Publications

(see also: Google Scholar - DBLP - Scopus - WoS - AMiner - MS Academic - academia.edu - ResearchGate - Panda Search - Padua Research)




Journal papers

[J65] Moreno Ambrosin, Paolo Braca, Mauro Conti, Riccardo Lazzaretti.
ODIN: Obfuscation-based privacy preserving consensus algorithm for Decentralized Information fusion in smart device Networks.
In (ACM) Transactions on Internet Technology, in press, 2017.

[J64] Amin Azmoodeh, Ali Dehghantanha, Mauro Conti, Raymond Choo.
Detecting Crypto-Ransomware in IoT Networks Based On Energy Consumption Footprint.
In (Springer) Journal of Ambient Intelligence and Humanized Computing, in press, 2017.

[J63] Vincent F. Taylor, Riccardo Spolaor, Mauro Conti and Ivan Martinovic.
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis.
In (IEEE) Transactions on Information Forensics & Security, in press, 2017.
(JCR IF 2016: 4.332; IT-ANVUR Class 1)

[J62] Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson.
Internet of Things security and forensics: Challenges and opportunities.
In (Elsevier) Future Generation Computer Systems, in press, 2017.

[J61] Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur,
Mohamed Mosbah, Mauro Conti.
Android Inter-App Communication Threats and Detection Techniques: A Focus on App Collusion.
In (Elsevier) Computers & Security, in press, 2017.
(JCR IF 2016: 2.849; IT-ANVUR Class 2)

[J60] Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mauro Conti, Athanasios Vasilakos.
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
In (IEEE) Journal of Biomedical and Health Informatics, in press, 2017.
(JCR IF 2016: 3.451; IT-ANVUR Class 1)

[J59] Seyed Hossein Hosseini Nazhad, Mohammad Shojafar, Shahaboddin Shamshirband, Mauro Conti.
An Efficient Routing Protocol for the QoS Support of Large-Scale MANETs.
In (Wiley) International Journal of Communication Systems, in press, 2017.
(JCR IF 2016: 1.066; IT-ANVUR Class 3)

[J58] Rifaqat Ali, Arup Kumar Pal, Saru Kumari, Marimuthu Karuppiah, Mauro Conti.
A Secure User Authentication and Key-Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring.
In (Elsevier) Future Generation Computer Systems, in press, 2017.

[J57] Riccardo Spolaor, QianQian Li, Merylin Monaro, Mauro Conti, Luciano Gamberini, Giuseppe Sartori.
Biometric Authentication Methods on Smartphones: A Survey.
In Psychnology Journal, in press, 2017.

[J56] Chhagan Lal, Roberto Petroccia, Konstantinos Pelekanakis, Mauro Conti, and João Alves.
Towards the Development of Secure Underwater Acoustic Networks.
In (IEEE) Journal of Oceanic Engineering, in press, 2017.

[J55] Reza Mohammadi, Reza Javidan, Mauro Conti.
SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks.
In (IEEE) Transactions on Network and Service Management, in press, 2017.
(JCR IF 2016: 1.296; IT-ANVUR Class 2)

[J54] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya.
DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions.
In (Elsevier) Computers Communications, in press, 2017.
(JCR IF 2015: 2.099; IT-ANVUR Class 2)

[J53] Fauzia Idrees, Muttukrishnan Rajarajan, Mauro Conti, Tom Chen, Yogachandran Rahulamathavan.
PIndroid: A novel Android malware detection system using ensemble learning methods.
In (Elsevier) Computers & Security, in press, 2017.
(JCR IF 2015: 1.640; IT-ANVUR Class 2)

[J52] Tooska Dargahi, Alberto Caponi, Moreno Ambrosin, Giuseppe Bianchi, Mauro Conti.
A Survey on the Security of Stateful SDN Data Planes.
In (IEEE) Communications Surveys and Tutorials, in press, 2017.
(JCR IF 2016: 9.220; IT-ANVUR Class 2)

[J51] Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik, Christopher A. Wood.
Privacy-Aware Caching in Information-Centric Networking.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2017.
(JCR IF 2015: 1.592; IT-ANVUR Class 1)

[J50] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan, Rajkumar Buyya.
Combating DDoS Attacks in Cloud: Requirements, Trends, and Future Directions.
In (IEEE) Cloud Computing, in press, 2017.
(JCR IF 2015: 1.86)

[J49] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan.
DDoS victim service containment to minimize the internal collateral damages in cloud computing.
In (Elsevier) Computers & Electrical Engineering, 2016.
DOI: dx.doi.org/10.1016/j.compeleceng.2016.12.004.
(JCR IF 2015: 1.084; IT-ANVUR Class 4)

[J48] Pericle Perazzo, Francesco Betti Sorbelli, Mauro Conti, Gianluca Dini, Cristina M. Pinotti.
Drone Path Planning for Secure Positioning and Secure Position Verification.
In (IEEE) Transactions on Mobile Computing, 2016.
DOI: 10.1109/TMC.2016.2627552, ISSN: 1536-1233.
(JCR IF 2015: 2.456; IT-ANVUR Class 1)

[J47] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya.
Service Resizing for Quick DDoS Mitigation in Cloud Computing Environment.
In (Springer) Annals of Telecommunications, 1-16, 2016.
DOI: 10.1007/s12243-016-0552-5, ISSN: 0003-4347.
(JCR IF 2015: 0.722; IT-ANVUR Class 3 - area 09)

[J46] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran.
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking.
In (IEEE/ACM) Transactions on Networking, 2016.
DOI: 10.1109/TNET.2016.2626287, ISSN: 1063-6692.
(JCR IF 2015: 2.186; IT-ANVUR Class 1)

[J45] Moreno Ambrosin, Arman Anzanpour, Mauro Conti, Tooska Dargahi, Sanaz Rahimi Moosavi, Amir M. Rahmani, Pasi Liljeberg.
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices.
In (IEEE) Micro, 36(6): 25-35, 2016.
DOI: 10.1109/MM.2016.101, ISSN: 0272-1732.
(JCR IF 2015: 1.091; IT-ANVUR Class 2)

[J44] Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
Colluding Browser Extension Attack on User Privacy and its Implication for Web Browsers.
In (Elsevier) Computers & Security, 63: 14-28, 2016.
DOI: 10.1016/j.cose.2016.09.003, ISSN: 0167-4048.
(JCR IF 2015: 1.640; IT-ANVUR Class 2)

[J43] Claudio Ardagna, Kanishka Ariyapala, Mauro Conti, Cristina Pinotti, Julinda Stefa.
Anonymous End-to-End Communications in Adversarial Mobile Clouds Pervasive and Mobile Computing.
In (Elsevier) Pervasive and Mobile Computing, 2016.
DOI: 10.1016/j.pmcj.2016.09.001.
(JCR IF 2015: 1.719; IT-ANVUR Class 2)

[J42] Vanga Odelu, Ashok Kumar Das, Mohammad Wazid, and Mauro Conti.
Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
In (IEEE) Transactions on Smart Grid, 2016.
DOI: 10.1109/TSG.2016.2602282.
(JCR IF 2015: 4.252; IT-ANVUR Class 1)

[J41] Wafa Ben Jaballah, Mauro Conti, Claudio Palazzi, Mohamed Mosbah.
Impact of Malicious Nodes Positioning on Vehicular Alert Messaging System.
In (Elsevier) Ad Hoc Networks , 52: 3-16, 2016.
DOI: 10.1016/j.adhoc.2016.08.008, ISSN: 1570-8705.
(JCR IF 2015: 1.660; IT-ANVUR Class 4)

[J40] Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur, and Mauro Conti.
Enhancing QoE for video streaming in MANETs via multi-constraint routing.
In (Springer) Wireless Networks, 1-22, 2016.
DOI: 10.1007/s11276-016-1325-9, ISSN: 1022-0038.
(JCR IF 2015: 1.006; IT-ANVUR Class 1)

[J39] Teing Yee Yang, Ali Dehghantanha, Kim-Kwang Raymond Choo, Mauro Conti, Tooska Dargahi.
Forensic Investigation of Cooperative Storage Cloud Service: Symform As a Case Study.
In (Wiley) Journal of Forensic Sciences, 2016.
DOI: 10.1111/1556-4029.13271.
(JCR IF 2015: 1.322)

[J38] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, and Mauro Conti.
DDoS attacks in Cloud Computing: Collateral Damage to Non-targets.
In (Elsevier) Computer Networks, 157-171, 2016.
DOI: 10.1016/j.comnet.2016.03.022, ISSN: 1389-1286.
(JCR IF 2014: 1.256; IT-ANVUR Class 1)

[J37] Mauro Conti, Nicola Dragoni, Viktor Lesyk.
A Survey of Man In The Middle Attacks.
In (IEEE) Communications Surveys and Tutorials, 18(3): 2027-2051, 2016.
DOI: 10.1109/COMST.2016.2548426, ISSN: 1553-877X.
(JCR IF 2014: 6.806; IT-ANVUR Class 2)

[J36] Tooska Dargahi, Moreno Ambrosin, Mauro Conti, N. Asokan.
ABAKA: a Novel Attribute-Based k-Anonymous Collaborative Solution for LBSs.
In (Elsevier) Computer Communications, 85: 1-13, 2016.
DOI: 10.1016/j.comcom.2016.03.002, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class 2)

[J35] Alberto Compagno, Mauro Conti, Antonio A. D'Amico, Gianluca Dini, Pericle Perazzo, Lorenzo Taponecco.
Modeling Enlargement Attacks Against UWB Distance Bounding.
In (IEEE) Transactions on Information Forensics & Security, 11(7): 1565-1577, 2016.
DOI: 10.1109/TIFS.2016.2541613, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class 1)

[J34] Alberto Giaretta, Sasitharan Balasubramaniam, Mauro Conti.
Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.
In (IEEE) Transactions on Information Forensics & Security, 11(4): 665-676, 2016.
DOI:10.1109/TIFS.2015.2505632, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class 1)

[J33] Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde.
Analyzing Android Encrypted Network Traffic to Identify User Actions.
In (IEEE) Transactions on Information Forensics & Security, 11(1): 114-125, 2016.
DOI: 10.1109/TIFS.2015.2478741, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class 1)

[J32] Smita Naval, Vijay Laxmi, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti.
Employing Program Semantics for Malware Detection.
In (IEEE) Transactions on Information Forensics & Security, 10(12): 2591-2604, 2015.
DOI: 10.1109/TIFS.2015.2469253, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class 1)

[J31] Fei Li, Yogachandran Rahulamathavan, Mauro Conti, Muttukrishnan Rajarajan.
Robust Access Control Framework for Mobile Cloud Computing Network.
In (Elsevier) Computer Communications, 68: 61-72, 2015.
DOI: 10.1016/j.comcom.2015.07.005, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class 2)

[J30] Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan.
Android Security: A Survey of Issues, Malware Penetration and Defenses.
In (IEEE) Communications Surveys and Tutorials, 17(2): 998-1022, 2015.
DOI: 10.1109/COMST.2014.2386139, ISSN: 1553-877X.
(JCR IF 2014: 6.806; IT-ANVUR Class 2)

[J29] Mauro Conti, Bruno Crispo, Daniele Diodati, Jukka K. Nurminen, Cristina M. Pinotti, Taavi Teemaa.
Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones.
In (IEEE) Transactions on Parallel and Distributed Systems, 26(10): 2778-2790, 2014
DOI: 10.1109/TPDS.2014.2360693, ISSN: 1045-9219.
(JCR IF 2013: 2.173; IT-ANVUR Class 1)

[J28] Stefano Guarino, Eyup Canlar, Mauro Conti, Roberto Di Pietro, Agusti Solanas.
Provable Storage Medium for Data Storage Outsourcing.
In (IEEE) Transactions on Services Computing, 8(6): 985-997, 2014
DOI: 10.1109/TSC.2014.2355229, ISSN: 1939-1374.
(JCR IF 2013: 1.985; IT-ANVUR Class 1)

[J27] Agusti Solanas, Constantinos Patsakis, Mauro Conti, Ioannis S. Vlachos, Victoria Ramos, Francisco Falcone, Octavian Postolache, Pablo A. Pérez-Martínez, Roberto Di Pietro, Despina N. Perrea, Antoni Martínez-Ballesté.
Smart Health: A Context-Aware Health Paradigm within Smart Cities.
In (IEEE) Communications Magazine, 52(8): 74-81, 2014.
DOI: 10.1109/MCOM.2014.6871673, ISSN: 0163-6804.
(JCR IF 2013: 4.460; IT-ANVUR Class 1)

[J26] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
A Secure Alert Messaging System for Safe Driving.
In (Elsevier) Computer Communications, 46: 29-42, 2014.
DOI: 10.1016/j.comcom.2014.03.010, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class 2)

[J25] Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia.
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
In (IEEE) Transactions on Information Forensics & Security, 9(4): 681-694, 2014.
DOI: 10.1109/TIFS.2014.2307197, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class 1)

[J24] Claudio Ardagna, Mauro Conti, Mario Leone, Julinda Stefa.
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments.
In (IEEE) Transactions on Services Computing, 7(3): 373-386, 2014
DOI: 10.1109/TSC.2014.2304717, ISSN: 1939-1374.
(JCR IF 2013: 1.985; IT-ANVUR Class 1)

[J23] Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes.
MOSES: Supporting and Enforcing Security Profiles on Smartphones.
In (IEEE) Transactions on Dependable and Secure Computing, 11(3): 211-22, 2014.
DOI: 10.1109/TDSC.2014.2300482, ISSN: 1545-5971.
(JCR IF 2013: 1.137; IT-ANVUR Class 1)

[J22] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Fast and Secure Multi-hop Broadcast Solutions for Inter-Vehicular Communication.
In (IEEE) Transactions on Intelligent Transportation Systems, 15(1): 433-450, 2014.
DOI: 10.1109/TITS.2013.2277890, ISSN: 1524-9050.
(JCR IF 2013: 2.472; IT-ANVUR Class 2)

[J21] Mauro Conti, Paolo Gasti, Marco Teoli.
A Lightweight Mechanism for Detection of Cache Pollution Attacks in Named Data Networking.
In (Elsevier) Computer Networks, 57(16): 3178-3191, 2013.
DOI: 10.1016/j.comnet.2013.07.034, ISSN: 1389-1286.
(JCR IF 2013: 1.282; IT-ANVUR Class 1)

[J20] Bruno P.S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo.
Hybrid Static-Runtime Information Flow and Declassification Enforcement.
In (IEEE) Transactions on Information Forensics & Security, 8(8): 1294-1305, 2013.
DOI: 10.1109/TIFS.2013.2267798, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class 1)

[J19] Earlence Fernandes, Bruno Crispo, Mauro Conti.
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
In (IEEE) Transactions on Information Forensics & Security, 8(6): 1027-1037, 2013.
DOI: 10.1109/TIFS.2013.2259818, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class 1)

[J18] Mauro Conti, Arbnor Hasani, Bruno Crispo.
Virtual Private Social Networks and a Facebook Implementation.
In (ACM) Transactions on the Web, 7(3), 14:1--14:31, 2013.
DOI: 10.1145/2516633.2516636, ISSN: 1559-1131.
(JCR IF 2013: 1.595; IT-ANVUR Class 1)

[J17] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Clone Wars: Distributed Detection of Clone Attack in Mobile WSNs.
In (Elsevier) Journal of Computer and System Sciences, 80(3): 654-669, 2014.
DOI: 10.1016/j.jcss.2013.06.017, ISSN: 0022-0000.
(JCR IF 2013: 1.091; IT-ANVUR Class 1)

[J16] Mauro Conti, Jeroen Willemsen, Bruno Crispo.
Providing Source Location Privacy in Wireless Sensor Networks: a Survey.
In (IEEE) Communications Surveys and Tutorials, 15(3):1238-1280, 2013.
DOI: 10.1109/SURV.2013.011413.00118, ISSN: 1553-877X.
(JCR IF 2013: 6.490; IT-ANVUR Class 2)

[J15] Eyup Serdar Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Windows Mobile LiveSD Forensics.
In (Elsevier) Journal of Network and Computer Applications, 36(2):677-684, 2013.
DOI: 10.1016/j.jnca.2012.12.024, ISSN: 1084-8045.
(JCR IF 2013: 1.772; IT-ANVUR Class 4)

[J14] Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich.
CRêPE: a System for Enforcing Fine-Grained Context-Related Policies on Android.
In (IEEE) Transactions on Information Forensics & Security, 7(5): 1426-1438, 2012.
DOI: 10.1109/TIFS.2012.2204249, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class 1)

[J13] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Secure Data Aggregation in Wireless Sensor Networks.
In (IEEE) Transactions on Information Forensics & Security, 7(3): 1040-1052, 2012.
DOI: 10.1109/TIFS.2012.2189568, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class 1)

[J12] Luciana Marconi, Mauro Conti, Roberto Di Pietro.
CASSANDRA: a probabilistic, efficient, and privacy preserving solution to compute set intersection.
In (Springer) International Journal of Information Security, 10(5):301-319, 2011.
DOI: 10.1007/s10207-011-0133-6, ISSN: 1615-5262.
(JCR IF 2013: 0.941; IT-ANVUR Class 2)

[J11] Mauro Conti, Bruno Crispo, Roberto Di Pietro, Luciana Marconi.
Time in privacy preserving LBSs: an overlooked dimension.
In (Hindawi) International Journal of Vehicular Technology, 2011:1-12, Article ID 486975, 2011.
DOI: 10.1155/2011/486975, ISSN: 1687-5702

[J10] Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini.
Preserving privacy against external and internal threats in WSN data aggregation.
In (Springer) Telecommunication Systems, 52(4):2163-2176, 2013.
DOI: 10.1007/s11235-011-9539-8, ISSN: 1018-4864.
(JCR IF 2013: 1.163; IT-ANVUR Class 3 - area 09)

[J9] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Who counterfeited my ViagraTM ? (Probabilistic item removal detection via RFID tag cooperation)
In (EURASIP) Journal on Wireless Communications and Networking, 2011:1-13, Article ID 575171, 2011.
DOI: 10.1155/2011/575171, ISSN: 1687-1499.
(JCR IF 2013: 0.805; IT-ANVUR Class 4)

[J8] Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini.
Secure Topology Maintenance and Events Collection in WSNs.
In (Wiley) Security and Communication Networks, 4(7):744-762, 2011.
DOI: 10.1002/sec.280, ISSN: 1939-0114.
(JCR IF 2013: 0.433; IT-ANVUR Class 3)

[J7] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Distributed Detection of Clone Attacks in Wireless Sensor Networks.
In (IEEE) Transactions on Dependable and Secure Computing , 8(5):685-698, 2011.
DOI: 10.1109/TDSC.2010.25, ISSN: 1545-5971.
(JCR IF 2013: 1.137; IT-ANVUR Class 1)

[J6] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs.
In (EURASIP) Journal on Wireless Communications and Networking , 2009:1-13, Article ID 8, 2009.
DOI: 10.1155/2009/945943, ISSN: 1687-1499.
(JCR IF 2013: 0.805; IT-ANVUR Class 4)

[J5] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi.
eRIPP-FS: Enforcing Privacy and Security in RFID.
In (Wiley) Security and Communication Networks , 3(1): 58-70, 2010.
DOI: 10.1002/sec.120, ISSN: 1939-0114.
(JCR IF 2013: 0.433; IT-ANVUR Class 3)

[J4] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Secure Median Computation in Wireless Sensor Networks.
In (Elsevier) Ad Hoc Networks , 7(8): 1448-1462, 2009.
DOI: 10.1016/j.adhoc.2009.04.007, ISSN: 1570-8705.
(JCR IF 2013: 1.943; IT-ANVUR Class 4)

[J3] Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia and Luigi V. Mancini.
Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks.
In (Wiley) Security and Communication Networks, 2(2): 195-213, 2009.
DOI: 10.1002/sec.95, ISSN: 1939-0122.
(JCR IF 2013: 0.433; IT-ANVUR Classe 3)

[J2] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
Distributed Data Source Verification in Wireless Sensor Networks.
In (Elsevier) Information Fusion , 10(4): 342-353, 2009.
DOI: 10.1016/j.inffus.2009.01.002, ISSN: 1566-2535.
(JCR IF 2013: 3.472; IT-ANVUR Class 4)

[J1] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini.
ECCE: Enhanced Cooperative Channel Establishment for secure pair-wise communication in Wireless Sensor Networks.
In (Elsevier) Ad Hoc Networks , 5(1): 49-62, 2007.
DOI: 10.1016/j.adhoc.2006.05.013, ISSN: 1570-8705.
(JCR IF 2013: 1.943; IT-ANVUR Class 4)


Books

[B1] Mauro Conti.
Secure Wireless Sensor Networks: Threats and Solutions.
Advances in Information Security. Series Volume 65, 2015.
(Springer) (Series Editor: Sushil Jajodia).
DOI: 10.1007/978-1-4939-3460-7, ISSN: 1568-2633, ISBN 978-1-4939-3458-4.


Book Chapters

[K9] Rehana Yasmin, M. Reza Memarian , Ville Leppänen, Mauro Conti.
Investigating the possibility of data leakage in time of live VM migration.
In Cyber Threat Intelligence, to appear, 2017.
(Springer) (Editors: Mauro Conti, Ali Dehghantanha, Tooska Dargahi).

[K8] Samuel Laurén, M. Reza Memarian, Mauro Conti, Ville Leppänen.
Analysis of Security in Modern Container Platforms.
In Research Advances in Cloud Computing, to appear, 2017.
(Springer) (Editors: Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya).

[K7] Mohammad Reza Memarian, Diogo Fernandes, Pedro Inacio, Ville Leppänen, Mauro Conti.
Applications of Trusted Computing in Cloud Context.
In Research Advances in Cloud Computing, to appear, 2017.
(Springer) (Editors: Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya).

[K6] Tooska Dargahi, Ali Dehghantanha, Mauro Conti.
Forensics Analysis of Android Mobile VoIP Apps.
In Contemporary digital forensic investigations of cloud and mobile applications, to appear, 2016.
(Elsevier) (Editors: Kim-Kwang Raymond Choo, Ali Dehghantanha).

[K5] Tooska Dargahi, Ali Dehghantanha, Mauro Conti.
Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
In Contemporary digital forensic investigations of cloud and mobile applications, to appear, 2016.
(Elsevier) (Editors: Kim-Kwang Raymond Choo, Ali Dehghantanha).

[K4] Hossein Fereidooni, Veelasha Moonsamy, Mauro Conti, Lejla Batina.
Efficient Classification of Android Malware in the wild using Robust Static Features.
In Protecting Mobile Networks and Devices: Challenges and Solutions, to appear, 2016.
(CRC Press - Taylor & Francis) (Editors: Weizhi Meng, Xiapu Luo, Jianying Zhou, Steven Furnell).

[K3] Mauro Conti, Fabio De Gaspari, Luigi Vincenzo Mancini.
Anonymity in an electronic society: A survey.
In Cyber Deception, pp 283-312, 2016.
(Springer) (Editors: Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, and Cliff Wang).
DOI: 10.1007/978-3-319-32699-3_12, ISBN: 978-3-319-32697-9.

[K2] Parvez Faruki, Vijay Laxmi, Manoj Gaur, Shweta Bhandari, Mauro Conti.
DroidAnalyst: Synergic Framework for Static and Dynamic App Analysis.
In Recent Advances in Computational Intelligence in Defense and Security, Volume 621, pp 519-552, 2015.
(Springer) (Editors: Rami Abielmona, Rafael Falcon, Nur Zincir-Heywood, Hussein Abbass).
DOI: 10.1007/978-3-319-26450-9_20, ISSN: 1860-949X.

[K1] Mauro Conti, Roberto Di Pietro, Luciana Marconi.
Privacy for LBSs: On Using a Footprint model to face the enemy.
In Advanced Research in Data Privacy, Studies in Computational Intelligence. Volume 567, pp 169-195, 2015.
(Springer) (Editors: Guillermo Navarro-arribas, Vincenc Torra).
DOI: 10.1007/978-3-319-09885-2_10, ISSN: 1860-949X, ISBN: 978-3-319-09884-5.


Conference and Workshop papers

[C126] It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via
Propagation Features.
Mauro Conti, Daniele Lain, Riccardo Lazzaretti, Giulio Lovisotto, Walter Quattrociocchi.
In Proceedings of the 9th IEEE International Workshop on Information Forensics and Security
(IEEE WIFS 2017)
, in press, Rennes, France, December 4-7, 2017.

[C125] A Novel Distributed Fog-based Networked Architecture to Preserve Energy of Fog Data Center.
Zahra Pooranian, Mohammad Shojafar, Paola G. Vinueza Naranjo, Luca Chiaraviglio, Mauro Conti.
In Proceedings of the 6th IEEE International Workshop on Cloud Computing Systems, Networks, and Applications
(IEEE MASS 2017 workshop: CCSNA 2017)
, in press, Orlando, Florida, USA, October 22-25, 2017.

[C124] SNIFFO: Security of Networks and Intelligence for Field Operations.
Matteo Brunati, Mauro Conti, Alessandro Tezza.
In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
(IEEE WiMob 2017)
, in press, Rome, Italy, October 9-11, 2017.

[C123] A Comprehensive and Effective Mechanism for DDoS Detection in SDN.
Mauro Conti, Ankit Gangwal, Manoj Singh Gaur.
In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
(IEEE WiMob 2017)
, in press, Rome, Italy, October 9-11, 2017.

[C122] Practical Extensions to Countermeasure DoS attacks in Software Defined Networking.
Reza Mohammadi, Reza Javidan, Manijeh Kehstgari, Mauro Conti, Chhagan Lal.
In Proceedings of the 3rd IEEE Conference on Network Functions Virtualization and Software Defined Networking
(IEEE NFV-SDN 2017)
, in press, Berlin, Germany, November 6-8, 2017.

[C121] Blocking Intrusions at Border using Software Defined-Internet Exchange Point (SD-IXP).
Mauro Conti, Ankit Gangwal.
In Proceedings of the 3rd IEEE Conference on Network Functions Virtualization and Software Defined Networking
(IEEE NFV-SDN 2017)
, in press, Berlin, Germany, November 6-8, 2017.

[C120] Unraveling Reflection Induced Sensitive Leaks in Android Apps.
Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Gaur, Akka Zemmari, Mohamed Mosbah, Daya Ram Sharma and Mauro Conti.
In Proceedings of the 12th International Conference on Risks and Security of Internet and Systems
(CRISIS 2017)
, in press, Dinard, France. September 19-21, 2017.

[C119] GolfEngine: Network Management System for Software Defined Networking.
Qianqian Li, Reza Mohammadi, Mauro Conti, Chuanhuang Li and Xiaolin Li.
In Proceedings of the 13th IEEE International Conference on Intelligent Computer Communication and Processing
(ICCP 2017)
, in press, Cluj-Napoca, Romania. September 7-9, 2017.

[C118] Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android.
Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2017)
, in press, Oslo, Norway. September 11-13, 2017.
(acceptance rate 15.88 %)

[C117] Ensuring Information Security by Using Haskell Advanced Type System.
Matteo Di Pirro, Mauro Conti and Riccardo Lazzeretti.
In Proceedings of the 51st International Carnahan Conference on Security Technology
(ICCST 2017)
, in press, Madrid, Spain. October 23-26, 2017.

[C116] Identifying Emotions in Social Media: Comparison of Word-emotion lexicons.
Ema Kusen, Giuseppe Cascavilla, Kathrin Figl, Mauro Conti and Mark Strembeck.
In Proceedings of the 4th International Symposium on Social Networks Analysis, Management and Security
(SNAMS 2017)
, in press, Prague, Czech Republic. August 21-23, 2017.

[C115] Merylin Monaro, Riccardo Spolaor, Qianqian Li, Mauro Conti, Luciano Gamberini and Giuseppe Sartori.
Type Me the Truth! Detecting Deceitful Users via Keystroke Dynamics.
In Proceedings of the 6th International Workshop Cyber Crime
(ARES 2017 workshop: IWCC 2017)
, in press, Reggio Calabria, Italy, August 29 - September 1, 2017.

[C114] Mauro Conti, Pallavi Kaliyar, and Chhagan Lal.
REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks.
In Proceedings of the 1st International Workshop on Criminal Use of Information Hiding
(ARES 2017 workshop: CUING 2017)
, in press, Reggio Calabria, Italy, August 29 - September 1, 2017.

[C113] Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti.
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In Proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses
(RAID 2017)
, in press, Atlanta, Georgia, USA, September 18-20, 2017.

[C112] Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, and Silvio Ranise.
POSTER: Toward Secure and Efficient Attestation for highly Dynamic Swarms.
In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(ACM SIGSAC WiSec 2017)
, in press, Boston, USA, July 18-20, 2017.

[C111] Moreno Ambrosin, Stefano Cecconello, Mauro Conti,and Daniele Lain.
POSTER: A Roaming-based Denial of Service Attack on LTE Networks.
In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(ACM SIGSAC WiSec 2017)
, in press, Boston, USA, July 18-20, 2017.

[C110] The Influence of Emotional Valence Shifts on the Spread of Information in Social Networks.
Ema Kusen, Mark Strembeck, Giuseppe Cascavilla and Mauro Conti.
In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
(ASONAM 2017)
, in press, Sydney, Australia, 31 July - 03 August, 2017.

[C109] Hossein Fereidooni, Tommaso Frassetto, Markus Miettinen, Ahmad-Reza Sadeghi, and Mauro Conti.
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
In Proceedings of the 2nd IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health
(CHASE 2017 workshop: SEARCH 2017)
, in press, Philadelphia, Pennsylvania, USA, July 17-19, 2017.

[C108] Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti and Radha Poovendran.
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices.
In Proceedings of the 15th International Conference on Applied Cryptography and Network Security
(ACNS 2017)
, in press, Kanazawa, Japan, June 10-12, 2017.

[C107] Mauro Conti, Fabio De Gaspari and Luigi V. Mancini.
Know Your Enemy: Stealth Configuration-Information Gathering in SDN.
In Proceedings of the 12th International Conference on Green, Pervasive and Cloud Computing
(GPC 2017)
, in press, Cetara, Italy, May 11-14, 2017.

[C106] Maddalena Favaretto, Riccardo Spolaor, Mauro Conti and Marco Ferrante.
You Surf So Strange Today: Anomaly Detection in Web services via HMM and CTMC.
In Proceedings of the 12th International Conference on Green, Pervasive and Cloud Computing
(GPC 2017)
, in press, Cetara, Italy, May 11-14, 2017.

[C105] Giulio Lovisotto, Mauro Conti, Ivan Martinovic and Gene Tsudik.
FADEWICH: Fast Deauthentication over the Wireless Channel.
In Proceedings of the The 37th IEEE International Conference on Distributed Computing
(ICDCS 2017)
, in press, Atlanta, Georgia, USA, June 5-8, 2017.
(acceptance rate 16.94 %)

[C104] Alberto Compagno, Mauro Conti, Muhammad Hassan Khan.
ICN-based Authentication Protocol for a Simplified LTE Architecture.
In Proceedings of the 2016 Workshop on Communication Security
(Eurocrypt 2017 workshop: WCS 2017)
, in press, Paris, France, April 30, 2017.

[C103] Marco Baesso, Pasquale Capuozzo, Mauro Conti, Luciano Gamberini, Merylin Monaro, Giuseppe Sartori, Riccardo Spolaor.
You Are How You Play: Authenticating Mobile Users via Game Playing.
In Proceedings of the 2016 Workshop on Communication Security
(Eurocrypt 2017 workshop: WCS 2017)
, in press, Paris, France, April 30, 2017.

[C102] Shanshan Wang, Qiben Yan, Zhenxiang Chen, Mauro Conti, Bo Yang, Chuan Zhao.
TextDroid: Semantics-based Detection of Mobile Malware Using Network Flows.
In Proceedings of the 2016 International Workshop on The Security, Privacy, and Digital Forensics of Mobile Systems and Networks
(IEEE INFOCOM 2017 workshop: MobiSec 2017)
, in press, Atlanta, Georgia, USA, May 1, 2017.

[C101] Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik.
Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP.
In Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2017)
, in press, Abu Dhabi, UAE, April 2 - 6, 2017.
(acceptance rate 18.66 %)

[C100] Ankit Gangwal, Mauro Conti and Manoj Singh Gaur.
PANORAMA: Real-time Bird's Eye View of an OpenFlow Network.
In Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control
(IEEE ICNSC 2017)
, pages 204-209, Catanzaro, Italy, May 16-18, 2017.
DOI: 10.1109/ICNSC.2017.8000092, ISBN: 978-1-5090-4429-0.

[C99] Jyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti.
POSTER: Detection of Information Leaks via Reflection in Android Apps
In Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2017)
, in press, Abu Dhabi, UAE, April 2 - 6, 2017.

[C98] Vittoria Cozza, Zisis Tsiatsikas, Mauro Conti, Georgios Kambourakis.
Why Snoopy loves online services: An Analysis of (lack of) Privacy in Online Services.
In Proceedings of the 3rd International Conference on Information Systems Security and Privacy
(ICISSP 2017)
, in press, Porto, Portugal, February 19 - 21, 2017.

[C97] Venkatesh Gauri Shankar, Gaurav Somani, Manoj Singh Gaur, Vijay Laxmi and Mauro Conti.
AndroTaint: An Efficient Android Malware Detection Framework using Dynamic Taint Analysis.
In Proceedings of the Asia Security and Privacy Conference
(Asia S&P 2017)
, in press, Surat, India, January 29 - February 1, 2017.

[C96] Mauro Conti, Fabio De Gaspari, Luigi V. Mancini.
Anonymity in an electronic society.
In Proceedings of the 1st Annual Italian Conference on Cybersecurity
(ITASEC 2017)
, in press, Venice, Italy, January 17 - 20, 2017.

[C95] Jyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, M.S. Gaur, Mauro Conti, Muttukrishnan Rajarajan.
sPECTRA: A Precise FramEwork for Analyzing CrypTographic VulneRabilities in Android Apps.
In Proceedings of the 14th Annual IEEE Consumer Communications & Networking Conference
(IEEE CCNC 2017)
, in press, Las Vegas, Nevada, USA, January 8 - 11, 2017.

[C94] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Nishanth Devarajan.
Amplified Distributed Denial of Service Attack in Software Defined Networking.
In Proceedings of the 8th Annual IEEE/IFIP International Conference on New Technologies, Mobility and Security
(IEEE/IFIP NTMS 2016)
, Larnaca, Cyprus, November 21 - 23, 2016.
DOI: 10.1109/NTMS.2016.7792432, ISBN: 978-1-5090-2914-3, ISSN: 2157-4960.

[C93] Hossein Fereidooni, Mauro Conti, Danfeng Yao, Alessandro Sperduti.
ANASTASIA: ANdroid mAlware detection using STAtic analySIs of Applications.
In Proceedings of the 8th Annual IEEE/IFIP International Conference on New Technologies, Mobility and Security
(IEEE/IFIP NTMS 2016)
, Larnaca, Cyprus, November 21 - 23, 2016.
DOI: 10.1109/NTMS.2016.7792435, ISBN: 978-1-5090-2914-3, ISSN: 2157-4960.

[C92] Anna Spagnolli, Mauro Conti, Giorgia Guerra, Jonathan Freeman, David Kirsh, Aimee van Wynsberghe.
Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions.
In Proceedings of the 5th International Workshop on Symbiotic Interaction
(Symbiotic 2016)
, pages 5-22, Padua, Italy, September 29 - 30, 2016.
DOI: 10.1007/978-3-319-57753-1_2, ISBN: 978-3-319-57752-4.

[C91] Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter.
SANA: Secure and Scalable Aggregate Network Attestation.
In Proceedings of the 23nd ACM Conference on Computer and Communications Security
(ACM CCS 2016)
, pages 731-742, Vienna, Austria, October 24 - 28, 2016.
DOI: 10.1145/2976749.2978335, ISBN: 978-1-4503-4139-4, ISSN: 1543-7221.
(acceptance rate 16.36 %)

[C90] Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran.
Despicable Me(ter): Anonymous and Fine-grained Metering Data Reporting with Dishonest Meters.
In Proceedings of the 4rd IEEE Conference on Communications and Network Security
(IEEE CNS 2016)
, in press, Philadelphia, PA USA, October 17 - 19, 2016.
(acceptance rate 29.00 %)

[C89] Alberto Compagno, Mauro Conti, Ralph Droms.
OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN.
In Proceedings of the 3rd ACM Conference on Information-Centric Networking
(ACM ICN 2016)
, pages 166-175, Kyoto, Japan, September 26-28, 2016.
DOI: 10.1145/2984356.2984374, ISBN: 978-145034467-8.

[C88] Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash.
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
In Proceedings of the 25th USENIX Security Symposium
(USENIX Security 2016)
, pages 531-548, Austin, TX, USA, August 10-12, 2016.
ISBN: 978-1-931971-32-4.
(acceptance rate 15.55 %)

[C87] Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter.
POSTER: Toward a Secure and Scalable Attestation.
In Proceedings of the 9th ACM Conference on Wireless Network Security
(ACM SIGSAC WiSec 2016)
, pages 229-230, Darmstadt, Germany, July 18 - 20, 2016.
DOI: 10.1145/2939918.2942425, ISBN: 978-145034270-4.

[C86] Chhagan Lal, Roberto Petroccia, Mauro Conti, João Alves.
Secure Underwater Acoustic Networks: Current and Future Research Directions.
In Proceedings of the 2016 IEEE/NATO Underwater Communications and Networking
(IEEE/NATO UComm 2016)
, La Spezia, Italy, August 30 - September 1, 2016.
DOI: 10.1109/UComms.2016.7583466, ISBN: 978-150902696-8.

[C85] Alessandro Sforzin, Mauro Conti, Félix Gómez Mármol and Jens-Matthias Bohli.
RPiDS: Raspberry Pi IDS. A Fruitful Intrusion Detection System for IoT.
In Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing
(IEEE ATC 2016)
, in press, Toulouse, France, July 18-21, 2016.

[C84] Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi.
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In Proceedings of the 16th Privacy Enhancing Technologies Symposium
(PETS 2016)
, Darmstadt, Germany, July 19-22, 2016.
DOI: 10.1515/popets-2016-0050.

[C83] Ankit Gangwal, Megha Gupta, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
ELBA: Efficient Layer Based Routing Algorithm in SDN.
In Proceedings of the 25th IEEE International Conference on Computer Communication and Networks
(ICCCN 2016)
, pages 1-7, Waikoloa, Hawaii, USA, August 1-4, 2016.
DOI: 10.1109/ICCCN.2016.7568515, ISBN: 978-150902279-3.

[C82] Parvez Faruki, Akka Zemmari, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
MimeoDroid: Large Scale Dynamic App analysis on Cloned Devices via Machine Learning Classifiers.
In Proceedings of the 3rd IEEE International Workshop on Reliability and Security Data Analysis
(IEEE DSN 2016 workshop; RSDA 2016)
, pages 60-65, London (Guildford), UK, June 19-22, 2016.
DOI:10.1109/DSN-W.2016.33, ISBN: 978-146738891-7.

[C81] Mauro Conti, Claudio Guarisco, Riccardo Spolaor.
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery.
In Proceedings of the 14th International Conference on Applied Cryptography and Network Security
(ACNS 2016)
, pages 611-628, London (Guildford), UK, June 19-22, 2016.
DOI: 10.1007/978-3-319-39555-5_33, ISBN: 978-331939554-8, ISSN: 0302-9743.
(acceptance rate 19.12 %)

[C80] Mauro Conti, Michele Nati, Enrico Rotundo, Riccardo Spolaor.
Mind The Plug! Laptop-User Recognition Through Power Consumption.
In Proceedings of the 2016 International Workshop on IoT Privacy, Trust, and Security
(ACM AsiaCCS 2016 workshop: IoTPTS 2016)
, pages 37-44, Xi'an, China, May 30 - June 3, 2016.
DOI: 10.1145/2899007.2899009, ISBN: 978-145034283-4.

[C79] Ding Ding, Mauro Conti, Agusti Solanas.
A Smart Health Application and its Related Privacy Issues.
In Proceedings of the 2016 Smart City Security and Privacy Workshop
(IEEE CPS Week workshop: SCSP-W 2016)
, pages 11-15, Vienna, Austria, April 11, 2016.
DOI: 10.1109/SCSPW.2016.7509558, ISBN: 978-150902924-2.

[C78] Kanishka Ariyapala, Hoang Giang Do, Huynh Ngoc Anh, Wee Keong Ng, Mauro Conti.
Host and Network Based Intrusion Detection For Android Smartphones.
In Proceedings of the 2016 Workshop on Security, Trust, Privacy and Analytics
(IEEE AINA 2016 workshop: STPA 2016)
, pages 849-854, Crans-Montana, Switzerland, March 23-25, 2016.
DOI: 10.1109/WAINA.2016.35, ISBN: 978-150901857-4.

[C77] Valeriu-Daniel Stanciu, Riccardo Spolaor, Mauro Conti, Cristiano Giuffrida.
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks.
In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy
(ACM SIGSAC CODASPY 2016)
, pages 105-112, New Orleans, LA, USA, March 9-11, 2016.
DOI: 10.1145/2857705.2857748, ISBN: 978-145033935-3.
(acceptance rate 30.00 %)

[C76] Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic
AppScanner: Automatic Fingerprinting of Smartphone Apps From Encrypted Network Traffic.
In Proceedings of the 1st IEEE European Symposium on Security and Privacy
(IEEE EuroSP 2016)
, pages 439-454, Saarbrücken, Germany, March 21-24, 2016.
DOI: 10.1109/EuroSP.2016.40, ISBN: 978-150901751-5.
(acceptance rate 17.26 %)

[C75] Agostino Sturaro, Simone Silvestri, Mauro Conti, Sajal K. Das.
Toward a Realistic Model for Failure Propagation in Interdependent Networks.
In Proceedings of the 2016 International Conference on Computing, Networking and Communications
(IEEE ICNC 2016)
, Kauai, Hawaii, USA, February 15-18, 2016.
DOI: 10.1109/ICCNC.2016.7440711, ISBN: 978-146738579-4.

[C74] Lovely Sinha, Shweta Bhandari, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
FlowMine: Android App Analysis via Data Flow.
In Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference
(IEEE CCNC 2016)
, pages 435-441, Las Vegas, Nevada, USA, January 9 - 12, 2016.
DOI: 10.1109/CCNC.2016.7444819, ISBN: 978-146739292-1.

[C73] Mahdi Rabbania, Reza Khoshkanginib, H.S. Nagendraswamya, Mauro Conti.
Hand Drawn Optical Circuit Recognition.
In Proceedings of the 7th International Conference on Intelligent Human Computer Interaction
(Elsevier IHCI 2015)
, pages 41-48, Allahabad, India, December 14-16, 2015.
DOI: 10.1016/j.procs.2016.04.064, ISSN: 1877-0509.

[C72] Shohreh Hosseinzadeh, Sami Hyrynsalmi, Mauro Conti, Ville Leppänen.
Security and Privacy in Cloud Computing via Obfuscation and Diversification: a Survey.
In Proceedings of the 2nd IEEE International Workshop on Enterprise Security
(IEEE CloudCom 2015 workshop: ES 2015)
, pages 529-535, Vancouver, Canada, November 30 - December 3, 2015.
DOI: 10.1109/CloudCom.2015.29, ISBN: 978-146739560-1.

[C71] Mauro Conti, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi.
TRAP: using TaRgeted Ads to unveil Google personal Profiles.
In Proceedings of the 7th IEEE International Workshop on Information Forensics and Security
(IEEE WIFS 2015)
, Rome, Italy, November 16-19, 2015.
DOI: 10.1109/WIFS.2015.7368607, ISBN: 978-146736802-5.

[C70] Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran.
Verifiable and Privacy-preserving Fine-Grained Data-Collection for Smart Metering.
In Proceedings of the 1st IEEE Workshop on Security and Privacy in Cybermatics
(IEEE CNS 2015 workshop: SPiCy 2015)
, pages 655-658, Florence, Italy, September 30, 2015.
DOI: 10.1109/CNS.2015.7346882, ISBN: 978-146737876-5.

[C69] QianQian Li, Ding Ding, Mauro Conti.
Brain-Computer Interface Applications: Security and Privacy Challenges.
In Proceedings of the 1st IEEE Workshop on Security and Privacy in Cybermatics
(IEEE CNS 2015 workshop: SPiCy 2015)
, pages 663-666, Florence, Italy, September 30, 2015.
DOI: 10.1109/CNS.2015.7346884, ISBN: 978-146737876-5.

[C68] Kanishka Ariyapala, Mauro Conti, Cristina M. Pinotti.
CaT: Evaluating Cloud-aided TLS for Smartphone Energy Efficiency.
In Proceedings of the 1st IEEE Workshop on Security and Privacy in Cybermatics
(IEEE CNS 2015 workshop: SPiCy 2015)
, pages 601-609, Florence, Italy, September 30, 2015.
DOI: 10.1109/CNS.2015.7346874, ISBN: 978-146737876-5.

[C67] Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Marco Negro, Mohaned Qunaibit, Ahmad-Reza Sadeghi.
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In Proceedings of the 22nd ACM Conference on Computer and Communications Security
(ACM CCS 2015)
, pages 952-963, Denver, Colorado, USA, October 12 - 16, 2015.
(acceptance rate 19.81 %)
DOI: 10.1145/2810103.2813671, ISBN: 978-145033832-5, ISSN: 1543-7221.

[C66] Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi V. Mancini.
Boten ELISA: A Novel Approach for Botnet C&C in Online Social Networks.
In Proceedings of the 3rd IEEE Conference on Communications and Network Security
(IEEE CNS 2015)
, pages 74-82, Florence, Italy, September 28 - 30, 2015.
DOI: 10.1109/CNS.2015.7346813, ISBN: 978-1-4673-7876-5.
(acceptance rate 28.00 %)

[C65] Jyoti Gajrani, Jitendra Sarswat, Meenakshi Tripathi, Vijay Laxmi, Manoj Gaur, Mauro Conti.
A Robust Dynamic Analysis System Preventing SandBox Detection by Android Malware.
In Proceedings of the 8th International Conference on Security of Information and Networks
(ACM SIN 2015)
, Sochi, Russia, September 8 - 10, 2015.
DOI: 10.1145/2799979.2800004, ISBN: 978-145033453-2.

[C64] Giuseppe Cascavilla, Mauro Conti, David G. Schwartz, Inbal Yahav.
Revealing Censored Information Through Comments and Commenters in Online Social Networks.
In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
(IEEE/ACM ASONAM 2015)
, pages 675-680, Paris, France, August 25 - 28, 2015.
DOI: 10.1145/2808797.2809290, ISBN: 978-145033854-7.

[C63] Mohammad Reza Memarian, Mauro Conti, Ville Leppänen.
EyeCloud: A BotCloud Detection System.
In Proceedings of the 5th IEEE International Symposium on Trust and Security in Cloud Computing
(IEEE TSCloud 2015)
, pages 1067-1072, Helsinki, Finland, 20 - 22 August, 2015.
DOI: 10.1109/Trustcom.2015.484, ISBN: 978-146737951-9.

[C62] Julien Mineraud, Federico Lancerin, Sasitharan Balasubramaniam, Mauro Conti, Sasu Tarkoma.
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data.
In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2015)
, pages 523-530, Helsinki, Finland, 20 - 22 August, 2015.
DOI: 10.1109/Trustcom.2015.415, ISBN: 978-146737951-9.
(acceptance rate 28.00 %)

[C61] Andrea Burattin, Mauro Conti, Daniele Turato.
Toward an Anonymous Process Mining.
In Proceedings of the 3rd IEEE International Conference on Future Internet of Things and Cloud
(IEEE FiCloud 2015)
, pages 58-63, Rome, Italy, August 24 - 26, 2015.
DOI: 10.1109/FiCloud.2015.9, ISBN: 978-146738103-1.

[C60] Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik.
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking.
In Proceedings of the 24th IEEE International Conference on Computer Communications and Networks
(IEEE ICCCN 2015)
, Las Vegas, Nevada, USA, August 3 - 6, 2015.
DOI: 10.1109/ICCCN.2015.7288477, ISBN: 978-147999964-4, ISSN: 1095-2055.
(acceptance rate 25.00 %)

[C59] Moreno Ambrosin, Mauro Conti, Tooska Dargahi.
On the Feasibility of Attribute-Based Encryption on Smartphone Devices.
In Proceedings of the 1st International Workshop on IoT challenges in Mobile and Industrial System
(MobiSys 2015 workshop: IoT-Sys 2015)
, pages 49-54, Florence, Italy, May 18, 2015.
DOI: 10.1145/2753476.2753482, DOI: 978-145033502-7.

[C58] Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi V. Mancini, Gene Tsudik.
Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking.
In Proceedings of the 13th International Conference on Applied Cryptography and Network Security
(ACNS 2015)
, pages 243-262, New York, NY, USA, June 2-5, 2015.
DOI: 10.1007/978-3-319-28166-7_12, ISBN: 978-331928165-0, ISSN: 0302-9743.
(acceptance rate 21.02 %; Best Student Paper Award)

[C57] Ding Ding, Mauro Conti, Renato Figueiredo.
Impact of Country-scale Internet Disconnection on Structured and Social P2P Overlays.
In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2015)
, Boston, MA, USA, June 14-17, 2015.
DOI: 10.1109/WoWMoM.2015.7158168, ISBN: 978-147998461-9.
(acceptance rate 21.00 %)

[C56] Pericle Perazzo, Kanishka Ariyapala, Mauro Conti, Gianluca Dini.
The Verifier Bee: a Path Planner for Drone-Based Secure Location Verification.
In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2015)
, Boston, MA, USA, June 14-17, 2015.
DOI: 10.1109/WoWMoM.2015.7158150, ISBN: 978-147998461-9.
(acceptance rate 21.00 %)

[C55] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Impact of Security Threats in Vehicular Alert Messaging Systems.
In Proceedings of the 1st IEEE Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems
(IEEE ICC 2015 workshop: IoTCPS 2015)
, pages 2627-2632, London, UK, June 8-12, 2015.
DOI: 10.1109/ICCW.2015.7247575, ISBN: 978-146736305-1.

[C54] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran.
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2015)
, pages 183-201, Singapore, April 14-17, 2015.
DOI: 10.1145/2714576.2714612, ISBN: 978-145033245-3.
(acceptance rate 17.84 %)

[C53] Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde.
Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis.
In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
(ACM SIGSAC CODASPY 2015)
, pages 297-304, San Antonio, TX, USA, March 2-4, 2015.
DOI: 10.1145/2699026.2699119, ISBN: 978-145033191-3.
(acceptance rate 21.00 %)

[C52] Giovanni Toso, Daniele Munaretto, Michele Zorzi, Mauro Conti.
Attack Resilient Underwater Networks Through Software Defined Networking.
In Proceedings of the 9th ACM International Conference on Underwater Networks & Systems
(WUWNet 2014)
, Rome, Italy, November 12-14, 2014.
DOI: 10.1145/2671490.2674589, ISBN: 978-145033277-4.

[C51] Anil Saini, Manoj Gaur, Vijay Laxmi, Tushar Singhal and Mauro Conti.
Privacy Leakage Attacks in Browsers by Colluding Extensions.
In Proceedings of the 10th International Conference on Information Systems Security
(ICISS 2014)
, pages 257-276, Hyderabad, India, December 16-20, 2014.
DOI: 10.1007/978-3-319-13841-1_15, ISBN: 978-331913840-4, ISSN: 0302-9743.
(acceptance rate 25/129 - 19.37 %)

[C50] Mauro Conti, Earlence Fernandes, Justin Paupore, Atul Prakash, Daniel Simionato.
OASIS: Operational Access Sandboxes for Information Security.
In Proceedings of the 4th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices
(ACM SIGSAC CCS 2014 workshop: SPSM 2014)
, pages 105-110, Scottsdale, AZ, USA, November 3-7, 2014.
DOI: 10.1145/2666620.2666629, ISBN: 978-1-4503-3155-5, ISSN: 1543-7221.

[C49] Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni, Mauro Conti.
Secure Message Delivery Games for Device-to-Device Communications.
In Proceedings of the 5th Conference on Decision and Game Theory for Security
(GameSec 2014)
, pages 195-215, Los Angeles, CA, USA, November 6-7, 2014.
DOI: 10.1007/978-3-319-12601-2, ISBN: 978-3-319-12600-5.

[C48] Smita Naval, Vijay Laxmi, Manoj Gaur, Sachin Raja, Muttukrishnan Rajarajan, Mauro Conti.
Environment-Reactive Malware Behavior: Detection and Categorization.
In Proceedings of the 3rd International Workshop on Quantitative Aspects in Security Assurance
(ESORICS 2014 workshop: QASA 2014)
, pages 167-182, Wroclaw, Poland, September 10-11, 2014.
DOI: 10.1007/978-3-319-17016-9_11, ISBN: 978-3-319-17015-2, ISSN: 0302-9743.

[C47] Giuseppe Cascavilla, Andrea Burattin, Mauro Conti.
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks.
In Proceedings of the 9th International Conference on Risks and Security of Internet and Systems
(CRiSIS 2014)
, pages 83-99, Trento, Italy, August 27-29, 2014.
DOI: 10.1007/978-3-319-17127-2_6, ISBN: 978-3-319-17126-5, ISSN: 0302-9743.
(acceptance rate 14/48 - 29.16 %)

[C46] Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti.
Evaluation of Android Anti Malware Techniques against Dalvik Bytecode Obfuscation.
In Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2014)
, pages 414-421, Beijing, China, September 24-26, 2014.
DOI: 10.1109/TrustCom.2014.54, ISBN: 978-147996513-7.

[C45] Parvez Faruki, Vijay Ganmoor, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
Platform Neutral Sandbox for Analyzing Android Malware and Resource Hoggers.
In Proceedings of the 10th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2014)
, pages 556-560, Beijing, China, September 24-26, 2014.
DOI: 10.1007/978-3-319-23829-6_43, ISBN:978-3-319-23829-6, ISSN: 1867-8211.

[C44] Filipe Beato, Mauro Conti, Bart Preneel, Dario Vettore.
VirtualFriendship: Hiding interactions on Online Social Networks.
In Proceedings of the 2nd IEEE Conference on Communications and Network Security
(IEEE CNS 2014)
, pages 328-336, San Francisco, CA, USA, October 29-31, 2014.
DOI: 10.1109/CNS.2014.6997501, ISBN: 978-147995890-0.
(acceptance rate 38/130 - 29.23 %)

[C43] Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter.
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2014)
, pages 76-93, Wroclaw, Poland, September 7-11, 2014.
DOI: 10.1007/978-3-319-11203-9_5, ISBN: 978-3-319-11202-2.
(acceptance rate 58/234 - 24.79 %)

[C42] Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, and Pedro Peris-Lopez.
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2014)
, pages 183-201, Wroclaw, Poland, September 7-11, 2014.
DOI: 10.1007/978-3-319-11203-9_11, ISBN: 978-3-319-11202-2.
(acceptance rate 58/234 - 24.79 %)

[C41] Reza Khoshkangini, Syroos Zaboli, Mauro Conti.
Efficient Routing Protocol via Ant Colony Optimization (ACO) and Breadth First Search (BFS).
In Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing
(IEEE CPSCom 2014)
, pages 374-380, Taipei, Taiwan, September 1-3, 2014.
DOI: 10.1109/iThings.2014.69, ISBN: 978-1-4799-5967-9.

[C40] Kamil Majdanik, Cristiano Giuffrida, Mauro Conti, Herbert Bos.
I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics.
In Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment
(DIMVA 2014)
, pages 92-111, Egham, UK, July 10-14, 2014.
DOI: 10.1007/978-3-319-08509-8_6, ISBN: 978-3-319-08508-1.
(acceptance rate - 23.30 %)

[C39] Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik.
Covert Ephemeral Communication in Named Data Networking.
In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2014)
, pages 15-26, Kyoto, Japan, June 4-6, 2014.
DOI: 10.1145/2590296.2590306, ISBN: 978-1-4503-2800-5.
(acceptance rate 52/260 - 20.00 %)

[C38] Moreno Ambrosin, Armir Bujari, Mauro Conti, Fabio De Gaspari, Claudio Palazzi.
Smartphone and Laptop Frameworks for Vehicular Networking Experimentation.
In Proceedings of the 2013 IEEE/IFIP Wireless Days Conference
(IEEE/IFIP WD 2013)
, pages 1-6, Valencia, Spain, November 13-15, 2013.
DOI: 10.1109/WD.2013.6686481, ISBN: 978-1-4799-0543-0.

[C37] Wafa Ben Jaballah, Mauro Conti, Roberto Di Pietro, Mohamed Mosbah, Nino Vincenzo Verde.
MASS: An Efficient and Secure Broadcast Authentication Scheme for Resource Constrained Devices.
In Proceedings of the 8th International Conference on Risks and Security of Internet and Systems
(CRiSIS 2013)
, pages 1-9, La Rochelle, France, October 23-25, 2013.
DOI: 10.1109/CRiSIS.2013.6766350.

[C36] Eyup Serdar Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
CREPUSCOLO: a Collusion Resistant Privacy Preserving Location Verification System.
In Proceedings of the 8th International Conference on Risks and Security of Internet and Systems
(CRiSIS 2013)
, La Rochelle, France, October 23-25, 2013.
DOI: 10.1109/CRiSIS.2013.6766357, ISBN: 978-364241097-0.

[C35] Mauro Conti, Nicola Dragoni, Sebastiano Gottardo.
MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities.
In Proceedings of the 9th International Workshop on Security & Trust management
(ESORICS 2013 workshop: STM 2013)
, pages 65-81, Egham, UK, September 12-13, 2013.
DOI: 10.1007/978-3-642-41098-7_5, ISBN: 978-364241097-0.

[C34] Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik.
Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking.
In Proceedings of the 38th IEEE Conference on Local Computer Networks
(IEEE LCN 2013)
, pages 630-638, Sydney, Australia, October 21-24, 2013.
DOI: 10.1109/LCN.2013.6761300, ISBN: 978-147990537-9.
(acceptance rate 53/201 - 26.40 %)

[C33] Kanishka Ariyapala, Mauro Conti, Chamath Keppitiyagama.
ContextOS: a Context Aware Operating System for Mobile Devices.
In Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing
(IEEE CPSCom 2013)
, pages. 976-984, Beijing, China, August 20-23, 2013.
DOI: 10.1109/GreenCom-iThings-CPSCom.2013.168, ISBN: 978-076955046-6.

[C32] Claudio Ardagna, Mauro Conti, Mario Leone, Julinda Stefa.
Preserving Smartphone Users' Anonymity in Cloudy Days.
In Proceedings of the 3rd International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems
(IEEE ICCCN 2013 workshop: IEEE MobiPST 2013)
, pages 1-5, Nassau, Bahamas, June 30-August 2, 2013.
DOI: 10.1109/ICCCN.2013.6614170, ISBN: 978-146735774-6.

[C31] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Secure Verification of Location Claims on a Vehicular Safety Application.
In Proceedings of the 22nd International Conference on Computer Communications and Networks
(IEEE ICCCN 2013)
, pages 1-7, Nassau, Bahamas, June 30-August 2, 2013.
DOI: 10.1109/ICCCN.2013.6614193, ISBN: 978-146735774-6.
(acceptance rate 86/300 - 28.66 %)

[C30] Gergely Ács, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik.
Cache Privacy in Name-Data Networking.
In Proceedings of the 33rd International Conference on Distributed Computing Systems
(IEEE ICDCS 2013)
, pages 41-51, Philadephia, PA, USA, July 8-11, 2013.
DOI: 10.1109/ICDCS.2013.12, ISBN: 978-0-7695-5000-8.
(acceptance rate 61/464 - 13.14 %)

[C29] Filipe Beato, Mauro Conti, Bart Preneel.
Friend in the Middle (FiM): Tackling Social Networks De-Anonymization.
In Proceedings of the 5th IEEE International Workshop on SECurity and SOCial Networking 2013
(IEEE SESOC 2013, workshop of PerCom 2013)
, pages. 279-284, San Diego, CA, USA, March 18-22, 2013.
DOI: 10.1109/PerComW.2013.6529495, ISBN: 978-146735077-8.

[C28] Mauro Conti, Daniele Diodati, Cristina M. Pinotti, Bruno Crispo.
Optimal Solutions for Pairing Services on Smartphones: a Strategy to Minimize Energy Consumption.
In Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing
(IEEE CPSCom 2012)
, pages 269-276, Besançon, France, November 20-23, 2012.
DOI: 10.1109/GreenCom.2012.51, ISBN: 978-0-7695-4865-4.

[C27] Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich.
DEMO: Demonstrating the Effectiveness of MOSESdroid for Separation of Execution Modes.
In Proceedings of the 19th ACM Conference on Computer and Communications Security
(ACM SIGSAC CCS 2012)
, pages 998-1000, Raleigh, NC, USA, October 16-18, 2012.
DOI: 10.1145/2382196.2382304, ISBN: 978-145031650-7.

[C26] Mauro Conti, Radha Poovendran, Marco Secchiero.
FakeBook: Detecting Fake Profiles in On Line Social Networks.
In Proceedings of the 1st IEEE/ACM International Workshop on Cybersecurity of Online Social Network
(IEEE/ACM CSOSN 2012)
, pages 1071-1078, Istanbul, Turkey, August 26, 2012.
DOI: 10.1109/ASONAM.2012.185, ISBN: 978-0-7695-4799-2.

[C25] Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes.
MOSES: Supporting Operation Modes on Smartphones.
In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies
(ACM SIGSAC SACMAT 2012)
, pages 3-12, Newark, NJ, US, June 20-22, 2012.
DOI: 10.1145/2295136.2295140, ISBN: 978-145031295-0.
(acceptance rate 19/73 - 26.03 %)

[C24] Mauro Conti.
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion).
In Proceedings of the 20th International Workshop on Security Protocols
(IWSP 2012 - Springer LNCS)
, pages 214-222, Cambridge, UK, April 11-12, 2012.
DOI: 10.1007/978-3-642-35694-0_23, ISBN: 978-3-642-35693-3.

[C23] Eyup Serdar Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System.
In Proceedings of the 20th International Workshop on Security Protocols
(IWSP 2012 - Springer LNCS)
, pages 199-213, Cambridge, UK, April 11-12, 2012.
DOI: 10.1007/978-3-642-35694-0_22, ISBN: 978-364235693-3.

[C22] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Wireless Sensor Replica Detection in Mobile Environments.
In Proceedings of the 13th International Conference on Distributed Computing and Networking
(ICDCN 2012)
, pages 249-264, Hong Kong, January 3-6, 2012.
DOI: 10.1007/978-3-642-25959-3_19, ISBN: 978-364225958-6.

[C21] Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Events Privacy in WSNs: a New Model and its Application.
In Proceedings of the 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2011)
, pages 1-9, Lucca, Italy, June 20-24, 2011.
DOI: 10.1109/WoWMoM.2011.5986491, ISBN: 978-145770351-5.
(acceptance rate 32/173 - 18.49 %)

[C20] Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo.
Mind How You Answer Me! (Transparently Authenticating the User of a Smartphone when Answering or Placing a Call).
In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2011)
, pages 249-259, Hong Kong, March 22-24, 2011.
DOI: 10.1145/1966913.1966945, ISBN: 978-145030564-8.
(acceptance rate 35/217 - 16.12 %)

[C19] Mauro Conti, Arbnor Hasani, Bruno Crispo.
Virtual Private Social Networks.
In Proceedings of the 1st ACM Conference on Data and Application Security and Privacy
(ACM SIGSAC CODASPY 2011)
, pages 39-50, San Antonio, TX, USA, February 21-23, 2011.
DOI: 10.1145/1943513.1943521, ISBN: 978-145030466-5.
(acceptance rate 21/69 - 30.43 %)

[C18] Mauro Conti, Bruno Crispo, Roberto Di Pietro, Luciana Marconi.
Time Warp: How Time Affects Privacy in LBSs. Threats and countermeasures.
In Proceedings of the 12th International Conference on Information and Communications Security
(ICICS 2010 - Springer LNCS)
, pages 325-339, Barcelona, Spain, December 15-17, 2010.
DOI: 10.1007/978-3-642-17650-0_23, ISBN: 978-3-642-17649-4.
(acceptance rate 31/134 - 23.13 %)

[C17] Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo.
CRePE: Context-Related Policy Enforcement for Android.
In Proceedings of the 13th Information Security Conference
(ISC 2010 - Springer LNCS)
, pages 331-354, Boca Raton, FL, USA, October 25 - 28, 2010.
DOI: 10.1007/978-3-642-18178-8_29, ISBN: 978-3-642-18177-1.
(acceptance rate 22/134 - 16.41 %)

[C16] Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei.
The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack.
In Proceedings of the 8th ACM International Symposium on Mobility Management and Wireless Access
(ACM MobiWac 2010)
, pages 99-106, Bodrum, Turkey, October 17 - 21, 2010.
DOI: 10.1145/1868497.1868514, ISBN: 978-1-4503-0277-7.

[C15] Luciana Marconi, Mauro Conti, Roberto Di Pietro.
CED2: Communication Efficient Disjointness Decision.
In Proceedings of the 6th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2010 - Springer LNCS)
, pages 290-306, Singapore, September 7 - 9, 2010.
DOI: 10.1007/978-3-642-16161-2_17, ISBN: 978-3-642-16160-5.
(acceptance rate 28/112 - 25.00 %)

[C14] Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini.
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks.
In Proceedings of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications
(IEEE TSP 2010)
, pages 910-915, Bradford, UK, June 29 - July 1, 2010.
DOI: 10.1109/CIT.2010.169, ISBN: 978-076954108-2.

[C13] Roberto Bragantini, Mauro Conti, Roberto Di Pietro.
Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance.
In Proceedings of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications
(IEEE TSP 2010)
, pages 1096-1101, Bradford, UK, June 29 - July 1, 2010.
DOI: 10.1109/CIT.2010.200, ISBN: 978-076954108-2.

[C12] Mauro Conti.
Censorship-Resilient Communications Throughout Information Scattering (Transcript of Discussion).
In Proceedings of the 18th International Workshop on Security Protocols
(IWSP 2010 - Springer LNCS)
, pages 90-97, Cambridge, UK, March 24-26, 2010.
DOI: 10.1007/978-3-662-45921-8_15, ISBN: 978-3-662-45920-1.

[C11] Stefano Ortolani, Mauro Conti, Bruno Crispo.
Censorship-Resilient Communications Throughout Information Scattering.
In Proceedings of the 18th International Workshop on Security Protocols
(IWSP 2010 - Springer LNCS)
, pages 82-89, Cambridge, UK, March 24-26, 2010.
DOI: 10.1007/978-3-662-45921-8_14, ISBN: 978-3-662-45920-1.

[C10] Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Event Handoff Unobservability in WSN.
In Proceedings of the 2010 IFIP Open Research Problems in Network Security Conference
(IFIP iNetSec 2010)
, pages 20-28, Sofia, Bulgaria, March 05-06, 2010.
DOI: 10.1007/978-3-642-19228-9_3, ISBN: 978-3-642-19227-2.

[C9] Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini.
Sec-TMP: a Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
In Proceedings of the 5th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2009 - Springer LNICST)
, pages 265-284, Athens, Greece, September 14-18, 2009.
DOI: 10.1007/978-3-642-05284-2_15, ISBN: 978-3-642-05283-5.
(acceptance rate 20/76 - 26.31 %)

[C8] Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei.
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.
In Proceedings of the 7th International Conference on Wired / Wireless Internet Communications
(WWIC 2009 - Springer LNCS)
, pages 85-96, Enschede, The Netherlands, May 27-29, 2009.
DOI: 10.1007/978-3-642-02118-3_8, ISBN: 978-3-642-02117-6.

[C7] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Securely Computing an Approximate Median in Wireless Sensor Networks.
In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks
(ACM SecureComm 2008)
, pages 1-10, Istanbul, Turkey, September 22-25, 2008.
DOI: 10.1145/1460877.1460885, ISBN: 978-160558241-2.
(acceptance rate 26/123 - 21.13 %)

[C6] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks.
In Proceedings of the 1st ACM Conference on Wireless Network Security
(ACM SIGSAC WiSec 2008)
, pages 214-219, Alexandria, VA, USA, March 31 - April 2, 2008.
DOI: 10.1145/1352533.1352568, ISBN: 978-159593814-5.
(acceptance rate 16/96 - 16.66 %)

[C5] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi.
FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronization.
In Proceedings of the 33rd Annual Conference of the IEEE Industrial Electronics Society
(IEEE IECON 07)
, pages 52-57, Taipei, Taiwan, November 5-8, 2007.
DOI: 10.1109/IECON.2007.4460365, ISBN: 978-1-4244-0783-5.

[C4] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks.
In Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing
(ACM MobiHoc 2007)
, pages 80-89, Montréal, Quebec, Canada, September 9-14, 2007.
(acceptance rate 27/146 - 18.49 %; Sapienza CS Dpt 2007 Best PhD Student Paper Award)
DOI: 10.1145/1288107.1288119, ISBN: 978-159593684-4.

[C3] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi.
RIPPFS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy.
In Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops
(IEEE PerCom 2007 workshop: PerComW 2006)
, pages 229-234, New York, NY, USA, March 19, 2007.
DOI: 10.1109/PERCOMW.2007.100, ISBN: 978-0-7695-2788-8.

[C2] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
In Proceedings of the 2006 IEEE International Conference on Systems, Man, and Cybernetics
(IEEE SMC '06)
, pages 1468-1473, Taipei, Taiwan, October 8-11, 2006.
DOI: 10.1109/ICSMC.2006.384924, ISBN: 978-1-4244-0099-7.

[C1] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini.
Secure Cooperative Channel Establishment in Wireless Sensor Networks.
In Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops
(IEEE PerCom 2006 workshop: PerComW 2006)
, pages 327-331, Pisa, Italy, March 13, 2006.
DOI: 10.1109/PERCOMW.2006.121, ISBN: 0-7695-2520-2.


Patents

[P2] Mauro Conti, Claudio Guarisco, Riccardo Spolaor.
A Method for recognizing whether a user terminal is human or robot.
IT Patent n. MI2014A002112, 2014.

[P1] Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo.
User authentication method for access to a mobile user terminal and corresponding mobile user terminal.
IT Patent n. TO2010A001069, 2010.
USA Patent n. US 20120164978 A1, 2014.


Theses

[T2] Mauro Conti.
Securing Wireless Sensor Networks,
PhD Thesis - University of Rome "La Sapienza" (Italy), February 2009.

[T1] Mauro Conti.
Protocolli per comunicazioni sicure nelle reti di sensori Wireless,
Tesi di Laurea - University of Rome "La Sapienza" (Italy), May 2005.

website hit counter