Filter
Conference contribution

Search results

  • 2023

    AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

    Perrina, F., Marchiori, F., Conti, M. & Verde, N. V., 2023, Proceedings of the 2023 IEEE International Conference on Big Data (BigData). IEEE, p. 3053-3062 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2

    Tricomi, P. P., Facciolo, L., Apruzzese, G. & Conti, M., 2023, CODASPY 2023 - Proceedings of the 13th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery (ACM), p. 27-38 12 p. (CODASPY 2023 - Proceedings of the 13th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Downloads (Pure)
  • BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks

    Lotto, A., Singh, V., Ramasubramanian, B., Brighente, A., Conti, M. & Poovendran, R., 2023, WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 133-144 12 p. (WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    16 Downloads (Pure)
  • E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem

    Casagrande, M., Cestaro, R., Losiouk, E., Conti, M. & Antonioli, D., 29 May 2023, WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 85-95 11 p. (WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms

    Tricomi, P. P., Chilese, M., Conti, M. & Sadeghi, A. R., 30 Apr 2023, WebSci 2023 - Proceedings of the 15th ACM Web Science Conference. Association for Computing Machinery (ACM), p. 346-356 11 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    2 Citations (Scopus)
  • GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks

    Agiollo, A., Bardhi, E., Conti, M., Lazzeretti, R., Losiouk, E. & Omicini, A., 2023, Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023. Institute of Electrical and Electronics Engineers (IEEE), p. 615-630 16 p. (Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    10 Downloads (Pure)
  • Going in Style: Audio Backdoors Through Stylistic Transformations

    Koffas, S., Pajola, L., Picek, S. & Conti, M., 2023, Proceedings of the ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    30 Downloads (Pure)
  • OpenScope-sec: An ADS-B Simulator to Support the Security Research

    Cestaro, R., Conti, M., Mancini, E. & Turrin, F., 29 Aug 2023, ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings. Association for Computing Machinery (ACM), 116

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems

    Teng, K. Z., Limbasiya, T., Turrin, F., Aung, Y. L., Chattopadhyay, S., Zhou, J. & Conti, M., 10 Jul 2023, CPSS 2023 - Proceedings of the 9th ACM ASIA Conference on Cyber-Physical System Security Workshop. Association for Computing Machinery (ACM), p. 3-13 11 p. (CPSS 2023 - Proceedings of the 9th ACM ASIA Conference on Cyber-Physical System Security Workshop).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel

    Spolaor, R., Liu, H., Turrin, F., Conti, M. & Cheng, X., 2023, Proceedings of the INFOCOM 2023 - IEEE International Conference on Computer Communications. Danvers: IEEE, 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Downloads (Pure)
  • QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer

    Bianchi, T., Asokraj, S., Brighente, A., Conti, M. & Poovendran, R., 2023, 2023 IEEE 97th Vehicular Technology Conference, VTC 2023-Spring - Proceedings. Institute of Electrical and Electronics Engineers (IEEE), (IEEE Vehicular Technology Conference; vol. 2023-June).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages

    Bardi, S., Conti, M., Pajola, L. & Tricomi, P. P., 2023, Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Proceedings. Tibouchi, M. & Wang, X. (eds.). Springer, p. 309-336 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13905 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    22 Downloads (Pure)
  • STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports

    Marchiori, F., Conti, M. & Verde, N. V., 29 Aug 2023, ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings. Association for Computing Machinery (ACM), 3

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum

    Sartori, E., Pajola, L., Martino, G. D. S. & Conti, M., 30 Apr 2023, ACM Web Conference 2023 - Proceedings of the World Wide Web Conference, WWW 2023. Association for Computing Machinery (ACM), p. 4060-4064 5 p. (ACM Web Conference 2023 - Proceedings of the World Wide Web Conference, WWW 2023).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions

    de Vos, A., Brighente, A. & Conti, M., 2023, Computer Security. ESORICS 2022 International Workshops - CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT and SECOMANE 2022, EIS 2022, and SecAssure 2022, Revised Selected Papers. Katsikas, S., Cuppens, F., Kalloniatis, C., Mylopoulos, J., Pallas, F., Pohle, J., Sasse, M. A., Abie, H., Ranise, S., Verderame, L., Cambiaso, E., Maestre Vidal, J., Sotelo Monge, M. A., Albanese, M., Katt, B., Pirbhulal, S. & Shukla, A. (eds.). Cham: Springer, p. 67-80 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13785).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    95 Downloads (Pure)
  • 2022

    Analyzing Price Deviations in DeFi Oracles

    Gangwal, A., Valluri, R. & Conti, M., 2022, Cryptology and Network Security - 21st International Conference, CANS 2022, Proceedings. Beresford, A. R., Patra, A. & Bellini, E. (eds.). Springer, p. 329-338 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13641 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks

    Limbasiya, T., Ghosal, A. & Conti, M., 2022, ICDCN 2022 - Proceedings of the 2022 International Conference on Distributed Computing and Networking. Association for Computing Machinery (ACM), p. 208-216 9 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

    Koffas, S., Xu, J., Conti, M. & Picek, S., 2022, WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning. Association for Computing Machinery (ACM), p. 57-62 6 p. (WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    94 Downloads (Pure)
  • Contactless Authentication for Wearable Devices Using RFID

    Bellandi, V., Ceravolo, P., Conti, M. & Ehsanpour, M., 2022, Proceedings - 2022 IEEE International Conference on Digital Health, ICDH 2022. Ahamed, S. I., Ardagna, C. A., Bian, H., Bochicchio, M., Chang, C. K., Chang, R. N., Damiani, E., Liu, L., Pavel, M., Priami, C., Shahriar, H., Ward, R., Xhafa, F., Zhang, J. & Zulkernine, F. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 234-239 6 p. (Proceedings - 2022 IEEE International Conference on Digital Health, ICDH 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Dynamic Backdoors with Global Average Pooling

    Koffas, S., Picek, S. & Conti, M., 2022, Proceedings of the 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS). Danvers: IEEE, p. 320-323 4 p. 9869920. (Proceeding - IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    17 Downloads (Pure)
  • EVExchange: A Relay Attack on Electric Vehicle Charging System

    Conti, M., Donadel, D., Poovendran, R. & Turrin, F., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 488-508 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Face Recognition Systems: Are you sure they only consider your face?

    Darbha, P. S., Conti, M., Losiouk, E. & Maiti, R. R., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy Workshops, SPW 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 258-264 7 p. (Proceedings - 43rd IEEE Symposium on Security and Privacy Workshops, SPW 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Face the Truth: Interpretable Emotion Genuineness Detection

    Cardaioli, M., Miolla, A., Conti, M., Sartori, G., Monaro, M., Scarpazza, C. & Navarin, N., 2022, 2022 International Joint Conference on Neural Networks, IJCNN 2022 - Proceedings. Institute of Electrical and Electronics Engineers (IEEE), (Proceedings of the International Joint Conference on Neural Networks; vol. 2022-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

    Bout, E., Brighente, A., Conti, M. & Loscri, V., 2022, Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery (ACM), 21. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection

    Cardaioli, M., Conti, M. & Ravindranath, A., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 595-613 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13556 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    21 Downloads (Pure)
  • Graph Encryption for Shortest Path Queries with k Unsorted Nodes

    Li, M., Gao, J., Zhang, Z., Fu, C., Lal, C. & Conti, M., 2022, Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 89-96 8 p. (Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Downloads (Pure)
  • Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand

    Cardaioli, M., Cecconello, S., Conti, M., Milani, S., Picek, S. & Saraci, E., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1687-1704 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    35 Downloads (Pure)
  • Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing

    Brighente, A., Conti, M. & Sciancalepore, S., 2022, Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery (ACM), 134. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • HolA: Holistic and Autonomous Attestation for IoT Networks

    Visintin, A., Toffalini, F., Losiouk, E., Conti, M. & Zhou, J., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Springer, p. 277-296 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • ICSpot: A High-Interaction Honeypot for Industrial Control Systems

    Conti, M., Trolese, F. & Turrin, F., 2022, 2022 International Symposium on Networks, Computers and Communications, ISNCC 2022. Institute of Electrical and Electronics Engineers (IEEE), (2022 International Symposium on Networks, Computers and Communications, ISNCC 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Label-Only Membership Inference Attack against \\Node-Level Graph Neural Networks

    Conti, M., Li, J., Picek, S. & Xu, J., 2022, AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022. Association for Computing Machinery (ACM), p. 1–12 12 p. (AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    44 Downloads (Pure)
  • MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles

    Brighente, A., Conti, M. & Vasudev, H., 2022, Proceedings of the 2022 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2022. Fortino, G., Gravina, R., Guerrieri, A. & Savaglio, C. (eds.). Institute of Electrical and Electronics Engineers (IEEE), 8 p. (Proceedings of the 2022 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • PoSC: Combined Score for Consensus in Intemet-of-Things Applications

    Singh, A., Saha, R., Conti, M. & Kumar, G., 2022, 2022 4th International Conference on Blockchain Computing and Applications, BCCA 2022. Alsmirat, M., Aloqaily, M., Jararweh, Y. & Alsmadi, I. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 173-180 8 p. (2022 4th International Conference on Blockchain Computing and Applications, BCCA 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart

    Amerini, I., Conti, M., Giacomazzi, P. & Pajola, L., 2022, 2022 International Joint Conference on Neural Networks, IJCNN 2022 - Proceedings. Institute of Electrical and Electronics Engineers (IEEE), (Proceedings of the International Joint Conference on Neural Networks; vol. 2022-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Privacy-Friendly De-Authentication with BLUFADE: Blurred Face Detection

    Cardaioli, M., Conti, M., Tricomi, P. P. & Tsudik, G., 2022, 2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 197-206 10 p. (2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    525 Downloads (Pure)
  • Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud

    Li, M., Zhang, M., Gao, J., Lal, C., Conti, M. & Alazab, M., 2022, Information and Communications Security - 24th International Conference, ICICS 2022, Proceedings. Alcaraz, C., Chen, L., Li, S. & Samarati, P. (eds.). Springer, p. 261-280 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13407 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    68 Downloads (Pure)
  • Secure Static Content Delivery for CDN Using Blockchain Technology

    Conti, M., Vinod, P. & Tricomi, P. P., 2022, Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Revised Selected Papers. Garcia-Alfaro, J., Muñoz-Tapia, J. L., Navarro-Arribas, G. & Soriano, M. (eds.). Springer, p. 301-309 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13140 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses

    Brighente, A., Camaioni, M., Conti, M. & Olivastri, E., 2022, 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 279-284 6 p. (2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Sim2Testbed Transfer: NDN Performance Evaluation

    Bardhi, E., Conti, M., Lazzeretti, R., Losiouk, E. & Taffal, A., 2022, Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery (ACM), 63. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
  • SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

    Apruzzese, G., Conti, M. & Yuan, Y., 2022, Proceedings - 38th Annual Computer Security Applications Conference, ACSAC 2022. Association for Computing Machinery (ACM), p. 171-185 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    81 Downloads (Pure)
  • Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering

    Brighente, A., Conti, M., Kumar, G., Ghanbari, R. & Saha, R., 2022, 2022 IEEE International Symposium on Measurements and Networking, M and N 2022 - Proceedings. Institute of Electrical and Electronics Engineers (IEEE), (2022 IEEE International Symposium on Measurements and Networking, M and N 2022 - Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles

    Brighente, A., Conti, M. & Vasudev, H., 2022, 2022 30th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2022. Begusic, D., Rozic, N., Radic, J. & Saric, M. (eds.). Institute of Electrical and Electronics Engineers (IEEE), (2022 30th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • The Rise of ICS Malware: A Comparative Analysis

    Mekdad, Y., Bernieri, G., Conti, M. & El Fergougui, A., 2022, Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT and SECOMANE, 2021. Katsikas, S., Lambrinoudakis, C., Cuppens, N., Mylopoulos, J., Kalloniatis, C., Meng, W., Furnell, S., Pallas, F., Pohle, J., Sasse, M. A., Abie, H., Ranise, S., Verderame, L., Cambiaso, E., Maestre Vidal, J. & Sotelo Monge, M. A. (eds.). Springer, p. 496-511 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13106 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • The Spread of Propaganda by Coordinated Communities on Social Media

    Hristakieva, K., Cresci, S., Da San Martino, G., Conti, M. & Nakov, P., 2022, WebSci 2022 - Proceedings of the 14th ACM Web Science Conference. Association for Computing Machinery (ACM), p. 191-201 11 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    13 Citations (Scopus)
  • VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks

    Soderi, S., Brighente, A., Turrin, F. & Conti, M., 2022, 2022 19th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2022. IEEE, p. 370-378 9 p. (Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks workshops; vol. 2022-September).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads

    Balagani, K., Cardaioli, M., Cecconello, S., Conti, M. & Tsudik, G., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 633-652 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels

    Conti, M., Losiouk, E. & Visintin, A., 2022, Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, SAC 2022. Association for Computing Machinery (ACM), p. 1723-1726 4 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • 2021

    Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis

    Barbieri, G., Conti, M., Tippenhauer, N. O. & Turrin, F., 2021, 30th International Conference on Computer Communications and Networks, ICCCN 2021. Institute of Electrical and Electronics Engineers (IEEE), (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2021-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • A threat model method for ICS malware: The TRISIS case

    Mekdad, Y., Bernieri, G., Conti, M. & Fergougui, A. E., 2021, Proceedings of the 18th ACM International Conference on Computing Frontiers 2021, CF 2021. Association for Computing Machinery (ACM), p. 221-228 8 p. (Proceedings of the 18th ACM International Conference on Computing Frontiers 2021, CF 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    10 Citations (Scopus)
  • Contact Tracing Made Un-relay-able

    Casagrande, M., Conti, M. & Losiouk, E., 2021, CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery (ACM), p. 221-232 12 p. (CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)