D. Antonioli
Latest
-
CTRAPS: CTAP Client Impersonation and API Confusion on FIDO2
-
E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems
-
AttackDefense Framework (ADF): Enhancing IoT Devices and Lifecycles Threat Modeling
-
FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Multi-level Entropy-based Thresholds
-
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
-
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
-
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem
-
On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats
-
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
-
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks
-
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy
-
BIAS: Bluetooth Impersonation AttackS
-
Design, Implementation, and Evaluation of Secure Cyber-Physical and Wireless Systems
-
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation of Bluetooth BR/EDR
-
Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android
-
Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot
-
State-Aware Anomaly Detection for Industrial Control Systems
-
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3
-
Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN
-
Legacy-Compliant Data Authentication for Industrial Control System Traffic
-
Towards high-interaction virtual ICS honeypots-in-a-box
-
MiniCPS: A toolkit for security research on CPS networks
-
Design and Testing of Random Number Generators (RNG)
-
On-chip lightweight implementation of reduced NIST randomness test suite
-
Artificial Optical Radiation Management, Risk and Safety in the Hospital Environment