Pubblicazioni del gruppo di ricerca Computer Vision, Computer Graphics, Deep Learning, Cybersecurity, Theory of Deep Learning

2023

Maiano Luca, Montuschi Antonio, Caserio Marta, Ferri Egon, Kieffer Federico, Germanò Chiara, Baiocco Lorenzo, RICCIARDI CELSI Lorenzo, Amerini Irene, Anagnostopoulos Aristidis
A deep-learning–based antifraud system for car-insurance claims. EXPERT SYSTEMS WITH APPLICATIONS 2023: 120644-

Mekdad Yassine, Aris Ahmet, Babun Leonardo, El Fergougui Abdeslam, Conti Mauro, Lazzeretti Riccardo, Selcuk Uluagac A.
Assaiante C., D'Elia D. C., Di Luna G. A., Querzoni L.
Where Did My Variable Go? Poking Holes in Incomplete Debug Information. International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS 2023: 935-947

2022

Acitelli G., Angelini M., Bonomi S., Maggi F. M., Marrella A., Palma A.
Context-Aware Trace Alignment with Automated Planning. Proceedings of the 4th International Conference on Process Mining, ICPM 2022 2022: 104-111

Artuso F., Di Luna G. A., Querzoni L.
Maiano Luca, Papa Lorenzo, Vocaj Ketbjano, Amerini Irene
DepthFake: a depth-based strategy for detecting Deepfake videos. ICPR 2022 Workshop on Artificial Intelligence for Multimedia Forensics and Disinformation Detection 2022: -

D’Elia Daniele Cono, Invidia Lorenzo, Palmaro Federico, Querzoni Leonardo
Borzacchiello Luca, Coppa Emilio, Demetrescu Camil
Handling Memory-Intensive Operations in Symbolic Execution. ISEC 2022: 15th Innovations in Software Engineering Conference 2022: -

Desolda G., Ferro L. S., Marrella A., Catarci T., Costabile M. F.
Baldini Gianmarco, Amerini Irene
Microphone Identification based on Spectral Entropy with Convolutional Neural Network. 2022 IEEE International Workshop on Information Forensics and Security (WIFS) 2022: 1-6

Amerini I., Conti M., Giacomazzi P., Pajola L.
PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart. Proceedings of the International Joint Conference on Neural Networks 2022: 1-7

Priamo Giacomo, D'Elia Daniele Cono, Querzoni Leonardo
Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection. Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering 2022: 1-5

Borzacchiello L., Coppa E., Maiorca D., Columbu A., Demetrescu C., Giacinto G.
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2022: 701-722

Borzacchiello L., Coppa E., Demetrescu C.
Bardhi E., Conti M., Lazzeretti R., Losiouk E., Taffal A.
Sim2Testbed Transfer: NDN Performance Evaluation. Proceedings of the 17th International Conference on Availability, Reliability and Security 2022: 1-9

Coppa Emilio, Yin Heng, Demetrescu Camil
SymFusion: Hybrid Instrumentation for Concolic Execution. Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE 2022) 2022: -

2021

Frontera S., Lazzeretti R.
Bloom Filter based Collective Remote Attestation for Dynamic Networks. ARES 2021: The 16th International Conference on Availability, Reliability and Security 2021: 1-10

Angelini Marco, Blasilli Graziano, Bonomi Silvia, Lenti Simone, Palleschi Alessia, Santucci Giuseppe, Paoli Emiliano De
BUCEPHALUS: a BUsiness CEntric cybersecurity Platform for proActive anaLysis Using visual analyticS. 2021 IEEE Symposium on Visualization for Cyber Security (VizSec) 2021: 15-25

Borrello P., D'Elia D. C., Querzoni L., Giuffrida C.
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. Proceedings of the ACM Conference on Computer and Communications Security 2021: 715-733

Magalini S., Gui D., Mari P., Merialdo M., Spanakis E., Sakkalis V., Rizzoni F., Casaroli A., &amp, , Bonomi S.
Amerini I., Anagnostopoulos A., Maiano L., ricciardi Celsi L.
Deep learning for multimedia forensics. FOUNDATIONS AND TRENDS IN COMPUTER GRAPHICS AND VISION 2021: 309-457

D'Elia Daniele Cono, Nicchi Simone, Mariani Matteo, Marini Matteo, Palmaro Federico
Designing Robust API Monitoring Solutions. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2021: 1-15

Di Luna Giuseppe Antonio, Italiano Davide, Massarelli Luca, Österlund Sebastian, Giuffrida Cristiano, Querzoni Leonardo
Distinguished paper award. Who’s debugging the debuggers? exposing debug information bugs in optimized binaries 2021: -

Spanakis Emmanouil G., Sfakianakis Stelios, Bonomi Silvia, Ciccotelli Claudio, Magalini Sabina, Sakkalis Vangelis
Massarelli Luca, Di Luna Giuseppe Antonio, Petroni Fabio, Querzoni Leonardo, Baldoni Roberto
Function Representations for Binary Similarity. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2021: -

Borzacchiello Luca, Coppa Emilio, Demetrescu Camil
Fuzzing Symbolic Expressions. 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE) 2021: 711-722

Borzacchiello L., Coppa E., Demetrescu C.
Borrello Pietro, Coppa Emilio, D'Elia Daniele Cono
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation. 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2021: 555-568

Bardhi Enkeleda, Conti Mauro, Lazzeretti Riccardo, Losiouk Eleonora
ICN PATTA: ICN Privacy Attack Through Traffic Analysis. 2021 IEEE 46th Conference on Local Computer Networks (LCN) 2021: 443-446

Maiano L., Amerini I., Ricciardi Celsi L., Anagnostopoulos A.
Amerini I., Baldini G., Leotta F.
Image and video forensics. JOURNAL OF IMAGING 2021: -

Ambrosin M., Conti M., Lazzeretti R., Yu C. -M.
Cabal-Yepez E., Ledesma-Carrillo L. M., Botella G., Amerini I.
Baldini G., Ramos J. L. H., Amerini I.
Amerini I., Anagnostopoulos A., Maiano L., Ricciardi Celsi Lorenzo
Learning double-compression video fingerprints left from social-media platforms. ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2021: 2530-2534

Pasquini C., Amerini I., Boato G.
Media forensics on social media platforms: a survey. EURASIP JOURNAL ON MULTIMEDIA AND INFORMATION SECURITY 2021: -

Caldelli R., Galteri L., Amerini I., Del Bimbo A.
D'Elia D. C., Invidia L., Querzoni L.
Angelini M., Bonomi S., Ciccotelli C., Palma A.
Toward a Context-Aware Methodology for Information Security Governance Assessment Validation. Cyber-Physical Security for Critical Infrastructures Protection 2021: 171-187

Di Luna G. A., Italiano D., Massarelli L., Osterlund S., Giuffrida C., Querzoni L.
Who's Debugging the Debuggers? Exposing Debug Information Bugs in Optimized Binaries. ASPLOS 2021: Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems 2021: 1034-1045

2020

Baldini G., Amerini I.
Massarelli Luca, Aniello Leonardo, Ciccotelli Claudio, Querzoni Leonardo, Ucci Daniele, Baldoni Roberto
Di Luna Giuseppe Antonio, Anceaume Emmanuelle, Querzoni Leonardo
Byzantine Generalized Lattice Agreement. 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS) 2020: 674-683

Ambrosin M., Conti M., Lazzeretti R., Rabbani M. M., Ranise S.
Giuseppi A., Pietrabissa A., Liberati F., Di Giorgio A.
Controlled optimal black start procedures in smart grids for service restoration in presence of electrical storage systems. 2020 28th Mediterranean Conference on Control and Automation, MED 2020 2020: 746-751

Spanakis E. G., Bonomi S., Sfakianakis S., Santucci G., Lenti S., Sorella M., Tanasache F. D., Palleschi A., Ciccotelli C., Sakkalis V., Magalini S.
Cyber-attacks and threats for healthcare - A multi-layer thread analysis. Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2020: 5705-5708

Laurenza G., Lazzeretti R.
Liberati Francesco, Di Giorgio Alessandro, Giuseppi Alessandro, Pietrabissa Antonio, Delli Priscoli Francesco
Germana' Roberto, Giuseppi Alessandro, Di Giorgio Alessandro
Amerini I., Caldelli R.
Exploiting Prediction Error Inconsistencies through LSTM-based Classifiers to Detect Deepfake Videos. IH and MMSec 2020 - Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security 2020: 97-102

Fioraldi A., Delia D. C., Querzoni L.
Fuzzing Binaries for Memory Safety Errors with QASan. Proceedings - 2020 IEEE Secure Development, SecDev 2020 2020: 23-30

Angelini Marco, Ciccotelli Claudio, Franchina Luisa, Marchetti Spaccamela Alberto, Querzoni Leonardo
Italian National Framework for Cybersecurity and Data Protection. Privacy Technologies and Policy. APF 2020 2020: -

Pitolli Gregorio, Laurenza Giuseppe, Aniello Leonardo, Querzoni Leonardo, Baldoni Roberto
Laurenza Giuseppe, Lazzeretti Riccardo, Mazzotti Luca
D'Elia Daniele Cono
D'Elia D. C., Coppa E., Palmaro F., Cavallaro L.
On the Dissection of Evasive Malware. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2020: 2750-2765

Fioraldi A., D'Elia D. C., Coppa E.
WEIZZ: Automatic grey-box fuzzing for structured binary formats. ISSTA 2020 - Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis 2020: 1-13

2019

Olivato M., Cotugno O., Brigato L., Bloisi D., Farinelli A., Iocchi L.
A Comparative Analysis on the use of Autoencoders for Robot Security Anomaly Detection. 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2019: 984-989

D'Elia Daniele Cono
Tanasache F. D., Sorella M., Bonomi S., Rapone R., Meacci D.
Building an emulation environment for cyber security analyses of complex networked systems. ACM International Conference Proceeding Series 2019: 203-212

Coppa Emilio, Finocchi Irene, LEON GARCIA Renan
AMERINI IRENE, Galteri Leonardo, Caldelli Roberto, Del Bimbo Alberto
Deepfake Video Detection through Optical Flow Based CNN. 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW) 2019: 1205-1207

Bo P., Granato A., Mancuso M. E., Ciccotelli C., Querzoni L.
FADa-CPS—Faults and Attacks Discrimination in Cyber Physical Systems. Policy-Based Autonomic Data Governance 2019: 91-112

Massarelli Luca, DI LUNA GIUSEPPE ANTONIO, Petroni Fabio, Querzoni Leonardo, Baldoni Roberto
Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis. Proceedings BAR 2019 Workshop on Binary Analysis Research 2019: 1-11

Borzacchiello Luca, Coppa Emilio, D'Elia DANIELE CONO, Demetrescu Camil
Memory Models in Symbolic Execution: Key Ideas and New Thoughts. SOFTWARE TESTING, VERIFICATION & RELIABILITY 2019: -

Baldini Gianmarco, Amerini Irene, Gentile Claudio
Petagna Emanuele, Laurenza Giuseppe, Ciccotelli Claudio, Querzoni Leonardo
Peel the Onion: Recognition of Android Apps Behind the Tor Network. Information Security Practice and Experience 2019: 95-112

Petagna Emanuele, Laurenza Giuseppe, Ciccotelli Claudio, Querzoni Leonardo
Borzacchiello Luca, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution. Cyber Security Cryptography and Machine Learning 2019: 121-140

Massarelli Luca, Di Luna Giuseppe Antonio, Petroni Fabio, Baldoni Roberto, Querzoni Leonardo
SAFE: Self-Attentive Function Embeddings for Binary Similarity. Detection of Intrusions and Malware, and Vulnerability Assessment 2019: 309-329

Barni M., Droandi G., Lazzeretti R., Pignata T.
Semba: Secure multi-biometric authentication. IET BIOMETRICS 2019: 411-421

Amerini I., Li C. -T., Caldelli R.
D'Elia DANIELE CONO, Coppa Emilio, Nicchi Simone, Palmaro Federico, Cavallaro Lorenzo
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). AsiaCCS '19 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019: 15-27

Caldelli R., Chaumont M., Li C. -T., Amerini I.
Special issue on Deep Learning in Image and Video Forensics. SIGNAL PROCESSING-IMAGE COMMUNICATION 2019: 199-200

D'Elia D. C., Coppa E., Salvati A., Demetrescu C.
Static analysis of ROP code. EuroSec '19 Proceedings of the 12th European Workshop on Systems Security 2019: -

Angelini Marco, Blasilli Graziano, Borzacchiello Luca, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil, Lenti Simone, Nicchi Simone, Santucci Giuseppe
SymNav: Visually Assisting Symbolic Execution. Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security (VizSec 2019) 2019: -

Borrello P., Coppa E., D'Elia D. C., Demetrescu C.
The ROP needle: Hiding trigger-based injection vectors via code reuse. SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 2019: 1962-1970

Phan Q. -T., Boato G., Caldelli R., Amerini I.
Tracking Multiple Image Sharing on Social Networks. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings 2019: 8266-8270

Coltellese Simone, Maria Maggi Fabrizio, Marrella Andrea, Massarelli Luca, Querzoni Leonardo
Triage of IoT Attacks Through Process Mining. On the Move to Meaningful Internet Systems: OTM 2019 Conferences 2019: 326-344

Angelini Marco, Blasilli Graziano, Catarci Tiziana, Lenti Simone, Santucci Giuseppe
Vulnus: Visual Vulnerability Analysis for Network Security. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 2019: 183-192

2018

Baldoni Roberto, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil, Finocchi Irene
A Survey of Symbolic Execution Techniques. ACM COMPUTING SURVEYS 2018: -

Angelini Marco, Bonomi Silvia, Borzi Emanuele, Del Pozzo Antonella, Lenti Simone, Santucci Giuseppe
An attack graph-based on-line multi-step attack detector. ICDCN '18 Proceedings of the 19th International Conference on Distributed Computing and Networking 2018: -

Luo Ying, Cheung Sen ching S., Lazzeretti Riccardo, Pignata Tommaso, Barni Mauro
Anonymous subject identification and privacy information management in video surveillance. INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2018: 261-278

Bonomi Silvia, Del Pozzo Antonella, Potop-Butucaru Maria, Tixeuil Sébastien
Approximate Agreement under Mobile Byzantine Faults. THEORETICAL COMPUTER SCIENCE 2018: 17-29

Bonomi S., Del Pozzo A., Potop-Butucaru M., Tixeuil S.
Brief announcement: Optimal self-stabilizing mobile byzantine-tolerant regular register with bounded timestamps. Stabilization, Safety, and Security of Distributed Systems 2018: 398-403

Chatzigiannakis Ioannis, Liagkou Vasiliki, Spirakis Paul G.
Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks. Cyber Security Cryptography and Machine Learning 2018: 101-104

Compagno Alberto, Conti Mauro, Munari Stefano, Lazzeretti Riccardo
GATE and FENCE: Geo-Blocking Protocols for Named Data Networking. 2018 IEEE 43rd Conference on Local Computer Networks (LCN) 2018: 580-588

Baldoni Roberto, De Nicola Rocco, Prinetto Paolo, Anglano COSIMO FILOMENO, Aniello Leonardo, Antinori Arije, Armando Alessandro, Aversa Rocco, Baldi Marco, Barili Antonio, Bartoletti Massimo, Basile Basile, Bellini Marco, Bergadano Francesco, Bernardeschi Cinzia, Bertino , Elisa Bianchi, Giuseppe , Biancotti Claudia, Bistarelli Stefano, Blefari Melazzi Nicola, Boetti Milena, Bondavalli Andrea, Bonomi Silvia, Buccafurri Francesco, Cambiaso Enrico, Caputo Barbara, Carminati Barbara, Cataliotti Francesco Saverio, Catarci Tiziana, Ceccarelli Andrea, Cesa Bianchi Nicolò, Chiaraluce Franco, Colajanni Michele, Conti Marco, Conti Mauro, Coppolino Luigi, Costa Gabriele, Costamagna Valerio, Cotroneo Domenico, Crispo Bruno, Cucchiara Rita, D’Antonio Salvatore, Damiani Ernesto, De Nicola Rocco, De Santis Alfredo, Di Battista Giuseppe, Di Martino Beniamino, Degiovanni Ivo Pietro, Demetrescu Camil, Di Corinto Arturo, Di Luna Antonio, Di Natale Giorgio, Dini Gianluca, Evangelisti Marco, Falcinelli Daniela, Figà Gianna, Ferretti Marco, Ficco Massimo, Flocchini Paola, Flottes Marie-Lise, Focardi Riccardo, Franchina Luisa, Furfaro Angelo, Girdinio Paola, Guida Franco, Italiano Giuseppe F., Lain Daniele, Laurenti Nicola, Lioy Antonio, Loreti Michele, Malerba Donato, Mancini Luigi Vincenzo, Marchetti Spaccamela Alberto, Marcialis Gianluca, Margheri Andrea, Marrella Andrea, Martinelli Fabio, Martinelli Maurizio, Martino Luigi, Massacci Fabio, Mayer Marco, Mecella Massimo, Mensi Maurizio, Merlo Alessio, Miculan Marino, Montanari Luca, Morana Marco, Mosco Gian Domenico, Mostarda Leonardo, Murino Vittorio, Nardi Daniele, Navigli Roberto, Palazzi Andrea, Palmieri Francesco, Panetta Ida, Passarella Andrea, Pellegrini Alessandro, Pelosi Gerardo, Pellegrino Giancarlo, Pirlo Giuseppe, Piuri Vincenzo, Pizzonia Maurizio, Pogliani Marcello, Polino Mario, Pontil Massimiliano, Prinetto Paolo, Quaglia Francesco, Quattrociocchi Walter, Querzoni Leonardo, Rak Massimiliano, Ranise Silvio, Ricci Elisa, Rossi Lorenzo, Rota Paolo, Russo Ludovico Orlando, Samarati Pierangela, Santoro Nicola, Santucci Beppe, Sassone Vladimiro, Scala Antonio, Scotti Fabio, Servida Andrea, Spagnoletti Paolo, Spalazzi Luca, Spidalieri Francesca, Spoto Austo, Squarcina Marco, Stefanelli Stefania, Vecchio Alessio, Venticinque Salvatore, Villoresi Paolo, Visaggio Aaron, Vitaletti Andrea, Zanero Stefano
Adamsky F., Aubigny M., Battisti F., Carli M., Cimorelli F., Cruz T., Di Giorgio A., Foglietta C., Galli A., Giuseppi A., Liberati F., Neri A., Panzieri S., Pascucci F., Proenca J., Pucci P., Rosa L., Soua R.
Integrated protection of industrial control systems from cyber-attacks: the ATENA approach. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION 2018: 72-82

Capossele Angelo, Gaglione Andrea, Nati Michele, Conti Mauro, Lazzeretti Riccardo, Missier Paolo
Leveraging Blockchain to Enable Smart-Health Applications. 2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI) 2018: 333-338

Ambrosin M., Conti M., Lazzeretti R., Rabbani M. M., Ranise S.
PADS: Practical Attestation for Highly Dynamic Swarm Topologies. 2018 International Workshop on Secure Internet of Things (SIoT) 2018: 18-27

Elingiusti M., Aniello L., Querzoni L., Baldoni R.
Caldelli R, Amerini I, Li Ct
PRNU-based image classification of origin social network with CNN. Proceedings of the 26th European Signal Processing Conference 2018: 1357-1361

Bonomi Silvia, Farina Giovanni, Tixeuil Sébastien
Reliable Broadcast in Dynamic Networks with Locally Bounded Byzantine Failures. Stabilization, Safety, and Security of Distributed Systems 2018: 170-185

Giuseppi A., Germana R., Di Giorgio A.
Risk Adverse Virtual Power Plant Control in Unsecure Power Systems. 2018 26th Mediterranean Conference on Control and Automation (MED) 2018: 210-216

Di Giorgio Alessandro, Pietrabissa Antonio, Delli Priscoli Francesco, Isidori Alberto
Robust protection scheme against cyber-physical attacks in power systems. IET CONTROL THEORY & APPLICATIONS 2018: 1792-1801

Marco Angelini, Graziano Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia , Serena Ferracci, Simone Lenti, Giuseppe Santucci
ROPMate: Visually Assisting the Creation of ROP-based Exploits. 2018 IEEE Symposium on Visualization for Cyber Security (VizSec) 2018: -

Baldoni R., De Nicola R., Prinetto P., Anglano C., Aniello L., Antinori A., Armando A., Aversa R., Baldi Marco, Barili A., Bartoletti M., Bellini M., Bergadano F., Bernardeschi C., Bianchi E., Biancotti C., Bistarelli S., Blefari Melazzi N., Boetti M., Bondavalli A., Bonomi ., Buccafurri F., Cambiaso E., Caputo B., Carminati B., Cataliotti F. S., Catarci T., Ceccarelli A., Cesa Bianchi N., Chiaraluce F., Colajanni M., Conti M., Conti M., Coppolino L., Costa G., Costamagna V., Cotroneo D., Crispo B., Cucchiara R., D’Antonio S., Damiani E., De Nicola R., De Santis A., Di Battista G., Di Martino B., Degiovanni I. P., Demetrescu C., Di Corinto A., Di Luna A., Di Natale G., Dini G., Evangelisti M., Falcinelli D., Figà G., Ferretti M., Ficco M., Flocchini P., Flottes M., Focardi R., Furfaro Franchina., Girdinio P., Guida F., Italiano G. F., Lain D., Laurenti N., Lioy A., Loreti M., Malerba D., Mancini L. V., Marchetti Spaccamela A., Marcialis G., Margheri A., Marrella A., Martinelli F., Martinelli M., Martino L., Massacci F., Mayer M., Mecella M., Mensi M., Merlo A., Miculan M., Montanari L., Morana M., Mosco G. D., Mostarda L., Murino V., Nardi D., Navigli R., Palazzi A., Palmieri F., Panetta I. C., Passarella A., Pellegrini A., Pelosi G., Pellegrino G., Pirlo G., Piuri V., Pizzonia M., Pogliani M., Polino M., Pontil M., Prinetto P., Quaglia F., Quattrociocchi W., Querzoni L., Rak M., Ranise S., Ricci E., Rossi L., Rota P., Russo L. O., Samarati P., Santoro N., Santucci B., Sassone V., Scala A., Scotti F., Servida A., Spagnoletti P., Spalazzi L., Spidalieri F., Spoto A., Squarcina M., Stefanelli S., Vecchio A., Venticinque S., Villoresi P., Visaggio A., Vitaletti A., Zanero S.
Fiaschetti A., Azzoni P., Noll J., Uribeetxeberria R., Pietrabissa A., Priscoli F. D., Suraci V., Mignanti S., Liberati F., Panfili M., Di Giorgio A., Morgagni A.
The SHIELD approach. Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The SHIELD Methodology 2018: 105-158

Angeletti Fabio, Chatzigiannakis Ioannis, Vitaletti Andrea
Baldoni Roberto, DI LUNA GIUSEPPE ANTONIO, Massarelli Luca, Petroni Fabio, Querzoni Leonardo

2017

Massarelli Luca, Aniello Leonardo, Ciccotelli Claudio, Querzoni Leonardo, Ucci Daniele, Baldoni Roberto
Massarelli L, Aniello L, Ciccotelli C, Querzoni L., Ucci D., Baldoni R.
Android malware family classification based on resource consumption over time. Proceedings of the 2017 12th International Conference on Malicious and Unwanted Software, MALWARE 2017 2017: 31-38

Baldoni Roberto, Coppa Emilio, D’Elia Daniele Cono, Demetrescu Camil
Assisting malware analysis with symbolic execution: A case study. Cyber Security Cryptographyand Machine Learning 2017: 171-188

DEL POZZO Antonella, Bonomi Silvia, Lazzeretti Riccardo, Baldoni Roberto
Building Regular Registers with Rational Malicious Servers and Anonymous Clients. Cyber Security Cryptography and Machine Learning 2017: 50-67

Amerini I, Caldelli R, Del Mastio A, Di Fuccia A, Molinari C, Rizzo Ap
Dealing with video source identification in social networks. SIGNAL PROCESSING-IMAGE COMMUNICATION 2017: 1-7

DELLI PRISCOLI Francesco, DI GIORGIO Alessandro, Esposito Mariana, Fiaschetti Andrea, Flammini Francesco, Mignanti Silvano, Pragliola Concetta
Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD. INTERNATIONAL JOURNAL OF CRITICAL COMPUTER-BASED SYSTEMS 2017: 138-170

Di Pirro Matteo, Conti Mauro, Lazzeretti Riccardo
Ensuring information security by using Haskell's advanced type system. 2017 International Carnahan Conference on Security Technology (ICCST) 2017: 1-6

Caldelli Roberto, Becarelli Rudy, Amerini Irene
Image Origin Classification Based on Social Network Provenance. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2017: 1299-1308

Conti Mauro, Lain Daniele, Lazzeretti Riccardo, Lovisotto Giulio, Quattrociocchi Walter
Amerini Irene, Uricchio Tiberio, Ballan Lamberto, Caldelli Roberto
Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks. 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2017: 1865-1871

Pitolli Gregorio, Aniello Leonardo, Laurenza Giuseppe, Querzoni Leonardo, Baldoni Roberto
Malware Family Identification with BIRCH Clustering. 2017 International Carnahan Conference on Security Technology (ICCST) 2017: -

Laurenza Giuseppe, Aniello Leonardo, Lazzeretti Riccardo, Baldoni Roberto
Malware Triage Based on Static Features and Public APT Reports. Cyber Security Cryptographyand Machine Learning 2017: 288-305

Amerini Irene, Becarelli Rudy, Brancati Francesco, Caldelli Roberto, Giunta Gabriele, Itria Massimiliano L.
Ambrosin Moreno, Braca Paolo, Conti Mauro, Lazzeretti Riccardo
DI GIORGIO Alessandro, Giuseppi Alessandro, Liberati Francesco, Ornatelli Antonio, Rabezzano Antonio, RICCIARDI CELSI Lorenzo
Ambrosin Moreno, Conti Mauro, Lazzeretti Riccardo, Rabbani Md Masoom, Ranise Silvio
Poster: Toward secure and efficient attestation for highly dynamic swarms. Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017 2017: 281-282

Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil
Rethinking Pointer Reasoning in Symbolic Execution. ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering 2017: 613-618

Amerini Irene, Becarelli Rudy, Caldelli Roberto, Melani Alessio, Niccolai Moreno
Smartphone Fingerprinting Combining Features of On-Board Sensors. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2017: 2457-2466

Baldini G, Amerini I, Stery G, Caldelli R
Amerini Irene, Uricchio Tiberio, Caldelli Roberto
Tracing images back to their social network of origin: A CNN-based approach. 2017 IEEE Workshop on Information Forensics and Security (WIFS) 2017: 1-6

2016

Chatzigiannakis Ioannis, Vitaletti Andrea, Pyrgelis Apostolos
Kallas K., Tondi B., Lazzeretti Riccardo, Barni M.
Braca P, Lazzeretti Riccardo, Marano S, Matta S.
Learning With Privacy in Consensus + Obfuscation. IEEE SIGNAL PROCESSING LETTERS 2016: 1174-1178

Lazzeretti Riccardo, Pignata Tommaso, Barni Mauro
Piecewise Function Approximation with Private Data. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2016: 642-657

Amerini I., Bestagini P., Bondi L., Caldelli R., Casini M., Tubaro S.
Robust smartphone fingerprint by mixing device sensors features for mobile strong authentication. Electronic Imaging, Media Watermarking, Security, and Forensics 2016 2016: 1-8

Bonomi Silvia, Matteucci Ilaria
Third International Workshop on Reliability and Security Aspects for Critical Infrastructure protection (ReSA4CI 2016). 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W) 2016: 136-136

Bonomi Silvia, DEL POZZO Antonella, Potop Butucaru Maria
Tight self-stabilizing mobile byzantine-tolerant atomic register. Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore, January 4-7, 2016 2016: 1-10

2015

Amerini I, Becarelli R, Caldelli R, Casini M
A feature-based forensic procedure for splicing forgeries detection. MATHEMATICAL PROBLEMS IN ENGINEERING 2015: -

Amerini Irene, Becarelli Rudy, Bertini Bruno, Caldelli Roberto
Amerini I, Caldelli R, Del Bimbo A, Di Fuccia A, Rizzo A P, Saravo L
Bonomi Silvia, Matteucci Ilaria
Introduction to the safecomp 2015 workshop: Reliability and security aspects for critical infrastructure protection. Computer Safety,Reliability, and Security. SAFECOMP 2015 Workshops ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR 2015: XXI-XXIII

Lazzeretti Riccardo, Barni M.
Lazzeretti Riccardo, Pignata T.
Privacy preserving cloud computing through piecewise approximation of multivariate functions. 2015 IEEE Conference on Communications and Network Security (CNS) 2015: 515-523

Barni M, Droandi G, Lazzeretti Riccardo
Droandi G, Lazzeretti Riccardo
SHE based Non Interactive Privacy Preserving Biometric Authentication Protocols. 2015 IEEE 9th International Symposium on Intelligent Signal Processing (WISP) Proceedings 2015: 1-6

Caldelli R, Amerini I, Costanzo A
SIFT match removal and keypoint preservation through dominant orientation shift. 2015 23rd European Signal Processing Conference (EUSIPCO) 2015: 2062-2066

2014

Aniello Leonardo, Armenia Stefano, Baldoni Roberto, D'Amore Fabrizio, Annachiara Di Paolo, Franchina Luisa, Montanari Luca, Panetta Ida Claudia, Querzoni Leonardo, Giovanni Rellini Lerz, Vincenzo Verde Nino
Aniello Leonardo, A. Bondavalli, A. Ceccarelli, Ciccotelli Claudio, M. Cinque, F. Frattini, A. Guzzo, A. Pecchia, A. Pugliese, Querzoni Leonardo, S. Russo
Big data in critical infrastructures security monitoring: challenges and opportunities. Proceedings of the first International Workshop on Real-time Big Data Analytics for Critical Infrastructure Protection 2014: -

Amerini Irene, Caldelli Roberto, Crescenzi Pierluigi, DEL MASTIO Andrea, Marino Andrea
Amerini Irene, Caldelli Roberto, DEL BIMBO Alberto, Andrea Di Fuccia, Luigi Saravo, Anna Paola Rizzo
Copy-move forgery detection from printed images. Media Watermarking, Security, and Forensics 2014 2014: -

Amerini Irene, F. Battisti, Caldelli Roberto, M. Carli, A. Costanzo
Exploiting perceptual quality issues in countering SIFT-based Forensic methods. 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2014: 2664-2668

Andrea Costanzo, Amerini Irene, Caldelli Roberto, Barni Mauro
Forensic Analysis of SIFT Keypoint Removal and Injection. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2014: 1450-1464

Amerini Irene, Caldelli Roberto, DEL BIMBO Alberto, A. Di Fuccia, A. Rizzo, L. Saravo
Forgery detection from printed images: a tool in crime scene analysis. Proceedings of the American Academy of Forensic Sciences 66th Annual Scientific Meeting 2014: 149-150

Lazzeretti Riccardo, Horn S, Braca P, Willett P.
Secure multi-party consensus gossip algorithms. 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2014: 7406-7410

Amerini Irene, Becarelli Rudy, Caldelli Roberto, Andrea Del Mastio
Splicing Forgeries Localization through the Use of First Digit Features. 2014 IEEE International Workshop on Information Forensics and Security (WIFS) 2014: 143-148

Aniello Leonardo, Baldoni Roberto, Ciccotelli Claudio, DI LUNA GIUSEPPE ANTONIO, F. Frontali, Querzoni Leonardo
The overlay scan attack: inferring topologies of distributed pub/sub systems through broker saturation. Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems 2014: 107-117

2013

Angelini Marco, Arcuri MARIA CRISTINA, Baldoni Roberto, Ciccotelli Claudio, DI LUNA GIUSEPPE ANTONIO, Montanari Luca, Panetta Ida Claudia, Querzoni Leonardo, Verde NINO VINCENZO
Baldoni Roberto, DI LUNA GIUSEPPE ANTONIO, Querzoni Leonardo
Collaborative detection of coordinated port scans. Proceedings of the International Conference on Distributed Computing and Networking 2013: 102-117

Amerini Irene, Ballan Lamberto, Caldelli Roberto, DEL BIMBO Alberto, Del Tongo Luca, Serra Giuseppe
Amerini Irene, Mauro Barni, Caldelli Roberto, Andrea Costanzo
Counter-forensics of SIFT-based copy-move detection by means of keypoint classification. EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING 2013: 1-17

Barni M, Bernaschi Massimo, Lazzeretti Riccardo, Pignata T, Sabellico A.
Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting. Data Privacy Management and Autonomous Spontaneous Security 2013: 66-82

Lazzeretti Riccardo, Failla P., Barni M.
Lazzeretti Riccardo, Barni M.
Private computing with garbled circuits [applications corner]. IEEE SIGNAL PROCESSING MAGAZINE 2013: 123-127

Amerini Irene, M. Barni, Caldelli Roberto, A. Costanzo
Removal and injection of keypoints for SIFT-based copy-move counter-forensics. EURASIP JOURNAL ON MULTIMEDIA AND INFORMATION SECURITY 2013: 1-12

Lazzeretti Riccardo, Pignata T, Barni M.
Secure Evaluation of Private Functions through Piecewise Linear Approximation. 2013 IEEE International Workshop on Information Forensics and Security (WIFS) 2013: 55-60

Amerini Irene, Mauro Barni, Caldelli Roberto, Andrea Costanzo
SIFT keypoint removal and injection for countering matching-based image forensics. IH&MMSec '13 Proceedings of the first ACM workshop on Information hiding and multimedia security 2013: 123-130

Baldoni Roberto, Bonomi Silvia, DI LUNA GIUSEPPE ANTONIO, Montanari Luca, Sorella Mara
Understanding (mis)information spreading for improving corporate network trustworthiness. Lecture Notes in Computer ScienceDependable Computing 2013: 165-172

2012

DI GIORGIO Alessandro, Liberati Francesco
Amerini I., Ballan L., Caldelli R., Del Bimbo A., Del Tongo L., Serra G.
An Effective Tool for Copy-Move Forgery Detection and Localization. 2012 IEEE International Workshop on Information Forensics and Security (WIFS) 2012: -

Luo Y, Cheung S, Pignata T, Lazzeretti Riccardo, Barni M.
An efficient protocol for private iris-code matching by means of garbled circuits. 2012 19th IEEE International Conference on Image Processing 2012: 2653-2656

Pignata T, Lazzeretti Riccardo, Barni M.
General function evaluation in a STPC setting via piecewise linear approximation. 2012 IEEE International Workshop on Information Forensics and Security (WIFS) 2012: 55-60

Caldelli Roberto, Amerini Irene, Ballan Lamberto, Serra Giuseppe, Barni Mauro, A. Costanzo
On the effectiveness of local warping against SIFT-based copy-move detection. 2012 5th International Symposium on Communications, Control and Signal Processing 2012: 1-5

Lazzeretti Riccardo, Guajardo J, Barni M.
Privacy preserving ECG quality evaluation. MM&Sec '12 Proceedings of the on Multimedia and security 2012: 165-174

2011

Amerini Irene, Ballan Lamberto, Caldelli Roberto, Del Bimbo Alberto, Serra Giuseppe
A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2011: 1099-1110

Caldelli R., Amerini I., Novi A.
An analysis on attacker actions in fingerprint-copy attack in source camera identification. 2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011 2011: 1-6

Amerini Irene, Ballan Lamberto, Caldelli Roberto, DEL BIMBO Alberto, Luca Del Tongo, Serra Giuseppe
An image forensics tool for copy-move detection and localization. Proc. of IEEE International Conference on Multimedia & Expo (ICME) 2011: -

Lazzeretti Riccardo, Barni M.
Division between encrypted integers by means of Garbled Circuits. 2011 IEEE International Workshop on Information Forensics and Security 2011: 1-6

DI GIORGIO Alessandro, Francesco Liberati
Interdependency modeling and analysis of critical infrastructures based on Dynamic Bayesian Networks. 19th Mediterranean Conference on Control & Automation (MED 2011) 2011: 791-797

Barni M, Failla P, Lazzeretti Riccardo, Sadeghi A. R, Schneider T.
Privacy-preserving ECG classification with branching programs and neural networks. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2011: 452-468

2010

AMERINI IRENE, CALDELLI ROBERTO, PICCHIONI FRANCESCO
A DFT-Based Analysis to Discern Between Camera and Scanned Images. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS 2010: 21-29

Amerini Irene, G. Ballocca, R. Borri, Caldelli Roberto, Filippini Francesco
Barni M, Bianchi T, Catalano D, Di Raimondo M, Labati R. D, Failla P, Fiore D, Lazzeretti Riccardo, Piuri V, Piva A, Scotti F.
A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates. 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) 2010: 1-7

Amerini I., Caldelli R., Cappellini V., Picchioni F., Piva A.
Estimate of PRNU noise based on different noise models for source camera identification. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS 2010: 21-33

Caldelli R., Amerini I., Picchioni F., Innocenti M.
Fast image clustering of unknown source images. 2010 IEEE International Workshop on Information Forensics and Security, WIFS 2010 2010: 1-5

Amerini Irene, Ballan Lamberto, Caldelli Roberto, DEL BIMBO Alberto, Serra Giuseppe
Geometric Tampering Estimation by Means of a SIFT-based Forensic Analysis. 2010 IEEE International Conference on Acoustics, Speech and Signal Processing 2010: 1702-1705

Barni M, Guajardo J, Lazzeretti Riccardo
Privacy preserving evaluation of signal quality with application to ECG analysis. 2010 IEEE International Workshop on Information Forensics and Security 2010: -

Barni M, Bianchi T, Catalano D, Di Raimondo M, Donida Labati R, Failla P, Fiore D, Lazzeretti Riccardo, Piuri V, Scotti F, Piva A.
Privacy-preserving fingercode authentication. MM&Sec '10 Proceedings of the 12th ACM workshop on Multimedia and security 2010: 231-240

2009

Amerini I., Caldelli R., Cappellini V., Picchioni F., Piva A.
Analysis of Denoising Filters for Photo Response Non Uniformity Noise Extraction in Source Camera Identification. 2009 16th International Conference on Digital Signal Processing 2009: 1-7

'BARNI M, FAILLA P, KOLESHNIKOV V, LAZZERETTI RICCARDO, SADEGHI A, SCHNEIDER T.
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification. International Workshop on Signal Processing in the EncryptEd Domain - colocated with CHES 2009 2009: 1-20

Caldelli R., Amerini I., Picchioni F.
Distinguishing between camera and scanned images by means of frequency analysis. Forensics in Telecommunications, Information and Multimedia 2009: 95-101

'Barni M, Failla P, Koleshnikov V, Lazzeretti Riccardo, Paus A, Sadeghi A, Schneider T.
Efficient Privacy-Preserving Classification of ECG Signals. 2009 First IEEE International Workshop on Information Forensics and Security (WIFS) 2009: 91-95

Caldelli R., Amerini I., Picchioni F., De Rosa A., Uccheddu F.
Multimedia forensic techniques for acquisition device identification and digital image authentication. Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions 2009: 130-154

Barni M, Failla P, Kolesnikov V, Lazzeretti Riccardo, Sadeghi A, Schneider T.

2008

Lazzeretti Riccardo, Barni M.
Lossless Compression of Encrypted Grey-Level and Color Images. 16th European Signal Processing Conference, EUSIPCO 2008 2008: 1-5

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma