Pubblicazioni del gruppo di ricerca Cybersecurity


D’Elia Daniele Cono, Invidia Lorenzo, Palmaro Federico, Querzoni Leonardo
Desolda G., Ferro L. S., Marrella A., Catarci T., Costabile M. F.


Angelini Marco, Blasilli Graziano, Bonomi Silvia, Lenti Simone, Palleschi Alessia, Santucci Giuseppe, Paoli Emiliano De
BUCEPHALUS: a BUsiness CEntric cybersecurity Platform for proActive anaLysis Using visual analyticS. 2021 IEEE Symposium on Visualization for Cyber Security (VizSec) 2021: 15-25

Borrello P., D'Elia D. C., Querzoni L., Giuffrida C.
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. Proceedings of the ACM Conference on Computer and Communications Security 2021: 715-733

Magalini S., Gui D., Mari P., Merialdo M., Spanakis E., Sakkalis V., Rizzoni F., Casaroli A., &amp, , Bonomi S.
Di Luna Giuseppe Antonio, Italiano Davide, Massarelli Luca, Österlund Sebastian, Giuffrida Cristiano, Querzoni Leonardo
Distinguished paper award. Who’s debugging the debuggers? exposing debug information bugs in optimized binaries 2021: -

Spanakis Emmanouil G., Sfakianakis Stelios, Bonomi Silvia, Ciccotelli Claudio, Magalini Sabina, Sakkalis Vangelis
Massarelli Luca, Di Luna Giuseppe Antonio, Petroni Fabio, Querzoni Leonardo, Baldoni Roberto
Function Representations for Binary Similarity. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2021: -15

Borzacchiello Luca, Coppa Emilio, Demetrescu Camil
Fuzzing Symbolic Expressions. 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE) 2021: 711-722

Borrello Pietro, Coppa Emilio, D'Elia Daniele Cono
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation. 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2021: 555-568

Angelini M., Bonomi S., Ciccotelli C., Palma A.
Toward a Context-Aware Methodology for Information Security Governance Assessment Validation. Cyber-Physical Security for Critical Infrastructures Protection 2021: 171-187

Di Luna G. A., Italiano D., Massarelli L., Osterlund S., Giuffrida C., Querzoni L.
Who's Debugging the Debuggers? Exposing Debug Information Bugs in Optimized Binaries. ASPLOS 2021: Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems 2021: 1034-1045


Massarelli Luca, Aniello Leonardo, Ciccotelli Claudio, Querzoni Leonardo, Ucci Daniele, Baldoni Roberto
Di Luna Giuseppe Antonio, Anceaume Emmanuelle, Querzoni Leonardo
Byzantine Generalized Lattice Agreement. 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS) 2020: 674-683

Ambrosin M., Conti M., Lazzeretti R., Rabbani M. M., Ranise S.
Giuseppi A., Pietrabissa A., Liberati F., Di Giorgio A.
Controlled optimal black start procedures in smart grids for service restoration in presence of electrical storage systems. 2020 28th Mediterranean Conference on Control and Automation, MED 2020 2020: 746-751

Spanakis E. G., Bonomi S., Sfakianakis S., Santucci G., Lenti S., Sorella M., Tanasache F. D., Palleschi A., Ciccotelli C., Sakkalis V., Magalini S.
Cyber-attacks and threats for healthcare - A multi-layer thread analysis. Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2020: 5705-5708

Laurenza G., Lazzeretti R.
Liberati Francesco, Di Giorgio Alessandro, Giuseppi Alessandro, Pietrabissa Antonio, Delli Priscoli Francesco
Germana' Roberto, Giuseppi Alessandro, Di Giorgio Alessandro
Fioraldi A., Delia D. C., Querzoni L.
Fuzzing Binaries for Memory Safety Errors with QASan. 2020 IEEE Secure Development (SecDev) 2020: 23-30

Angelini Marco, Ciccotelli Claudio, Franchina Luisa, Marchetti Spaccamela Alberto, Querzoni Leonardo
Italian National Framework for Cybersecurity and Data Protection. Privacy Technologies and Policy 2020: 127-142

Pitolli Gregorio, Laurenza Giuseppe, Aniello Leonardo, Querzoni Leonardo, Baldoni Roberto
Laurenza Giuseppe, Lazzeretti Riccardo, Mazzotti Luca
D'Elia Daniele Cono
D'Elia D. C., Coppa E., Palmaro F., Cavallaro L.
On the Dissection of Evasive Malware. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2020: 2750-2765

Fioraldi A., D'Elia D. C., Coppa E.
WEIZZ: Automatic grey-box fuzzing for structured binary formats. ISSTA 2020 - Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis 2020: 1-13


Olivato M., Cotugno O., Brigato L., Bloisi D., Farinelli A., Iocchi L.
A Comparative Analysis on the use of Autoencoders for Robot Security Anomaly Detection. 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2019: 984-989

D'Elia Daniele Cono
Tanasache F. D., Sorella M., Bonomi S., Rapone R., Meacci D.
Building an emulation environment for cyber security analyses of complex networked systems. ACM International Conference Proceeding Series 2019: 203-212

Coppa Emilio, Finocchi Irene, Leon Garcia Renan
Bo P., Granato A., Mancuso M. E., Ciccotelli C., Querzoni L.
FADa-CPS—Faults and Attacks Discrimination in Cyber Physical Systems. Policy-Based Autonomic Data Governance 2019: 91-112

Massarelli Luca, DI LUNA GIUSEPPE ANTONIO, Petroni Fabio, Querzoni Leonardo, Baldoni Roberto
Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis. Proceedings BAR 2019 Workshop on Binary Analysis Research 2019: 1-11

Borzacchiello Luca, Coppa Emilio, D'Elia DANIELE CONO, Demetrescu Camil
Memory Models in Symbolic Execution: Key Ideas and New Thoughts. SOFTWARE TESTING, VERIFICATION & RELIABILITY 2019: -

Petagna Emanuele, Laurenza Giuseppe, Ciccotelli Claudio, Querzoni Leonardo
Peel the Onion: Recognition of Android Apps Behind the Tor Network. Information Security Practice and Experience 2019: 95-112

Petagna Emanuele, Laurenza Giuseppe, Ciccotelli Claudio, Querzoni Leonardo
Borzacchiello Luca, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution. Cyber Security Cryptography and Machine Learning 2019: 121-140

Massarelli Luca, Di Luna Giuseppe Antonio, Petroni Fabio, Baldoni Roberto, Querzoni Leonardo
SAFE: Self-Attentive Function Embeddings for Binary Similarity. Detection of Intrusions and Malware, and Vulnerability Assessment 2019: 309-329

Barni M., Droandi G., Lazzeretti R., Pignata T.
Semba: Secure multi-biometric authentication. IET BIOMETRICS 2019: 411-421

D'Elia DANIELE CONO, Coppa Emilio, Nicchi Simone, Palmaro Federico, Cavallaro Lorenzo
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). AsiaCCS '19 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019: 15-27

D'Elia D. C., Coppa E., Salvati A., Demetrescu C.
Static analysis of ROP code. EuroSec '19 Proceedings of the 12th European Workshop on Systems Security 2019: -

Angelini Marco, Blasilli Graziano, Borzacchiello Luca, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil, Lenti Simone, Nicchi Simone, Santucci Giuseppe
SymNav: Visually Assisting Symbolic Execution. Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security (VizSec 2019) 2019: -

Borrello P., Coppa E., D'Elia D. C., Demetrescu C.
The ROP needle: Hiding trigger-based injection vectors via code reuse. SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 2019: 1962-1970

Coltellese Simone, Maria Maggi Fabrizio, Marrella Andrea, Massarelli Luca, Querzoni Leonardo
Triage of IoT Attacks Through Process Mining. On the Move to Meaningful Internet Systems: OTM 2019 Conferences 2019: 326-344

Angelini Marco, Blasilli Graziano, Catarci Tiziana, Lenti Simone, Santucci Giuseppe
Vulnus: Visual Vulnerability Analysis for Network Security. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 2019: 183-192


Baldoni Roberto, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil, Finocchi Irene
A Survey of Symbolic Execution Techniques. ACM COMPUTING SURVEYS 2018: -

Angelini Marco, Bonomi Silvia, Borzi Emanuele, Del Pozzo Antonella, Lenti Simone, Santucci Giuseppe
An attack graph-based on-line multi-step attack detector. ICDCN '18 Proceedings of the 19th International Conference on Distributed Computing and Networking 2018: -

Luo Ying, Cheung Sen ching S., Lazzeretti Riccardo, Pignata Tommaso, Barni Mauro
Anonymous subject identification and privacy information management in video surveillance. INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2018: 261-278

Bonomi Silvia, Del Pozzo Antonella, Potop-Butucaru Maria, Tixeuil Sébastien
Approximate Agreement under Mobile Byzantine Faults. THEORETICAL COMPUTER SCIENCE 2018: 17-29

Bonomi S., Del Pozzo A., Potop-Butucaru M., Tixeuil S.
Brief announcement: Optimal self-stabilizing mobile byzantine-tolerant regular register with bounded timestamps. Stabilization, Safety, and Security of Distributed Systems 2018: 398-403

Chatzigiannakis Ioannis, Liagkou Vasiliki, Spirakis Paul G.
Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks. Cyber Security Cryptography and Machine Learning 2018: 101-104

Compagno Alberto, Conti Mauro, Munari Stefano, Lazzeretti Riccardo
GATE and FENCE: Geo-Blocking Protocols for Named Data Networking. 2018 IEEE 43rd Conference on Local Computer Networks (LCN) 2018: 580-588

Baldoni Roberto, De Nicola Rocco, Prinetto Paolo, Anglano COSIMO FILOMENO, Aniello Leonardo, Antinori Arije, Armando Alessandro, Aversa Rocco, Baldi Marco, Barili Antonio, Bartoletti Massimo, Basile Basile, Bellini Marco, Bergadano Francesco, Bernardeschi Cinzia, Bertino , Elisa Bianchi, Giuseppe , Biancotti Claudia, Bistarelli Stefano, Blefari Melazzi Nicola, Boetti Milena, Bondavalli Andrea, Bonomi Silvia, Buccafurri Francesco, Cambiaso Enrico, Caputo Barbara, Carminati Barbara, Cataliotti Francesco Saverio, Catarci Tiziana, Ceccarelli Andrea, Cesa Bianchi Nicolò, Chiaraluce Franco, Colajanni Michele, Conti Marco, Conti Mauro, Coppolino Luigi, Costa Gabriele, Costamagna Valerio, Cotroneo Domenico, Crispo Bruno, Cucchiara Rita, D’Antonio Salvatore, Damiani Ernesto, De Nicola Rocco, De Santis Alfredo, Di Battista Giuseppe, Di Martino Beniamino, Degiovanni Ivo Pietro, Demetrescu Camil, Di Corinto Arturo, Di Luna Antonio, Di Natale Giorgio, Dini Gianluca, Evangelisti Marco, Falcinelli Daniela, Figà Gianna, Ferretti Marco, Ficco Massimo, Flocchini Paola, Flottes Marie-Lise, Focardi Riccardo, Franchina Luisa, Furfaro Angelo, Girdinio Paola, Guida Franco, Italiano Giuseppe F., Lain Daniele, Laurenti Nicola, Lioy Antonio, Loreti Michele, Malerba Donato, Mancini Luigi Vincenzo, Marchetti Spaccamela Alberto, Marcialis Gianluca, Margheri Andrea, Marrella Andrea, Martinelli Fabio, Martinelli Maurizio, Martino Luigi, Massacci Fabio, Mayer Marco, Mecella Massimo, Mensi Maurizio, Merlo Alessio, Miculan Marino, Montanari Luca, Morana Marco, Mosco Gian Domenico, Mostarda Leonardo, Murino Vittorio, Nardi Daniele, Navigli Roberto, Palazzi Andrea, Palmieri Francesco, Panetta Ida, Passarella Andrea, Pellegrini Alessandro, Pelosi Gerardo, Pellegrino Giancarlo, Pirlo Giuseppe, Piuri Vincenzo, Pizzonia Maurizio, Pogliani Marcello, Polino Mario, Pontil Massimiliano, Prinetto Paolo, Quaglia Francesco, Quattrociocchi Walter, Querzoni Leonardo, Rak Massimiliano, Ranise Silvio, Ricci Elisa, Rossi Lorenzo, Rota Paolo, Russo Ludovico Orlando, Samarati Pierangela, Santoro Nicola, Santucci Beppe, Sassone Vladimiro, Scala Antonio, Scotti Fabio, Servida Andrea, Spagnoletti Paolo, Spalazzi Luca, Spidalieri Francesca, Spoto Austo, Squarcina Marco, Stefanelli Stefania, Vecchio Alessio, Venticinque Salvatore, Villoresi Paolo, Visaggio Aaron, Vitaletti Andrea, Zanero Stefano
Adamsky F., Aubigny M., Battisti F., Carli M., Cimorelli F., Cruz T., Di Giorgio A., Foglietta C., Galli A., Giuseppi A., Liberati F., Neri A., Panzieri S., Pascucci F., Proenca J., Pucci P., Rosa L., Soua R.
Integrated protection of industrial control systems from cyber-attacks: the ATENA approach. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION 2018: 72-82

Capossele Angelo, Gaglione Andrea, Nati Michele, Conti Mauro, Lazzeretti Riccardo, Missier Paolo
Leveraging Blockchain to Enable Smart-Health Applications. 2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI) 2018: 333-338

Ambrosin M., Conti M., Lazzeretti R., Rabbani M. M., Ranise S.
PADS: Practical Attestation for Highly Dynamic Swarm Topologies. 2018 International Workshop on Secure Internet of Things (SIoT) 2018: 18-27

Elingiusti M., Aniello L., Querzoni L., Baldoni R.
Bonomi Silvia, Farina Giovanni, Tixeuil Sébastien
Reliable Broadcast in Dynamic Networks with Locally Bounded Byzantine Failures. Stabilization, Safety, and Security of Distributed Systems 2018: 170-185

Giuseppi A., Germana R., Di Giorgio A.
Risk Adverse Virtual Power Plant Control in Unsecure Power Systems. 2018 26th Mediterranean Conference on Control and Automation (MED) 2018: 210-216

Di Giorgio Alessandro, Pietrabissa Antonio, Delli Priscoli Francesco, Isidori Alberto
Robust protection scheme against cyber-physical attacks in power systems. IET CONTROL THEORY & APPLICATIONS 2018: 1792-1801

Marco Angelini, Graziano Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia , Serena Ferracci, Simone Lenti, Giuseppe Santucci
ROPMate: Visually Assisting the Creation of ROP-based Exploits. 2018 IEEE Symposium on Visualization for Cyber Security (VizSec) 2018: -

Baldoni R., De Nicola R., Prinetto P., Anglano C., Aniello L., Antinori A., Armando A., Aversa R., Baldi Marco, Barili A., Bartoletti M., Bellini M., Bergadano F., Bernardeschi C., Bianchi E., Biancotti C., Bistarelli S., Blefari Melazzi N., Boetti M., Bondavalli A., Bonomi ., Buccafurri F., Cambiaso E., Caputo B., Carminati B., Cataliotti F. S., Catarci T., Ceccarelli A., Cesa Bianchi N., Chiaraluce F., Colajanni M., Conti M., Conti M., Coppolino L., Costa G., Costamagna V., Cotroneo D., Crispo B., Cucchiara R., D’Antonio S., Damiani E., De Nicola R., De Santis A., Di Battista G., Di Martino B., Degiovanni I. P., Demetrescu C., Di Corinto A., Di Luna A., Di Natale G., Dini G., Evangelisti M., Falcinelli D., Figà G., Ferretti M., Ficco M., Flocchini P., Flottes M., Focardi R., Furfaro Franchina., Girdinio P., Guida F., Italiano G. F., Lain D., Laurenti N., Lioy A., Loreti M., Malerba D., Mancini L. V., Marchetti Spaccamela A., Marcialis G., Margheri A., Marrella A., Martinelli F., Martinelli M., Martino L., Massacci F., Mayer M., Mecella M., Mensi M., Merlo A., Miculan M., Montanari L., Morana M., Mosco G. D., Mostarda L., Murino V., Nardi D., Navigli R., Palazzi A., Palmieri F., Panetta I. C., Passarella A., Pellegrini A., Pelosi G., Pellegrino G., Pirlo G., Piuri V., Pizzonia M., Pogliani M., Polino M., Pontil M., Prinetto P., Quaglia F., Quattrociocchi W., Querzoni L., Rak M., Ranise S., Ricci E., Rossi L., Rota P., Russo L. O., Samarati P., Santoro N., Santucci B., Sassone V., Scala A., Scotti F., Servida A., Spagnoletti P., Spalazzi L., Spidalieri F., Spoto A., Squarcina M., Stefanelli S., Vecchio A., Venticinque S., Villoresi P., Visaggio A., Vitaletti A., Zanero S.
Fiaschetti A., Azzoni P., Noll J., Uribeetxeberria R., Pietrabissa A., Priscoli F. D., Suraci V., Mignanti S., Liberati F., Panfili M., Di Giorgio A., Morgagni A.
The SHIELD approach. Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The SHIELD Methodology 2018: 105-158

Angeletti Fabio, Chatzigiannakis Ioannis, Vitaletti Andrea
Baldoni Roberto, DI LUNA GIUSEPPE ANTONIO, Massarelli Luca, Petroni Fabio, Querzoni Leonardo


Massarelli Luca, Aniello Leonardo, Ciccotelli Claudio, Querzoni Leonardo, Ucci Daniele, Baldoni Roberto
Massarelli L, Aniello L, Ciccotelli C, Querzoni L., Ucci D., Baldoni R.
Android malware family classification based on resource consumption over time. Proceedings of the 2017 12th International Conference on Malicious and Unwanted Software, MALWARE 2017 2017: 31-38

Baldoni Roberto, Coppa Emilio, D’Elia Daniele Cono, Demetrescu Camil
Assisting malware analysis with symbolic execution: A case study. Cyber Security Cryptographyand Machine Learning 2017: 171-188

DEL POZZO Antonella, Bonomi Silvia, Lazzeretti Riccardo, Baldoni Roberto
Building Regular Registers with Rational Malicious Servers and Anonymous Clients. Cyber Security Cryptography and Machine Learning 2017: 50-67

DELLI PRISCOLI Francesco, DI GIORGIO Alessandro, Esposito Mariana, Fiaschetti Andrea, Flammini Francesco, Mignanti Silvano, Pragliola Concetta
Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD. INTERNATIONAL JOURNAL OF CRITICAL COMPUTER-BASED SYSTEMS 2017: 138-170

Di Pirro Matteo, Conti Mauro, Lazzeretti Riccardo
Ensuring information security by using Haskell's advanced type system. 2017 International Carnahan Conference on Security Technology (ICCST) 2017: 1-6

Conti Mauro, Lain Daniele, Lazzeretti Riccardo, Lovisotto Giulio, Quattrociocchi Walter
Pitolli Gregorio, Aniello Leonardo, Laurenza Giuseppe, Querzoni Leonardo, Baldoni Roberto
Malware Family Identification with BIRCH Clustering. 2017 International Carnahan Conference on Security Technology (ICCST) 2017: -

Laurenza Giuseppe, Aniello Leonardo, Lazzeretti Riccardo, Baldoni Roberto
Malware Triage Based on Static Features and Public APT Reports. Cyber Security Cryptographyand Machine Learning 2017: 288-305

Ambrosin Moreno, Braca Paolo, Conti Mauro, Lazzeretti Riccardo
DI GIORGIO Alessandro, Giuseppi Alessandro, Liberati Francesco, Ornatelli Antonio, Rabezzano Antonio, RICCIARDI CELSI Lorenzo
Ambrosin Moreno, Conti Mauro, Lazzeretti Riccardo, Rabbani Md Masoom, Ranise Silvio
Poster: Toward secure and efficient attestation for highly dynamic swarms. Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017 2017: 281-282

Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil
Rethinking Pointer Reasoning in Symbolic Execution. ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering 2017: 613-618


Chatzigiannakis Ioannis, Vitaletti Andrea, Pyrgelis Apostolos
Kallas K., Tondi B., Lazzeretti Riccardo, Barni M.
Braca P, Lazzeretti Riccardo, Marano S, Matta S.
Learning With Privacy in Consensus + Obfuscation. IEEE SIGNAL PROCESSING LETTERS 2016: 1174-1178

Lazzeretti Riccardo, Pignata Tommaso, Barni Mauro
Piecewise Function Approximation with Private Data. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2016: 642-657

Bonomi Silvia, Matteucci Ilaria
Third International Workshop on Reliability and Security Aspects for Critical Infrastructure protection (ReSA4CI 2016). 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W) 2016: 136-136

Bonomi Silvia, DEL POZZO Antonella, Potop Butucaru Maria
Tight self-stabilizing mobile byzantine-tolerant atomic register. Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore, January 4-7, 2016 2016: 1-10


Bonomi Silvia, Matteucci Ilaria
Introduction to the safecomp 2015 workshop: Reliability and security aspects for critical infrastructure protection. Computer Safety,Reliability, and Security. SAFECOMP 2015 Workshops ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR 2015: XXI-XXIII

Lazzeretti Riccardo, Barni M.
Lazzeretti Riccardo, Pignata T.
Privacy preserving cloud computing through piecewise approximation of multivariate functions. 2015 IEEE Conference on Communications and Network Security (CNS) 2015: 515-523

Barni M, Droandi G, Lazzeretti Riccardo
Droandi G, Lazzeretti Riccardo
SHE based Non Interactive Privacy Preserving Biometric Authentication Protocols. 2015 IEEE 9th International Symposium on Intelligent Signal Processing (WISP) Proceedings 2015: 1-6


Aniello Leonardo, Armenia Stefano, Baldoni Roberto, D'Amore Fabrizio, Annachiara Di Paolo, Franchina Luisa, Montanari Luca, Panetta Ida Claudia, Querzoni Leonardo, Giovanni Rellini Lerz, Vincenzo Verde Nino
Aniello Leonardo, A. Bondavalli, A. Ceccarelli, Ciccotelli Claudio, M. Cinque, F. Frattini, A. Guzzo, A. Pecchia, A. Pugliese, Querzoni Leonardo, S. Russo
Big data in critical infrastructures security monitoring: challenges and opportunities. Proceedings of the first International Workshop on Real-time Big Data Analytics for Critical Infrastructure Protection 2014: -

Lazzeretti Riccardo, Horn S, Braca P, Willett P.
Secure multi-party consensus gossip algorithms. 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2014: 7406-7410

Aniello Leonardo, Baldoni Roberto, Ciccotelli Claudio, DI LUNA GIUSEPPE ANTONIO, F. Frontali, Querzoni Leonardo
The overlay scan attack: inferring topologies of distributed pub/sub systems through broker saturation. Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems 2014: 107-117


Angelini Marco, Arcuri MARIA CRISTINA, Baldoni Roberto, Ciccotelli Claudio, DI LUNA GIUSEPPE ANTONIO, Montanari Luca, Panetta Ida Claudia, Querzoni Leonardo, Verde NINO VINCENZO
Baldoni Roberto, DI LUNA GIUSEPPE ANTONIO, Querzoni Leonardo
Collaborative detection of coordinated port scans. Proceedings of the International Conference on Distributed Computing and Networking 2013: 102-117

Barni M, Bernaschi Massimo, Lazzeretti Riccardo, Pignata T, Sabellico A.
Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting. Data Privacy Management and Autonomous Spontaneous Security 2013: 66-82

Lazzeretti Riccardo, Failla P., Barni M.
Lazzeretti Riccardo, Barni M.
Private computing with garbled circuits [applications corner]. IEEE SIGNAL PROCESSING MAGAZINE 2013: 123-127

Lazzeretti Riccardo, Pignata T, Barni M.
Secure Evaluation of Private Functions through Piecewise Linear Approximation. 2013 IEEE International Workshop on Information Forensics and Security (WIFS) 2013: 55-60

Baldoni Roberto, Bonomi Silvia, DI LUNA GIUSEPPE ANTONIO, Montanari Luca, Sorella Mara
Understanding (mis)information spreading for improving corporate network trustworthiness. Lecture Notes in Computer ScienceDependable Computing 2013: 165-172


DI GIORGIO Alessandro, Liberati Francesco
Luo Y, Cheung S, Pignata T, Lazzeretti Riccardo, Barni M.
An efficient protocol for private iris-code matching by means of garbled circuits. 2012 19th IEEE International Conference on Image Processing 2012: 2653-2656

Pignata T, Lazzeretti Riccardo, Barni M.
General function evaluation in a STPC setting via piecewise linear approximation. 2012 IEEE International Workshop on Information Forensics and Security (WIFS) 2012: 55-60

Lazzeretti Riccardo, Guajardo J, Barni M.
Privacy preserving ECG quality evaluation. MM&Sec '12 Proceedings of the on Multimedia and security 2012: 165-174


Lazzeretti Riccardo, Barni M.
Division between encrypted integers by means of Garbled Circuits. 2011 IEEE International Workshop on Information Forensics and Security 2011: 1-6

DI GIORGIO Alessandro, Francesco Liberati
Interdependency modeling and analysis of critical infrastructures based on Dynamic Bayesian Networks. 19th Mediterranean Conference on Control & Automation (MED 2011) 2011: 791-797

Barni M, Failla P, Lazzeretti Riccardo, Sadeghi A. R, Schneider T.
Privacy-preserving ECG classification with branching programs and neural networks. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2011: 452-468


Barni M, Bianchi T, Catalano D, Di Raimondo M, Labati R. D, Failla P, Fiore D, Lazzeretti Riccardo, Piuri V, Piva A, Scotti F.
A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates. 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) 2010: 1-7

Barni M, Guajardo J, Lazzeretti Riccardo
Privacy preserving evaluation of signal quality with application to ECG analysis. 2010 IEEE International Workshop on Information Forensics and Security 2010: -

Barni M, Bianchi T, Catalano D, Di Raimondo M, Donida Labati R, Failla P, Fiore D, Lazzeretti Riccardo, Piuri V, Scotti F, Piva A.
Privacy-preserving fingercode authentication. MM&Sec '10 Proceedings of the 12th ACM workshop on Multimedia and security 2010: 231-240


Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification. International Workshop on Signal Processing in the EncryptEd Domain - colocated with CHES 2009 2009: 1-20

'Barni M, Failla P, Koleshnikov V, Lazzeretti Riccardo, Paus A, Sadeghi A, Schneider T.
Efficient Privacy-Preserving Classification of ECG Signals. 2009 First IEEE International Workshop on Information Forensics and Security (WIFS) 2009: 91-95

Barni M, Failla P, Kolesnikov V, Lazzeretti Riccardo, Sadeghi A, Schneider T.


Lazzeretti Riccardo, Barni M.
Lossless Compression of Encrypted Grey-Level and Color Images. 16th European Signal Processing Conference, EUSIPCO 2008 2008: 1-5

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma