- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- Information and Cyber Security
- Cryptography and Data Security
- Advanced Malware Detection Techniques
- Access Control and Trust
- Vehicular Ad Hoc Networks (VANETs)
- Privacy, Security, and Data Protection
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Privacy-Preserving Technologies in Data
- Multi-Agent Systems and Negotiation
- Blockchain Technology Applications and Security
- Cryptographic Implementations and Security
- Opportunistic and Delay-Tolerant Networks
- Security and Verification in Computing
- Digital and Cyber Forensics
- Semantic Web and Ontologies
- Adversarial Robustness in Machine Learning
- Cybersecurity and Cyber Warfare Studies
- Formal Methods in Verification
- Logic, Reasoning, and Knowledge
- Autonomous Vehicle Technology and Safety
- Software Testing and Debugging Techniques
- Mobile Agent-Based Network Management
University of Catania
2015-2024
KTH Royal Institute of Technology
2015
De Montfort University
2011-2014
Tulane University
2013
Los Alamitos Medical Center
2013
Istituto di Matematica Applicata e Tecnologie Informatiche
2013
University of Luxembourg
2013
Centre Azuréen de Cancérologie
2011
University of Cambridge
1997-2005
Attackers may attempt exploiting Internet of Things (IoT) devices to operate them unduly as well gather personal data the legitimate device owners'. Vulnerability Assessment and Penetration Testing (VAPT) sessions help verify effectiveness adopted security measures. However, VAPT over IoT devices, namely targeted at is an open research challenge due variety target technologies creativity it require. Therefore, this article aims guiding penetration testers conduct by means a new cyber Kill...
Abstract The advanced and personalised experience that modern cars offer makes them more data-hungry. For example, the cabin preferences of possible drivers must be recorded associated to some identity, while such data could exploited deduce sensitive information about driver’s health. Therefore, drivers’ privacy taken seriously, requiring a dedicated risk assessment framework, as presented in this paper through double combining asset-oriented ISO approach with threat-oriented STRIDE...
Modern cars are no longer purely mechanical devices but shelter so much digital technology that they resemble a network of computers. Electronic Control Units (ECUs) need to exchange large amount data for the various functions car work, and such must be made secure if we want those work as intended despite malicious activity by attackers. TOUCAN is new security protocol designed at same time both CAN AUTOSAR compliant. It achieves in terms authenticity, integrity confidentiality, yet without...
Electronic commerce and finance are progressively supporting including decentralized, shared public ledgers such as the blockchain. This is reshaping traditional commercial activities by advancing them towards Decentralized Finance (DeFi) Commerce 3.0, thereby latter’s potential to outpace hurdles of central authority controllers lawgivers. The quantity entropy information that must be sought managed become active participants in a relentlessly evolving scenario increasing at steady pace....
Secure electronic transaction (SET) is an immense e-commerce protocol designed to improve the security of credit card purchases. In this paper, we focus on initial bootstrapping phases SET, whose objective registration cardholders and merchants with a SET certificate authority. The aim twofold: getting approval cardholder's or merchant's bank replacing traditional numbers credentials that can present merchant so their privacy protected. These subprotocols number challenges current formal...
The Secure Electronic Transaction (SET) protocol has been proposed by a consortium of credit card companies and software corporations to secure e-commerce transactions. When the customer makes purchase, SET dual signature guarantees authenticity while keeping customer's account details secret from merchant his choice goods bank.This paper reports first verification results for complete purchase phase SET. Using Isabelle inductive method, we showed that do remain confidential customer, bank...
Classical security protocols aim to achieve authentication and confidentiality under the assumption that peers behave honestly. Some recent are required their goals even if peer misbehaves. Accountability is a protocol design strategy may help. It delivers sufficient evidence of each other's participation in protocol. underlies nonrepudiation Zhou Gollmann certified email Abadi et al. This paper provides comparative, formal analysis two protocols, confirms they reach realistic conditions....
Despite their apparent simplicity, devices like smart light bulbs and electrical plugs are often perceived as exempt from rigorous security measures.However, this paper challenges misconception, uncovering how vulnerabilities in these seemingly innocuous can expose users to significant risks.This extends the findings outlined previous work, introducing a novel attack scenario.This new allows malicious actors obtain sensitive credentials, including victim's Tapo account email password, well...
The security and privacy of the data that users transmit, more or less deliberately, to modern services is an open problem. It not solely limited actual Internet traversal, a sub-problem vastly tackled by consolidated research in protocol design analysis. By contrast, it enta ils much broader dimensions pertaining how approach technology understand risks for they enter. For example, may express cautious distracted personas depending on service point time; further, pre-established paths...