- Cryptography and Data Security
- Cloud Data Security Solutions
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Distributed systems and fault tolerance
- Privacy-Preserving Technologies in Data
- Security and Verification in Computing
- Access Control and Trust
- Caching and Content Delivery
- Vehicular Ad Hoc Networks (VANETs)
- Adversarial Robustness in Machine Learning
- Advanced Authentication Protocols Security
- Blockchain Technology Applications and Security
- Mobile Ad Hoc Networks
- Combustion and flame dynamics
- User Authentication and Security Systems
- Gene expression and cancer classification
- Surface Roughness and Optical Measurements
- Machine Learning in Bioinformatics
- Spam and Phishing Detection
- Peer-to-Peer Network Technologies
- Robot Manipulation and Learning
- Sharing Economy and Platforms
- Soft Robotics and Applications
- Opportunistic and Delay-Tolerant Networks
University of Modena and Reggio Emilia
2013-2022
Université de Bordeaux
2022
Instituto de Engenharia de Sistemas e Computadores Investigação e Desenvolvimento
2022
Boston University
2022
University of Bologna
2022
Ferrari (Italy)
2014-2017
Gruppo Scienzia Machinale (Italy)
2013
Scuola Superiore Sant'Anna
2002
Machine learning is adopted in a wide range of domains where it shows its superiority over traditional rule-based algorithms. These methods are being integrated cyber detection systems with the goal supporting or even replacing first level security analysts. Although complete automation and analysis an enticing goal, efficacy machine must be evaluated due diligence. We present analysis, addressed to specialists, techniques applied intrusion, malware, spam. The twofold: assess current...
The control of exploratory and manipulative procedures in teleoperation virtual environments requires the availability adequate advanced interfaces capable not only recording movements human hands arms, but also replicating sensations contact collisions. In this paper problem external forces acting against remote/virtual arm is addressed. design an exoskeleton system developed authors' laboratory presented. consists a 7 DOF actuated sensorized mechanical structure wrapping up completely...
The incremental diffusion of machine learning algorithms in supporting cybersecurity is creating novel defensive opportunities but also new types risks. Multiple researches have shown that methods are vulnerable to adversarial attacks create tiny perturbations aimed at decreasing the effectiveness detecting threats. We observe existing literature assumes threat models inappropriate for realistic scenarios because they consider opponents with complete knowledge about cyber detector or can...
Machine-learning solutions are successfully adopted in multiple contexts but the application of these techniques to cyber security domain is complex and still immature. Among many open issues that affect systems based on machine learning, we concentrate adversarial attacks aim detection prediction capabilities machine-learning models. We consider realistic types poisoning evasion targeting devoted malware, spam network intrusion detection. explore possible damages an attacker can cause a...
Placing critical data in the hands of a cloud provider should come with guarantee security and availability for at rest, motion, use. Several alternatives exist storage services, while confidentiality solutions database as service paradigm are still immature. We propose novel architecture that integrates services possibility executing concurrent operations on encrypted data. This is first solution supporting geographically distributed clients to connect directly an database, execute...
Designing secure, scalable, and resilient IoT networks is a challenging task because of resource-constrained devices no guarantees reliable network connectivity. Fog computing improves the resiliency IoT, but its security model assumes that fog nodes are fully trusted. We relax this latter constraint by proposing solution confidentiality messages exchanged through semi-honest thanks to lightweight proxy re-encryption scheme. demonstrate feasibility applying it low-power experiments on...
Recent research showcased several cyber-attacks against unmodified licensed vehicles, demonstrating the vulnerability of their internal networks. Many solutions have already been proposed by industry and academia, aiming to detect prevent targeting in-vehicle The majority these proposals borrow security algorithms techniques from classical ICT domain, in many cases they do not consider inherent limitations legacy automotive protocols resource-constrained microcontrollers. This paper proposes...
The success of the cloud database paradigm is strictly related to strong guarantees in terms service availability, scalability and security, but also data confidentiality. Any provider assures security availability its platform, while implementation scalable solutions guarantee confidentiality information stored databases an open problem left tenant. Existing address some preliminary issues through SQL operations on encrypted data. We propose first complete architecture that combines...
The diffusion of cloud database services requires a lot efforts to improve confidentiality data stored in external infrastructures. We propose novel scheme that integrates encryption with users access control mechanisms. It can be used guarantee respect public infrastructure, and minimize the risks internal leakage even worst case legitimate user colluding some provider personnel. correctness feasibility proposal is demonstrated through formal models, while integration cloud-based...
Modern vehicles are complex cyber physical systems where communication protocols designed for physically isolated networks now employed to connect Internet-enabled devices. This unforeseen increase in connectivity creates novel attack surfaces, and exposes safety-critical functions of the vehicle attacks. As standard security solutions not applicable due resource constraints compatibility issues, research is proposing tailored approaches cope with existing design next generations vehicles....
The cloud database as a service is novel paradigm that can support several Internet-based applications, but its adoption requires the solution of information confidentiality problems. We propose architecture for adaptive encryption public databases offers an interesting alternative to tradeoff between required data level and flexibility structures at design time. demonstrate feasibility performance proposed through software prototype. Moreover, we original cost model oriented evaluation...
Emerging Cooperative Intelligent Transportation Systems (C-ITS) enable improved driving experience and safety guarantees, but require secure Vehicular Ad-hoc NETworks (VANETs) that must comply to strict performance constraints. Specialized standards have been defined these aims, such as the IEEE 1609.2 uses network-efficient cryptographic protocols reduce communication latencies. The reduced latencies are achieved through a combination of Elliptic Curve Qu-Vantstone (ECQV) implicit...
Cooperative Intelligent Transportation Systems (C-ITS) improve driving experience and safety through secure Vehicular Ad-hoc NETworks (VANETs) that satisfy strict security performance constraints. Relevant standards, such as the IEEE 1609.2, prescribe network-efficient cryptographic protocols to reduce communication latencies a combination of Elliptic Curve Qu-Vanstone (ECQV) implicit certificate scheme Digital Signature Algorithm (ECDSA). However, literature lacks open implementations...
Highly distributed smart environments, such as Smart Cities, require scalable architectures to support a large number of stakeholders that share Internet Things (IoT) resources and services. We focus on authorization solutions regulate access users objects consider scenarios where owners want the their devices in secure way. A popular solution is delegate third parties, public Cloud services, mediate procedures among objects. This approach has disadvantage assuming parties trusted proxies...
In a fully interconnected world where even network-related services are becoming more dependent on software, the management of license agreements is critical for business any software vendor and communication provider. Building, managing protecting infrastructure to handle validation scalability provider and, other hand, assessing correct use licenses can become an expensive part relationship costs. We propose novel approach decentralized licensing that leverages blockchain smart contracts...
Delegated authorization protocols have become wide-spread to implement Web applications and services, where some popular providers managing people identity information personal data allow their users delegate third party services access data. In this paper, we analyze the risks related untrusted not behaving correctly, solve problem by proposing first verifiable delegated protocol that allows verify correctness of returned provider. The contribution paper is twofold: show how can be...
Cloud services represent an unprecedented opportunity, but their adoption is hindered by confidentiality and integrity issues related to the risks of outsourcing private data cloud providers. This paper focuses on proposes innovative solution that allows tenants detect unauthorized modifications outsourced while minimizing storage network overheads. Our approach based encrypted Bloom filters, designed allow efficient verification for databases stored in cloud. We assess effectiveness...