Searched for: author%3A%22Conti%2C+M.%22
(1 - 20 of 51)

Pages

document
Li, Meng (author), Chen, Yifei (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author), Hu, Donghui (author)
Vehicular Digital Forensics (VDF) is essential to enable liability cognizance of accidents and fight against crimes. Ensuring the authority to timely gather, analyze, and trace data promotes vehicular investigations. However, adversaries crave the identity of the data provider/user, damage the evidence, violate evidence jurisdiction, and leak...
journal article 2023
document
Li, Meng (author), Chen, Yifei (author), Zhu, Liehaung (author), Zhang, Zijian (author), Ni, Jianbing (author), Lal, C. (author), Conti, M. (author)
Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the single point of failure and lack of transparency. Blockchain-based solutions neglect...
journal article 2023
document
Halder, Subir (author), Ghosal, Amrita (author), Conti, M. (author)
Networks of Unmanned Aerial Vehicles (UAVs) are emerging in many application domains, e.g., military surveillance. To perform collaborative tasks, the involved UAVs exchange several types of information, e.g., sensor data and commands. The major question here is how to schedule the tasks under dynamic traffic flows to provide network services...
journal article 2023
document
Nowroozi, Ehsan (author), Mohammadi, Mohammadreza (author), Savas, Erkay (author), Mekdad, Yassine (author), Conti, M. (author)
In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structures poses major security problems, making them inappropriate for use in security-oriented applications,...
journal article 2023
document
Ahmadvand, Hossein (author), Lal, C. (author), Hemmati, Hadi (author), Sookhak, Mehdi (author), Conti, M. (author)
In recent years, the use of Software Defined Networking (SDN) has increased due to various network management requirements. Using SDN in computer network applications has brought several benefits to users, including lower operational costs, better hardware management, flexibility, and centralized network deployment. On the other hand, the...
journal article 2023
document
Kumar, Anand (author), Singh, Karan (author), Shariq, Mohd (author), Lal, C. (author), Conti, M. (author), Amin, Ruhul (author), Chaudhry, Shehzad Ashraf (author)
In the era of the Internet of Communication Technologies (ICT), the Internet is becoming more popular and widely used across the world. Radio Frequency IDentification (RFID) has become a prominent technology in healthcare systems for identifying tagged objects. The RFID tags are attached to the billions of different healthcare devices or...
journal article 2023
document
Tricomi, Pier Paolo (author), Facciolo, Lisa (author), Apruzzese, Giovanni (author), Conti, M. (author)
Did you know that over 70 million of Dota2 players have their in-game data freely accessible? What if such data is used in malicious ways? This paper is the first to investigate such a problem. Motivated by the widespread popularity of video games, we propose the first threat model for Attribute Inference Attacks (AIA) in the Dota2 context....
conference paper 2023
document
Cardaioli, Matteo (author), Conti, M. (author), Orazi, Gabriele (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)
Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to pass the former, but the latter is often underestimated or ignored. Unattended or dangling sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, researchers...
journal article 2023
document
Alsoliman, Anas (author), Rigoni, Giulio (author), Callegaro, Davide (author), Levorato, Marco (author), Pinotti, Cristina M. (author), Conti, M. (author)
Cheap commercial off-the-shelf (COTS) First-Person View (FPV) drones have become widely available for consumers in recent years. Unfortunately, they also provide low-cost attack opportunities to malicious users. Thus, effective methods to detect the presence of unknown and non-cooperating drones within a restricted area are highly demanded....
journal article 2023
document
Lotto, Alessandro (author), Singh, Vaibhav (author), Ramasubramanian, Bhaskar (author), Brighente, Alessandro (author), Conti, M. (author), Poovendran, Radha (author)
Fifth-generation (5G) cellular communication networks are being deployed on applications beyond mobile devices, including vehicular networks and industry automation. Despite their increasing popularity, 5G networks, as defined by the Third Generation Partnership Project (3GPP), have been shown to be vulnerable against fake base station (FBS)...
conference paper 2023
document
Koffas, S. (author), Pajola, Luca (author), Picek, S. (author), Conti, M. (author)
This work explores stylistic triggers for backdoor attacks in the audio domain: dynamic transformations of malicious samples through guitar effects. We first formalize stylistic triggers – currently missing in the literature. Second, we explore how to develop stylistic triggers in the audio domain by proposing JingleBack. Our experiments confirm...
conference paper 2023
document
Spolaor, Riccardo (author), Liu, Hao (author), Turrin, Federico (author), Conti, M. (author), Cheng, Xiuzhen (author)
The literature and the news regularly report cases of exploiting Universal Serial Bus (USB) devices as attack tools for malware injections and private data exfiltration. To protect against such attacks, security researchers proposed different solutions to verify the identity of a USB device via side-channel information (e.g., timing or...
conference paper 2023
document
El-Zawawy, Mohamed A. (author), Lal, C. (author), Conti, M. (author)
With the rapid technological advancement in the Internet of Things (IoT) and Internet of Vehicles (IoV), we witness exponential growth of Connected and Autonomous Vehicles (CAVs). However, these integrations of IoV with other technologies make the IoV network and its interaction between different network components highly complex. Therefore,...
journal article 2023
document
de Vos, Adriaan (author), Brighente, Alessandro (author), Conti, M. (author)
IEEE 802.1CB provides a standard for reliable packet delivery within Time-Sensitive Networking (TSN). As this standard is envisioned to be used in mission-critical networks in the near future, it has to be protected against security threats. The integrity of the network communication should be the biggest focus as guaranteed delivery is...
conference paper 2023
document
Bardi, Sara (author), Conti, M. (author), Pajola, L. (author), Tricomi, Pier Paolo (author)
Social Honeypots are tools deployed in Online Social Networks (OSN) to attract malevolent activities performed by spammers and bots. To this end, their content is designed to be of maximum interest to malicious users. However, by choosing an appropriate content topic, this attractive mechanism could be extended to any OSN users, rather than...
conference paper 2023
document
Perrina, Filippo (author), Marchiori, Francesco (author), Conti, M. (author), Verde, Nino Vincenzo (author)
Cyber Threat Intelligence (CTI) reporting is pivotal in contemporary risk management strategies. As the volume of CTI reports continues to surge, the demand for automated tools to streamline report generation becomes increasingly apparent. While Natural Language Processing techniques have shown potential in handling text data, they often...
conference paper 2023
document
Agiollo, A. (author), Bardhi, Enkeleda (author), Conti, M. (author), Lazzeretti, Riccardo (author), Losiouk, Eleonora (author), Omicini, Andrea (author)
In the context of Information-Centric Networking, Interest Flooding Attacks (IFAs) represent a new and dangerous sort of distributed denial of service. Since existing proposals targeting IFAs mainly focus on local information, in this paper we propose GNN4IFA as the first mechanism exploiting complex non-local knowledge for IFA detection by...
conference paper 2023
document
Li, Meng (author), Chen, Yifei (author), Kumar, Neeraj (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
Current connected and autonomous vehicles will contribute to various and green vehicular services. However, sharing personal data with untrustworthy Navigation Service Providers (NSPs) raises serious location concerns. To address this issue, many Location Privacy-Preserving Mechanisms (LPPMs) have been proposed. In addition, several...
journal article 2022
document
El-Zawawy, Mohamed A. (author), Brighente, Alessandro (author), Conti, M. (author)
Internet of Drones (IoD) is a framework to set up drones networks that may serve multiple purposes, e.g., data collection. New IoD applications (such as drone assisted internet of vehicles) envision the simultaneous collection of multiple data types. Although authentication may prevent unauthorized users to access the collected data, existing...
journal article 2022
document
Kalita, Alakesh (author), Brighente, Alessandro (author), Khatua, Manas (author), Conti, M. (author)
The 6TiSCH standard provides minimum latency and reliability in mission-critical IoT applications. To optimize resource allocation during 6TiSCH network formation, IETF released the 6TiSCH minimal configuration (6TiSCH-MC) standard. 6TiSCH-MC considered IETF's IPv6 Routing Protocol for Low power and Lossy network (RPL) as a routing protocol...
journal article 2022
Searched for: author%3A%22Conti%2C+M.%22
(1 - 20 of 51)

Pages