Selected Publications (Click here for all publications)

(See also: Google Scholar - DBLP - Scopus - WoS - AMiner - MS Academic - academia.edu - ResearchGate - Panda Search - Padua Research)
(Journal ranked according to JCR and Italian-ANVUR-VQR-2012; conference ranked according to CORE/LiveSHINE/MicrosoftAcademic/Italian-GII-GRIN-SCIE)


Quick links:     Journal papers    Conference & Workshop papers    Patents    Hacking Conferences


Journal papers

[J96] Mauro Conti, Ralph Droms, Muhammad Hassan, Chhagan Lal.
Fair-RTT-DAS: A Robust and Efficient Dynamic Adaptive Streaming over ICN.
In (Elsevier) Computer Communications, 129: 209-225, 2018.
DOI: 10.1016/j.comcom.2018.07.033, ISSN: 0140-3664.
(JCR IF 2017: 2.613; IT-ANVUR Class: 2)

[J95] Mauro Conti, Ankit Gangwal, Sushmita Ruj.
On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective.
In (Elsevier) Computers & Security, 79: 162-189, 2018.
DOI: 10.1016/j.cose.2018.08.008, ISSN: 0167-4048.
(JCR IF 2017: 2.650; IT-ANVUR Class: 2)

[J93] M.M. Tajiki, M. Shojafar, B. Akbari, S. Salsano, M. Conti.
Software Defined Service Function Chaining with Failure Consideration for Fog Computing.
In (Wiley) Concurrency and Computation: Practice and Experience, in press, 2018.
(JCR IF 2017: 1.114; IT-ANVUR Class: 1)

[J92] Mauro Conti, Pallavi Kaliyar, Chhagan Lal.
CENSOR - Cloud Enabled Secure IoT Architecture over SDN Paradigm.
In (Wiley) Concurrency and Computation: Practice and Experience, in press, 2018.
(JCR IF 2017: 1.114; IT-ANVUR Class: 1)

[J90] Prashant Kumar, Meenakshi Tripathi, Ajay Nehra, Mauro Conti, Chhagan Lal.
SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN.
In (IEEE) Transactions on Network and Service Management, in press, 2018.
(JCR IF 2016: 3.286; IT-ANVUR Class: 2)

[J89] Paola G Vinueza Naranjo, Zahra Pooranian, Mohammad Shojafar, Mauro Conti, Rajkumar Buyya.
FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments.
In (Elsevier) Journal of Parallel and Distributed Computing, in press, 2018.
DOI: 10.1016/j.jpdc.2018.07.003.
(JCR IF 2017: 1.93; IT-ANVUR Class: 1)

[J88] Mauro Conti, Sandeep Kumar, Chhagan Lal, Sushmita Ruj.
A Survey on Security and Privacy Issues for Bitcoin.
In (IEEE) Communications Surveys and Tutorials, in press, 2018.
DOI: 10.1109/COMST.2018.2842460, ISSN: 1553-877X.
(JCR IF 2017: 20.23; IT-ANVUR Class: 2)

[J85] Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor.
The Dark Side (-Channel) of Mobile Devices: A Survey on Network Traffic Analysis.
In (IEEE) Communications Surveys and Tutorials, in press, 2018.
DOI: 10.1109/COMST.2018.2843533, ISSN: 1553-877X.
(JCR IF 2017: 17.188; IT-ANVUR Class: 2)

[J84] Subir Halder, Amrita Ghosal, Mauro Conti.
LiMCA: An Optimal Clustering Algorithm for Lifetime Maximization of Internet of Things.
In (Springer) Wireless Networks, 1-19, 2018.
DOI: 10.1007/s11276-018-1741-0, ISSN: 1572-8196.
(JCR IF 2016: 1.584; IT-ANVUR Class: 1)

[J82] Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti.
A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
In (ACM) Computing Surveys, in press, 2018.
(JCR IF 2016: 6.748; IT-ANVUR Class: 1)

[J79] Po-Yen Lee, Chia-Mu Yu, Tooska Dargahi, Mauro Conti, Giuseppe Bianchi.
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things.
In (IEEE) Transactions on Information Forensics & Security, 13(8): 2031-2046, 2018.
DOI: 10.1109/TIFS.2018.2805291, ISSN: 1556-6021.
(JCR IF 2016: 4.332; IT-ANVUR Class: 1)

[J78] Wafa Ben Jaballah, Akka Zemmari, Gilberto Filé, Mauro Conti, Mohamed Mosbah.
Whac-A-Mole: Smart Node Positioning in Clone Attack in Wireless Sensor Networks.
In (Elsevier) Computer Communications, in press, 2018.
(JCR IF 2016: 3.338; IT-ANVUR Class: 2)

[J77] Hidayet Aksu, Leonardo Babun, Mauro Conti, Gabriele Tolomei, A. Selcuk Uluagac.
Advertising in the IoT Era: Vision and Challenges.
In (IEEE) Communications Magazine, in press, 2018.
(JCR IF 2017: 10.435; IT-ANVUR Class: 1)

[J76] Merylin Monaro, Chiara Galante, Riccardo Spolaor, Qian Qian Li, Luciano Gamberini, Mauro Conti, Giuseppe Sartori.
Covert Lie Detection Using Keyboard Dynamics.
In (Nature) Scientific Reports, in press, 2018.
(JCR IF 2017: 4.259)

[J73] Moreno Ambrosin, Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik.
Security and Privacy Analysis of National Science Foundation Future Internet Architectures.
In (IEEE) Communications Surveys and Tutorials, 20(2): 1418-1442, 2018.
DOI: 10.1109/COMST.2018.2798280, ISSN: 1553-877X.
(JCR IF 2017: 17.188; IT-ANVUR Class: 2)

[J70] Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti.
Detecting Android Malware Leveraging Text Semantics of Network Flows.
In (IEEE) Transactions on Information Forensics & Security, 13(5): 1096-1109, 2017.
DOI: 10.1109/TIFS.2017.2771228, ISSN: 1556-6013.
(JCR IF 2016: 4.332; IT-ANVUR Class: 1)

[J69] QianQian Li, Sarada Prasad Gochhayat, Mauro Conti, FangAi Liu.
EnergIoT: A Solution to Improve Network Lifetime of IoT Devices.
In (Elsevier) Pervasive and Mobile Computing, 42: 124-133, 2017.
DOI: 10.1016/j.pmcj.2017.10.005, ISSN: 1574-1192.
(JCR IF 2016: 2.349; IT-ANVUR Class: 2)

[J68] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan.
Scale Inside-out: Rapid Mitigation of Cloud DDoS Attacks.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2017.
DOI: 10.1109/TDSC.2017.2763160, ISSN: 1545-5971.
(JCR IF 2016: 2.926; IT-ANVUR Class: 1)

[J67] Riccardo Spolaor, Elia Dal Santo, Mauro Conti.
DELTA: Data Extraction and Logging Tool for Android.
In (IEEE) Transactions on Mobile Computing, 17(6): 1289-1302, 2017.
DOI: 10.1109/TMC.2017.2762692, ISSN: 1536-1233.
(JCR IF 2016: 3.822; IT-ANVUR Class: 1)

[J66] Giuseppe Cascavilla, Mauro Conti, David G Schwartz, Inbal Yahav.
The Insider on the Outside: A Novel System for the Detection of Information Leakers in Social Networks.
In (Springer) European Journal of Information Systems, 1-16, 2017.
DOI: 10.1080/0960085X.2017.1387712.
(JCR IF 2016: 2.819; IT-ANVUR Class: 1)

[J65] Moreno Ambrosin, Paolo Braca, Mauro Conti, Riccardo Lazzaretti.
ODIN: Obfuscation-based privacy preserving consensus algorithm for Decentralized Information fusion in smart device Networks.
In (ACM) Transactions on Internet Technology, 18(1): 1-22, 2017.
DOI: 10.1145/3137573, ISSN: 1533-5399.
(JCR IF 2017: 1.489; IT-ANVUR Class: 1)

[J63] Vincent F. Taylor, Riccardo Spolaor, Mauro Conti and Ivan Martinovic.
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis.
In (IEEE) Transactions on Information Forensics & Security, 13(1): 63-78, 2017.
DOI: 10.1109/TIFS.2017.2737970, ISSN: 1556-6013.
(JCR IF 2016: 4.332; IT-ANVUR Class: 1)

[J62] Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson.
Internet of Things security and forensics: Challenges and opportunities.
In (Elsevier) Future Generation Computer Systems, 78: 544-546, 2017.
DOI: 10.1016/j.future.2017.07.060.
(JCR IF 2016: 3.997; IT-ANVUR Class: 1)

[J61] Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur,
Mohamed Mosbah, Mauro Conti.
Android Inter-App Communication Threats and Detection Techniques: A Focus on App Collusion.
In (Elsevier) Computers & Security, in press, 2017.
(JCR IF 2016: 2.849; IT-ANVUR Class: 2)

[J60] Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mauro Conti, Athanasios Vasilakos.
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
In (IEEE) Journal of Biomedical and Health Informatics, in press, 2017.
DOI: 10.1109/JBHI.2017.2721545, ISSN: 2168-2194.
(JCR IF 2016: 3.451; IT-ANVUR Class: 1)

[J58] Rifaqat Ali, Arup Kumar Pal, Saru Kumari, Marimuthu Karuppiah, Mauro Conti.
A Secure User Authentication and Key-Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring.
In (Elsevier) Future Generation Computer Systems, in press, 2017.
DOI: doi.org/10.1016/j.future.2017.06.018, ISSN: 0167-739X.
(JCR IF 2016: 3.997; IT-ANVUR Class: 1)

[J55] Reza Mohammadi, Reza Javidan, Mauro Conti.
SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks.
In (IEEE) Transactions on Network and Service Management, 14(2): 487-497, 2017.
DOI: 10.1109/TNSM.2017.2701549.
(JCR IF 2016: 1.296; IT-ANVUR Class: 2)

[J54] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya.
DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions.
In (Elsevier) Computers Communications, 107: 30-48, 2017.
DOI: 10.1016/j.comcom.2017.03.010.
(JCR IF 2015: 2.099; IT-ANVUR Class: 2)

[J53] Fauzia Idrees, Muttukrishnan Rajarajan, Mauro Conti, Tom Chen, Yogachandran Rahulamathavan.
PIndroid: A novel Android malware detection system using ensemble learning methods.
In (Elsevier) Computers & Security, 68: 36-46, 2017.
DOI: 10.1016/j.cose.2017.03.011.
(JCR IF 2015: 1.640; IT-ANVUR Class: 2)

[J52] Tooska Dargahi, Alberto Caponi, Moreno Ambrosin, Giuseppe Bianchi, Mauro Conti.
A Survey on the Security of Stateful SDN Data Planes.
In (IEEE) Communications Surveys and Tutorials, 19(3): 1701-1725, 2017.
DOI: 10.1109/COMST.2017.2689819.
(JCR IF 2016: 9.220; IT-ANVUR Class: 2)

[J51] Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik, Christopher A. Wood.
Privacy-Aware Caching in Information-Centric Networking.
In (IEEE) Transactions on Dependable and Secure Computing, 1-14, 2017.
DOI: 10.1109/TDSC.2017.2679711, ISSN: 1545-5971.
(JCR IF 2015: 1.592; IT-ANVUR Class: 1)

[J48] Pericle Perazzo, Francesco Betti Sorbelli, Mauro Conti, Gianluca Dini, Cristina M. Pinotti.
Drone Path Planning for Secure Positioning and Secure Position Verification.
In (IEEE) Transactions on Mobile Computing, 16(9): 2478-2493, 2016.
DOI: 10.1109/TMC.2016.2627552, ISSN: 1536-1233.
(JCR IF 2015: 2.456; IT-ANVUR Class: 1)

[J46] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran.
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking.
In (IEEE/ACM) Transactions on Networking, 25(2): 1206-1219, 2016.
DOI: 10.1109/TNET.2016.2626287, ISSN: 1063-6692.
(JCR IF 2015: 2.186; IT-ANVUR Class: 1)

[J45] Moreno Ambrosin, Arman Anzanpour, Mauro Conti, Tooska Dargahi, Sanaz Rahimi Moosavi, Amir M. Rahmani, Pasi Liljeberg.
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices.
In (IEEE) Micro, 36(6): 25-35, 2016.
DOI: 10.1109/MM.2016.101, ISSN: 0272-1732.
(JCR IF 2015: 1.091; IT-ANVUR Class: 2)

[J44] Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
Colluding Browser Extension Attack on User Privacy and its Implication for Web Browsers.
In (Elsevier) Computers & Security, 63: 14-28, 2016.
DOI: 10.1016/j.cose.2016.09.003, ISSN: 0167-4048.
(JCR IF 2015: 1.640; IT-ANVUR Class: 2)

[J43] Claudio Ardagna, Kanishka Ariyapala, Mauro Conti, Cristina Pinotti, Julinda Stefa.
Anonymous End-to-End Communications in Adversarial Mobile Clouds Pervasive and Mobile Computing.
In (Elsevier) Pervasive and Mobile Computing, 2016.
DOI: 10.1016/j.pmcj.2016.09.001.
(JCR IF 2015: 1.719; IT-ANVUR Class: 2)

[J42] Vanga Odelu, Ashok Kumar Das, Mohammad Wazid, Mauro Conti.
Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
In (IEEE) Transactions on Smart Grid, 9(3): 1900-1910, 2016.
DOI: 10.1109/TSG.2016.2602282, ISSN: 1949-3061.
(JCR IF 2015: 4.252; IT-ANVUR Class: 1)

[J40] Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti.
Enhancing QoE for video streaming in MANETs via multi-constraint routing.
In (Springer) Wireless Networks, 1-22, 2016.
DOI: 10.1007/s11276-016-1325-9, ISSN: 1022-0038.
(JCR IF 2015: 1.006; IT-ANVUR Class: 1)

[J38] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti.
DDoS attacks in Cloud Computing: Collateral Damage to Non-targets.
In (Elsevier) Computer Networks, 157-171, 2016.
DOI: 10.1016/j.comnet.2016.03.022, ISSN: 1389-1286.
(JCR IF 2014: 1.256; IT-ANVUR Class: 1)

[J37] Mauro Conti, Nicola Dragoni, Viktor Lesyk.
A Survey of Man In The Middle Attacks.
In (IEEE) Communications Surveys and Tutorials, 18(3): 2027-2051, 2016.
DOI: 10.1109/COMST.2016.2548426, ISSN: 1553-877X.
(JCR IF 2014: 6.806; IT-ANVUR Class: 2)

[J36] Tooska Dargahi, Moreno Ambrosin, Mauro Conti, N. Asokan.
ABAKA: a Novel Attribute-Based k-Anonymous Collaborative Solution for LBSs.
In (Elsevier) Computer Communications, 85: 1-13, 2016.
DOI: 10.1016/j.comcom.2016.03.002, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class: 2)

[J35] Alberto Compagno, Mauro Conti, Antonio A. D'Amico, Gianluca Dini, Pericle Perazzo, Lorenzo Taponecco.
Modeling Enlargement Attacks Against UWB Distance Bounding.
In (IEEE) Transactions on Information Forensics & Security, 11(7): 1565-1577, 2016.
DOI: 10.1109/TIFS.2016.2541613, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J34] Alberto Giaretta, Sasitharan Balasubramaniam, Mauro Conti.
Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.
In (IEEE) Transactions on Information Forensics & Security, 11(4): 665-676, 2016.
DOI:10.1109/TIFS.2015.2505632, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J33] Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde.
Analyzing Android Encrypted Network Traffic to Identify User Actions.
In (IEEE) Transactions on Information Forensics & Security, 11(1): 114-125, 2016.
DOI: 10.1109/TIFS.2015.2478741, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J32] Smita Naval, Vijay Laxmi, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti.
Employing Program Semantics for Malware Detection.
In (IEEE) Transactions on Information Forensics & Security, 10(12): 2591-2604, 2015.
DOI: 10.1109/TIFS.2015.2469253, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J31] Fei Li, Yogachandran Rahulamathavan, Mauro Conti, Muttukrishnan Rajarajan.
Robust Access Control Framework for Mobile Cloud Computing Network.
In (Elsevier) Computer Communications, 68: 61-72, 2015.
DOI: 10.1016/j.comcom.2015.07.005, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class: 2)

[J30] Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan.
Android Security: A Survey of Issues, Malware Penetration and Defenses.
In (IEEE) Communications Surveys and Tutorials, 17(2): 998-1022, 2015.
DOI: 10.1109/COMST.2014.2386139, ISSN: 1553-877X.
(JCR IF 2014: 6.806; IT-ANVUR Class: 2)

[J29] Mauro Conti, Bruno Crispo, Daniele Diodati, Jukka K. Nurminen, Cristina M. Pinotti, Taavi Teemaa.
Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones.
In (IEEE) Transactions on Parallel and Distributed Systems, 26(10): 2778-2790, 2014
DOI: 10.1109/TPDS.2014.2360693, ISSN: 1045-9219.
(JCR IF 2013: 2.173; IT-ANVUR Class: 1)

[J28] Stefano Guarino, Eyup Canlar, Mauro Conti, Roberto Di Pietro, Agusti Solanas.
Provable Storage Medium for Data Storage Outsourcing.
In (IEEE) Transactions on Services Computing, 8(6): 985-997, 2014
DOI: 10.1109/TSC.2014.2355229, ISSN: 1939-1374.
(JCR IF 2013: 1.985; IT-ANVUR Class: 1)

[J27] Agusti Solanas, Constantinos Patsakis, Mauro Conti, Ioannis S. Vlachos, Victoria Ramos, Francisco Falcone, Octavian Postolache, Pablo A. Pérez-Martínez, Roberto Di Pietro, Despina N. Perrea, Antoni Martínez-Ballesté.
Smart Health: A Context-Aware Health Paradigm within Smart Cities.
In (IEEE) Communications Magazine, 52(8): 74-81, 2014.
DOI: 10.1109/MCOM.2014.6871673, ISSN: 0163-6804.
(JCR IF 2013: 4.460; IT-ANVUR Class: 1)

[J26] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
A Secure Alert Messaging System for Safe Driving.
In (Elsevier) Computer Communications, 46: 29-42, 2014.
DOI: 10.1016/j.comcom.2014.03.010, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class: 2)

[J25] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
In (IEEE) Transactions on Information Forensics & Security, 9(4): 681-694, 2014.
DOI: 10.1109/TIFS.2014.2307197, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J24] Claudio Ardagna, Mauro Conti, Mario Leone, Julinda Stefa.
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments.
In (IEEE) Transactions on Services Computing, 7(3): 373-386, 2014
DOI: 10.1109/TSC.2014.2304717, ISSN: 1939-1374.
(JCR IF 2013: 1.985; IT-ANVUR Class: 1)

[J23] Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes.
MOSES: Supporting and Enforcing Security Profiles on Smartphones.
In (IEEE) Transactions on Dependable and Secure Computing, 11(3): 211-22, 2014.
DOI: 10.1109/TDSC.2014.2300482, ISSN: 1545-5971.
(JCR IF 2013: 1.137; IT-ANVUR Class: 1)

[J22] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Fast and Secure Multi-hop Broadcast Solutions for Inter-Vehicular Communication.
In (IEEE) Transactions on Intelligent Transportation Systems, 15(1): 433-450, 2014.
DOI: 10.1109/TITS.2013.2277890, ISSN: 1524-9050.
(JCR IF 2013: 2.472; IT-ANVUR Class: 2)

[J21] Mauro Conti, Paolo Gasti, Marco Teoli.
A Lightweight Mechanism for Detection of Cache Pollution Attacks in Named Data Networking.
In (Elsevier) Computer Networks, 57(16): 3178-3191, 2013.
DOI: 10.1016/j.comnet.2013.07.034, ISSN: 1389-1286.
(JCR IF 2013: 1.282; IT-ANVUR Class: 1)

[J20] Bruno P.S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo.
Hybrid Static-Runtime Information Flow and Declassification Enforcement.
In (IEEE) Transactions on Information Forensics & Security, 8(8): 1294-1305, 2013.
DOI: 10.1109/TIFS.2013.2267798, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J19] Earlence Fernandes, Bruno Crispo, Mauro Conti.
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
In (IEEE) Transactions on Information Forensics & Security, 8(6): 1027-1037, 2013.
DOI: 10.1109/TIFS.2013.2259818, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J18] Mauro Conti, Arbnor Hasani, Bruno Crispo.
Virtual Private Social Networks and a Facebook Implementation.
In (ACM) Transactions on the Web, 7(3), 14:1--14:31, 2013.
DOI: 10.1145/2516633.2516636, ISSN: 1559-1131.
(JCR IF 2013: 1.595; IT-ANVUR Class: 1)

[J17] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Clone Wars: Distributed Detection of Clone Attack in Mobile WSNs.
In (Elsevier) Journal of Computer and System Sciences, 80(3): 654-669, 2014.
DOI: 10.1016/j.jcss.2013.06.017, ISSN: 0022-0000.
(JCR IF 2013: 1.091; IT-ANVUR Class: 1)

[J16] Mauro Conti, Jeroen Willemsen, Bruno Crispo.
Providing Source Location Privacy in Wireless Sensor Networks: a Survey.
In (IEEE) Communications Surveys and Tutorials, 15(3):1238-1280, 2013.
DOI: 10.1109/SURV.2013.011413.00118, ISSN: 1553-877X.
(JCR IF 2013: 6.490; IT-ANVUR Class: 2)

[J14] Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich.
CRêPE: a System for Enforcing Fine-Grained Context-Related Policies on Android.
In (IEEE) Transactions on Information Forensics & Security, 7(5): 1426-1438, 2012.
DOI: 10.1109/TIFS.2012.2204249, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J13] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Secure Data Aggregation in Wireless Sensor Networks.
In (IEEE) Transactions on Information Forensics & Security, 7(3): 1040-1052, 2012.
DOI: 10.1109/TIFS.2012.2189568, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J12] Luciana Marconi, Mauro Conti, Roberto Di Pietro.
CASSANDRA: a probabilistic, efficient, and privacy preserving solution to compute set intersection.
In (Springer) International Journal of Information Security, 10(5):301-319, 2011.
DOI: 10.1007/s10207-011-0133-6, ISSN: 1615-5262.
(JCR IF 2013: 0.941; IT-ANVUR Class: 2)

[J7] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Distributed Detection of Clone Attacks in Wireless Sensor Networks.
In (IEEE) Transactions on Dependable and Secure Computing , 8(5):685-698, 2011.
DOI: 10.1109/TDSC.2010.25, ISSN: 1545-5971.
(JCR IF 2013: 1.137; IT-ANVUR Class: 1)




Conference and Workshop papers

[C143] Giovanna Carofiglio, Alberto Compagno, Mauro Conti, Fabio De Gaspari, Luca Muscariello.
IaaS-Aided Access Control for Information-Centric IoT.
In Proceedings of the 43rd IEEE Conference on Local Computer Networks
(IEEE LCN 2018)
, in press, Chicago, USA, October 1-4 2018.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 30.00%)

[C142] Alberto Compagno, Mauro Conti, Stefano Munari, Riccardo Lazzeretti.
GATE and FENCE: Geo-Blocking Protocols for Named Data Networking.
In Proceedings of the 43rd IEEE Conference on Local Computer Networks
(IEEE LCN 2018)
, in press, Chicago, USA, October 1-4 2018.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 30.00%)

[C139] Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter.
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In Proceedings of the 23rd European Symposium on Research in Computer Security
(ESORICS 2018)
, in press, Barcelona, Spain, September 3-7, 2018.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 20.00%)

[C138] Kiran Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu.
SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
In Proceedings of the 23rd European Symposium on Research in Computer Security
(ESORICS 2018)
, in press, Barcelona, Spain, September 3-7, 2018.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 20.00%)

[C136] Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi.
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In Proceedings of the 27th USENIX Security Symposium
(USENIX Security 2018)
, in press, Baltimore, USA, August 15-17, 2018.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 19.08%)

[C131] Mauro Conti, Ralph Droms, Muhammad Hassan, Sebastiano Valle.
QoE Degradation Attack in Dynamic Adaptive Streaming over ICN.
In Proceedings of the 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2018)
, in press, Chania, Greece, June 12-15, 2018.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B)

[C128] Andrea Biondo, Mauro Conti, Daniele Lain.
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets.
In Proceedings of the Network and Distributed System Security Symposium
(NDSS 2018)
, in press, San Diego, CA, February 18-21, 2018.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A+)

[C127] Wafa Ben Jaballah, Mauro Conti, Claudio E. Palazzi.
The Position Cheating Attack on Inter-Vehicular Online Gaming.
In Proceedings of the 15th IEEE Consumer Communications and Networking Conference
(IEEE CCNC 2018)
, in press, Las Vegas, USA, January 12-15, 2018.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C125] Zahra Pooranian, Mohammad Shojafar, Paola G. Vinueza Naranjo, Luca Chiaraviglio, Mauro Conti.
A Novel Distributed Fog-based Networked Architecture to Preserve Energy of Fog Data Center.
In Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems
(IEEE MASS 2017)
, pages 604-609, Orlando, Florida, USA, October 22-25, 2017.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B)

[C118] Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor.
Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2017)
, pages 278-296, Oslo, Norway. September 11-13, 2017.
DOI: 10.1007/978-3-319-66402-6_17, ISBN: 978-3-319-66401-9.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 15.88%)

[C113] Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti.
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In Proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses
(RAID 2017)
, pages 48-69, Atlanta, Georgia, USA, September 18-20, 2017.
DOI: 10.1007/978-3-319-66332-6_3, ISBN: 978-3-319-66332-6.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A+)

[C108] Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti and Radha Poovendran.
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices.
In Proceedings of the 15th International Conference on Applied Cryptography and Network Security
(ACNS 2017)
, pages 83-102, Kanazawa, Japan, June 10-12, 2017.
DOI: 10.1007/978-3-319-61204-1_5, ISBN: 978-3-319-61203-4.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B)

[C105] Giulio Lovisotto, Mauro Conti, Ivan Martinovic and Gene Tsudik.
FADEWICH: Fast Deauthentication over the Wireless Channel.
In Proceedings of the 37th IEEE International Conference on Distributed Computing
(ICDCS 2017)
, pages 2294-2301, Atlanta, Georgia, USA, June 5-8, 2017.
DOI: 10.1109/ICDCS.2017.296, ISBN: 978-1-5386-1792-2, ISSN: 1063-6927.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 16.94%)

[C101] Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik.
Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP.
In Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2017)
, pages 703-715, Abu Dhabi, UAE, April 2 - 6, 2017.
DOI: 10.1145/3052973.3053005, ISBN: 978-1-4503-4944-4.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 18.66%)

[C99] Jyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti.
POSTER: Detection of Information Leaks via Reflection in Android Apps.
In Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2017)
, pages 911-913, Abu Dhabi, UAE, April 2 - 6, 2017.
DOI: http://dx.doi.org/10.1145/3052973.3055162, ISBN 978-1-4503-4944-4.
(GGS: 2/A-; CORE: B; LiveSHINE: A+)

[C95] Jyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, M.S. Gaur, Mauro Conti, Muttukrishnan Rajarajan.
sPECTRA: A Precise FramEwork for Analyzing CrypTographic VulneRabilities in Android Apps.
In Proceedings of the 14th Annual IEEE Consumer Communications & Networking Conference
(IEEE CCNC 2017)
, pages 854-860, Las Vegas, Nevada, USA, January 8 - 11, 2017.
DOI: 10.1109/CCNC.2017.7983245, ISBN: 978-1-5090-6196-9, ISSN: 2331-9860.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C91] Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter.
SANA: Secure and Scalable Aggregate Network Attestation.
In Proceedings of the 23nd ACM Conference on Computer and Communications Security
(ACM CCS 2016)
, pages 731-742, Vienna, Austria, October 24 - 28, 2016.
DOI: 10.1145/2976749.2978335, ISBN: 978-1-4503-4139-4, ISSN: 1543-7221.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 16.36%)

[C88] Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash.
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
In Proceedings of the 25th USENIX Security Symposium
(USENIX Security 2016)
, pages 531-548, Austin, TX, USA, August 10-12, 2016.
ISBN: 978-1-931971-32-4.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 15.55%)

[C84] Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi.
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In Proceedings of the 16th Privacy Enhancing Technologies Symposium
(PETS 2016)
, Darmstadt, Germany, July 19-22, 2016.
DOI: 10.1515/popets-2016-0050.
(CORE: B; MA: A-)

[C83] Ankit Gangwal, Megha Gupta, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
ELBA: Efficient Layer Based Routing Algorithm in SDN.
In Proceedings of the 25th IEEE International Conference on Computer Communication and Networks
(IEEE ICCCN 2016)
, pages 1-7, Waikoloa, Hawaii, USA, August 1-4, 2016.
DOI: 10.1109/ICCCN.2016.7568515, ISBN: 978-1-5090-2279-3.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-)

[C81] Mauro Conti, Claudio Guarisco, Riccardo Spolaor.
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery.
In Proceedings of the 14th International Conference on Applied Cryptography and Network Security
(ACNS 2016)
, pages 611-628, London (Guildford), UK, June 19-22, 2016.
DOI: 10.1007/978-3-319-39555-5_33, ISBN: 978-331939554-8, ISSN: 0302-9743.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B; Acceptance rate: 19.12%)

[C74] Lovely Sinha, Shweta Bhandari, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
FlowMine: Android App Analysis via Data Flow.
In Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference
(IEEE CCNC 2016)
, pages 435-441, Las Vegas, Nevada, USA, January 9 - 12, 2016.
DOI: 10.1109/CCNC.2016.7444819, ISBN: 978-146739292-1.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C67] Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Marco Negro, Mohaned Qunaibit, Ahmad-Reza Sadeghi.
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In Proceedings of the 22nd ACM Conference on Computer and Communications Security
(ACM CCS 2015)
, pages 952-963, Denver, Colorado, USA, October 12 - 16, 2015.
DOI: 10.1145/2810103.2813671, ISBN: 978-145033832-5, ISSN: 1543-7221.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 19.81%)

[C62] Julien Mineraud, Federico Lancerin, Sasitharan Balasubramaniam, Mauro Conti, Sasu Tarkoma.
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data.
In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2015)
, pages 523-530, Helsinki, Finland, 20 - 22 August, 2015.
DOI: 10.1109/Trustcom.2015.415, ISBN: 978-146737951-9.
(CORE: A; Acceptance rate: 28.00%)

[C60] Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik.
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking.
In Proceedings of the 24th IEEE International Conference on Computer Communications and Networks
(IEEE ICCCN 2015)
, Las Vegas, Nevada, USA, August 3 - 6, 2015.
DOI: 10.1109/ICCCN.2015.7288477, ISBN: 978-147999964-4, ISSN: 1095-2055.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 25.00%)

[C58] Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi V. Mancini, Gene Tsudik.
Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking.
In Proceedings of the 13th International Conference on Applied Cryptography and Network Security
(ACNS 2015)
, pages 243-262, New York, NY, USA, June 2-5, 2015.
DOI: 10.1007/978-3-319-28166-7_12, ISBN: 978-331928165-0, ISSN: 0302-9743.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B; Acceptance rate: 21.02%; Best Student Paper Award)

[C57] Ding Ding, Mauro Conti, Renato Figueiredo.
Impact of Country-scale Internet Disconnection on Structured and Social P2P Overlays.
In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2015)
, Boston; MA, USA, June 14-17, 2015.
DOI: 10.1109/WoWMoM.2015.7158168, ISBN: 978-147998461-9.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B; Acceptance rate: 21.00%)

[C56] Pericle Perazzo, Kanishka Ariyapala, Mauro Conti, Gianluca Dini.
The Verifier Bee: a Path Planner for Drone-Based Secure Location Verification.
In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2015)
, Boston; MA, USA, June 14-17, 2015.
DOI: 10.1109/WoWMoM.2015.7158150, ISBN: 978-147998461-9.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B; Acceptance rate: 21.00%)

[C54] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran.
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2015)
, pages 183-201, Singapore, April 14-17, 2015.
DOI: 10.1145/2714576.2714612, ISBN: 978-145033245-3.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 17.84%)

[C51] Anil Saini, Manoj Gaur, Vijay Laxmi, Tushar Singhal and Mauro Conti.
Privacy Leakage Attacks in Browsers by Colluding Extensions.
In Proceedings of the 10th International Conference on Information Systems Security
(ICISS 2014)
, pages 257-276, Hyderabad, India, December 16-20, 2014.
DOI: 10.1007/978-3-319-13841-1_15, ISBN: 978-331913840-4, ISSN: 0302-9743.
(GGS: 3/B-; CORE: B; LiveSHINE: B; MA: C; Acceptance rate: 25/129 - 19.37%)

[C46] Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti.
Evaluation of Android Anti Malware Techniques against Dalvik Bytecode Obfuscation.
In Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2014)
, pages 414-421, Beijing, China, September 24-26, 2014.
DOI: 10.1109/TrustCom.2014.54, ISBN: 978-147996513-7.
(CORE: A)

[C45] Parvez Faruki, Vijay Ganmoor, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
Platform Neutral Sandbox for Analyzing Android Malware and Resource Hoggers.
In Proceedings of the 10th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2014)
, pages 556-560, Beijing, China, September 24-26, 2014.
DOI: 10.1007/978-3-319-23829-6_43, ISBN:978-3-319-23829-6, ISSN: 1867-8211.
(CORE: B; LiveSHINE: A; MA: C)

[C43] Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter.
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2014)
, pages 76-93, Wroclaw, Poland, September 7-11, 2014.
DOI: 10.1007/978-3-319-11203-9_5, ISBN: 978-3-319-11202-2.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 58/234 - 24.79%)

[C42] Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez.
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2014)
, pages 183-201, Wroclaw, Poland, September 7-11, 2014.
DOI: 10.1007/978-3-319-11203-9_11, ISBN: 978-3-319-11202-2.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 58/234 - 24.79%)

[C39] Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik.
Covert Ephemeral Communication in Named Data Networking.
In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2014)
, pages 15-26, Kyoto, Japan, June 4-6, 2014.
DOI: 10.1145/2590296.2590306, ISBN: 978-1-4503-2800-5.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 52/260 - 20.00%)

[C34] Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik.
Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking.
In Proceedings of the 38th IEEE Conference on Local Computer Networks
(IEEE LCN 2013)
, pages 630-638, Sydney, Australia, October 21-24, 2013.
DOI: 10.1109/LCN.2013.6761300, ISBN: 978-147990537-9.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 53/201 - 26.40%)

[C31] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Secure Verification of Location Claims on a Vehicular Safety Application.
In Proceedings of the 22nd International Conference on Computer Communications and Networks
(IEEE ICCCN 2013)
, pages 1-7, Nassau, Bahamas, June 30-August 2, 2013.
DOI: 10.1109/ICCCN.2013.6614193, ISBN: 978-146735774-6.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 86/300 - 28.66%)

[C30] Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik.
Cache Privacy in Name-Data Networking.
In Proceedings of the 33rd International Conference on Distributed Computing Systems
(IEEE ICDCS 2013)
, pages 41-51, Philadephia, PA, USA, July 8-11, 2013.
DOI: 10.1109/ICDCS.2013.12, ISBN: 978-0-7695-5000-8.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 61/464 - 13.14%)

[C27] Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich.
DEMO: Demonstrating the Effectiveness of MOSESdroid for Separation of Execution Modes.
In Proceedings of the 19th ACM Conference on Computer and Communications Security
(ACM SIGSAC CCS 2012)
, pages 998-1000, Raleigh, NC, USA, October 16-18, 2012.
DOI: 10.1145/2382196.2382304, ISBN: 978-145031650-7.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++)

[C22] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Wireless Sensor Replica Detection in Mobile Environments.
In Proceedings of the 13th International Conference on Distributed Computing and Networking
(ICDCN 2012)
, pages 249-264, Hong Kong, January 3-6, 2012.
DOI: 10.1007/978-3-642-25959-3_19, ISBN: 978-364225958-6.
(GGS: 3/B-; CORE: B; LiveSHINE: B-; MA: C)

[C21] Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Events Privacy in WSNs: a New Model and its Application.
In Proceedings of the 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2011)
, pages 1-9, Lucca, Italy, June 20-24, 2011.
DOI: 10.1109/WoWMoM.2011.5986491, ISBN: 978-145770351-5.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B; Acceptance rate: 32/173 - 18.49%)

[C20] Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo.
Mind How You Answer Me! (Transparently Authenticating the User of a Smartphone when Answering or Placing a Call).
In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2011)
, pages 249-259, Hong Kong, March 22-24, 2011.
DOI: 10.1145/1966913.1966945, ISBN: 978-145030564-8.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 35/217 - 16.12%)

[C18] Mauro Conti, Bruno Crispo, Roberto Di Pietro, Luciana Marconi.
Time Warp: How Time Affects Privacy in LBSs. Threats and countermeasures.
In Proceedings of the 12th International Conference on Information and Communications Security
(ICICS 2010 - Springer LNCS)
, pages 325-339, Barcelona, Spain, December 15-17, 2010.
DOI: 10.1007/978-3-642-17650-0_23, ISBN: 978-3-642-17649-4.
(GGS: 3/B; CORE: B; LiveSHINE: B; MA: B; Acceptance rate: 31/134 - 23.13%)

[C17] Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo.
CRePE: Context-Related Policy Enforcement for Android.
In Proceedings of the 13th Information Security Conference
(ISC 2010 - Springer LNCS)
, pages 331-354, Boca Raton, FL, USA, October 25 - 28, 2010.
DOI: 10.1007/978-3-642-18178-8_29, ISBN: 978-3-642-18177-1.
(GGS: 3/B; CORE: B; LiveSHINE: B; Acceptance rate: 22/134 - 16.41%)

[C15] Luciana Marconi, Mauro Conti, Roberto Di Pietro.
CED2: Communication Efficient Disjointness Decision.
In Proceedings of the 6th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2010 - Springer LNCS)
, pages 290-306, Singapore, September 7 - 9, 2010.
DOI: 10.1007/978-3-642-16161-2_17, ISBN: 978-3-642-16160-5.
(CORE: B; LiveSHINE: A; MA: C; Acceptance rate: 28/112 - 25.00%)

[C9] Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini.
Sec-TMP: a Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
In Proceedings of the 5th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2009 - Springer LNICST)
, pages 265-284, Athens, Greece, September 14-18, 2009.
DOI: 10.1007/978-3-642-05284-2_15, ISBN: 978-3-642-05283-5.
(CORE: B; LiveSHINE: A; MA: C; Acceptance rate: 20/76 - 26.31%)

[C7] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Securely Computing an Approximate Median in Wireless Sensor Networks.
In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks
(ACM SecureComm 2008)
, pages 1-10, Istanbul, Turkey, September 22-25, 2008.
DOI: 10.1145/1460877.1460885, ISBN: 978-160558241-2.
(CORE: B; LiveSHINE: A; MA: C; Acceptance rate: 26/123 - 21.13%)

[C4] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks.
In Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing
(ACM MobiHoc 2007)
, pages 80-89, Montréal, Quebec, Canada, September 9-14, 2007.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A++; Acceptance rate: 27/146 - 18.49%; Sapienza CS Dpt 2007 Best PhD Student Paper Award)
DOI: 10.1145/1288107.1288119, ISBN: 978-159593684-4.

[C2] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
In Proceedings of the 2006 IEEE International Conference on Systems, Man, and Cybernetics
(IEEE SMC '06)
, pages 1468-1473, Taipei, Taiwan, October 8-11, 2006.
DOI: 10.1109/ICSMC.2006.384924, ISBN: 978-1-4244-0099-7.
(GGS: 2/A-; CORE: B; LiveSHINE: B; MA: A++)


Patents

[P3] Mauro Conti, Rabbani Md Masoom, Nele Mentens, Jo Vliegen.
Configurable hardware device.
(Submitted), 2018.

[P2] Mauro Conti, Claudio Guarisco, Riccardo Spolaor.
A Method for recognizing whether a user terminal is human or robot.
IT Patent n. MI2014A002112, 2014.

[P1] Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo.
User authentication method for access to a mobile user terminal and corresponding mobile user terminal.
IT Patent n. TO2010A001069, 2010.
USA Patent n. US 20120164978 A1, 2014.


Hacking Conferences (w/o published proceedings)

[H2] Andrea Biondo, Mauro Conti, Daniele Lain.
Back To The Epilogue: How to Evade Windows' Control Flow Guard with Less than 16 Bytes.
In BlackHat Asia Briefings '18, Marina Bay Sands, Singapore, March 20-23, 2018.

[H1] Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik.
Skype & Type: Keystroke Leakage over VoIP.
In BlackHat USA Briefings '17, Mandalay Bay, Las Vegas, USA July 22-27, 2017.


Top

All Publications (Click here for selected publications)

(see also: Google Scholar - DBLP - Scopus - WoS - AMiner - MS Academic - academia.edu - ResearchGate - Panda Search - Padua Research)
(Journal ranked according to JCR and Italian-ANVUR-VQR-2012; conference ranked according to CORE/LiveSHINE/MicrosoftAcademic/Italian-GII-GRIN-SCIE)


Quick links:     Journal papers    Books    Book chapters    Conference & Workshop papers    Patents    Theses    Hacking Conferences


Journal papers

[J96] Mauro Conti, Ralph Droms, Muhammad Hassan, Chhagan Lal.
Fair-RTT-DAS: A Robust and Efficient Dynamic Adaptive Streaming over ICN.
In (Elsevier) Computer Communications, 129: 209-225, 2018.
DOI: 10.1016/j.comcom.2018.07.033, ISSN: 0140-3664.
(JCR IF 2017: 2.613; IT-ANVUR Class: 2)

[J95] Mauro Conti, Ankit Gangwal, Sushmita Ruj.
On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective.
In (Elsevier) Computers & Security, 79: 162-189, 2018.
DOI: 10.1016/j.cose.2018.08.008, ISSN: 0167-4048.
(JCR IF 2017: 2.650; IT-ANVUR Class: 2)

[J94] Agostino Sturaro, Simone Silvestri, Mauro Conti, Sajal K. Das.
A Realistic Model for Failure Propagation in Interdependent Cyber-Physical Systems.
In (IEEE) Transactions on Network Science and Engineering, in press, 2018.

[J93] M.M. Tajiki, M. Shojafar, B. Akbari, S. Salsano, M. Conti.
Software Defined Service Function Chaining with Failure Consideration for Fog Computing.
In (Wiley) Concurrency and Computation: Practice and Experience, in press, 2018.
(JCR IF 2017: 1.114; IT-ANVUR Class: 1)

[J92] Mauro Conti, Pallavi Kaliyar, Chhagan Lal.
CENSOR - Cloud Enabled Secure IoT Architecture over SDN Paradigm.
In (Wiley) Concurrency and Computation: Practice and Experience, in press, 2018.
(JCR IF 2017: 1.114; IT-ANVUR Class: 1)

[J91] Armir Bujari, Mauro Conti, Carla De Francesco, Claudio E Palazzi.
Fast Multi-hop Broadcast of Alert Messages in VANETs: An Analytical Model.
In (Elsevier) Ad Hoc Networks, in press, 2018.
(JCR IF 2017: 3.151; IT-ANVUR Class: 4)

[J90] Prashant Kumar, Meenakshi Tripathi, Ajay Nehra, Mauro Conti, Chhagan Lal.
SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN.
In (IEEE) Transactions on Network and Service Management, in press, 2018.
(JCR IF 2016: 3.286; IT-ANVUR Class: 2)

[J89] Paola G Vinueza Naranjo, Zahra Pooranian, Mohammad Shojafar, Mauro Conti, Rajkumar Buyya.
FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments.
In (Elsevier) Journal of Parallel and Distributed Computing, in press, 2018.
DOI: 10.1016/j.jpdc.2018.07.003.
(JCR IF 2017: 1.93; IT-ANVUR Class: 1)

[J88] Mauro Conti, Sandeep Kumar, Chhagan Lal, Sushmita Ruj.
A Survey on Security and Privacy Issues for Bitcoin.
In (IEEE) Communications Surveys and Tutorials, in press, 2018.
DOI: 10.1109/COMST.2018.2842460, ISSN: 1553-877X.
(JCR IF 2017: 20.23; IT-ANVUR Class: 2)

[J87] Zahra Pooranian, Jemal H. Abawajy, Vinod P, Mauro Conti.
Scheduling Distributed Energy Resource Operation and Daily Power Consumption for a Smart Building to Optimize Economic and Environmental Parameters.
In Energies, MDPI Journal, 11(6): 1348, 2018.
DOI: 10.3390/en11061348, ISSN: 1996-1073.
(JCR IF 2017: 2.7; IT-ANVUR Class: 2)

[J86] Chuan Zhao, Shengnan Zhao, Bo Zhang, Zhongtian Jia, Zhenxiang Chen, Mauro Conti.
Secure Comparison under Ideal/Real Simulation Paradigm.
In (IEEE) Access, 1-15 (Early Access), 2018.
DOI: 10.1109/ACCESS.2018.2837665, ISSN: 2169-3536.
(JCR IF 2016: 3.244)

[J85] Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor.
The Dark Side (-Channel) of Mobile Devices: A Survey on Network Traffic Analysis.
In (IEEE) Communications Surveys and Tutorials, in press, 2018.
DOI: 10.1109/COMST.2018.2843533, ISSN: 1553-877X.
(JCR IF 2017: 17.188; IT-ANVUR Class: 2)

[J84] Subir Halder, Amrita Ghosal, Mauro Conti.
LiMCA: An Optimal Clustering Algorithm for Lifetime Maximization of Internet of Things.
In (Springer) Wireless Networks, 1-19, 2018.
DOI: 10.1007/s11276-018-1741-0, ISSN: 1572-8196.
(JCR IF 2016: 1.584; IT-ANVUR Class: 1)

[J83] Giuseppe Cascavilla, Filipe Beato, Andrea Burattin, Mauro Conti, Luigi Vincenzo Mancini.
OSSINT - Open Source Social Network Intelligence. An efficient and effective way to uncover "private" information in OSN profiles.
In (Elsevier) Online Social Networks and Media, in press, 2018.

[J82] Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti.
A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
In (ACM) Computing Surveys, in press, 2018.
(JCR IF 2016: 6.748; IT-ANVUR Class: 1)

[J81] Seyedeh Narjes Fallah, Ravinesh Deo, Mohammad Shojafar, Mauro Conti, Sh Shamshirband.
Computational intelligence approaches for energy load forecasting in smart energy management grids: state of the art, future challenges and research directions.
In Energies, MDPI Journal, in press, 2018.
(JCR IF 2017: 2.7; IT-ANVUR Class: 2)

[J80] Mauro Conti, Fabio De Gaspari, Luigi V. Mancini.
A Novel Stealthy Attack to Gather SDN Configuration-Information.
In (IEEE) Transactions on Emerging Topics in Computing, in press, 2018.
DOI: 10.1109/TETC.2018.2806977, ISSN: 2168-6750.
(JCR IF 2016: 3.826)

[J79] Po-Yen Lee, Chia-Mu Yu, Tooska Dargahi, Mauro Conti, Giuseppe Bianchi.
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things.
In (IEEE) Transactions on Information Forensics & Security, 13(8): 2031-2046, 2018.
DOI: 10.1109/TIFS.2018.2805291, ISSN: 1556-6021.
(JCR IF 2016: 4.332; IT-ANVUR Class: 1)

[J78] Wafa Ben Jaballah, Akka Zemmari, Gilberto Filé, Mauro Conti, Mohamed Mosbah.
Whac-A-Mole: Smart Node Positioning in Clone Attack in Wireless Sensor Networks.
In (Elsevier) Computer Communications, in press, 2018.
(JCR IF 2016: 3.338; IT-ANVUR Class: 2)

[J77] Hidayet Aksu, Leonardo Babun, Mauro Conti, Gabriele Tolomei, A. Selcuk Uluagac.
Advertising in the IoT Era: Vision and Challenges.
In (IEEE) Communications Magazine, in press, 2018.
(JCR IF 2017: 10.435; IT-ANVUR Class: 1)

[J76] Merylin Monaro, Chiara Galante, Riccardo Spolaor, Qian Qian Li, Luciano Gamberini, Mauro Conti, Giuseppe Sartori.
Covert Lie Detection Using Keyboard Dynamics.
In (Nature) Scientific Reports, in press, 2018.
(JCR IF 2017: 4.259)

[J75] Chia-Mu Yu, Sarada Prasad Gochhayat, Mauro Conti, Chun-Shien Lu.
Privacy Aware Data Deduplication for Side Channel in Cloud Storage.
In (IEEE) Transactions on Cloud Computing, in press, 2018.

[J74] Minho Jo, Ashok Kumar Das, Mohammad Wazid, Odelu Vanga, Neeraj Kumar, Mauro Conti.
Design of Secure User Authenticated Key Management Protocol for Generic IoT Network.
In (IEEE) Internet of Things Journal, 5(1): 269-282, 2018.
DOI: 10.1109/JIOT.2017.2780232, ISSN: 2327-4662.
(JCR IF 2017: 7.596)

[J73] Moreno Ambrosin, Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik.
Security and Privacy Analysis of National Science Foundation Future Internet Architectures.
In (IEEE) Communications Surveys and Tutorials, 20(2): 1418-1442, 2018.
DOI: 10.1109/COMST.2018.2798280, ISSN: 1553-877X.
(JCR IF 2017: 17.188; IT-ANVUR Class: 2)

[J72] Paola G. V. Naranjo, Zahra Pooranian, Shahaboddin Shamshirband, Jemal H. Abawajy, Mauro Conti.
Fog over Virtualized IoT: New Opportunity for Context-Aware Networked Applications and a Case Study.
In (MDPI) Applied Sciences, in press, 2017.

[J71] Fatemeh Hajeforosh, Zahra Pooranian, Ali Shabani, Mauro Conti.
Evaluating the High Frequency Behavior of the Modified Grounding Scheme in Wind Farms.
In (MDPI) Applied Sciences, in press, 2017.

[J70] Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti.
Detecting Android Malware Leveraging Text Semantics of Network Flows.
In (IEEE) Transactions on Information Forensics & Security, 13(5): 1096-1109, 2017.
DOI: 10.1109/TIFS.2017.2771228, ISSN: 1556-6013.
(JCR IF 2016: 4.332; IT-ANVUR Class: 1)

[J69] QianQian Li, Sarada Prasad Gochhayat, Mauro Conti, FangAi Liu.
EnergIoT: A Solution to Improve Network Lifetime of IoT Devices.
In (Elsevier) Pervasive and Mobile Computing, 42: 124-133, 2017.
DOI: 10.1016/j.pmcj.2017.10.005, ISSN: 1574-1192.
(JCR IF 2016: 2.349; IT-ANVUR Class: 2)

[J68] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan.
Scale Inside-out: Rapid Mitigation of Cloud DDoS Attacks.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2017.
DOI: 10.1109/TDSC.2017.2763160, ISSN: 1545-5971.
(JCR IF 2016: 2.926; IT-ANVUR Class: 1)

[J67] Riccardo Spolaor, Elia Dal Santo, Mauro Conti.
DELTA: Data Extraction and Logging Tool for Android.
In (IEEE) Transactions on Mobile Computing, 17(6): 1289-1302, 2017.
DOI: 10.1109/TMC.2017.2762692, ISSN: 1536-1233.
(JCR IF 2016: 3.822; IT-ANVUR Class: 1)

[J66] Giuseppe Cascavilla, Mauro Conti, David G Schwartz, Inbal Yahav.
The Insider on the Outside: A Novel System for the Detection of Information Leakers in Social Networks.
In (Springer) European Journal of Information Systems, 1-16, 2017.
DOI: 10.1080/0960085X.2017.1387712.
(JCR IF 2016: 2.819; IT-ANVUR Class: 1)

[J65] Moreno Ambrosin, Paolo Braca, Mauro Conti, Riccardo Lazzaretti.
ODIN: Obfuscation-based privacy preserving consensus algorithm for Decentralized Information fusion in smart device Networks.
In (ACM) Transactions on Internet Technology, 18(1): 1-22, 2017.
DOI: 10.1145/3137573, ISSN: 1533-5399.
(JCR IF 2017: 1.489; IT-ANVUR Class: 1)

[J64] Amin Azmoodeh, Ali Dehghantanha, Mauro Conti, Raymond Choo.
Detecting Crypto-Ransomware in IoT Networks Based On Energy Consumption Footprint.
In (Springer) Journal of Ambient Intelligence and Humanized Computing, 1-12, 2017.
DOI: 10.1007/s12652-017-0558-5.
(JCR IF 2016: 1.588)

[J63] Vincent F. Taylor, Riccardo Spolaor, Mauro Conti and Ivan Martinovic.
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis.
In (IEEE) Transactions on Information Forensics & Security, 13(1): 63-78, 2017.
DOI: 10.1109/TIFS.2017.2737970, ISSN: 1556-6013.
(JCR IF 2016: 4.332; IT-ANVUR Class: 1)

[J62] Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson.
Internet of Things security and forensics: Challenges and opportunities.
In (Elsevier) Future Generation Computer Systems, 78: 544-546, 2017.
DOI: 10.1016/j.future.2017.07.060.
(JCR IF 2016: 3.997; IT-ANVUR Class: 1)

[J61] Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur,
Mohamed Mosbah, Mauro Conti.
Android Inter-App Communication Threats and Detection Techniques: A Focus on App Collusion.
In (Elsevier) Computers & Security, in press, 2017.
(JCR IF 2016: 2.849; IT-ANVUR Class: 2)

[J60] Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mauro Conti, Athanasios Vasilakos.
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
In (IEEE) Journal of Biomedical and Health Informatics, in press, 2017.
DOI: 10.1109/JBHI.2017.2721545, ISSN: 2168-2194.
(JCR IF 2016: 3.451; IT-ANVUR Class: 1)

[J59] Seyed Hossein Hosseini Nazhad, Mohammad Shojafar, Shahaboddin Shamshirband, Mauro Conti.
An Efficient Routing Protocol for the QoS Support of Large-Scale MANETs.
In (Wiley) International Journal of Communication Systems, in press, 2017.
DOI: 10.1002/dac.3384, ISSN: 1099-1131.
(JCR IF 2016: 1.066; IT-ANVUR Class: 3)

[J58] Rifaqat Ali, Arup Kumar Pal, Saru Kumari, Marimuthu Karuppiah, Mauro Conti.
A Secure User Authentication and Key-Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring.
In (Elsevier) Future Generation Computer Systems, in press, 2017.
DOI: doi.org/10.1016/j.future.2017.06.018, ISSN: 0167-739X.
(JCR IF 2016: 3.997; IT-ANVUR Class: 1)

[J57] Riccardo Spolaor, QianQian Li, Merylin Monaro, Mauro Conti, Luciano Gamberini, Giuseppe Sartori.
Biometric Authentication Methods on Smartphones: A Survey.
In Psychnology Journal, 14(2): 87-98, 2017.

[J56] Chhagan Lal, Roberto Petroccia, Konstantinos Pelekanakis, Mauro Conti, João Alves.
Towards the Development of Secure Underwater Acoustic Networks.
In (IEEE) Journal of Oceanic Engineering, 42(4): 1075-1087, 2017.
DOI: 10.1109/JOE.2017.2716599, ISSN: 0364-9059.
(JCR IF 2016: 2.297)

[J55] Reza Mohammadi, Reza Javidan, Mauro Conti.
SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks.
In (IEEE) Transactions on Network and Service Management, 14(2): 487-497, 2017.
DOI: 10.1109/TNSM.2017.2701549.
(JCR IF 2016: 1.296; IT-ANVUR Class: 2)

[J54] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya.
DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions.
In (Elsevier) Computers Communications, 107: 30-48, 2017.
DOI: 10.1016/j.comcom.2017.03.010.
(JCR IF 2015: 2.099; IT-ANVUR Class: 2)

[J53] Fauzia Idrees, Muttukrishnan Rajarajan, Mauro Conti, Tom Chen, Yogachandran Rahulamathavan.
PIndroid: A novel Android malware detection system using ensemble learning methods.
In (Elsevier) Computers & Security, 68: 36-46, 2017.
DOI: 10.1016/j.cose.2017.03.011.
(JCR IF 2015: 1.640; IT-ANVUR Class: 2)

[J52] Tooska Dargahi, Alberto Caponi, Moreno Ambrosin, Giuseppe Bianchi, Mauro Conti.
A Survey on the Security of Stateful SDN Data Planes.
In (IEEE) Communications Surveys and Tutorials, 19(3): 1701-1725, 2017.
DOI: 10.1109/COMST.2017.2689819.
(JCR IF 2016: 9.220; IT-ANVUR Class: 2)

[J51] Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik, Christopher A. Wood.
Privacy-Aware Caching in Information-Centric Networking.
In (IEEE) Transactions on Dependable and Secure Computing, 1-14, 2017.
DOI: 10.1109/TDSC.2017.2679711, ISSN: 1545-5971.
(JCR IF 2015: 1.592; IT-ANVUR Class: 1)

[J50] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan, Rajkumar Buyya.
Combating DDoS Attacks in Cloud: Requirements, Trends, and Future Directions.
In (IEEE) Cloud Computing, 4(1): 22-32, 2017.
DOI: 10.1109/MCC.2017.14.
(JCR IF 2015: 1.86)

[J49] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan.
DDoS victim service containment to minimize the internal collateral damages in cloud computing.
In (Elsevier) Computers & Electrical Engineering, 59: 165-179, 2016.
DOI: dx.doi.org/10.1016/j.compeleceng.2016.12.004.
(JCR IF 2015: 1.084; IT-ANVUR Class: 4)

[J48] Pericle Perazzo, Francesco Betti Sorbelli, Mauro Conti, Gianluca Dini, Cristina M. Pinotti.
Drone Path Planning for Secure Positioning and Secure Position Verification.
In (IEEE) Transactions on Mobile Computing, 16(9): 2478-2493, 2016.
DOI: 10.1109/TMC.2016.2627552, ISSN: 1536-1233.
(JCR IF 2015: 2.456; IT-ANVUR Class: 1)

[J47] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya.
Service Resizing for Quick DDoS Mitigation in Cloud Computing Environment.
In (Springer) Annals of Telecommunications, 72(5-6): 237-252, 2016.
DOI: 10.1007/s12243-016-0552-5, ISSN: 0003-4347.
(JCR IF 2015: 0.722; IT-ANVUR Class: 3 - area 09)

[J46] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran.
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking.
In (IEEE/ACM) Transactions on Networking, 25(2): 1206-1219, 2016.
DOI: 10.1109/TNET.2016.2626287, ISSN: 1063-6692.
(JCR IF 2015: 2.186; IT-ANVUR Class: 1)

[J45] Moreno Ambrosin, Arman Anzanpour, Mauro Conti, Tooska Dargahi, Sanaz Rahimi Moosavi, Amir M. Rahmani, Pasi Liljeberg.
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices.
In (IEEE) Micro, 36(6): 25-35, 2016.
DOI: 10.1109/MM.2016.101, ISSN: 0272-1732.
(JCR IF 2015: 1.091; IT-ANVUR Class: 2)

[J44] Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
Colluding Browser Extension Attack on User Privacy and its Implication for Web Browsers.
In (Elsevier) Computers & Security, 63: 14-28, 2016.
DOI: 10.1016/j.cose.2016.09.003, ISSN: 0167-4048.
(JCR IF 2015: 1.640; IT-ANVUR Class: 2)

[J43] Claudio Ardagna, Kanishka Ariyapala, Mauro Conti, Cristina Pinotti, Julinda Stefa.
Anonymous End-to-End Communications in Adversarial Mobile Clouds Pervasive and Mobile Computing.
In (Elsevier) Pervasive and Mobile Computing, 2016.
DOI: 10.1016/j.pmcj.2016.09.001.
(JCR IF 2015: 1.719; IT-ANVUR Class: 2)

[J42] Vanga Odelu, Ashok Kumar Das, Mohammad Wazid, Mauro Conti.
Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
In (IEEE) Transactions on Smart Grid, 9(3): 1900-1910, 2016.
DOI: 10.1109/TSG.2016.2602282, ISSN: 1949-3061.
(JCR IF 2015: 4.252; IT-ANVUR Class: 1)

[J41] Wafa Ben Jaballah, Mauro Conti, Claudio Palazzi, Mohamed Mosbah.
Impact of Malicious Nodes Positioning on Vehicular Alert Messaging System.
In (Elsevier) Ad Hoc Networks , 52: 3-16, 2016.
DOI: 10.1016/j.adhoc.2016.08.008, ISSN: 1570-8705.
(JCR IF 2015: 1.660; IT-ANVUR Class: 4)

[J40] Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti.
Enhancing QoE for video streaming in MANETs via multi-constraint routing.
In (Springer) Wireless Networks, 1-22, 2016.
DOI: 10.1007/s11276-016-1325-9, ISSN: 1022-0038.
(JCR IF 2015: 1.006; IT-ANVUR Class: 1)

[J39] Teing Yee Yang, Ali Dehghantanha, Kim-Kwang Raymond Choo, Mauro Conti, Tooska Dargahi.
Forensic Investigation of Cooperative Storage Cloud Service: Symform As a Case Study.
In (Wiley) Journal of Forensic Sciences, 2016.
DOI: 10.1111/1556-4029.13271.
(JCR IF 2015: 1.322)

[J38] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti.
DDoS attacks in Cloud Computing: Collateral Damage to Non-targets.
In (Elsevier) Computer Networks, 157-171, 2016.
DOI: 10.1016/j.comnet.2016.03.022, ISSN: 1389-1286.
(JCR IF 2014: 1.256; IT-ANVUR Class: 1)

[J37] Mauro Conti, Nicola Dragoni, Viktor Lesyk.
A Survey of Man In The Middle Attacks.
In (IEEE) Communications Surveys and Tutorials, 18(3): 2027-2051, 2016.
DOI: 10.1109/COMST.2016.2548426, ISSN: 1553-877X.
(JCR IF 2014: 6.806; IT-ANVUR Class: 2)

[J36] Tooska Dargahi, Moreno Ambrosin, Mauro Conti, N. Asokan.
ABAKA: a Novel Attribute-Based k-Anonymous Collaborative Solution for LBSs.
In (Elsevier) Computer Communications, 85: 1-13, 2016.
DOI: 10.1016/j.comcom.2016.03.002, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class: 2)

[J35] Alberto Compagno, Mauro Conti, Antonio A. D'Amico, Gianluca Dini, Pericle Perazzo, Lorenzo Taponecco.
Modeling Enlargement Attacks Against UWB Distance Bounding.
In (IEEE) Transactions on Information Forensics & Security, 11(7): 1565-1577, 2016.
DOI: 10.1109/TIFS.2016.2541613, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J34] Alberto Giaretta, Sasitharan Balasubramaniam, Mauro Conti.
Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.
In (IEEE) Transactions on Information Forensics & Security, 11(4): 665-676, 2016.
DOI:10.1109/TIFS.2015.2505632, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J33] Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde.
Analyzing Android Encrypted Network Traffic to Identify User Actions.
In (IEEE) Transactions on Information Forensics & Security, 11(1): 114-125, 2016.
DOI: 10.1109/TIFS.2015.2478741, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J32] Smita Naval, Vijay Laxmi, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti.
Employing Program Semantics for Malware Detection.
In (IEEE) Transactions on Information Forensics & Security, 10(12): 2591-2604, 2015.
DOI: 10.1109/TIFS.2015.2469253, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J31] Fei Li, Yogachandran Rahulamathavan, Mauro Conti, Muttukrishnan Rajarajan.
Robust Access Control Framework for Mobile Cloud Computing Network.
In (Elsevier) Computer Communications, 68: 61-72, 2015.
DOI: 10.1016/j.comcom.2015.07.005, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class: 2)

[J30] Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan.
Android Security: A Survey of Issues, Malware Penetration and Defenses.
In (IEEE) Communications Surveys and Tutorials, 17(2): 998-1022, 2015.
DOI: 10.1109/COMST.2014.2386139, ISSN: 1553-877X.
(JCR IF 2014: 6.806; IT-ANVUR Class: 2)

[J29] Mauro Conti, Bruno Crispo, Daniele Diodati, Jukka K. Nurminen, Cristina M. Pinotti, Taavi Teemaa.
Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones.
In (IEEE) Transactions on Parallel and Distributed Systems, 26(10): 2778-2790, 2014
DOI: 10.1109/TPDS.2014.2360693, ISSN: 1045-9219.
(JCR IF 2013: 2.173; IT-ANVUR Class: 1)

[J28] Stefano Guarino, Eyup Canlar, Mauro Conti, Roberto Di Pietro, Agusti Solanas.
Provable Storage Medium for Data Storage Outsourcing.
In (IEEE) Transactions on Services Computing, 8(6): 985-997, 2014
DOI: 10.1109/TSC.2014.2355229, ISSN: 1939-1374.
(JCR IF 2013: 1.985; IT-ANVUR Class: 1)

[J27] Agusti Solanas, Constantinos Patsakis, Mauro Conti, Ioannis S. Vlachos, Victoria Ramos, Francisco Falcone, Octavian Postolache, Pablo A. Pérez-Martínez, Roberto Di Pietro, Despina N. Perrea, Antoni Martínez-Ballesté.
Smart Health: A Context-Aware Health Paradigm within Smart Cities.
In (IEEE) Communications Magazine, 52(8): 74-81, 2014.
DOI: 10.1109/MCOM.2014.6871673, ISSN: 0163-6804.
(JCR IF 2013: 4.460; IT-ANVUR Class: 1)

[J26] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
A Secure Alert Messaging System for Safe Driving.
In (Elsevier) Computer Communications, 46: 29-42, 2014.
DOI: 10.1016/j.comcom.2014.03.010, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class: 2)

[J25] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
In (IEEE) Transactions on Information Forensics & Security, 9(4): 681-694, 2014.
DOI: 10.1109/TIFS.2014.2307197, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J24] Claudio Ardagna, Mauro Conti, Mario Leone, Julinda Stefa.
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments.
In (IEEE) Transactions on Services Computing, 7(3): 373-386, 2014
DOI: 10.1109/TSC.2014.2304717, ISSN: 1939-1374.
(JCR IF 2013: 1.985; IT-ANVUR Class: 1)

[J23] Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes.
MOSES: Supporting and Enforcing Security Profiles on Smartphones.
In (IEEE) Transactions on Dependable and Secure Computing, 11(3): 211-22, 2014.
DOI: 10.1109/TDSC.2014.2300482, ISSN: 1545-5971.
(JCR IF 2013: 1.137; IT-ANVUR Class: 1)

[J22] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Fast and Secure Multi-hop Broadcast Solutions for Inter-Vehicular Communication.
In (IEEE) Transactions on Intelligent Transportation Systems, 15(1): 433-450, 2014.
DOI: 10.1109/TITS.2013.2277890, ISSN: 1524-9050.
(JCR IF 2013: 2.472; IT-ANVUR Class: 2)

[J21] Mauro Conti, Paolo Gasti, Marco Teoli.
A Lightweight Mechanism for Detection of Cache Pollution Attacks in Named Data Networking.
In (Elsevier) Computer Networks, 57(16): 3178-3191, 2013.
DOI: 10.1016/j.comnet.2013.07.034, ISSN: 1389-1286.
(JCR IF 2013: 1.282; IT-ANVUR Class: 1)

[J20] Bruno P.S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo.
Hybrid Static-Runtime Information Flow and Declassification Enforcement.
In (IEEE) Transactions on Information Forensics & Security, 8(8): 1294-1305, 2013.
DOI: 10.1109/TIFS.2013.2267798, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J19] Earlence Fernandes, Bruno Crispo, Mauro Conti.
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
In (IEEE) Transactions on Information Forensics & Security, 8(6): 1027-1037, 2013.
DOI: 10.1109/TIFS.2013.2259818, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J18] Mauro Conti, Arbnor Hasani, Bruno Crispo.
Virtual Private Social Networks and a Facebook Implementation.
In (ACM) Transactions on the Web, 7(3), 14:1--14:31, 2013.
DOI: 10.1145/2516633.2516636, ISSN: 1559-1131.
(JCR IF 2013: 1.595; IT-ANVUR Class: 1)

[J17] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Clone Wars: Distributed Detection of Clone Attack in Mobile WSNs.
In (Elsevier) Journal of Computer and System Sciences, 80(3): 654-669, 2014.
DOI: 10.1016/j.jcss.2013.06.017, ISSN: 0022-0000.
(JCR IF 2013: 1.091; IT-ANVUR Class: 1)

[J16] Mauro Conti, Jeroen Willemsen, Bruno Crispo.
Providing Source Location Privacy in Wireless Sensor Networks: a Survey.
In (IEEE) Communications Surveys and Tutorials, 15(3):1238-1280, 2013.
DOI: 10.1109/SURV.2013.011413.00118, ISSN: 1553-877X.
(JCR IF 2013: 6.490; IT-ANVUR Class: 2)

[J15] Eyup Serdar Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Windows Mobile LiveSD Forensics.
In (Elsevier) Journal of Network and Computer Applications, 36(2):677-684, 2013.
DOI: 10.1016/j.jnca.2012.12.024, ISSN: 1084-8045.
(JCR IF 2013: 1.772; IT-ANVUR Class: 4)

[J14] Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich.
CRêPE: a System for Enforcing Fine-Grained Context-Related Policies on Android.
In (IEEE) Transactions on Information Forensics & Security, 7(5): 1426-1438, 2012.
DOI: 10.1109/TIFS.2012.2204249, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J13] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Secure Data Aggregation in Wireless Sensor Networks.
In (IEEE) Transactions on Information Forensics & Security, 7(3): 1040-1052, 2012.
DOI: 10.1109/TIFS.2012.2189568, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J12] Luciana Marconi, Mauro Conti, Roberto Di Pietro.
CASSANDRA: a probabilistic, efficient, and privacy preserving solution to compute set intersection.
In (Springer) International Journal of Information Security, 10(5):301-319, 2011.
DOI: 10.1007/s10207-011-0133-6, ISSN: 1615-5262.
(JCR IF 2013: 0.941; IT-ANVUR Class: 2)

[J11] Mauro Conti, Bruno Crispo, Roberto Di Pietro, Luciana Marconi.
Time in privacy preserving LBSs: an overlooked dimension.
In (Hindawi) International Journal of Vehicular Technology, 2011:1-12, Article ID 486975, 2011.
DOI: 10.1155/2011/486975, ISSN: 1687-5702

[J10] Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini.
Preserving privacy against external and internal threats in WSN data aggregation.
In (Springer) Telecommunication Systems, 52(4):2163-2176, 2013.
DOI: 10.1007/s11235-011-9539-8, ISSN: 1018-4864.
(JCR IF 2013: 1.163; IT-ANVUR Class: 3 - area 09)

[J9] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Who counterfeited my ViagraTM ? (Probabilistic item removal detection via RFID tag cooperation)
In (EURASIP) Journal on Wireless Communications and Networking, 2011:1-13, Article ID 575171, 2011.
DOI: 10.1155/2011/575171, ISSN: 1687-1499.
(JCR IF 2013: 0.805; IT-ANVUR Class: 4)

[J8] Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini.
Secure Topology Maintenance and Events Collection in WSNs.
In (Wiley) Security and Communication Networks, 4(7):744-762, 2011.
DOI: 10.1002/sec.280, ISSN: 1939-0114.
(JCR IF 2013: 0.433; IT-ANVUR Class: 3)

[J7] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Distributed Detection of Clone Attacks in Wireless Sensor Networks.
In (IEEE) Transactions on Dependable and Secure Computing , 8(5):685-698, 2011.
DOI: 10.1109/TDSC.2010.25, ISSN: 1545-5971.
(JCR IF 2013: 1.137; IT-ANVUR Class: 1)

[J6] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs.
In (EURASIP) Journal on Wireless Communications and Networking , 2009:1-13, Article ID 8, 2009.
DOI: 10.1155/2009/945943, ISSN: 1687-1499.
(JCR IF 2013: 0.805; IT-ANVUR Class: 4)

[J5] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi.
eRIPP-FS: Enforcing Privacy and Security in RFID.
In (Wiley) Security and Communication Networks , 3(1): 58-70, 2010.
DOI: 10.1002/sec.120, ISSN: 1939-0114.
(JCR IF 2013: 0.433; IT-ANVUR Class: 3)

[J4] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Secure Median Computation in Wireless Sensor Networks.
In (Elsevier) Ad Hoc Networks , 7(8): 1448-1462, 2009.
DOI: 10.1016/j.adhoc.2009.04.007, ISSN: 1570-8705.
(JCR IF 2013: 1.943; IT-ANVUR Class: 4)

[J3] Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia and Luigi V. Mancini.
Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks.
In (Wiley) Security and Communication Networks, 2(2): 195-213, 2009.
DOI: 10.1002/sec.95, ISSN: 1939-0122.
(JCR IF 2013: 0.433; IT-ANVUR Class: 3)

[J2] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
Distributed Data Source Verification in Wireless Sensor Networks.
In (Elsevier) Information Fusion , 10(4): 342-353, 2009.
DOI: 10.1016/j.inffus.2009.01.002, ISSN: 1566-2535.
(JCR IF 2013: 3.472; IT-ANVUR Class: 4)

[J1] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini.
ECCE: Enhanced Cooperative Channel Establishment for secure pair-wise communication in Wireless Sensor Networks.
In (Elsevier) Ad Hoc Networks , 5(1): 49-62, 2007.
DOI: 10.1016/j.adhoc.2006.05.013, ISSN: 1570-8705.
(JCR IF 2013: 1.943; IT-ANVUR Class: 4)


Books

[B1] Mauro Conti.
Secure Wireless Sensor Networks: Threats and Solutions.
Advances in Information Security. Series Volume 65, 2015.
(Springer) (Series Editor: Sushil Jajodia).
DOI: 10.1007/978-1-4939-3460-7, ISSN: 1568-2633, ISBN 978-1-4939-3458-4.


Book Chapters

[K11] Mauro Conti, Edlira Dushku, Luigi V. Mancini.
Distributed Services Attestation in IoT.
In From Database to Cyber Security, to appear, 2018.
(Springer) (Editors: P. Samarati, I. Ray, I. Ray).

[K10] Ema Kušen, Mark Strembeck, Mauro Conti.
Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube.
In Lecture Notes on Social Networks, to appear, 2018.
(Springer) (Editors: R. Alhajj, U. Glässer, H. Liu, R. Wittek, D. Zeng).

[K9] Rehana Yasmin, M. Reza Memarian , Ville Leppänen, Mauro Conti.
Investigating the possibility of data leakage in time of live VM migration.
In Cyber Threat Intelligence, to appear, 2017.
(Springer) (Editors: Mauro Conti, Ali Dehghantanha, Tooska Dargahi).

[K8] Samuel Laurén, M. Reza Memarian, Mauro Conti, Ville Leppänen.
Analysis of Security in Modern Container Platforms.
In Research Advances in Cloud Computing, to appear, 2017.
(Springer) (Editors: Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya).

[K7] Mohammad Reza Memarian, Diogo Fernandes, Pedro Inacio, Ville Leppänen, Mauro Conti.
Applications of Trusted Computing in Cloud Context.
In Research Advances in Cloud Computing, to appear, 2017.
(Springer) (Editors: Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya).

[K6] Tooska Dargahi, Ali Dehghantanha, Mauro Conti.
Forensics Analysis of Android Mobile VoIP Apps.
In Contemporary digital forensic investigations of cloud and mobile applications, to appear, 2016.
(Elsevier) (Editors: Kim-Kwang Raymond Choo, Ali Dehghantanha).

[K5] Tooska Dargahi, Ali Dehghantanha, Mauro Conti.
Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
In Contemporary digital forensic investigations of cloud and mobile applications, to appear, 2016.
(Elsevier) (Editors: Kim-Kwang Raymond Choo, Ali Dehghantanha).

[K4] Hossein Fereidooni, Veelasha Moonsamy, Mauro Conti, Lejla Batina.
Efficient Classification of Android Malware in the wild using Robust Static Features.
In Protecting Mobile Networks and Devices: Challenges and Solutions, to appear, 2016.
(CRC Press - Taylor & Francis) (Editors: Weizhi Meng, Xiapu Luo, Jianying Zhou, Steven Furnell).

[K3] Mauro Conti, Fabio De Gaspari, Luigi Vincenzo Mancini.
Anonymity in an electronic society: A survey.
In Cyber Deception, pp 283-312, 2016.
(Springer) (Editors: Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, and Cliff Wang).
DOI: 10.1007/978-3-319-32699-3_12, ISBN: 978-3-319-32697-9.

[K2] Parvez Faruki, Vijay Laxmi, Manoj Gaur, Shweta Bhandari, Mauro Conti.
DroidAnalyst: Synergic Framework for Static and Dynamic App Analysis.
In Recent Advances in Computational Intelligence in Defense and Security, Volume 621, pp 519-552, 2015.
(Springer) (Editors: Rami Abielmona, Rafael Falcon, Nur Zincir-Heywood, Hussein Abbass).
DOI: 10.1007/978-3-319-26450-9_20, ISSN: 1860-949X.

[K1] Mauro Conti, Roberto Di Pietro, Luciana Marconi.
Privacy for LBSs: On Using a Footprint model to face the enemy.
In Advanced Research in Data Privacy, Studies in Computational Intelligence. Volume 567, pp 169-195, 2015.
(Springer) (Editors: Guillermo Navarro-arribas, Vincenc Torra).
DOI: 10.1007/978-3-319-09885-2_10, ISSN: 1860-949X, ISBN: 978-3-319-09884-5.


Conference and Workshop papers

[C148] Mayank Swarnkar, Neminath Hubballi, Nikhil Tripathi, Mauro Conti.
AppHunter: Mobile Application Traffic Classification.
In Proceedings of the 12th IEEE International Conference on Advanced Networks and Telecommunications Systems
(IEEE ANTS 2018)
, in press, Radisson Blu, Indore, India, December 16-19, 2018.

[C147] Mauro Conti, Pallavi Kaliyar, Md Masoom Rabbani, Silvio Ranise.
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things.
In Proceedings of the 14th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
(IEEE WiMob 2018)
, in press, Limassol, Cyprus, October 15-17, 2018.
(GGS: 3/B; LiveSHINE: B; MA: B)

[C146] Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan.
All you need is "love": Evading hate speech detection.
In Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security
(ACM CCS 2018 workshop: AISec 2018)
, in press, Toronto, Canada, October 19, 2018.

[C145] Sankardas Roy, Daniele Tomasi, Mauro Conti, Shiva Bhusal, Arkajyoti Roy, Jiang Li.
Optimizing Message Ferry Scheduling in a DTN.
In Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access
(ACM MobiWac)
, in press, Montreal, Canada October 28 - November 2, 2018.
(LiveSHINE:C; MA:C)

[C144] Moreno Ambrosin; Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise.
PADS: Practical Attestation for Highly Dynamic Swarm Topologies.
In Proceedings of the 7th International Workshop on Secure Internet of Things
(ESORICS 2018 workshop: SIoT 2018)
, in press, Barcelona, Spain, September 3-7, 2018.

[C143] Giovanna Carofiglio, Alberto Compagno, Mauro Conti, Fabio De Gaspari, Luca Muscariello.
IaaS-Aided Access Control for Information-Centric IoT.
In Proceedings of the 43rd IEEE Conference on Local Computer Networks
(IEEE LCN 2018)
, in press, Chicago, USA, October 1-4 2018.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 30.00%)

[C142] Alberto Compagno, Mauro Conti, Stefano Munari, Riccardo Lazzeretti.
GATE and FENCE: Geo-Blocking Protocols for Named Data Networking.
In Proceedings of the 43rd IEEE Conference on Local Computer Networks
(IEEE LCN 2018)
, in press, Chicago, USA, October 1-4 2018.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 30.00%)

[C141] Giuseppe Bernieri, Mauro Conti, Federica Pascucci.
A Novel Architecture for Cyber-Physical Security in Industrial Control Networks.
In Proceedings of the 4th International Forum on Research and Technologies for Society and Industry
(RTSI 2018)
, in press, Palermo, Italy, September 10-13 2018.

[C140] Angelo Capossele, Mauro Conti, Andrea Gaglione, Riccardo Lazzeretti, Paolo Missier, Michele Nati.
Leveraging blockchain to enable smart-health applications.
In Proceedings of the 4th International Forum on Research and Technologies for Society and Industry
(RTSI 2018)
, in press, Palermo, Italy, September 10-13 2018.

[C139] Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter.
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In Proceedings of the 23rd European Symposium on Research in Computer Security
(ESORICS 2018)
, in press, Barcelona, Spain, September 3-7, 2018.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 20.00%)

[C138] Kiran Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu.
SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
In Proceedings of the 23rd European Symposium on Research in Computer Security
(ESORICS 2018)
, in press, Barcelona, Spain, September 3-7, 2018.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 20.00%)

[C137] Neda Maleki, Amir Masoud Rahmani, Mauro Conti.
POSTER: An Intelligent Framework to Parallelize Hadoop Phases.
In Proceedings of the 27th International Symposium on High-Performance Parallel and Distributed Computing
(ACM HPDC 2018)
, in press, Tempe, Arizona, USA, June 11-15, 2018.
(GGS: 2/A; CORE: A; LiveSHINE: A; MA: A)

[C136] Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi.
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In Proceedings of the 27th USENIX Security Symposium
(USENIX Security 2018)
, in press, Baltimore, USA, August 15-17, 2018.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 19.08%)

[C135] Merylin Monaro, Marta Businaro, Riccardo Spolaor, Qian Qian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori.
The Online Identity Detection via Keyboard Dynamics.
In Proceedings of the IEEE Future Technologies Conference
(FTC)
, in press, Vancouver, Canada, November 13-14, 2018.

[C134] Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lin Wang, Bo Yang, Mauro Conti.
Deep and Broad Learning based Detection of Android Malware via Network Traffic.
In Proceedings of the IEEE/ACM International Symposium on Quality of Service
(IWQoS)
, in press, Alberta, Canada, June 4-6, 2018.

[C133] Mauro Conti, Ankit Gangwal, Sarada Prasad Gochhayat, Gabriele Tolomei.
Spot the Difference: Your Bucket is Leaking - A Novel Methodology to Expose A/B Testing Effortlessly.
In Proceedings of the 4th IEEE Workshop on Security and Privacy in the Cloud
(IEEE CNS 2018 workshop: SPC 2018)
, pages 1-7, Beijing, China, May 30, 2018.
DOI: 10.1109/CNS.2018.8433122, ISBN: 978-1-5386-4586-4.

[C132] Sana Belguith, Sarada Prasad Gochhayat, Mauro Conti, Giovanni Russello.
Emergency Access Control Management Via Attribute Based Encrypted QR Codes.
In Proceedings of the 4th IEEE Workshop on Security and Privacy in the Cloud
(IEEE CNS 2018 workshop: SPC 2018)
, in press, Beijing, China, May 30, 2018.

[C131] Mauro Conti, Ralph Droms, Muhammad Hassan, Sebastiano Valle.
QoE Degradation Attack in Dynamic Adaptive Streaming over ICN.
In Proceedings of the 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2018)
, in press, Chania, Greece, June 12-15, 2018.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B)

[C130] Zahra Pooranian, Kang-Cheng Chen, Chia-Mu Yu, Mauro Conti.
RARE: Defeating Side Channels based on Data-Deduplication in Cloud Storage.
In Proceedings of the 7th International workshop on Cloud Computing Systems, Networks, and Applications
(IEEE INFOCOM 2018 workshop: CCSNA 2018)
, in press, Honolulu, USA, April 16, 2018.

[C129] Amit Kumar Sikder, Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya, Mauro Conti.
IoT-based Smart Lighting Communication Protocols for Smart Cities.
In Proceedings of the 8th IEEE Annual Computing and Communication Workshop and Conference
(CCWC 2018)
, in press, Las Vegas, NV, USA, January 8-10, 2018.

[C128] Andrea Biondo, Mauro Conti, Daniele Lain.
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets.
In Proceedings of the Network and Distributed System Security Symposium
(NDSS 2018)
, in press, San Diego, CA, February 18-21, 2018.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A+)

[C127] Wafa Ben Jaballah, Mauro Conti, Claudio E. Palazzi.
The Position Cheating Attack on Inter-Vehicular Online Gaming.
In Proceedings of the 15th IEEE Consumer Communications and Networking Conference
(IEEE CCNC 2018)
, in press, Las Vegas, USA, January 12-15, 2018.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C126] Mauro Conti, Daniele Lain, Riccardo Lazzaretti, Giulio Lovisotto, Walter Quattrociocchi.
It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via
Propagation Features.
In Proceedings of the 9th IEEE International Workshop on Information Forensics and Security
(IEEE WIFS 2017)
, in press, Rennes, France, December 4-7, 2017.

[C125] Zahra Pooranian, Mohammad Shojafar, Paola G. Vinueza Naranjo, Luca Chiaraviglio, Mauro Conti.
A Novel Distributed Fog-based Networked Architecture to Preserve Energy of Fog Data Center.
In Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems
(IEEE MASS 2017)
, pages 604-609, Orlando, Florida, USA, October 22-25, 2017.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B)

[C124] Matteo Brunati, Mauro Conti, Alessandro Tezza.
SNIFFO: Security of Networks and Intelligence for Field Operations.
In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
(IEEE WiMob 2017)
, in press, Rome, Italy, October 9-11, 2017.
(GGS: 3/B; LiveSHINE: B; MA: B; Acceptance rate: 28%)

[C123] Mauro Conti, Ankit Gangwal, Manoj Singh Gaur.
A Comprehensive and Effective Mechanism for DDoS Detection in SDN.
In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
(IEEE WiMob 2017)
, pages 1-8, Rome, Italy, October 9-11, 2017.
DOI: 10.1109/WiMOB.2017.8115796, ISBN: 978-1-5386-3839-2.
(GGS: 3/B; LiveSHINE: B; MA: B; Acceptance rate: 28%)

[C122] Reza Mohammadi, Reza Javidan, Manijeh Kehstgari, Mauro Conti, Chhagan Lal.
Practical Extensions to Countermeasure DoS attacks in Software Defined Networking.
In Proceedings of the 3rd IEEE Conference on Network Functions Virtualization and Software Defined Networking
(IEEE NFV-SDN 2017)
, in press, Berlin, Germany, November 6-8, 2017.

[C121] Mauro Conti, Ankit Gangwal.
Blocking Intrusions at Border using Software Defined-Internet Exchange Point (SD-IXP).
In Proceedings of the 3rd IEEE Conference on Network Functions Virtualization and Software Defined Networking
(IEEE NFV-SDN 2017)
, pages 1-6, Berlin, Germany, November 6-8, 2017.
DOI: 10.1109/NFV-SDN.2017.8169838, ISBN: 978-1-5386-3285-7.

[C120] Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Gaur, Akka Zemmari, Mohamed Mosbah, Daya Ram Sharma and Mauro Conti.
Unraveling Reflection Induced Sensitive Leaks in Android Apps.
In Proceedings of the 12th International Conference on Risks and Security of Internet and Systems
(CRISIS 2017)
, in press, Dinard, France. September 19-21, 2017.
(CORE: C; MA: C)

[C119] Qianqian Li, Reza Mohammadi, Mauro Conti, Chuanhuang Li and Xiaolin Li.
GolfEngine: Network Management System for Software Defined Networking.
In Proceedings of the 13th IEEE International Conference on Intelligent Computer Communication and Processing
(ICCP 2017)
, in press, Cluj-Napoca, Romania. September 7-9, 2017.
(CORE: C)

[C118] Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor.
Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2017)
, pages 278-296, Oslo, Norway. September 11-13, 2017.
DOI: 10.1007/978-3-319-66402-6_17, ISBN: 978-3-319-66401-9.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 15.88%)

[C117] Matteo Di Pirro, Mauro Conti and Riccardo Lazzeretti.
Ensuring Information Security by Using Haskell Advanced Type System.
In Proceedings of the 51st International Carnahan Conference on Security Technology
(ICCST 2017)
, in press, Madrid, Spain. October 23-26, 2017.

[C116] Ema Kusen, Giuseppe Cascavilla, Kathrin Figl, Mauro Conti and Mark Strembeck.
Identifying Emotions in Social Media: Comparison of Word-emotion lexicons.
In Proceedings of the 4th International Symposium on Social Networks Analysis, Management and Security
(SNAMS 2017)
, in press, Prague, Czech Republic. August 21-23, 2017.

[C115] Merylin Monaro, Riccardo Spolaor, Qianqian Li, Mauro Conti, Luciano Gamberini and Giuseppe Sartori.
Type Me the Truth! Detecting Deceitful Users via Keystroke Dynamics.
In Proceedings of the 6th International Workshop on Cyber Crime
(ARES 2017 workshop: IWCC 2017)
, pages 1-6, Reggio Calabria, Italy, August 29 - September 1, 2017.
DOI: 10.1145/3098954.3104047, ISBN: 978-1-4503-5257-4.

[C114] Mauro Conti, Pallavi Kaliyar, Chhagan Lal.
REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks.
In Proceedings of the 1st International Workshop on Criminal Use of Information Hiding
(ARES 2017 workshop: CUING 2017)
, pages 1-8, Reggio Calabria, Italy, August 29 - September 1, 2017.
DOI: 10.1145/3098954.3106070, ISBN: 978-1-4503-5257-4.

[C113] Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti.
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In Proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses
(RAID 2017)
, pages 48-69, Atlanta, Georgia, USA, September 18-20, 2017.
DOI: 10.1007/978-3-319-66332-6_3, ISBN: 978-3-319-66332-6.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A+)

[C112] Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise.
POSTER: Toward Secure and Efficient Attestation for highly Dynamic Swarms.
In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(ACM SIGSAC WiSec 2017)
, pages 281-282, Boston, USA, July 18-20, 2017.
DOI: 10.1145/3098243.3106026, ISBN: 978-1-4503-5084-6.
(GGS: 3/B; LiveSHINE: A-; MA: B)

[C111] Moreno Ambrosin, Stefano Cecconello, Mauro Conti,and Daniele Lain.
POSTER: A Roaming-based Denial of Service Attack on LTE Networks.
In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(ACM SIGSAC WiSec 2017)
, pages 283-284, Boston, USA, July 18-20, 2017.
DOI: 10.1145/3098243.3106027, ISBN: 978-1-4503-5084-6.
(GGS: 3/B; LiveSHINE: A-; MA: B)

[C110] Ema Kusen, Mark Strembeck, Giuseppe Cascavilla and Mauro Conti.
The Influence of Emotional Valence Shifts on the Spread of Information in Social Networks.
In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
(ASONAM 2017)
, pages 321-324, Sydney, Australia, 31 July - 03 August, 2017.
DOI: 10.1145/3110025.3110031, ISBN: 978-1-4503-4993-2.
(GGS: 3/B-; LiveSHINE: B; MA: B-)

[C109] Hossein Fereidooni, Tommaso Frassetto, Markus Miettinen, Ahmad-Reza Sadeghi, Mauro Conti.
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
In Proceedings of the 2nd IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health
(CHASE 2017 workshop: SEARCH 2017)
, pages 19-24, Philadelphia, Pennsylvania, USA, July 17-19, 2017.
DOI: 10.1109/CHASE.2017.54, ISBN: 978-1-5090-4722-2.

[C108] Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti and Radha Poovendran.
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices.
In Proceedings of the 15th International Conference on Applied Cryptography and Network Security
(ACNS 2017)
, pages 83-102, Kanazawa, Japan, June 10-12, 2017.
DOI: 10.1007/978-3-319-61204-1_5, ISBN: 978-3-319-61203-4.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B)

[C107] Mauro Conti, Fabio De Gaspari and Luigi V. Mancini.
Know Your Enemy: Stealth Configuration-Information Gathering in SDN.
In Proceedings of the 12th International Conference on Green, Pervasive and Cloud Computing
(GPC 2017)
, pages 386-401, Cetara, Italy, May 11-14, 2017.
DOI: 10.1007/978-3-319-57186-7, ISBN: 978-3-319-57185-0.
(CORE: C; LiveSHINE: C; MA: C)

[C106] Maddalena Favaretto, Riccardo Spolaor, Mauro Conti and Marco Ferrante.
You Surf So Strange Today: Anomaly Detection in Web services via HMM and CTMC.
In Proceedings of the 12th International Conference on Green, Pervasive and Cloud Computing
(GPC 2017)
, pages 426-440, Cetara, Italy, May 11-14, 2017.
DOI: 10.1007/978-3-319-57186-7_32, ISBN: 978-3-319-57185-0.
(CORE: C; LiveSHINE: C; MA: C)

[C105] Giulio Lovisotto, Mauro Conti, Ivan Martinovic and Gene Tsudik.
FADEWICH: Fast Deauthentication over the Wireless Channel.
In Proceedings of the 37th IEEE International Conference on Distributed Computing
(ICDCS 2017)
, pages 2294-2301, Atlanta, Georgia, USA, June 5-8, 2017.
DOI: 10.1109/ICDCS.2017.296, ISBN: 978-1-5386-1792-2, ISSN: 1063-6927.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 16.94%)

[C104] Alberto Compagno, Mauro Conti, Muhammad Hassan Khan.
ICN-based Authentication Protocol for a Simplified LTE Architecture.
In Proceedings of the 2016 Workshop on Communication Security
(Eurocrypt 2017 workshop: WCS 2017)
, pages 125-140, Paris, France, April 30, 2017.
DOI: 10.1007/978-3-319-59265-7_9, ISBN: 978-3-319-59265-7.

[C103] Marco Baesso, Pasquale Capuozzo, Mauro Conti, Luciano Gamberini, Merylin Monaro, Giuseppe Sartori, Riccardo Spolaor.
You Are How You Play: Authenticating Mobile Users via Game Playing.
In Proceedings of the 2016 Workshop on Communication Security
(Eurocrypt 2017 workshop: WCS 2017)
, pages 79-96, Paris, France, April 30, 2017.
DOI: 10.1007/978-3-319-59265-7_6, ISBN: 978-3-319-59265-7.

[C102] Shanshan Wang, Qiben Yan, Zhenxiang Chen, Mauro Conti, Bo Yang, Chuan Zhao.
TextDroid: Semantics-based Detection of Mobile Malware Using Network Flows.
In Proceedings of the 2016 International Workshop on The Security, Privacy, and Digital Forensics of Mobile Systems and Networks
(IEEE INFOCOM 2017 workshop: MobiSec 2017)
, in press, Atlanta, Georgia, USA, May 1, 2017.

[C101] Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik.
Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP.
In Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2017)
, pages 703-715, Abu Dhabi, UAE, April 2 - 6, 2017.
DOI: 10.1145/3052973.3053005, ISBN: 978-1-4503-4944-4.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 18.66%)

[C100] Ankit Gangwal, Mauro Conti, Manoj Singh Gaur.
PANORAMA: Real-time Bird's Eye View of an OpenFlow Network.
In Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control
(IEEE ICNSC 2017)
, pages 204-209, Catanzaro, Italy, May 16-18, 2017.
DOI: 10.1109/ICNSC.2017.8000092, ISBN: 978-1-5090-4429-0.
(GGS: 3/B; LiveSHINE: B; MA: B)

[C99] Jyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti.
POSTER: Detection of Information Leaks via Reflection in Android Apps.
In Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2017)
, pages 911-913, Abu Dhabi, UAE, April 2 - 6, 2017.
DOI: http://dx.doi.org/10.1145/3052973.3055162, ISBN 978-1-4503-4944-4.
(GGS: 2/A-; CORE: B; LiveSHINE: A+)

[C98] Vittoria Cozza, Zisis Tsiatsikas, Mauro Conti, Georgios Kambourakis.
Why Snoopy loves online services: An Analysis of (lack of) Privacy in Online Services.
In Proceedings of the 3rd International Conference on Information Systems Security and Privacy
(ICISSP 2017)
, pages 431-438, Porto, Portugal, February 19 - 21, 2017.
DOI: 10.5220/0006207204310438, ISBN: 978-989-758-209-7.

[C97] Venkatesh Gauri Shankar, Gaurav Somani, Manoj Singh Gaur, Vijay Laxmi and Mauro Conti.
AndroTaint: An Efficient Android Malware Detection Framework using Dynamic Taint analySIs.
In Proceedings of the Asia Security and Privacy Conference
(Asia S&P 2017)
, pages 1-13, Surat, India, January 29 - February 1, 2017.
DOI: 10.1109/ISEASP.2017.7976989, ISBN: 978-1-5090-5942-3.

[C96] Mauro Conti, Fabio De Gaspari, Luigi V. Mancini.
Anonymity in an electronic society.
In Proceedings of the 1st Annual Italian Conference on Cybersecurity
(ITASEC 2017)
, in press, Venice, Italy, January 17 - 20, 2017.

[C95] Jyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, M.S. Gaur, Mauro Conti, Muttukrishnan Rajarajan.
sPECTRA: A Precise FramEwork for Analyzing CrypTographic VulneRabilities in Android Apps.
In Proceedings of the 14th Annual IEEE Consumer Communications & Networking Conference
(IEEE CCNC 2017)
, pages 854-860, Las Vegas, Nevada, USA, January 8 - 11, 2017.
DOI: 10.1109/CCNC.2017.7983245, ISBN: 978-1-5090-6196-9, ISSN: 2331-9860.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C94] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Nishanth Devarajan.
Amplified Distributed Denial of Service Attack in Software Defined Networking.
In Proceedings of the 8th Annual IEEE/IFIP International Conference on New Technologies, Mobility and Security
(IEEE/IFIP NTMS 2016)
, pages 1-4, Larnaca, Cyprus, November 21 - 23, 2016.
DOI: 10.1109/NTMS.2016.7792432, ISBN: 978-1-5090-2914-3, ISSN: 2157-4960.
(LiveSHINE: B-; MA: C)

[C93] Hossein Fereidooni, Mauro Conti, Danfeng Yao, Alessandro Sperduti.
ANASTASIA: ANdroid mAlware detection using STAtic analySIs of Applications.
In Proceedings of the 8th Annual IEEE/IFIP International Conference on New Technologies, Mobility and Security
(IEEE/IFIP NTMS 2016)
, pages 1-5, Larnaca, Cyprus, November 21 - 23, 2016.
DOI: 10.1109/NTMS.2016.7792435, ISBN: 978-1-5090-2914-3, ISSN: 2157-4960.
(LiveSHINE: B-; MA: C)

[C92] Anna Spagnolli, Mauro Conti, Giorgia Guerra, Jonathan Freeman, David Kirsh, Aimee van Wynsberghe.
Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions.
In Proceedings of the 5th International Workshop on Symbiotic Interaction
(Symbiotic 2016)
, pages 5-22, Padua, Italy, September 29 - 30, 2016.
DOI: 10.1007/978-3-319-57753-1_2, ISBN: 978-3-319-57752-4.

[C91] Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter.
SANA: Secure and Scalable Aggregate Network Attestation.
In Proceedings of the 23nd ACM Conference on Computer and Communications Security
(ACM CCS 2016)
, pages 731-742, Vienna, Austria, October 24 - 28, 2016.
DOI: 10.1145/2976749.2978335, ISBN: 978-1-4503-4139-4, ISSN: 1543-7221.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 16.36%)

[C90] Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran.
Despicable Me(ter): Anonymous and Fine-grained Metering Data Reporting with Dishonest Meters.
In Proceedings of the 4rd IEEE Conference on Communications and Network Security
(IEEE CNS 2016)
, in press, Philadelphia, PA USA, October 17 - 19, 2016.
(MA: C; Acceptance rate: 29.00%)

[C89] Alberto Compagno, Mauro Conti, Ralph Droms.
OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN.
In Proceedings of the 3rd ACM Conference on Information-Centric Networking
(ACM ICN 2016)
, pages 166-175, Kyoto, Japan, September 26-28, 2016.
DOI: 10.1145/2984356.2984374, ISBN: 978-145034467-8.

[C88] Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash.
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
In Proceedings of the 25th USENIX Security Symposium
(USENIX Security 2016)
, pages 531-548, Austin, TX, USA, August 10-12, 2016.
ISBN: 978-1-931971-32-4.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 15.55%)

[C87] Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter.
POSTER: Toward a Secure and Scalable Attestation.
In Proceedings of the 9th ACM Conference on Wireless Network Security
(ACM SIGSAC WiSec 2016)
, pages 229-230, Darmstadt, Germany, July 18 - 20, 2016.
DOI: 10.1145/2939918.2942425, ISBN: 978-145034270-4.
(GGS: 3/B; LiveSHINE: A-; MA: B)

[C86] Chhagan Lal, Roberto Petroccia, Mauro Conti, João Alves.
Secure Underwater Acoustic Networks: Current and Future Research Directions.
In Proceedings of the 2016 IEEE/NATO Underwater Communications and Networking
(IEEE/NATO UComm 2016)
, La Spezia, Italy, August 30 - September 1, 2016.
DOI: 10.1109/UComms.2016.7583466, ISBN: 978-150902696-8.

[C85] Alessandro Sforzin, Mauro Conti, Félix Gómez Mármol and Jens-Matthias Bohli.
RPiDS: Raspberry Pi IDS. A Fruitful Intrusion Detection System for IoT.
In Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing
(IEEE ATC 2016)
, in press, Toulouse, France, July 18-21, 2016.
(CORE: C; MA: C)

[C84] Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi.
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In Proceedings of the 16th Privacy Enhancing Technologies Symposium
(PETS 2016)
, Darmstadt, Germany, July 19-22, 2016.
DOI: 10.1515/popets-2016-0050.
(CORE: B; MA: A-)

[C83] Ankit Gangwal, Megha Gupta, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
ELBA: Efficient Layer Based Routing Algorithm in SDN.
In Proceedings of the 25th IEEE International Conference on Computer Communication and Networks
(IEEE ICCCN 2016)
, pages 1-7, Waikoloa, Hawaii, USA, August 1-4, 2016.
DOI: 10.1109/ICCCN.2016.7568515, ISBN: 978-1-5090-2279-3.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-)

[C82] Parvez Faruki, Akka Zemmari, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
MimeoDroid: Large Scale Dynamic App analysis on Cloned Devices via Machine Learning Classifiers.
In Proceedings of the 3rd IEEE International Workshop on Reliability and Security Data Analysis
(IEEE DSN 2016 workshop; RSDA 2016)
, pages 60-65, London (Guildford), UK, June 19-22, 2016.
DOI:10.1109/DSN-W.2016.33, ISBN: 978-146738891-7.

[C81] Mauro Conti, Claudio Guarisco, Riccardo Spolaor.
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery.
In Proceedings of the 14th International Conference on Applied Cryptography and Network Security
(ACNS 2016)
, pages 611-628, London (Guildford), UK, June 19-22, 2016.
DOI: 10.1007/978-3-319-39555-5_33, ISBN: 978-331939554-8, ISSN: 0302-9743.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B; Acceptance rate: 19.12%)

[C80] Mauro Conti, Michele Nati, Enrico Rotundo, Riccardo Spolaor.
Mind The Plug! Laptop-User Recognition Through Power Consumption.
In Proceedings of the 2016 International Workshop on IoT Privacy, Trust, and Security
(ACM AsiaCCS 2016 workshop: IoTPTS 2016)
, pages 37-44, Xi'an, China, May 30 - June 3, 2016.
DOI: 10.1145/2899007.2899009, ISBN: 978-145034283-4.

[C79] Ding Ding, Mauro Conti, Agusti Solanas.
A Smart Health Application and its Related Privacy Issues.
In Proceedings of the 2016 Smart City Security and Privacy Workshop
(IEEE CPS Week workshop: SCSP-W 2016)
, pages 11-15, Vienna, Austria, April 11, 2016.
DOI: 10.1109/SCSPW.2016.7509558, ISBN: 978-150902924-2.

[C78] Kanishka Ariyapala, Hoang Giang Do, Huynh Ngoc Anh, Wee Keong Ng, Mauro Conti.
Host and Network Based Intrusion Detection For Android Smartphones.
In Proceedings of the 2016 Workshop on Security, Trust, Privacy and Analytics
(IEEE AINA 2016 workshop: STPA 2016)
, pages 849-854, Crans-Montana, Switzerland, March 23-25, 2016.
DOI: 10.1109/WAINA.2016.35, ISBN: 978-150901857-4.

[C77] Valeriu-Daniel Stanciu, Riccardo Spolaor, Mauro Conti, Cristiano Giuffrida.
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks.
In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy
(ACM SIGSAC CODASPY 2016)
, pages 105-112, New Orleans, LA, USA, March 9-11, 2016.
DOI: 10.1145/2857705.2857748, ISBN: 978-145033935-3.
(LiveSHINE: B; Acceptance rate: 30.00%)

[C76] Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic
AppScanner: Automatic Fingerprinting of Smartphone Apps From Encrypted Network Traffic.
In Proceedings of the 1st IEEE European Symposium on Security and Privacy
(IEEE EuroSP 2016)
, pages 439-454, Saarbrücken, Germany, March 21-24, 2016.
DOI: 10.1109/EuroSP.2016.40, ISBN: 978-150901751-5.
(MA: C; Acceptance rate: 17.26%)

[C75] Agostino Sturaro, Simone Silvestri, Mauro Conti, Sajal K. Das.
Toward a Realistic Model for Failure Propagation in Interdependent Networks.
In Proceedings of the 2016 International Conference on Computing, Networking and Communications
(IEEE ICNC 2016)
, Kauai, Hawaii, USA, February 15-18, 2016.
DOI: 10.1109/ICCNC.2016.7440711, ISBN: 978-146738579-4.

[C74] Lovely Sinha, Shweta Bhandari, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
FlowMine: Android App Analysis via Data Flow.
In Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference
(IEEE CCNC 2016)
, pages 435-441, Las Vegas, Nevada, USA, January 9 - 12, 2016.
DOI: 10.1109/CCNC.2016.7444819, ISBN: 978-146739292-1.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C73] Mahdi Rabbania, Reza Khoshkanginib, H.S. Nagendraswamya, Mauro Conti.
Hand Drawn Optical Circuit Recognition.
In Proceedings of the 7th International Conference on Intelligent Human Computer Interaction
(Elsevier IHCI 2015)
, pages 41-48, Allahabad, India, December 14-16, 2015.
DOI: 10.1016/j.procs.2016.04.064, ISSN: 1877-0509.
(MA: C)

[C72] Shohreh Hosseinzadeh, Sami Hyrynsalmi, Mauro Conti, Ville Leppänen.
Security and Privacy in Cloud Computing via Obfuscation and Diversification: a Survey.
In Proceedings of the 2nd IEEE International Workshop on Enterprise Security
(IEEE CloudCom 2015 workshop: ES 2015)
, pages 529-535, Vancouver, Canada, November 30 - December 3, 2015.
DOI: 10.1109/CloudCom.2015.29, ISBN: 978-146739560-1.

[C71] Mauro Conti, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi.
TRAP: using TaRgeted Ads to unveil Google personal Profiles.
In Proceedings of the 7th IEEE International Workshop on Information Forensics and Security
(IEEE WIFS 2015)
, Rome, Italy, November 16-19, 2015.
DOI: 10.1109/WIFS.2015.7368607, ISBN: 978-146736802-5.

[C70] Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran.
Verifiable and Privacy-preserving Fine-Grained Data-Collection for Smart Metering.
In Proceedings of the 1st IEEE Workshop on Security and Privacy in Cybermatics
(IEEE CNS 2015 workshop: SPiCy 2015)
, pages 655-658, Florence, Italy, September 30, 2015.
DOI: 10.1109/CNS.2015.7346882, ISBN: 978-146737876-5.

[C69] QianQian Li, Ding Ding, Mauro Conti.
Brain-Computer Interface Applications: Security and Privacy Challenges.
In Proceedings of the 1st IEEE Workshop on Security and Privacy in Cybermatics
(IEEE CNS 2015 workshop: SPiCy 2015)
, pages 663-666, Florence, Italy, September 30, 2015.
DOI: 10.1109/CNS.2015.7346884, ISBN: 978-146737876-5.

[C68] Kanishka Ariyapala, Mauro Conti, Cristina M. Pinotti.
CaT: Evaluating Cloud-aided TLS for Smartphone Energy Efficiency.
In Proceedings of the 1st IEEE Workshop on Security and Privacy in Cybermatics
(IEEE CNS 2015 workshop: SPiCy 2015)
, pages 601-609, Florence, Italy, September 30, 2015.
DOI: 10.1109/CNS.2015.7346874, ISBN: 978-146737876-5.

[C67] Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Marco Negro, Mohaned Qunaibit, Ahmad-Reza Sadeghi.
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In Proceedings of the 22nd ACM Conference on Computer and Communications Security
(ACM CCS 2015)
, pages 952-963, Denver, Colorado, USA, October 12 - 16, 2015.
DOI: 10.1145/2810103.2813671, ISBN: 978-145033832-5, ISSN: 1543-7221.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 19.81%)

[C66] Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi V. Mancini.
Boten ELISA: A Novel Approach for Botnet C&C in Online Social Networks.
In Proceedings of the 3rd IEEE Conference on Communications and Network Security
(IEEE CNS 2015)
, pages 74-82, Florence, Italy, September 28 - 30, 2015.
DOI: 10.1109/CNS.2015.7346813, ISBN: 978-1-4673-7876-5.
(MA: C; Acceptance rate: 28.00%)

[C65] Jyoti Gajrani, Jitendra Sarswat, Meenakshi Tripathi, Vijay Laxmi, Manoj Gaur, Mauro Conti.
A Robust Dynamic Analysis System Preventing SandBox Detection by Android Malware.
In Proceedings of the 8th International Conference on Security of Information and Networks
(ACM SIN 2015)
, Sochi, Russia, September 8 - 10, 2015.
DOI: 10.1145/2799979.2800004, ISBN: 978-145033453-2.
(CORE: C; LiveSHINE: C; MA: C)

[C64] Giuseppe Cascavilla, Mauro Conti, David G. Schwartz, Inbal Yahav.
Revealing Censored Information Through Comments and Commenters in Online Social Networks.
In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
(IEEE/ACM ASONAM 2015)
, pages 675-680, Paris, France, August 25 - 28, 2015.
DOI: 10.1145/2808797.2809290, ISBN: 978-145033854-7.
(GGS: 3/B-; LiveSHINE: B; MA: B-)

[C63] Mohammad Reza Memarian, Mauro Conti, Ville Leppänen.
EyeCloud: A BotCloud Detection System.
In Proceedings of the 5th IEEE International Symposium on Trust and Security in Cloud Computing
(IEEE TSCloud 2015)
, pages 1067-1072, Helsinki, Finland, 20 - 22 August, 2015.
DOI: 10.1109/Trustcom.2015.484, ISBN: 978-146737951-9.

[C62] Julien Mineraud, Federico Lancerin, Sasitharan Balasubramaniam, Mauro Conti, Sasu Tarkoma.
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data.
In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2015)
, pages 523-530, Helsinki, Finland, 20 - 22 August, 2015.
DOI: 10.1109/Trustcom.2015.415, ISBN: 978-146737951-9.
(CORE: A; Acceptance rate: 28.00%)

[C61] Andrea Burattin, Mauro Conti, Daniele Turato.
Toward an Anonymous Process Mining.
In Proceedings of the 3rd IEEE International Conference on Future Internet of Things and Cloud
(IEEE FiCloud 2015)
, pages 58-63, Rome, Italy, August 24 - 26, 2015.
DOI: 10.1109/FiCloud.2015.9, ISBN: 978-146738103-1.

[C60] Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik.
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking.
In Proceedings of the 24th IEEE International Conference on Computer Communications and Networks
(IEEE ICCCN 2015)
, Las Vegas, Nevada, USA, August 3 - 6, 2015.
DOI: 10.1109/ICCCN.2015.7288477, ISBN: 978-147999964-4, ISSN: 1095-2055.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 25.00%)

[C59] Moreno Ambrosin, Mauro Conti, Tooska Dargahi.
On the Feasibility of Attribute-Based Encryption on Smartphone Devices.
In Proceedings of the 1st International Workshop on IoT challenges in Mobile and Industrial System
(MobiSys 2015 workshop: IoT-Sys 2015)
, pages 49-54, Florence, Italy, May 18, 2015.
DOI: 10.1145/2753476.2753482, DOI: 978-145033502-7.

[C58] Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi V. Mancini, Gene Tsudik.
Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking.
In Proceedings of the 13th International Conference on Applied Cryptography and Network Security
(ACNS 2015)
, pages 243-262, New York, NY, USA, June 2-5, 2015.
DOI: 10.1007/978-3-319-28166-7_12, ISBN: 978-331928165-0, ISSN: 0302-9743.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B; Acceptance rate: 21.02%; Best Student Paper Award)

[C57] Ding Ding, Mauro Conti, Renato Figueiredo.
Impact of Country-scale Internet Disconnection on Structured and Social P2P Overlays.
In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2015)
, Boston; MA, USA, June 14-17, 2015.
DOI: 10.1109/WoWMoM.2015.7158168, ISBN: 978-147998461-9.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B; Acceptance rate: 21.00%)

[C56] Pericle Perazzo, Kanishka Ariyapala, Mauro Conti, Gianluca Dini.
The Verifier Bee: a Path Planner for Drone-Based Secure Location Verification.
In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2015)
, Boston; MA, USA, June 14-17, 2015.
DOI: 10.1109/WoWMoM.2015.7158150, ISBN: 978-147998461-9.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B; Acceptance rate: 21.00%)

[C55] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Impact of Security Threats in Vehicular Alert Messaging Systems.
In Proceedings of the 1st IEEE Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems
(IEEE ICC 2015 workshop: IoTCPS 2015)
, pages 2627-2632, London, UK, June 8-12, 2015.
DOI: 10.1109/ICCW.2015.7247575, ISBN: 978-146736305-1.

[C54] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran.
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2015)
, pages 183-201, Singapore, April 14-17, 2015.
DOI: 10.1145/2714576.2714612, ISBN: 978-145033245-3.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 17.84%)

[C53] Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde.
Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis.
In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
(ACM SIGSAC CODASPY 2015)
, pages 297-304, San Antonio, TX, USA, March 2-4, 2015.
DOI: 10.1145/2699026.2699119, ISBN: 978-145033191-3.
(LiveSHINE: B; Acceptance rate: 21.00%)

[C52] Giovanni Toso, Daniele Munaretto, Michele Zorzi, Mauro Conti.
Attack Resilient Underwater Networks Through Software Defined Networking.
In Proceedings of the 9th ACM International Conference on Underwater Networks & Systems
(WUWNet 2014)
, Rome, Italy, November 12-14, 2014.
DOI: 10.1145/2671490.2674589, ISBN: 978-145033277-4.
(LiveSHINE: B)

[C51] Anil Saini, Manoj Gaur, Vijay Laxmi, Tushar Singhal and Mauro Conti.
Privacy Leakage Attacks in Browsers by Colluding Extensions.
In Proceedings of the 10th International Conference on Information Systems Security
(ICISS 2014)
, pages 257-276, Hyderabad, India, December 16-20, 2014.
DOI: 10.1007/978-3-319-13841-1_15, ISBN: 978-331913840-4, ISSN: 0302-9743.
(GGS: 3/B-; CORE: B; LiveSHINE: B; MA: C; Acceptance rate: 25/129 - 19.37%)

[C50] Mauro Conti, Earlence Fernandes, Justin Paupore, Atul Prakash, Daniel Simionato.
OASIS: Operational Access Sandboxes for Information Security.
In Proceedings of the 4th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices
(ACM SIGSAC CCS 2014 workshop: SPSM 2014)
, pages 105-110, Scottsdale, AZ, USA, November 3-7, 2014.
DOI: 10.1145/2666620.2666629, ISBN: 978-1-4503-3155-5, ISSN: 1543-7221.

[C49] Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni, Mauro Conti.
Secure Message Delivery Games for Device-to-Device Communications.
In Proceedings of the 5th Conference on Decision and Game Theory for Security
(GameSec 2014)
, pages 195-215, Los Angeles, CA, USA, November 6-7, 2014.
DOI: 10.1007/978-3-319-12601-2, ISBN: 978-3-319-12600-5.

[C48] Smita Naval, Vijay Laxmi, Manoj Gaur, Sachin Raja, Muttukrishnan Rajarajan, Mauro Conti.
Environment-Reactive Malware Behavior: Detection and Categorization.
In Proceedings of the 3rd International Workshop on Quantitative Aspects in Security Assurance
(ESORICS 2014 workshop: QASA 2014)
, pages 167-182, Wroclaw, Poland, September 10-11, 2014.
DOI: 10.1007/978-3-319-17016-9_11, ISBN: 978-3-319-17015-2, ISSN: 0302-9743.

[C47] Giuseppe Cascavilla, Andrea Burattin, Mauro Conti.
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks.
In Proceedings of the 9th International Conference on Risks and Security of Internet and Systems
(CRiSIS 2014)
, pages 83-99, Trento, Italy, August 27-29, 2014.
DOI: 10.1007/978-3-319-17127-2_6, ISBN: 978-3-319-17126-5, ISSN: 0302-9743.
(CORE: C; MA: C; Acceptance rate: 14/48 - 29.16%)

[C46] Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti.
Evaluation of Android Anti Malware Techniques against Dalvik Bytecode Obfuscation.
In Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2014)
, pages 414-421, Beijing, China, September 24-26, 2014.
DOI: 10.1109/TrustCom.2014.54, ISBN: 978-147996513-7.
(CORE: A)

[C45] Parvez Faruki, Vijay Ganmoor, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
Platform Neutral Sandbox for Analyzing Android Malware and Resource Hoggers.
In Proceedings of the 10th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2014)
, pages 556-560, Beijing, China, September 24-26, 2014.
DOI: 10.1007/978-3-319-23829-6_43, ISBN:978-3-319-23829-6, ISSN: 1867-8211.
(CORE: B; LiveSHINE: A; MA: C)

[C44] Filipe Beato, Mauro Conti, Bart Preneel, Dario Vettore.
VirtualFriendship: Hiding interactions on Online Social Networks.
In Proceedings of the 2nd IEEE Conference on Communications and Network Security
(IEEE CNS 2014)
, pages 328-336, San Francisco, CA, USA, October 29-31, 2014.
DOI: 10.1109/CNS.2014.6997501, ISBN: 978-147995890-0.
(MA: C; Acceptance rate: 38/130 - 29.23%)

[C43] Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter.
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2014)
, pages 76-93, Wroclaw, Poland, September 7-11, 2014.
DOI: 10.1007/978-3-319-11203-9_5, ISBN: 978-3-319-11202-2.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 58/234 - 24.79%)

[C42] Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez.
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2014)
, pages 183-201, Wroclaw, Poland, September 7-11, 2014.
DOI: 10.1007/978-3-319-11203-9_11, ISBN: 978-3-319-11202-2.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 58/234 - 24.79%)

[C41] Reza Khoshkangini, Syroos Zaboli, Mauro Conti.
Efficient Routing Protocol via Ant Colony Optimization (ACO) and Breadth First Search (BFS).
In Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing
(IEEE CPSCom 2014)
, pages 374-380, Taipei, Taiwan, September 1-3, 2014.
DOI: 10.1109/iThings.2014.69, ISBN: 978-1-4799-5967-9.

[C40] Kamil Majdanik, Cristiano Giuffrida, Mauro Conti, Herbert Bos.
I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics.
In Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment
(DIMVA 2014)
, pages 92-111, Egham, UK, July 10-14, 2014.
DOI: 10.1007/978-3-319-08509-8_6, ISBN: 978-3-319-08508-1.
(GGS: 3/B-; CORE: C; LiveSHINE: A-; Acceptance rate: 23.30%)

[C39] Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik.
Covert Ephemeral Communication in Named Data Networking.
In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2014)
, pages 15-26, Kyoto, Japan, June 4-6, 2014.
DOI: 10.1145/2590296.2590306, ISBN: 978-1-4503-2800-5.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 52/260 - 20.00%)

[C38] Moreno Ambrosin, Armir Bujari, Mauro Conti, Fabio De Gaspari, Claudio Palazzi.
Smartphone and Laptop Frameworks for Vehicular Networking Experimentation.
In Proceedings of the 2013 IEEE/IFIP Wireless Days Conference
(IEEE/IFIP WD 2013)
, pages 1-6, Valencia, Spain, November 13-15, 2013.
DOI: 10.1109/WD.2013.6686481, ISBN: 978-1-4799-0543-0.

[C37] Wafa Ben Jaballah, Mauro Conti, Roberto Di Pietro, Mohamed Mosbah, Nino Vincenzo Verde.
MASS: An Efficient and Secure Broadcast Authentication Scheme for Resource Constrained Devices.
In Proceedings of the 8th International Conference on Risks and Security of Internet and Systems
(CRiSIS 2013)
, pages 1-9, La Rochelle, France, October 23-25, 2013.
DOI: 10.1109/CRiSIS.2013.6766350.
(CORE: C; MA: C)

[C36] Eyup Serdar Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
CREPUSCOLO: a Collusion Resistant Privacy Preserving Location Verification System.
In Proceedings of the 8th International Conference on Risks and Security of Internet and Systems
(CRiSIS 2013)
, La Rochelle, France, October 23-25, 2013.
DOI: 10.1109/CRiSIS.2013.6766357, ISBN: 978-364241097-0.
(CORE: C; MA: C)

[C35] Mauro Conti, Nicola Dragoni, Sebastiano Gottardo.
MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities.
In Proceedings of the 9th International Workshop on Security & Trust management
(ESORICS 2013 workshop: STM 2013)
, pages 65-81, Egham, UK, September 12-13, 2013.
DOI: 10.1007/978-3-642-41098-7_5, ISBN: 978-364241097-0.

[C34] Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik.
Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking.
In Proceedings of the 38th IEEE Conference on Local Computer Networks
(IEEE LCN 2013)
, pages 630-638, Sydney, Australia, October 21-24, 2013.
DOI: 10.1109/LCN.2013.6761300, ISBN: 978-147990537-9.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 53/201 - 26.40%)

[C33] Kanishka Ariyapala, Mauro Conti, Chamath Keppitiyagama.
ContextOS: a Context Aware Operating System for Mobile Devices.
In Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing
(IEEE CPSCom 2013)
, pages. 976-984, Beijing, China, August 20-23, 2013.
DOI: 10.1109/GreenCom-iThings-CPSCom.2013.168, ISBN: 978-076955046-6.

[C32] Claudio Ardagna, Mauro Conti, Mario Leone, Julinda Stefa.
Preserving Smartphone Users' Anonymity in Cloudy Days.
In Proceedings of the 3rd International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems
(IEEE ICCCN 2013 workshop: IEEE MobiPST 2013)
, pages 1-5, Nassau, Bahamas, June 30-August 2, 2013.
DOI: 10.1109/ICCCN.2013.6614170, ISBN: 978-146735774-6.

[C31] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Secure Verification of Location Claims on a Vehicular Safety Application.
In Proceedings of the 22nd International Conference on Computer Communications and Networks
(IEEE ICCCN 2013)
, pages 1-7, Nassau, Bahamas, June 30-August 2, 2013.
DOI: 10.1109/ICCCN.2013.6614193, ISBN: 978-146735774-6.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 86/300 - 28.66%)

[C30] Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik.
Cache Privacy in Name-Data Networking.
In Proceedings of the 33rd International Conference on Distributed Computing Systems
(IEEE ICDCS 2013)
, pages 41-51, Philadephia, PA, USA, July 8-11, 2013.
DOI: 10.1109/ICDCS.2013.12, ISBN: 978-0-7695-5000-8.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 61/464 - 13.14%)

[C29] Filipe Beato, Mauro Conti, Bart Preneel.
Friend in the Middle (FiM): Tackling Social Networks De-Anonymization.
In Proceedings of the 5th IEEE International Workshop on SECurity and SOCial Networking 2013
(IEEE SESOC 2013, workshop of PerCom 2013)
, pages. 279-284, San Diego, CA, USA, March 18-22, 2013.
DOI: 10.1109/PerComW.2013.6529495, ISBN: 978-146735077-8.

[C28] Mauro Conti, Daniele Diodati, Cristina M. Pinotti, Bruno Crispo.
Optimal Solutions for Pairing Services on Smartphones: a Strategy to Minimize Energy Consumption.
In Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing
(IEEE CPSCom 2012)
, pages 269-276, Besançon, France, November 20-23, 2012.
DOI: 10.1109/GreenCom.2012.51, ISBN: 978-0-7695-4865-4.

[C27] Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich.
DEMO: Demonstrating the Effectiveness of MOSESdroid for Separation of Execution Modes.
In Proceedings of the 19th ACM Conference on Computer and Communications Security
(ACM SIGSAC CCS 2012)
, pages 998-1000, Raleigh, NC, USA, October 16-18, 2012.
DOI: 10.1145/2382196.2382304, ISBN: 978-145031650-7.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++)

[C26] Mauro Conti, Radha Poovendran, Marco Secchiero.
FakeBook: Detecting Fake Profiles in On Line Social Networks.
In Proceedings of the 1st IEEE/ACM International Workshop on Cybersecurity of Online Social Network
(IEEE/ACM CSOSN 2012)
, pages 1071-1078, Istanbul, Turkey, August 26, 2012.
DOI: 10.1109/ASONAM.2012.185, ISBN: 978-0-7695-4799-2.

[C25] Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes.
MOSES: Supporting Operation Modes on Smartphones.
In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies
(ACM SIGSAC SACMAT 2012)
, pages 3-12, Newark, NJ, US, June 20-22, 2012.
DOI: 10.1145/2295136.2295140, ISBN: 978-145031295-0.
(GGS: 2/A-; CORE: C; LiveSHINE: A+; MA: A+; Acceptance rate: 19/73 - 26.03%)

[C24] Mauro Conti.
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion).
In Proceedings of the 20th International Workshop on Security Protocols
(IWSP 2012 - Springer LNCS)
, pages 214-222, Cambridge, UK, April 11-12, 2012.
DOI: 10.1007/978-3-642-35694-0_23, ISBN: 978-3-642-35693-3.
(CORE: C)

[C23] Eyup Serdar Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System.
In Proceedings of the 20th International Workshop on Security Protocols
(IWSP 2012 - Springer LNCS)
, pages 199-213, Cambridge, UK, April 11-12, 2012.
DOI: 10.1007/978-3-642-35694-0_22, ISBN: 978-364235693-3.
(CORE: C)

[C22] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Wireless Sensor Replica Detection in Mobile Environments.
In Proceedings of the 13th International Conference on Distributed Computing and Networking
(ICDCN 2012)
, pages 249-264, Hong Kong, January 3-6, 2012.
DOI: 10.1007/978-3-642-25959-3_19, ISBN: 978-364225958-6.
(GGS: 3/B-; CORE: B; LiveSHINE: B-; MA: C)

[C21] Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Events Privacy in WSNs: a New Model and its Application.
In Proceedings of the 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2011)
, pages 1-9, Lucca, Italy, June 20-24, 2011.
DOI: 10.1109/WoWMoM.2011.5986491, ISBN: 978-145770351-5.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B; Acceptance rate: 32/173 - 18.49%)

[C20] Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo.
Mind How You Answer Me! (Transparently Authenticating the User of a Smartphone when Answering or Placing a Call).
In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2011)
, pages 249-259, Hong Kong, March 22-24, 2011.
DOI: 10.1145/1966913.1966945, ISBN: 978-145030564-8.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 35/217 - 16.12%)

[C19] Mauro Conti, Arbnor Hasani, Bruno Crispo.
Virtual Private Social Networks.
In Proceedings of the 1st ACM Conference on Data and Application Security and Privacy
(ACM SIGSAC CODASPY 2011)
, pages 39-50, San Antonio, TX, USA, February 21-23, 2011.
DOI: 10.1145/1943513.1943521, ISBN: 978-145030466-5.
(LiveSHINE: B; Acceptance rate: 21/69 - 30.43%)

[C18] Mauro Conti, Bruno Crispo, Roberto Di Pietro, Luciana Marconi.
Time Warp: How Time Affects Privacy in LBSs. Threats and countermeasures.
In Proceedings of the 12th International Conference on Information and Communications Security
(ICICS 2010 - Springer LNCS)
, pages 325-339, Barcelona, Spain, December 15-17, 2010.
DOI: 10.1007/978-3-642-17650-0_23, ISBN: 978-3-642-17649-4.
(GGS: 3/B; CORE: B; LiveSHINE: B; MA: B; Acceptance rate: 31/134 - 23.13%)

[C17] Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo.
CRePE: Context-Related Policy Enforcement for Android.
In Proceedings of the 13th Information Security Conference
(ISC 2010 - Springer LNCS)
, pages 331-354, Boca Raton, FL, USA, October 25 - 28, 2010.
DOI: 10.1007/978-3-642-18178-8_29, ISBN: 978-3-642-18177-1.
(GGS: 3/B; CORE: B; LiveSHINE: B; Acceptance rate: 22/134 - 16.41%)

[C16] Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei.
The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack.
In Proceedings of the 8th ACM International Symposium on Mobility Management and Wireless Access
(ACM MobiWac 2010)
, pages 99-106, Bodrum, Turkey, October 17 - 21, 2010.
DOI: 10.1145/1868497.1868514, ISBN: 978-1-4503-0277-7.
(LiveSHINE: C; MA: C)

[C15] Luciana Marconi, Mauro Conti, Roberto Di Pietro.
CED2: Communication Efficient Disjointness Decision.
In Proceedings of the 6th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2010 - Springer LNCS)
, pages 290-306, Singapore, September 7 - 9, 2010.
DOI: 10.1007/978-3-642-16161-2_17, ISBN: 978-3-642-16160-5.
(CORE: B; LiveSHINE: A; MA: C; Acceptance rate: 28/112 - 25.00%)

[C14] Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini.
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks.
In Proceedings of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications
(IEEE TSP 2010)
, pages 910-915, Bradford, UK, June 29 - July 1, 2010.
DOI: 10.1109/CIT.2010.169, ISBN: 978-076954108-2.

[C13] Roberto Bragantini, Mauro Conti, Roberto Di Pietro.
Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance.
In Proceedings of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications
(IEEE TSP 2010)
, pages 1096-1101, Bradford, UK, June 29 - July 1, 2010.
DOI: 10.1109/CIT.2010.200, ISBN: 978-076954108-2.

[C12] Mauro Conti.
Censorship-Resilient Communications Throughout Information Scattering (Transcript of Discussion).
In Proceedings of the 18th International Workshop on Security Protocols
(IWSP 2010 - Springer LNCS)
, pages 90-97, Cambridge, UK, March 24-26, 2010.
DOI: 10.1007/978-3-662-45921-8_15, ISBN: 978-3-662-45920-1.
(CORE: C)

[C11] Stefano Ortolani, Mauro Conti, Bruno Crispo.
Censorship-Resilient Communications Throughout Information Scattering.
In Proceedings of the 18th International Workshop on Security Protocols
(IWSP 2010 - Springer LNCS)
, pages 82-89, Cambridge, UK, March 24-26, 2010.
DOI: 10.1007/978-3-662-45921-8_14, ISBN: 978-3-662-45920-1.
(CORE: C)

[C10] Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Event Handoff Unobservability in WSN.
In Proceedings of the 2010 IFIP Open Research Problems in Network Security Conference
(IFIP iNetSec 2010)
, pages 20-28, Sofia, Bulgaria, March 05-06, 2010.
DOI: 10.1007/978-3-642-19228-9_3, ISBN: 978-3-642-19227-2.

[C9] Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini.
Sec-TMP: a Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
In Proceedings of the 5th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2009 - Springer LNICST)
, pages 265-284, Athens, Greece, September 14-18, 2009.
DOI: 10.1007/978-3-642-05284-2_15, ISBN: 978-3-642-05283-5.
(CORE: B; LiveSHINE: A; MA: C; Acceptance rate: 20/76 - 26.31%)

[C8] Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei.
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.
In Proceedings of the 7th International Conference on Wired / Wireless Internet Communications
(WWIC 2009 - Springer LNCS)
, pages 85-96, Enschede, The Netherlands, May 27-29, 2009.
DOI: 10.1007/978-3-642-02118-3_8, ISBN: 978-3-642-02117-6.

[C7] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Securely Computing an Approximate Median in Wireless Sensor Networks.
In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks
(ACM SecureComm 2008)
, pages 1-10, Istanbul, Turkey, September 22-25, 2008.
DOI: 10.1145/1460877.1460885, ISBN: 978-160558241-2.
(CORE: B; LiveSHINE: A; MA: C; Acceptance rate: 26/123 - 21.13%)

[C6] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks.
In Proceedings of the 1st ACM Conference on Wireless Network Security
(ACM SIGSAC WiSec 2008)
, pages 214-219, Alexandria, VA, USA, March 31 - April 2, 2008.
DOI: 10.1145/1352533.1352568, ISBN: 978-159593814-5.
(GGS: 3/B; LiveSHINE: A-; MA: B; Acceptance rate: 16/96 - 16.66%)

[C5] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi.
FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronization.
In Proceedings of the 33rd Annual Conference of the IEEE Industrial Electronics Society
(IEEE IECON 07)
, pages 52-57, Taipei, Taiwan, November 5-8, 2007.
DOI: 10.1109/IECON.2007.4460365, ISBN: 978-1-4244-0783-5.

[C4] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks.
In Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing
(ACM MobiHoc 2007)
, pages 80-89, Montréal, Quebec, Canada, September 9-14, 2007.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A++; Acceptance rate: 27/146 - 18.49%; Sapienza CS Dpt 2007 Best PhD Student Paper Award)
DOI: 10.1145/1288107.1288119, ISBN: 978-159593684-4.

[C3] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi.
RIPPFS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy.
In Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops
(IEEE PerCom 2007 workshop: PerComW 2006)
, pages 229-234, New York, NY, USA, March 19, 2007.
DOI: 10.1109/PERCOMW.2007.100, ISBN: 978-0-7695-2788-8.

[C2] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
In Proceedings of the 2006 IEEE International Conference on Systems, Man, and Cybernetics
(IEEE SMC '06)
, pages 1468-1473, Taipei, Taiwan, October 8-11, 2006.
DOI: 10.1109/ICSMC.2006.384924, ISBN: 978-1-4244-0099-7.
(GGS: 2/A-; CORE: B; LiveSHINE: B; MA: A++)

[C1] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini.
Secure Cooperative Channel Establishment in Wireless Sensor Networks.
In Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops
(IEEE PerCom 2006 workshop: PerComW 2006)
, pages 327-331, Pisa, Italy, March 13, 2006.
DOI: 10.1109/PERCOMW.2006.121, ISBN: 0-7695-2520-2.


Patents

[P3] Mauro Conti, Rabbani Md Masoom, Nele Mentens, Jo Vliegen.
Configurable hardware device.
(Submitted), 2018.

[P2] Mauro Conti, Claudio Guarisco, Riccardo Spolaor.
A Method for recognizing whether a user terminal is human or robot.
IT Patent n. MI2014A002112, 2014.

[P1] Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo.
User authentication method for access to a mobile user terminal and corresponding mobile user terminal.
IT Patent n. TO2010A001069, 2010.
USA Patent n. US 20120164978 A1, 2014.


Theses

[T2] Mauro Conti.
Securing Wireless Sensor Networks,
PhD Thesis - University of Rome "La Sapienza" (Italy), February 2009.

[T1] Mauro Conti.
Protocolli per comunicazioni sicure nelle reti di sensori Wireless,
Tesi di Laurea - University of Rome "La Sapienza" (Italy), May 2005.


Hacking Conferences (w/o published proceedings)

[H2] Andrea Biondo, Mauro Conti, Daniele Lain.
Back To The Epilogue: How to Evade Windows' Control Flow Guard with Less than 16 Bytes.
In BlackHat Asia Briefings '18, Marina Bay Sands, Singapore, March 20-23, 2018.

[H1] Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik.
Skype & Type: Keystroke Leakage over VoIP.
In BlackHat USA Briefings '17, Mandalay Bay, Las Vegas, USA July 22-27, 2017.


Top

website hit counter