo; Pomi, PAOLO CARLO; Scaglioso, PIERVITO GIOVANNI
In: PDP2008: 16th Euromicro Conference on Parallel, Distributed and Network- Based Processing
Los Alamitos, CA (STATI UNITI D'AMERICA)
PDP2008: 16th Euromicro Conference on Parallel, Distributed and Network- Based Processing (Toulouse, France) February 13-15, 2008
(pp.611-615) ISBN:9780769530895 -
Trusted-Computing Technologies forthe Protection of Critical Information Systems
Proceeding
Lioy, Antonio; Ramunno, Gianluca; Vernizzi, Davide
In: Titolo volume non avvalorato
Springer
CISIS'08 - Int. Workshop on Computational Intelligence in Security for Information Systems (Genova (Italy)) 23-24 October 2008
Vol.53 pp.7 (pp.77-83) ISBN:9783540881803 DOI:10.1007/978-3-540-88181-0_10 -
The Risks With Security Metrics
Proceeding
Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO
In: Titolo volume non avvalorato
ACM (STATI UNITI D'AMERICA)
QoP 2008, ACM Workshop on Quality of Protection (Alexandria, VA, USA) 27 Oct 2008
(pp.65-70) ISBN:9781605583211 DOI:10.1145/1456362.1456376 -
On the Performance and Use of a Space-Efficient Merkle Tree Traversal Algorithm in Real-Time Applications for Wireless and Sensor Networks
Proceeding
Berbecaru, DIANA GRATIELA; Luca, Albertalli
In: Titolo volume non avvalorato
IEEE Computer Society (STATI UNITI D'AMERICA)
WIMOB'08 - IEEE International Conference on Wireless and Mobile Networking and Communications 12-14 Oct. 2008, Avignon (France)
(pp.234-240) ISBN:9780769533933 DOI:10.1109/WiMob.2008.14 -
Geometric Interpretation of Policy Specification
Proceeding
Basile, Cataldo; Cappadonia, Alberto; Lioy, Antonio
In: Titolo volume non avvalorato
IEEE
POLICY-2008: IEEE Int. workshop on Policies for Distributed Systems and Networks (Palisades (NY, USA)) June 2-4, 2008
pp.4 (pp.78-81) ISBN:9780769531335 DOI:10.1109/POLICY.2008.36 -
Learning to enhance dependability of information systems
Proceeding
Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO
In: Titolo volume non avvalorato
IEEE
SASO 2008, IEEE International Conference on Self-Adaptive and Self-Organizing Systems (Venezia) October 20-24, 2008
(pp.483-484) ISBN:9780769534046 DOI:10.1109/SASO.2008.50 -
Policy-Driven System Configuration for Dependability
Proceeding
Aime, MARCO DOMENICO; Pomi, PAOLO CARLO; Vallini, Marco
In: Titolo volume non avvalorato
IEEE
SECUREWARE'08 - 2nd Int. Conf. on Emerging Security Information, Systems and Technologies (Cap Esterel (France)) 25-31 August 2008
pp.6 (pp.420-425) ISBN:9780769533292 DOI:10.1109/SECURWARE.2008.54 -
Trust, Privacy and Security in Digital Business
Edited by
Furnell, S; Katsikas, S. K.; Lioy, Antonio
Springer (GERMANIA)
pp.204 ISBN:9783540857341 -
Impact of vehicular communication security on transportation safety
Proceeding
Papadimitratos, P.; Calandriello, Giorgio; Hubaux, J. P.; Lioy, Antonio
In: Titolo volume non avvalorato
IEEE
MOVE 2008 - IEEE INFOCOM-2008 workshop on Mobile Networking for Vehicular Environments (Phoenix (AZ, USA)) 13-18 April 2008
pp.6 (pp.1-6) ISBN:9781424422197 DOI:10.1109/INFOCOM.2008.4544663 -
An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes
Proceeding
Berbecaru, DIANA GRATIELA; Luca, Albertalli
In: Titolo volume non avvalorato
IEEE Computer Society
PDP 2008 - 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing 13-15 Feb. 2008, Toulouse (France)
(pp.581-589) ISBN:9780769530895 DOI:10.1109/PDP.2008.64
-
Algebraic Models to Detect and Solve Policy Conflicts
Proceeding
Basile, Cataldo; Cappadonia, Alberto; Lioy, Antonio
In: Titolo volume non avvalorato
Springer (GERMANIA)
MMM-ACNS 2007: 4th Int. Conf. on Mathematical Methods, Models, and Architectures for Computer Network Security (St. Petersburg (Russia)) September 13–15, 2007
Vol.1 pp.6 (pp.242-247) ISBN:9783540739852 DOI:10.1007/978-3-540-73986-9_20 -
On the robustness of applications based on the SSL and TLS security protocols
Article
Berbecaru, DIANA GRATIELA; Lioy, Antonio
LECTURE NOTES IN COMPUTER SCIENCE
Vol.4582 pp.17 (pp.248-264) ISSN:0302-9743 ISBN:9783540734079 DOI:10.1007/978-3-540-73408-6_18 -
Efficient and robust pseudonymous authentication in VANET
Proceeding
Calandriello, Giorgio; Papadimitratos, P.; Hubaux, J. P.; Lioy, Antonio
In: Titolo volume non avvalorato
ACM
VANET 2007 - 4th ACM international workshop on Vehicular ad-hoc networks (Montreal (Canada)) 10 September 2007
pp.10 (pp.19-28) ISBN:9781595937391 DOI:10.1145/1287748.1287752 -
AMBRA - Automated Model-Based Risk Analysis
Proceeding
Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO
In: Titolo volume non avvalorato
ACM
QoP-2007, ACM workshop on Quality of Protection (Alexandria, VA, USA) October 29, 2007
(pp.43-48) ISBN:9781595938855 DOI:10.1145/1314257.1314272 -
An estimation of attack surface to evaluate network (in)security
Proceeding
Atzeni, Andrea; Lioy, Antonio
In: Titolo volume non avvalorato
ICEIS 2007 - 9th International Conference on Enterprise Information Systems (Funchal (Portugal)) 12-16 June 2007
(pp.493-498) ISBN:9789728865900 -
Dependability in wireless networks: can we rely on WiFi?
Article
Aime, MARCO DOMENICO; Calandriello, Giorgio; Lioy, Antonio
IEEE SECURITY & PRIVACY
IEEE
Vol.5 pp.7 (pp.23-29) ISSN:1540-7993 DOI:10.1109/MSP.2007.4
-
Public Key Infrastructure - theory and practice
Edited by
Atzeni, Andrea; Lioy, Antonio
Springer (GERMANIA)
pp.261 (pp.1-261) ISBN:9783540351511 -
Fighting e-mail abuses: the EMPE approach
Proceeding
Lioy, Antonio; Pala, Massimiliano
LECTURE NOTES IN COMPUTER SCIENCE
In: Titolo volume non avvalorato
Springer
Third European PKI Workshop: Theory and Practice, EuroPKI 2006 (Turin (Italy)) June 19-20, 2006
Vol.4043 pp.15 (pp.130-144) ISSN:0302-9743 ISBN:9783540351511 DOI:10.1007/11774716_11 -
A wireless distributed intrusion detection system and a new attack model
Proceeding
Aime, MARCO DOMENICO; Calandriello, Giorgio; Lioy, Antonio
In: Titolo volume non avvalorato
ISCC-2006: 11th IEEE Int. Symp. on Computers and Communications (Cagliari (Italy)) June 26-29, 2006
pp.6 (pp.35-40) ISBN:9780769525884 DOI:10.1109/ISCC.2006.22 -
On the Tradeoff between Performance and Security in OCSP-Based Certificate Revocation Systems for Wireless Environments
Proceeding
Berbecaru, DIANA GRATIELA
In: Proceedings of the Eleventh IEEE Symposium on Computers and Communications (ISCC'06)
ISCC 2006 (Pula-Cagliari, Sardegna (Italia)) 26-29 Giugno 2006
(pp.340-346) DOI:10.1109/ISCC.2006.114 -
Opaque channel: contrasting information leakage in wireless scenarios
Proceeding
Aime, MARCO DOMENICO; Atzeni, Andrea
In: Titolo volume non avvalorato
AICA-2006 (Cesena (Italy)) September 21-22, 2006
(pp.481-490) ISBN:9788860550750 -
PKI past, present and future
Article
Lioy, Antonio; Marian, Marius Adrian; Moltchanova, N.; Pala, Massimiliano
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
Vol.5 pp.12 (pp.18-29) ISSN:1615-5262 DOI:10.1007/s10207-005-0077-9
-
The wireless opaque channel to contrast information leakage
Proceeding
Aime, MARCO DOMENICO; Atzeni, Andrea; Lioy, Antonio
In: Titolo volume non avvalorato
WoWMoM-2005, IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (Taormina, Italy) June 13-16, 2005
Vol.3 (pp.570-575) ISBN:9780769523422 DOI:10.1109/WOWMOM.2005.104 -
Motivations for a theoretical approach to WYSIWYS
Proceeding
Lioy, Antonio; Ramunno, Gianluca; Aime, MARCO DOMENICO; Pala, Massimiliano
LECTURE NOTES IN COMPUTER SCIENCE
In: Titolo volume non avvalorato
Springer
9th IFIP TC-6 TC-11International Conference, CMS 2005 (Salzburg (AT)) September 19 – 21, 2005
Vol.3677 pp.2 (pp.289-290) ISSN:0302-9743 ISBN:9783540287919 DOI:10.1007/11552055_38 -
On Measuring SSL-based Secure Data Transfer with Handheld Devices
Proceeding
Berbecaru, DIANA GRATIELA
In: Proceedings of 2nd IEEE International Symposium on Wireless Communication Systems 2005 (ISWCS 2005)
ISWCS 2005 (Siena, Italia) 5-7 Settembre 2005
(pp.409-413) ISBN:9780780392076 DOI:10.1109/ISWCS.2005.1547731 -
FIrDA-SSL: Experiments with securing communication in PANs
Proceeding
Berbecaru, DIANA GRATIELA
In: Proceedings of First IEEE/CREATE-NET Workshop on Security and QoS in Communications Networks (SeCQoS 2005), held in conjunction with SecureComm-2005: IEEE/Create-Net International Conference on Security and Privacy for Emerging Areas in Communication Networks
SeCQoS 2005 (Atene, Grecia) 5-9 Settembre 2005
(pp.295-305) ISBN:9780780394698 DOI:10.1109/SECCMW.2005.1588324 -
Why to adopt a security metric? A little survey
Proceeding
Atzeni, Andrea; Lioy, Antonio
In: Titolo volume non avvalorato
Springer
QoP-2005: Quality of Protection workshop (Milano (Italy)) September 15, 2005
pp.12 (pp.1-12) ISBN:9780387290164 DOI:10.1007/978-0-387-36584-8_1 -
A generic overall framework for network security evaluation
Proceeding
Atzeni, Andrea; Lioy, Antonio; Tamburino, Lucia
In: Titolo volume non avvalorato
AICA-2005 (Udine (Italy)) October 5-7, 2005
pp.11 (pp.605-615) ISBN:9788884202871 -
POSITIF: un approccio olistico alla sicurezza basato su politiche formali
Proceeding
Basile, Cataldo; Lioy, Antonio; Marian, Marius Adrian
In: Titolo volume non avvalorato
AICA-2005 (Udine (Italy)) October 5-7, 2005
pp.10 (pp.710-719) ISBN:9788884202871 -
Incremental trust: building trust from past experience
Proceeding
Aime, MARCO DOMENICO; Lioy, Antonio
In: Titolo volume non avvalorato
WoWMoM 2005: IEEE Int. Symp. on a World of Wireless Mobile and Multimedia Networks (Taormina (Italy)) June 13-16, 2005
pp.6 (pp.603-608) ISBN:9780769523422 DOI:10.1109/WOWMOM.2005.54 -
Decentralised access control in 802.11 networks
Proceeding
Aime, MARCO DOMENICO; Lioy, Antonio; Ramunno, Gianluca
LECTURE NOTES IN COMPUTER SCIENCE
In: Titolo volume non avvalorato
Springer
9th IFIP TC-6 TC-11International Conference, CMS 2005 (Salzburg (AT)) September 19 – 21, 2005
Vol.3677 pp.11 (pp.180-190) ISSN:0302-9743 ISBN:9783540287919 DOI:10.1007/11552055_18
-
MBS-OCSP: An OCSP based certificate revocation system for wireless environments
Proceeding
Berbecaru, DIANA GRATIELA
In: Proceedings of the 4th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2004)
IEEE ISSPIT 2004 (Roma, Italia) 18-21 Dicembre 2004
(pp.267-272) ISBN:9780780386891 DOI:10.1109/ISSPIT.2004.1433737 -
Multiple electronic signatures on multiple documents
Proceeding
Lioy, Antonio; Ramunno, Gianluca
In: Titolo volume non avvalorato
ICETE'04: IADIS Int. Conf. on E-Business and Telecommunication Networks (Setubal (Portugal)) August 24-28, 2004
pp.11 (pp.24-34) ISBN:9789728865177 -
Towards an algebraic approach to solve policy conflicts
Proceeding
Basile, Cataldo; Lioy, Antonio
In: Titolo volume non avvalorato
FCS'04: Foundations of Computer Security (Turku (Finland)) July 12-13, 2004
pp.20 (pp.319-338) ISBN:9789521213724 -
Preliminary steps in designing and implementing a privilege verifier for PMI
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio
In: Titolo volume non avvalorato
ICWI-2004: IADIS International Conference on WWW/Internet (Madrid (Spain)) October 6-9, 2004
pp.8 (pp.317-324) ISBN:9789729935305 -
The EuroPKI experience
Proceeding
Lioy, Antonio; Marian, M.; Moltchanova, N.; Pala, M.
LECTURE NOTES IN COMPUTER SCIENCE
In: Titolo volume non avvalorato
First European PKI Workshop: Research and Applications, EuroPKI 2004 (Samos Island (GR)) June 25-26, 2004
Vol.3093 pp.14 (pp.14-27) ISSN:0302-9743 ISBN:9783540222163 DOI:10.1007/978-3-540-25980-0_2 -
Digital certificates and public-key infrastructures
Book chapter
Berbecaru, DIANA GRATIELA; Derenale, Corrado; Lioy, Antonio
Information Security Policies and Actions in Modern Integrated Systems
IDEA group publishing
pp.34 (pp.65-98) ISBN:9781591401865 -
Security of 802.11 wireless networks
Book chapter
Aime, MARCO DOMENICO; Lioy, Antonio; Mazzocchi, Daniele
Security and privacy in advanced networking technologies
IOS Press (PAESI BASSI)
pp.50 (pp.51-100) ISBN:9781586034306
-
DNS-based implementation of a PKI repository
Other
Berbecaru, DIANA GRATIELA; Marius, Marian
(pp.157-165) -
A practical approach to expressing digitally signed documents
Other
Berbecaru, DIANA GRATIELA; Marius, Marian
(pp.79-86) -
Communications and Multimedia Security - Advanced Techniques for Network and Data Protection
Edited by
Lioy, Antonio; Mazzocchi, D.
Springer (GERMANIA)
Vol.LNCS-2828 pp.263 (pp.1-263) ISBN:9783540201854 -
Support for public-key infrastructures in DNS
Proceeding
Marius, Marian; Berbecaru, DIANA GRATIELA
In: Proceedings of the International Symposium on systems theory, automation, robotics, computers, informatics, electronics and instrumentation, SINTES 11 – XIth edition, Vol II, Software engineering, Computer engineering and Electronics
SINTES 11 - XI th edition (Craiova) 23-24 Ottobre 2003
Vol.II pp.6 (pp.451-456) -
Representation of E-documents in AIDA Project
Proceeding
Berbecaru, DIANA GRATIELA; Marius, Marian
In: Proceedings of the International Symposium on systems theory, automation, robotics, computers, informatics, electronics and instrumentation, SINTES 11 – XIth edition, Vol II, Software engineering, Computer engineering and Electronics
SINTES 11 - XI th edition (Craiova) 23-24 Ottobre 2003
Vol.II pp.6 (pp.393-398)
-
Management of attribute certificates for access control, Scientific Journal of the University of Craiova, Analele UNIVERSITATII DIN CRAIOVA, seria: Inginerie Electrica, Nr. 26/2002, Volumul II ISSN 1223-530X
Other
Berbecaru, DIANA GRATIELA; Marius, Marian
(pp.10-21) -
Towards Simplifying PKI Implementation: Client-Server based Validation of Public Key Certificates
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio
In: Titolo volume non avvalorato
IEEE Int. Symp. on Signal Processing and Information Technology (ISSPIT-2002) (Marrakech (Marocco)) December 18-21, 2002
pp.6 (pp.277-282) ISBN:9780972718608 -
Security aspects in standard certificate revocation mechanisms: a case study for OCSP
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio; Marian, Marius Adrian
In: Titolo volume non avvalorato
7th IEEE Symp. on Computers and Communications (ISCC-2002) (Taormina/Giardini Naxos (Italy)) 1 - 4 July 2002
pp.6 (pp.484-489) ISBN:9780769516714 DOI:10.1109/ISCC.2002.1021719 -
Verso applicazioni concrete della firma digitale (II parte)
Article
Lioy, Antonio; Berbecaru, DIANA GRATIELA; Mazzocchi, Daniele; Maino, Fabio Rodolfo; Ramunno, Gianluca
IGED.IT
Vol.1 pp.9 (pp.26-34) ISSN:1720-6618 -
Wireless security: current status and future evolution
Proceeding
Aime, MARCO DOMENICO; Lioy, Antonio; D., Mazzocchi
In: Titolo volume non avvalorato
AICA 2002 (Conversano (BA), Italy) September 25-27, 2002
pp.14 (pp.1-14) -
Secure digital administration in medical environment
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio; Marian, Marius Adrian; Marano, D.
In: Titolo volume non avvalorato
ICWI-2002: IADIS Int. Conf. on WWW/Internet (Lisbon (Portugal)) November 13-15, 2002
pp.8 (pp.299-306) ISBN:9789729027536 -
Towards simplifying PKI implementation: client-server based validation of public-key certificates
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio
In: Titolo volume non avvalorato
ISSPIT-2002: IEEE Int. Symp. on Signal Processing and Information Technology (Marrakesh (Marocco)) December 18-21, 2002
pp.6 (pp.277-282) ISBN:9780972718608
-
A Framework for Secure Digital Administration
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio; Marian, Marius Adrian
In: Titolo volume non avvalorato
EuroWeb 2001 - the web in Public Administration (Pisa (Italy)) December 18-20, 2001
pp.15 (pp.119-133) ISBN:9788888327334 -
PKI-based System Management
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio; Marian, Marius Adrian
In: Titolo volume non avvalorato
SACCS 2001 - 7th Int. Symp. on Automatic Control and Computer Science (Iasi (Romania)) 26-27 October 2001
pp.16 -
On the complexity of public-key certificate validation
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio; Marian, Marius Adrian
LECTURE NOTES IN COMPUTER SCIENCE
In: Titolo volume non avvalorato
Springer
Information Security 4th International Conference, ISC 2001 (Malaga (ESP)) October 1–3, 2001
Vol.2200 pp.21 (pp.183-203) ISSN:0302-9743 ISBN:9783540426622 DOI:10.1007/3-540-45439-X_13 -
Verso applicazioni concrete della firma digitale (I parte)
Article
Lioy, Antonio; Berbecaru, DIANA GRATIELA; Mazzocchi, Daniele; Maino, Fabio Rodolfo; Ramunno, Gianluca
IGED.IT
Vol.4 pp.6 (pp.32-37) ISSN:1720-6618 -
Towards a Policy System for IPsec: issues and an experimental implementation
Proceeding
Baltatu, Madalina; Lioy, Antonio; Mazzocchi, Daniele
In: Titolo volume non avvalorato
ICON-2001: IEEE Int. Conf. on Networks (Bangkok (Thailand)) October 10-12
pp.6 (pp.146-151) ISBN:9780769511863 DOI:10.1109/ICON.2001.962332 -
Synthesis of Power-Managed Sequential Components Based on Computational Kernel Extraction
Article
Benini, L.; DE MICHELI, G.; Lioy, Antonio; Macii, Enrico; Odasso, Giuseppe; Poncino, Massimo
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
Vol.20 pp.14 (pp.1118-1131) ISSN:0278-0070 DOI:10.1109/43.945307 -
Sicurezza dei sistemi informativi
Book chapter
Lioy, Antonio; Mezzalama, Marco
Sistemi informativi
Franco Angeli (ITALIA)
Vol.5 pp.86 (pp.124-209) ISBN:9788846432704 -
IP security
Book chapter
Baltatu, Madalina; Lioy, Antonio
Advanced Security Technologies in Networking
IOS press (PAESI BASSI)
pp.14 (pp.95-108) ISBN:9781586031565
-
A flexible management framework for certificate status validation
Proceeding
Berbecaru, DIANA GRATIELA; Corradi, A.; Lioy, Antonio; Maino, Fabio Rodolfo; Montanari, R.; Stefanelli, C.
In: Titolo volume non avvalorato
Kluwer
IFIP/SEC-2000: 15th IFIP Int. Conf. on Information Security (Bejing (China)) August 22-24, 2000
pp.10 (pp.481-490) ISBN:9780792379140 -
Towards concrete application of electronic signature
Proceeding
Berbecaru, DIANA GRATIELA; Lioy, Antonio; Mazzocchi, Daniele; Maino, Fabio Rodolfo; Ramunno, Gianluca
In: Titolo volume non avvalorato
AICA conference 2000 (Taormina (Italy)) 27-30 September 2000
pp.19 (pp.543-561) -
DNS security
Proceeding
Lioy, Antonio; Maino, Fabio Rodolfo; Marian, Marius Adrian; Mazzocchi, Daniele
In: Titolo volume non avvalorato
TNC-2000: Terena Networking Conf. (Lisbon (Portugal)) May 22-25, 2000
pp.13 -
Security Policy System: status and perspective
Proceeding
Baltatu, Madalina; Lioy, Antonio; Mazzocchi, Daniele
In: Titolo volume non avvalorato
ICON-2000: IEEE Int. Conf. On Networks (Singapore) September 5-8, 2000
pp.7 (pp.278-284) ISBN:9780769507774 DOI:10.1109/ICON.2000.875802 -
Security issues in control, management and routing protocols
Proceeding
Baltatu, Madalina; Lioy, Antonio; Maino, Fabio Rodolfo; Mazzocchi, Daniele
In: Titolo volume non avvalorato
TNC-2000: Terena Networking Conference 2000 (Lisbon (Portugal)) May 22-25, 2000
pp.12 -
Security issues in control, management, and routing protocols
Article
Baltatu, Madalina; Lioy, Antonio; Maino, Fabio Rodolfo; Mazzocchi, Daniele
COMPUTER NETWORKS
Vol.34, no.6 pp.14 (pp.881-894) ISSN:1389-1286
-
Computational Kernels and their Application to Sequential Power Optimization
Proceeding
Benini, L; DE MICHELI, G; Lioy, Antonio; Macii, Enrico; Odasso, G; Poncino, Massimo
In: Titolo volume non avvalorato
DAC-35: ACM/IEEE Design Automation Conference (San Francisco, CA)
(pp.764-769) ISBN:9780897919647 DOI:10.1145/277044.277237 -
Automatic Synthesis of Large Telescopic Units Based on Near-Minimum Timed Supersetting
Article
Benini, I. L.; DE MICHELI, G.; Lioy, Antonio; Macii, Enrico; Odasso, G.; Poncino, Massimo
IEEE TRANSACTIONS ON COMPUTERS
Vol.48 pp.11 (pp.769-779) ISSN:0018-9340 DOI:10.1109/12.795120
-
Timed Supersetting and the Synthesis of Large Telescopic Units
Proceeding
Benini, L; DE MICHELI, G; Lioy, Antonio; Macii, Enrico; Odasso, G; Poncino, Massimo
In: Titolo volume non avvalorato
GLS-VLSI-98: IEEE/ACM 8th Great Lakes Symposium on VLSI (Lafayette, LA)
(pp.331-337) ISBN:9780818684098 DOI:10.1109/GLSV.1998.665289 -
Providing X.509-based user access control to web servers
Proceeding
Lioy, Antonio; Maino, F.
In: Titolo volume non avvalorato
SEC'98: IFIP Int. Information Security Conf. Aug. 31 - Sep. 4
(pp.61-71) -
Security aspects of IPv6
Book chapter
Lioy, Antonio
Internetworking IPv6 with Cisco routers
McGraw-Hill (STATI UNITI D'AMERICA)
(pp.151-166) ISBN:9780070228368 -
La sicurezza nelle reti di calcolatori: dai firewall alla firmadigitale
Other
Lioy, Antonio; Mezzalama, M.
-
A Parallel Approach to Symbolic Traversal Based on Set Partitioning
Proceeding
Cabodi, Gianpiero; Camurati, Paolo Enrico; Lioy, Antonio; Poncino, M.; Quer, Stefano
In: Titolo volume non avvalorato
CHARME’97: Correct Hardware Methodologies
ISBN:9780412813306 -
Accurate entropy calculation for large logic circuits based on output clustering
Proceeding
Lioy, Antonio; Macii, Enrico; Poncino, Massimo; M., Rossello
In: Titolo volume non avvalorato
IEEE
7th Great Lakes Symposium on VLSI (Urbana-Champaign, IL (USA)) 13-15 Mar 1997
(pp.70-75) ISBN:9780818679049 DOI:10.1109/GLSV.1997.580413 -
Providing security to the building licenses delivering process in the city of Torino
Proceeding
Lioy, Antonio; Maino, F.
In: Titolo volume non avvalorato
JENC8: 8th Joint European Networking Conf. May 12-15
(pp.432.1-432.6) -
Non-intrusive authentication
Proceeding
Galliano, D. A.; Lioy, Antonio; Maino, F.
In: Titolo volume non avvalorato
SEC'97: IFIP Int. Information Security Conf.
(pp.440-451) -
Secure document management and distribution in an open network environment
Proceeding
Lioy, Antonio; Maino, F.; Mezzalama, Marco
LECTURE NOTES IN COMPUTER SCIENCE
In: Titolo volume non avvalorato
Springer
Information and Communications Security First International Conference, ICIS '97 (Beijing (CHN)) November 11–14, 1997
Vol.1334 pp.9 (pp.109-117) ISSN:0302-9743 ISBN:9783540636960 DOI:10.1007/BFb0028467 -
Aspetti di sicurezza in IPv6
Book chapter
Lioy, Antonio
IPv6: il nuovo protocollo per Internet e le Intranet
McGraw-Hill Italia (ITALIA)
(pp.139-151) ISBN:9788838632099
-
Testing Hyperactive Faults in Asynchronous Circuits
Proceeding
Lioy, Antonio; Maino, F.; Odasso, G.; Poncino, Massimo
In: Titolo volume non avvalorato
IEEE Pacific Rim Conference on Communications, Computer and Signal Processing
ISBN:9780780325531 DOI:10.1109/PACRIM.1995.519572 -
Exact Functional Redundancy Identification
Proceeding
Lioy, Antonio; Poncino, Massimo
In: Titolo volume non avvalorato
IEEE Pacific Rim Conference on Communications, Computer and Signal Processing
ISBN:9780780325531 DOI:10.1109/PACRIM.1995.519570
-
On the equivalence of fanout-point faults
Article
Lioy, Antonio
IEEE TRANSACTIONS ON COMPUTERS
IEEE
Vol.42 pp.4 (pp.268-271) ISSN:0018-9340 DOI:10.1109/12.210169 -
Computation of exact random pattern detection probability
Proceeding
Fahrat, H.; Lioy, Antonio; Poncino, Massimo
In: Proceedings of IEEE Custom Integrated Circuits Conference - CICC '93
IEEE
CICC'93: IEEE Custom Integrated Circuits Conference (San Diego, CA (USA)) 09-12 May 1993
pp.4 (pp.26.7.1-26.7.4) ISBN:9780780312814 DOI:10.1109/CICC.1993.590784 -
On the Resetability of Synchronous Sequential Circuits
Proceeding
Lioy, Antonio; Poncino, Massimo
In: Titolo volume non avvalorato
ISCAS'93: IEEE Int. Symposium on Circuits and Systems
ISBN:9780780312814 DOI:10.1109/ISCAS.1993.394021
-
Advanced Fault Collapsing
Article
Lioy, A.
IEEE DESIGN & TEST OF COMPUTERS
IEEE
Vol.9 pp.8 (pp.64-71) ISSN:0740-7475 DOI:10.1109/54.124518 -
Test Generation for Gate Level Sequential Machines: Algorithms and Implementation Issues
Proceeding
Lioy, Antonio; Macii, Enrico; Meo, A. R.
In: Titolo volume non avvalorato
CompEuro'92: IEEE 1992 International Conference on Software Engineering (Den Haag, The Netherlands)
(pp.262-267) ISBN:9780818627606 DOI:10.1109/CMPEUR.1992.218499
-
An Algebraic Approach to Test Generation for Sequential Circuits
Proceeding
Lioy, Antonio; Macii, Enrico; Meo, A. R.; SONZA REORDA, Matteo
In: Titolo volume non avvalorato
GLS-VLSI-91: IEEE/ACM 1st Great Lakes Symposium on VLSI (Kalamazoo, MI)
(pp.115-120) ISBN:9780818621703 DOI:10.1109/GLSV.1991.143952 -
Automatic compaction of microcode
Article
Lioy, Antonio; Mezzalama, Marco
MICROPROCESSORS AND MICROSYSTEMS
Vol.14 ISSN:0141-9331 -
A Hierarchical Multi-Level Test Generation System
Proceeding
Lioy, Antonio; Poncino, Massimo
In: Titolo volume non avvalorato
GLS-VLSI'91: 1st Great Lake State Symposium
ISBN:9780818621703 DOI:10.1109/GLSV.1991.143942
-
Diagnosis Oriented Test Pattern Generation
Proceeding
Camurati, Paolo Enrico; Lioy, Antonio; Prinetto, Paolo Ernesto; SONZA REORDA, Matteo
In: Titolo volume non avvalorato
IEEE / Institute of Electrical and Electronics Engineers Incorporated:445 Hoes Lane:Piscataway, NJ 08854:(800)701-4333, (732)981-0060, EMAIL: subscription-service@ieee.org, INTERNET: http://www.ieee.org, Fax: (732)981-9667
IEEE European Design Automation Conference
pp.5 (pp.470-474) ISBN:9780818620249 DOI:10.1109/EDAC.1990.136693 -
Exact Probabilistic Testability Measures for Multi-Output Circuits
Article
Camurati, P; Lioy, A; Prinetto, Paolo Ernesto; SONZA REORDA, Matteo
JOURNAL OF ELECTRONIC TESTING
Kluwer Academic Publishers
Vol.1, Number 3, October 1990 pp.6 (pp.229-234) ISSN:0923-8174 DOI:10.1007/BF00938686
-
Complexity analysis of sequential ATPG
Proceeding
Lioy, Antonio; Montessoro, Pier Luca; Gai, Silvano
In: ISCAS'89: IEEE International Symposium on Circuits and Systems 1989
IEEE
ISCAS'89: IEEE International Symposium on Circuits and Systems 1989 (Portland,OR (USA)) May 8-11, 1989
Vol.3 pp.4 (pp.1946-1949) DOI:10.1109/ISCAS.1989.100751
-
Shaping a Quantum-Resistant Future: Strategies for Post-Quantum PKI