Ciao, I am Daniele, an Assistant Professor at EURECOM with the software and system security (S3) group. I am doing research and teaching in applied system security and privacy with an emphasis on wireless communication, such as Bluetooth and Wi-Fi, embedded systems, such as cars and fitness trackers, mobile systems such as smartphones, and cyber-physical systems such as industrial control systems.
I spent one year and a half as a Postdoc with Mathias Payer’s HexHive group at École Polytechnique Fédérale de Lausanne (EPFL). During my postdoc, among others, I’ve participated in the design, implementation and evaluation of DP3T/GAEN, a privacy-preserving contact-tracing technology now used by Android and iOS for proximity tracing.
I hold a PhD in Computer Science from the Singapore University of Technology and Design (SUTD). My PhD thesis is titled “Design, Implementation, and Evaluation of Secure Cyber-Physical and Wireless Systems”. During my PhD I spent six months at the Computer Science Department of the University of Oxford as a visiting researcher advised by Kasper Rasmussen, and ten months as a visiting researcher at the Helmholtz Center for Information Security (CISPA) advised by Nils Ole Tippenhauer.
I hold a BS and MS in Electronics and Telecommunications Engineering from the University of Bologna (UniBO). I spent three months at the University of Massachusetts (UMass Amherst) as a research assistant to prepare my master thesis titled Design and Testing of Random Number Generators (RNG) advised by Wayne Burleson and Riccardo Rovatti.
PhD in Computer Science, 2019
Singapore University of Technology and Design (SUTD)
MS in Electronics and Telecommunications Engineering, 2013
University of Bologna (UniBO)
BS in Electronics and Telecommunications Engineering, 2010
University of Bologna (UniBO)
PDF Cite Code Project Slides 37c3 37c3 Slides THCON'24 CVE-2023-24023
PDF Cite Code Project Project Slides Video CVE-2019-9506 CVE-2020-10135
PDF Cite Code Project Slides Video Website CVE-2020-15802 CVE-2022-20361
Talk on Automotive Bluetooth Security at AMUSEC'25.
Cars are some of the most security-critical consumer devices. On the one hand, owners expect rich infotainment features, including audio, hands-free calls, contact management, or navigation through their connected mobile phone. On the other hand, the infotainment unit exposes exploitable wireless attack surfaces. This talk focuses on protocol-level Bluetooth threats on vehicles, a critical but unexplored wireless attack surface. These threats are crucial because they are portable across vehicles, and they can achieve impactful goals, such as accessing sensitive data or even taking remote control of the vehicle. Their evaluation is novel as prior work focused on other wireless attack surfaces, notably Bluetooth implementation bugs. Among relevant protocol-level threats, we pick the KNOB and BIAS attacks because they provide the most effective strategy to impersonate arbitrary Bluetooth devices and are not yet evaluated against vehicles.
Alfred Menezes has published a fantastic online course on real-world cryptography called Crypto 101: Real-World Deployments.
It is an honor to be featured in the Bluetooth Security Lecture (Lecture 4) which talks about the KNOB attack.
Salut, Marco Casagrande will talk about E-Spoofer and I will talk about BLUFFS at the 2024 Toulouse Hacking Convention (THCON)! Both research works are funded by the ORSHIN Horizon Europe research grant.
See you in Toulouse 🇫🇷 at THCON'24