Giampaolo Bella

ORCID: 0000-0002-7615-8643
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Information and Cyber Security
  • Cryptography and Data Security
  • Advanced Malware Detection Techniques
  • Access Control and Trust
  • Vehicular Ad Hoc Networks (VANETs)
  • Privacy, Security, and Data Protection
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • Multi-Agent Systems and Negotiation
  • Blockchain Technology Applications and Security
  • Cryptographic Implementations and Security
  • Opportunistic and Delay-Tolerant Networks
  • Security and Verification in Computing
  • Digital and Cyber Forensics
  • Semantic Web and Ontologies
  • Adversarial Robustness in Machine Learning
  • Cybersecurity and Cyber Warfare Studies
  • Formal Methods in Verification
  • Logic, Reasoning, and Knowledge
  • Autonomous Vehicle Technology and Safety
  • Software Testing and Debugging Techniques
  • Mobile Agent-Based Network Management

University of Catania
2015-2024

KTH Royal Institute of Technology
2015

De Montfort University
2011-2014

Tulane University
2013

Los Alamitos Medical Center
2013

Istituto di Matematica Applicata e Tecnologie Informatiche
2013

University of Luxembourg
2013

Centre Azuréen de Cancérologie
2011

University of Cambridge
1997-2005

10.3233/jcs-2009-0346 article EN Journal of Computer Security 2009-04-15

Attackers may attempt exploiting Internet of Things (IoT) devices to operate them unduly as well gather personal data the legitimate device owners'. Vulnerability Assessment and Penetration Testing (VAPT) sessions help verify effectiveness adopted security measures. However, VAPT over IoT devices, namely targeted at is an open research challenge due variety target technologies creativity it require. Therefore, this article aims guiding penetration testers conduct by means a new cyber Kill...

10.1016/j.iot.2023.100707 article EN cc-by-nc-nd Internet of Things 2023-02-10

10.1007/s10207-025-00999-0 article EN cc-by International Journal of Information Security 2025-03-01

Abstract The advanced and personalised experience that modern cars offer makes them more data-hungry. For example, the cabin preferences of possible drivers must be recorded associated to some identity, while such data could exploited deduce sensitive information about driver’s health. Therefore, drivers’ privacy taken seriously, requiring a dedicated risk assessment framework, as presented in this paper through double combining asset-oriented ISO approach with threat-oriented STRIDE...

10.1007/s42154-022-00203-2 article EN cc-by Automotive Innovation 2023-01-06

Modern cars are no longer purely mechanical devices but shelter so much digital technology that they resemble a network of computers. Electronic Control Units (ECUs) need to exchange large amount data for the various functions car work, and such must be made secure if we want those work as intended despite malicious activity by attackers. TOUCAN is new security protocol designed at same time both CAN AUTOSAR compliant. It achieves in terms authenticity, integrity confidentiality, yet without...

10.1145/3309171.3309175 preprint EN 2019-03-13

Electronic commerce and finance are progressively supporting including decentralized, shared public ledgers such as the blockchain. This is reshaping traditional commercial activities by advancing them towards Decentralized Finance (DeFi) Commerce 3.0, thereby latter’s potential to outpace hurdles of central authority controllers lawgivers. The quantity entropy information that must be sought managed become active participants in a relentlessly evolving scenario increasing at steady pace....

10.3233/sw-243543 article EN other-oa Semantic Web 2024-03-15

Secure electronic transaction (SET) is an immense e-commerce protocol designed to improve the security of credit card purchases. In this paper, we focus on initial bootstrapping phases SET, whose objective registration cardholders and merchants with a SET certificate authority. The aim twofold: getting approval cardholder's or merchant's bank replacing traditional numbers credentials that can present merchant so their privacy protected. These subprotocols number challenges current formal...

10.1109/jsac.2002.806133 article EN IEEE Journal on Selected Areas in Communications 2003-01-01

10.1007/s10817-005-9018-6 article EN Journal of Automated Reasoning 2006-02-24

The Secure Electronic Transaction (SET) protocol has been proposed by a consortium of credit card companies and software corporations to secure e-commerce transactions. When the customer makes purchase, SET dual signature guarantees authenticity while keeping customer's account details secret from merchant his choice goods bank.This paper reports first verification results for complete purchase phase SET. Using Isabelle inductive method, we showed that do remain confidential customer, bank...

10.1145/586110.586113 article EN 2002-11-18

Classical security protocols aim to achieve authentication and confidentiality under the assumption that peers behave honestly. Some recent are required their goals even if peer misbehaves. Accountability is a protocol design strategy may help. It delivers sufficient evidence of each other's participation in protocol. underlies nonrepudiation Zhou Gollmann certified email Abadi et al. This paper provides comparative, formal analysis two protocols, confirms they reach realistic conditions....

10.1145/1151414.1151416 article EN ACM Transactions on Information and System Security 2006-05-01

Despite their apparent simplicity, devices like smart light bulbs and electrical plugs are often perceived as exempt from rigorous security measures.However, this paper challenges misconception, uncovering how vulnerabilities in these seemingly innocuous can expose users to significant risks.This extends the findings outlined previous work, introducing a novel attack scenario.This new allows malicious actors obtain sensitive credentials, including victim's Tapo account email password, well...

10.5220/0012767700003767 preprint EN 2024-01-01

10.1007/s10817-010-9185-y article EN Journal of Automated Reasoning 2010-07-16

The security and privacy of the data that users transmit, more or less deliberately, to modern services is an open problem. It not solely limited actual Internet traversal, a sub-problem vastly tackled by consolidated research in protocol design analysis. By contrast, it enta ils much broader dimensions pertaining how approach technology understand risks for they enter. For example, may express cautious distracted personas depending on service point time; further, pre-established paths...

10.3233/jcs-150536 article EN Journal of Computer Security 2015-09-29
Coming Soon ...