Selected Publications (Click here for all publications)

(See also: Google Scholar - DBLP - Scopus - WoS - ORCID - AMiner - MS Academic - academia.edu - ResearchGate - Panda Search - Padua Research)
(Journal ranked according to JCR and Italian-ANVUR-VQR-2012; conference ranked according to CORE/LiveSHINE/MicrosoftAcademic/Italian-GII-GRIN-SCIE)


Quick links:     Journal papers    Conference & Workshop papers    Patents    Hacking Conferences


Journal papers

[J261] Rahul Saha, Gulshan Kumar, G. Geetha, Mauro Conti, William J Buchanan.
Application of Randomness for Security and Privacy in Multi-Party Computation.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2024.
(JCR IF 2023: 7.329; IT-ANVUR Class: 1)

[J257] Alessandro Brighente, Mauro Conti, Andrea De Salve.
EDIT: a Data Inspection Tool for Smart Contracts Temporal Behavior Modeling and Prediction.
In (Elsevier) Future Generation Computer Systems, in press, 2024.
(JCR IF 2023: 7.307; IT-ANVUR Class: 1)

[J255] Mauro Conti, Yoosef Habibi, Ehsan Nowroozi.
SPRITZ-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents.
In (Springer) Multimedia Tools and Applications, in press, 2024.
DOI: 10.1007/s11042-024-18111-4.
(JCR IF 2023: 2.577; IT-ANVUR Class: 2)

[J254] Mauro Conti, Chhagan Lal, Vaishali Shirsath.
SPARQ: SYN Protection using Acyclic Redundancy Check and Quartile Range on P4 Switches.
In (Elsevier) Computer Communications, in press, 2023.
(JCR IF 2023: 5.047; IT-ANVUR Class: 2)

[J252] Rekha Goyat, Gulshan Kumar, Tannishtha Devgun, Rahul Saha, Mauro Conti, Joel Rodrigues.
PRIBADI: A Decentralized Privacy-preserving Authentication in Wireless Multimedia Sensor Networks for Smart Cities.
In (Springer) Cluster Computing, in press, 2023.
(JCR IF 2023: 2.303; IT-ANVUR Class: 2)

[J251] Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Nicoḷ Dal Fabbro, Riccardo Lazzeretti.
Anonymous Federated Learning via Named-Data Networking.
In (Elsevier) Future Generation Computer Systems, in press, 2023.
DOI: 10.1016/j.future.2023.11.009
(JCR IF 2023: 7.307, IT-ANVUR Class: 1)

[J249] Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, Selcuk Uluagac.
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization.
In (IEEE) Transactions on Services Computing, in press, 2023.
(JCR IF 2023: 11.019, IT-ANVUR Class: 1)

[J248] Yanan Zhao, Haiyang Yu, Yuhao Liang, Alessandro Brighente, Mauro Conti, Jianfei Sun, Yilong Ren.
Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon.
In (IEEE) Transactions on Intelligent Transportation Systems, in press, 2023.
DOI: 10.1109/TITS.2023.3329488.
(JCR IF 2023: 9.551, IT-ANVUR Class: 2)

[J246] Meng Li, Yanzhe Shen, Guixin Ye, Jialing He, Xin Zheng, Zijian Zhang, Liehuang Zhu, Mauro Conti.
Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics.
In (IEEE) Transactions on Knowledge and Data Engineering, in press, 2023.
(JCR IF 2023: 8.9, IT-ANVUR Class: 1)

[J244] Mohamed El-Zawawy, Chhagan Lal, Mauro Conti.
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles.
In (IEEE) Transactions on Intelligent Transportation Systems, Volume 25 (2), pp. 2017-2033, 2023.
DOI: 10.1109/TITS.2023.3316775, ISSN: 1558-0016.
(JCR IF 2023: 9.551; IT-ANVUR Class: 2)

[J243] Meng Li, Jianbo Gao, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti.
Time-Restricted, Verifiable, and Efficient Query Processing over Encrypted Data on Cloud.
In (IEEE)Transactions on Services Computing, in press, 2023.
(JCR IF 2022: 11.019; IT-ANVUR Class: 1)

[J242] Mohamed A. El-Zawawy, Pallavi Kaliyar, Mauro Conti, Sokratis Katsikas.
Honey-List Based Authentication Protocol for Industrial IoT Swarms.
In (Elsevier) Computer Communications, in press, 2023.
(JCR IF 2022: 6; IT-ANVUR Class: 2)

[J240] Gulshan Kumar, Rahul Saha, Mauro Conti, Tannishtha Devgun, Rekha Goyat, Joel J. P. C. Rodrigues.
COUNT: Blockchain Framework for Resource Accountability in E-healthcare.
In (Elsevier) Computer Communications, in press, 2023.
(JCR IF 2022: 6; IT-ANVUR Class: 2)

[J239] Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk.
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey.
In (IEEE) Communications Surveys and Tutorials, in press, 2023.
(JCR IF 2022: 33.84; IT-ANVUR Class: 2)

[J238] Mauro Conti, Gulshan Kumar, Rahul Saha.
RAPCOL: A Range-free Power Efficient Cooperative Localization with Heterogeneous devices for Industrial Internet-of-Things.
In (Springer) Cluster Computing, in press, 2023.
DOI: 10.1007/s10586-023-04106-7.
(JCR IF 2022: 2.303; IT-ANVUR Class: 2)

[J236] Tayyab Khan, Karan Singh, Mohd Shariq, Khaleel Ahmad, K.S. Savita, Ali Ahmadian, Soheil Salahshour, Mauro Conti.
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach.
In (Elsevier) Computer Communications, in press, 2023.
DOI: 10.1016/j.comcom.2023.06.014.
(JCR IF 2022: 5.047; IT-ANVUR Class: 2)

[J234] PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Mamoun Alazab, Mauro Conti, Xiaochun Cheng.
PIGNUS: A Deep Learning Model for IDS in Industrial Internet-of-Things.
In (Elsevier) Computers & Security, in press, 2023.
(JCR IF 2021: 5.105; IT-ANVUR Class: 2)

[J233] Miao He, Jianbing Ni, Meng Li, Alessandro Brighente, Mauro Conti.
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach.
In (IEEE) Transactions on Wireless Communications, vol. 23, no. 1, pp. 276-289, 2024.
DOI: 10.1109/TWC.2023.3277448
(JCR IF 2023: 6.779; IT-ANVUR Class: 1)

[J232] Matteo Cardaioli, Mauro Conti, Gabriele Orazi, Pier Paolo Tricomi, Gene Tsudik.
BLUFADER: Blurred Face Detection & Recognition for Privacy-Friendly Continuous Authentication.
In (Elsevier) Pervasive and Mobile Computing, in press, 2023.
(JCR IF 2023: 3.848; IT-ANVUR Class: 2)

[J231] Zhihao Wang, Ding Ding, Min Ren, Mauro Conti.
TANGO: A Temporal Spatial Dynamic Graph Model for Event Prediction.
In (Elsevier) Neurocomputing, in press, 2023.
(JCR IF 2021: 5.779; IT-ANVUR Class: 2)

[J230] Anand Kumar, Karan Singh, Mohd Shariq, Chhagan Lal, Mauro Conti, Ruhul Amin, Shehzad Ashraf Chaudhry.
An Efficient and Reliable ultralightweight RFID Authentication Scheme for Healthcare Systems.
In (Elsevier) Computer Communications, in press, 2023.
(JCR IF 2022: 5.047; IT-ANVUR Class: 2)

[J229] Ehsan Nowroozi, Mohammadreza Mohammadi, Erkan Savas, Mauro Conti.
SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks.
In (IEEE) Transactions on Network and Service Management, vol. 20, no. 2, pp. 2096-2105, 2023.
DOI: 10.1109/TNSM.2023.3267831; ISSN: 1932-4537.
(JCR IF 2020: 3.878; IT-ANVUR Class: 2)

[J226]Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, Selcuk Uluagac.
A Survey on Security and Privacy Issues of UAVs.
In (Elsevier) Computer Networks , in press, 2023.
(JCR IF 2021: 4.235; IT-ANVUR Class: 1)

[J225] Dongkai Chen, Mauro Conti, Luca Pajola, V.S. Subrahmanian.
A Novel Review Helpfulness Measure based on the User-Review-Item Paradigm.
In (ACM) Transactions on the Web, Vol. 17(4), pp. 1-31, 2023.
DOI: 10.1145/3585280.
(JCR IF 2021: 4.235; IT-ANVUR Class: 1)

[J221] Ehsan Nowroozi, Abhishek, Mohammad Reza Mohammadi, Mauro Conti.
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework.
In (IEEE) Transactions on Network and Service Management, vol. 20, no. 2, pp. 1332-1344, 2022.
DOI: 10.1109/TNSM.2022.3225217; ISSN: 1932-4537.
(JCR IF 2020: 3.878; IT-ANVUR Class: 2)

[J220] Meng Li, Jianbo Gao, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti, Mamoun Alazab.
Mnemosyne: Privacy-Preserving Ride Matching with Collusion-Resistant Driver Exclusion.
In (IEEE) Transactions on Vehicular Technology, vol. 72, no. 4, pp. 5139-5151, 2022.
DOI: 10.1109/TVT.2022.3225175.
(JCR IF 2022: 6.239; IT-ANVUR Class: 2)

[J219] Saiqin Xu, Alessandro Brighente, Baixiao Chen, Mauro Conti, Xiancheng Cheng.
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets with Sparse Prior for 1D Line-of-Sight Scenarios.
In (IEEE) Transactions on Vehicular Technology, vol. 72, no. 4, pp. 4683-4696, 2022.
DOI: 10.1109/TVT.2022.3224586; ISSN: 1939-9359.
(JCR IF 2022: 6.239; IT-ANVUR Class: 2)

[J218] Reza Mohammadi, Chhagan Lal, Mauro Conti.
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN.
In International Journal of Information Security , Volume 101, 2022.
DOI: 10.1007/s10207-022-00641-3, ISSN 0045-7906.
(JCR IF 2021: 2.427; IT-ANVUR Class: 2)

[J215] Mohamed A. El-Zawawy, Alessandro Brighente, Mauro Conti.
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain.
In (IEEE) Transactions on Network and Service Management, in press, 2022.
DOI: 10.1109/TNSM.2022.3217320.
(JCR IF 2021: 4.195; IT-ANVUR Class: 2)

[J214] Mauro Conti, Shubham Khandhar, Vinod P.
A few-shot malware classification approach for unknown family recognition using malware feature visualization.
In (Elsevier) Computers & Security, Vol. 122, 102887, 2022.
DOI: 10.1016/j.cose.2022.10288; ISSN: 0167-4048.
(JCR IF 2021: 5.105; IT-ANVUR Class: 2)

[J213] Amrita Ghosal, Subir Halder, Mauro Conti.
Secure Over-The-Air Software Update for Connected Vehicles.
In (Elsevier) Computer Networks, in press, 2022.
(JCR IF 2020: 4.474; IT-ANVUR Class: 1)

[J211] Ankur Bang, Udai Pratap Rao, Andrea Visconti, Alessandro Brighente, Mauro Conti.
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions.
In (Elsevier) Computers & Security, in press, 2022.
DOI: 10.1016/j.cose.2022.102914; ISSN: 0167-4048.
(JCR IF 2021: 5.105; IT-ANVUR Class: 2)

[J210] Mohd Shariq, Karan Singh, Chhagan Lal, Mauro Conti, Tayyab Khan.
ESRAS: An Efficient and Secure Ultra-lightweight RFID Authentication Scheme for Low-cost Tags.
In (Elsevier) Computer Networks, in press, 2022.
(JCR IF 2020: 4.474; IT-ANVUR Class: 1)

[J209] Meng Li, Yifei Chen, Liehaung Zhu, Zijian Zhang, Jianbing Ni, Chhagan Lal, Mauro Conti.
Astraea: Anonymous and Secure Auditing based on Private Smart Contracts for Donation Systems.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2022.
(JCR IF 2021: 7.329; IT-ANVUR Class: 1)

[J207] Subir Halder, Amrita Ghosal, Mauro Conti.
Dynamic Super Round Based Distributed Task Scheduling for UAV Networks.
In (IEEE) Transactions on Wireless Communications, in press, 2022.
DOI: 10.1109/TWC.2022.3200366.
(JCR IF 2021: 7.016; IT-ANVUR Class: 1)

[J206] Meng Li, Yifei Chen, Chhagan Lal, Mauro Conti, Fabio Martinelli, Mamoun Alazab.
Nereus: Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2022.
DOI:10.1109/TDSC.2022.3192367.
(JCR IF 2021: 7.329; IT-ANVUR Class: 1)

[J204] Jamshid Pirayesh, Alberto Giaretta, Mauro Conti, Parviz Keshavarzi.
A PLS-HECC-based Device Authentication and Key Agreement Scheme for Smart Home Networks.
In (Elsevier) Computer Networks, Volume 216, 2022.
DOI: 10.1016/j.comnet.2022.109077; ISSN 1389-1286, 2022.
(JCR IF 2020: 4.474; IT-ANVUR Class: 1)

[J203] Simone Soderi, Riccardo Colelli, Federico Turrin, Federica Pascucci, Mauro Conti.
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2022.
DOI: 10.1109/TDSC.2022.3179562; ISSN: 1545-5971.
(JCR IF 2021: 7.329; IT-ANVUR Class: 1)

[J202] Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tannishtha Devgun, Joel J. P. C. Rodrigues.
Adaptive Intrusion Detection in Edge Computing using Cerebellar Model Articulation Controller and Spline Fit.
In (IEEE) Transactions on Services Computing, in press, 2022.
DOI: 10.1109/TSC.2022.3178471, ISSN: 1939-1374.
(JCR IF 2021: 8.216; IT-ANVUR Class: 1)

[J201] Ashish Kumar, Rahul Saha, Gulshan Kumar, Mauro Conti, William J. Buchanan, Tai-Hoon Kim.
A Comprehensive Survey of Authentication Methods in Internet-of-Things and Its Conjunctions.
In (Elsevier) Journal of Networking and Computer Applications, Volume 204, 2022.
DOI: 10.1016/j.jnca.2022.103414, ISSN: 10848045.
(JCR IF 2021: 6.281; IT-ANVUR Class: 2)

[J196] Ehsan Nowroozi, Yassine Mekdad, Mohammad Berenjestanaki, Mauro Conti, Abdeslam El Fergougui.
Demystifying the Transferability of Adversarial Attacks in Computer Networks.
In (IEEE) Transactions on Network and Service Management, in press, 2022.
DOI: 10.1109/TNSM.2022.3164354, ISSN: 1932-4537.
(JCR IF 2020: 3.878; IT-ANVUR Class: 2)

[J194] Mauro Conti, Gulshan Kumar, Pranav Nerurkar, Rahul Saha, Luigi Vigneri.
A Survey on Security Challenges and Solutions in IOTA.
In (Elsevier) Journal of Network and Computer Applications, Volume 203, 2022.
DOI: 10.1016/j.jnca.2022.103383, ISSN: 10848045.
(JCR IF 2021: 6.281; IT-ANVUR Class: 2)

[J193] Mauro Conti, Jenil Gathani, Pier Paolo Tricomi.
Virtual Influencers in Online Social Media.
In (IEEE) Communication Magazine, vol. 60, no. 8, pp. 86-91, 2022.
DOI: 10.1109/MCOM.001.2100786.
(JCR IF 2020: 9.619)

[J192] Meng Li, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti, Mamoun Alazab.
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack.
In (IEEE/ACM) Transactions on Networking, Volume 30, Issue 5, Pages 2060 - 2073, 2022.
DOI: 10.1109/TNET.2022.3157654; ISSN: 1558-2566.
(JCR IF 2020: 3.315; IT-ANVUR Class: 1)

[J191] Giovanni Apruzzese, Luca Pajola, Mauro Conti.
The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems.
In (IEEE) Transactions on Network and Service Management, Volume 19, Issue 4, Pages 5152 - 5169, 2022.
DOI: 10.1109/TNSM.2022.3157344, ISSN: 1932-4537.
(JCR IF 2020: 3.878; IT-ANVUR Class: 2)

[J190] Alakesh Kalita, Alessandro Brighente, Manas Khatua, Mauro Conti.
Effect of DIS Attack on 6TiSCH Network Formation.
In (IEEE) Communications Letters, Vol. 26(5), pp. 1190-1193, 2022.
DOI: 10.1109/LCOMM.2022.3155992; ISSN: 1558-2558.
(JCR IF 2021: 3.436; IT-ANVUR Class: 1)

[J189] Mohamed A. El-Zawawy, Parvez Faruki, Mauro Conti.
Formal Model for Inter-Component Communication and its Security in Android Computing.
In (Springer) Computing, Vol. 104, 1839-1865, 2022.
DOI: 10.1007/s00607-022-01069-2.
(JCR IF 2020: 2.220; IT-ANVUR Class: 2)

[J187] Federico Tavella, Alberto Giaretta, Mauro Conti, Sasitharan Balasubramaniam.
A Machine Learning-based Approach to Detect Threats in Bio-Cyber DNA Storage Systems.
In (Elsevier) Computer Communications, Volume 187, Pages 59 - 70, 2022.
DOI: 10.1016/j.comcom.2022.01.023, ISSN: 01403664.
(JCR IF 2021: 3.167; IT-ANVUR Class: 2)

[J186] Mohamed A. El-Zawawy, Alessandro Brighente, Mauro Conti.
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones.
In (Elsevier) Computer Networks, in press, 2022.
DOI: 10.1016/j.comnet.2022.108804, ISSN: 13891286.
(JCR IF 2020: 4.474; IT-ANVUR Class: 1)

[J184] Milad Taleby Ahvanooey, Mark Zhu, Wojciech Mazurczyk, Qianmu Li, Kim-Kwang Raymond Choo, Birij B. Gupta, Mauro Conti.
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey.
In (IEEE) Internet of Things Journal, Vol. 9(10), pp. 7639-7663, 2021.
DOI: 10.1109/JIOT.2021.3138073, ISSN: 2327-4662.
(JRC IF 2020: 9.936)

[J183] Vasilios Koutsokostas, Nikolaos Lykousas, Theodoros Apostolopoulos, Gabriele Orazi, Amrita Ghosal, Fran Casino, Mauro Conti, Constantinos Patsakis.
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents.
In (Elsevier) Computers & Security, Vol. 114, 2022.
DOI: 10.1016/j.cose.2021.102582, ISSN 0167-4048.
(JCR IF 2018: 3.06; IT-ANVUR Class: 2)

[J182] Meng Li, Yifei Chen, Chhagan Lal, Mauro Conti, Mamoun Alazab, Donghui Hu.
Eunomia: Anonymous and Secure Vehicular Digital Forensics based on Blockchain.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2021.
DOI: 10.1109/TDSC.2021.3130583, ISSN: 1545-5971.
(JCR IF 2019: 6.864; IT-ANVUR Class: 1)

[J181] Fabio Aiolli, Mauro Conti, Stjepan Picek, Mirko Polato.
On the Feasibility of Crawling-based Attacks against Recommender Systems.
In Journal of Computer Security, in press, 2021.
DOI: 10.3233/JCS-210041, ISSN 1875-8924.
(JCR IF 2021: 1.15; IT-ANVUR Class: 1)

[J180] Ankur O. Bang, Udai Pratap Rao, Pallavi Kaliyar, Mauro Conti.
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey.
In (ACM) Computing Surveys, 5 (22), pp. 1-36, 2021.
DOI: 10.1145/3494524.
(JCR IF 2020: 7.99; IT-ANVUR Class: 1)

[J178] Zahra Pooranian, Mauro Conti, Hamed Haddadi, Rahim Tafazolli.
Online Advertising Security: Issues, Taxonomy, and Future Directions.
In (IEEE) Communications Surveys and Tutorials, 23(4), pp. 2494-2524, 2021.
DOI: 10.1109/COMST.2021.3118271, ISSN: 1553-877X.
(JCR IF 2021: 23.70; IT-ANVUR Class: 2)

[J177] Gulshan Kumar, Rahul Saha, Mauro Conti.
DHACS: Smart Contract-based Decentralized Hybrid Access Control for Industrial Internet of Things.
In (IEEE) Transactions on Industrial Informatics, in press, 2021.
DOI: 10.1109/TII.2021.3108676, ISSN: 1551-3203.
(JCR IF 2020: 9.112; IT-ANVUR Class: 1)

[J176] Koosha Mohammad Hossein, Mohammad Esmaeil Esmaeili, Tooska Dargahi, Ahmad Khonsari, Mauro Conti.
BCHealth: A Novel Blockchain-Based Privacy-Preserving Architecture for IoT Healthcare Applications.
In (Elsevier) Computer Communications, Vol. 180, pp. 31-47, 2021.
DOI: 10.1016/j.comcom.2021.08.011, ISSN: 0140-3664.
(JCR IF 2021: 3.167; IT-ANVUR Class: 2)

[J173] Habib Mostafaei, Mohammad Shojafar, Mauro Conti.
TEL: Low-Latency Failover Traffic Engineering in Data Plane.
In (IEEE) Transactions on Network and Service Management, 1-14, 2021.
DOI: 10.1109/TNSM.2021.3099620, ISSN: 1932-4537.
(JCR IF 2019: 5.333; IT-ANVUR Class: 2)

[J172] Meng Li, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti, Mamoun Alazab.
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain.
In (IEEE) Transactions on Network and Service Management, 18(4): 4697-4710, 2021.
DOI: 10.1109/TNSM.2021.3098439, ISSN: 1932-4537.
(JCR IF 2019: 5.333; IT-ANVUR Class: 2)

[J171] Mohamed El-Zawawy, Eleonora Losiouk, Mauro Conti.
Vulnerabilities in Android WebView Objects: Still Not the End!
In (Elsevier) Computers & Security, Vol. 109.C, 2021.
DOI: 10.1016/j.cose.2021.102395.
(JCR IF 2019: 4.438; IT-ANVUR Class: 2)

[J170] Mauro Conti, Denis Donadel, Federico Turrin.
A Survey on Industrial Control System Testbeds and Datasets for Security Research.
In (IEEE) Communications Surveys and Tutorials, in press, 2021.
DOI: 10.1109/COMST.2021.3094360, ISSN: 1553-877X.
(JCR IF 2021: 23.70; IT-ANVUR Class: 2)

[J168] Andrea Agiollo, Mauro Conti, Pallavi Kaliyar, TsungNan Lin, Luca Pajola.
DETONAR: Detection of Routing Attacks in RPL-based IoT.
In (IEEE) Transactions on Network and Service Management, 18(2): 1178-1190, 2021.
DOI: 10.1109/TNSM.2021.3075496, ISSN: 1932-4537.
(JCR IF 2019: 5.333; IT-ANVUR Class: 2)

[J167] Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran.
Covert Channel-Based Transmitter Authentication in Controller Area Networks.
In (IEEE) Transactions on Dependable and Secure Computing, 2021.
DOI: 10.1109/TDSC.2021.3068213; ISSN: 1545-5971.
(JCR IF 2019: 6.864; IT-ANVUR Class: 1)

[J166] Subir Halder, Mauro Conti, Sajal K Das.
A Holistic Approach to Power Efficiency in a Clock Offset Based Intrusion Detection System for Controller Area Networks.
In (Elsevier) Pervasive and Mobile Computing, Vol.73, 101385, 2021.
DOI: 10.1016/j.pmcj.2021.101385, ISSN 1574-1192.
(JCR IF 2019: 2.725; IT-ANVUR Class: 2)

[J164] Gulshan Kumar, Rahul Saha, Chhagan Lal, Mauro Conti.
Internet-of-Forensic (IoF): A Blockchain Based Digital Forensics Framework for IoT Applications.
In (Elsevier) Future Generation Computer Systems, Vol. 120, pp. 13-25, 2021.
DDOI: 10.1016/j.future.2021.02.016, ISSN: 0167-739X
(JCR IF 2018: 5.768; IT-ANVUR Class: 1)

[J163] Neda Maleki, Amir Masoud Rahmani, Mauro Conti.
SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling.
In (Elsevier) Journal of Network and Computer Applications, 176, 102944, 2021.
DOI: 10.1016/j.jnca.2020.102944
(JCR IF 2019: 5.570; IT-ANVUR Class: 2)

[J162] Subir Halder, Mauro Conti.
CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem.
In (IEEE) Transactions on Cloud Computing, in press, 2020.
(JCR IF 2019: 4.714)

[J161] Aanshi Bhardwaj, Veenu Mangat, Renu Vig, Subir Halder, Mauro Conti.
Distributed Denial of Service Attacks on Cloud: State-of-the-Art Scientific and Commercial Solutions.
In (Elsevier) Computer Science Review, in press, 2020.
(JCR IF 2019: 7.707; IT-ANVUR Class: 2)

[J160] Nagarathna Ravi, S. Mercy Shalinie, Mauro Conti, Chhagan lal.
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller.
In (IEEE) Transactions on Network and Service Management, in press, 2020.
(JCR IF 2016: 4.682; IT-ANVUR Class: 2)

[J159] Amrita Ghosal, Sang Sagong, Subir Halder, Kalana Sahabandu, Mauro Conti, Radha Poovendran, Linda Bushnell.
Truck Platoon Security: State-of-the-Art and Road Ahead.
In (Elsevier) Computer Networks, in press, 2020.
(JCR IF 2020: 4.200; IT-ANVUR Class: 1)

[J158] Meng Li, Chhagan Lal, Mauro Conti, Donghui Hu.
LEChain: A Blockchain-based Lawful Evidence Management Scheme for Digital Forensics.
In (Elsevier) Future Generation Computer Systems, in press, 2020.
(JCR IF 2018: 5.768; IT-ANVUR Class: 1)

[J157] Giuseppe Bernieri, Stefano Cecconello, Mauro Conti, Gianluca Lain.
TAMBUS: A Novel Authentication Method Through Covert Channels for Securing Industrial Networks.
In (Elsevier) Computer Networks, in press, 2020.
(JCR IF 2020: 4.200; IT-ANVUR Class: 1)

[J155] Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti, Mritunjay Rai, Reji Thomas, Mamoun Alazab, Tai-hoon Kim.
Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things.
In (IEEE) Internet of Things Journal, in press, 2020.
(JRC IF 2020: 9.936)

[J154] Meng Li, Yifei Chen, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti.
Privacy-preserving Navigation Supporting Similar Queries in Vehicular Networks.
In (IEEE) Transactions on Dependable and Secure Computing, Vol. 19(2), pp. 1133-1148, 2020.
DOI: 10.1109/TDSC.2020.3017534, ISSN: 1545-5971.
(JCR IF 2018: 6.404; IT-ANVUR Class: 1)

[J153] Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise.
Collective Remote Attestation at the Internet of Things Scale: State-of-the-art and Future Challenges.
In (IEEE) Communications Surveys and Tutorials, 22(4): 2447-2461, 2020.
DOI: 10.1109/COMST.2020.3008879, ISSN: 1553-877X.
(JCR IF 2019: 22.97; IT-ANVUR Class: 2)

[J152] Neminath Hubballi, Mayank Swarnkar, Mauro Conti.
BitProb: Probabilistic Bit Signatures for Accurate Application Identification.
In (IEEE) Transactions on Network and Service Management, in press, 2020.
DOI: 10.1109/TNSM.2020.2999856, ISSN: 1932-4537.
(JCR IF 2016: 4.682; IT-ANVUR Class: 2)

[J151] Subir Halder, Amrita Ghosal, Mauro Conti.
Secure Over-The-Air Software Updates in Connected Vehicles: A Survey.
In (Elsevier) Computer Networks, Volume 178, 107343, 2020.
DOI: 10.1016/j.comnet.2020.107343; ISSN: 1389-1286.
(JCR IF 2019: 3.030; IT-ANVUR Class: 1)

[J150] Mohammad Hadi Alaeiyan, Saeed Parsa, Vinod P, Mauro Conti.
Detection of algorithmically-generated domains: An adversarial machine learning approach.
In (Elsevier) Computer Communications, 160: 661-673, 2020.
DOI: 10.1016/j.comcom.2020.04.033, ISSN: 0140-3664.
(JCR IF 2018: 2.766; IT-ANVUR Class: 2)

[J149] Mauro Conti, Pallavi Kaliyar, Chhagan Lal.
A Robust Multicast Communication Protocol for Low power and Lossy Networks.
In (Elsevier) Journal of Network and Computer Applications, in press, 2020.
(JCR IF 2019: 5.27; IT-ANVUR Class: 2)

[J148] Mauro Conti, Ankit Gangwal, Muhammad Hassan, Chhagan Lal, Eleonora Losiouk.
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions.
In (IEEE) Communications Surveys and Tutorials, in press, 2020.
DOI: 10.1109/COMST.2020.2994526, ISSN: 1553-877X.
(JCR IF 2019: 22.97; IT-ANVUR Class: 2)

[J147] Pallavi Kaliyar, Wafa Ben Jaballah, Mauro Conti, Chhagan Lal.
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks.
In (Elsevier) Computers & Security, in press, 2020.
(JCR IF 2018: 3.06; IT-ANVUR Class: 2)

[J146] Abdelmadjid Benarfa, Muhammad Hassan, Eleonora Losiouk, Alberto Compagno, Mohamed bachir Yagoubi, Mauro Conti.
ChoKIFA+: An Early Detection and Mitigation Approach against Interest Flooding Attacks in NDN.
In International Journal of Information Security , 1-17, in press, 2020.
DOI: 10.1007/s10207-020-00500-z, ISSN: 1553-877X.
(JCR IF 2018: 1.822; IT-ANVUR Class: 2)

[J145] Muhammad Hassan, Mauro Conti, Chhagan Lal.
NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN.
In (Elsevier) Computer Networks, in press, 2020.
(JCR IF 2019: 3.030; IT-ANVUR Class: 1)

[J144] Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti.
On Defending Against Label Flipping Attacks on Malware Detection Systems.
In (Springer) Neural Computing and Applications, in press, 2020.
(JCR IF 2018: 4.664; IT-ANVUR Class: 2)

[J143] Rahim Taheri, Reza Javidan, Mohammad Shojafar, Vinod P, Mauro Conti.
Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach.
In (Springer) Cluster Computing, in press, 2020.
(JCR IF 2018: 1.851; IT-ANVUR Class: 2)

[J142] Edlira Dushku, Md Masoom Rabbani, Mauro Conti, Luigi V. Mancini, Silvio Ranise.
SARA: Secure Asynchronous Remote Attestation for IoT systems.
In (IEEE) Transactions on Information Forensics & Security, 15(1): 3123-3136, 2020.
DOI: 10.1109/TIFS.2020.2983282, ISSN: 1556-6013.
(JCR IF 2019: 6.211; IT-ANVUR Class: 1)

[J141] Mohamed El-Zawawy, Eleonora Losiouk, Mauro Conti.
Don't Let Next-Intent Vulnerability Be Your Next Nightmare: Type System Based Approach to Detect It in Android Apps.
In International Journal of Information Security, in press, 2020.
(JCR IF 2018: 1.822; IT-ANVUR Class: 2)

[J140] Meng Li, Donghui Hu, Chhagan Lal, Mauro Conti, Zijian Zhang.
Blockchain-enabled Secure Energy Trading with Verifiable Fairness in Industrial Internet of Things.
In IEEE Transaction on Industrial Informatics, 16(10): 6564-6574, 2020.
DOI: 10.1109/TII.2020.2974537, ISSN: 1551-3203.
(JCR IF 2019: 7.377; IT-ANVUR Class: 1)

[J139] Jay Dave, Parvez Faruki, Vijay Laxmi, Akka Zemmari, Manoj Gaur, Mauro Conti.
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage.
In (Elsevier) Computer Communications, in press, 2020.
(JCR IF 2018: 2.766; IT-ANVUR Class: 2)

[J137] Wafa Ben Jaballah, Mauro Conti, Chhagan Lal.
Security and Design Requirements for Software-Defined VANETs.
In (Elsevier) Computer Network, in press, 2020.
(JCR IF 2018: 3.030; IT-ANVUR Class: 1)

[J136] Amrita Ghosal, Mauro Conti.
Security Issues and Challenges in V2X: A Survey.
In (Elsevier) Computer Network, in press, 2020.
(JCR IF 2018: 3.030; IT-ANVUR Class: 1)

[J135] Stefano Calzavara, Mauro Conti, Riccardo Focardi, Alvise Rabitti, Gabriele Tolomei.
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery.
In (IEEE) Security and Privacy, in press, 2020.
(JCR IF 2018: 1.596)

[J132] Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti.
Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features.
In (Elsevier) Future Generation Computer Systems, in press, 2019.
(JCR IF 2018: 5.768; IT-ANVUR Class: 1)

[J131] Anshul Arora, Sateesh K Peddoju, Mauro Conti.
PermPair: Android Malware Detection using Permission Pairs.
In (IEEE) Transactions on Information Forensics & Security, 2019.
DOI: 10.1109/TIFS.2019.2950134, ISSN: 1556-6013.
(JCR IF 2018: 6.211; IT-ANVUR Class: 1)

[J130] Mauro Conti, Chhagan Lal.
Context-based Co-presence Detection Techniques: A Survey.
In (Elsevier) Computers & Security, 1-20, 2019.
DOI: 10.1016/j.cose.2019.101652, ISSN: 0167-4048.
(JCR IF 2018: 3.06; IT-ANVUR Class: 2)

[J129] Stefano Cecconello, Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik.
Skype & Type: Keyboard Eavesdropping in Voice-over-IP.
In (ACM) Transactions on Privacy & Security, 22(4), 2019.
DOI: 10.1145/3365366, ISSN: 2471-2566.
(JCR IF 2018: 2.103; IT-ANVUR Class: 1)

[J128] Neetesh Saxena, Mauro Conti, Kim-Kwang Raymond, Narendra S. Chaudhari.
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices.
In (IEEE) Transactions on Information Forensics & Security, 1-16, 2019.
DOI: 10.1109/TIFS.2019.2940908, ISSN: 1556-6013.
(JCR IF 2018: 6.211; IT-ANVUR Class: 1)

[J127] Ankit Gangwal, Mauro Conti.
Cryptomining cannot Change its Spots: Detecting Covert Cryptomining using Magnetic Side-channel.
In (IEEE) Transactions on Information Forensics & Security, 1-10, 2019.
DOI: 10.1109/TIFS.2019.2945171, ISSN: 1556-6021.
(JCR IF 2018: 6.211; IT-ANVUR Class: 1)

[J126] Ding Ding, Kyuho Jeong, Shuning Xing, Mauro Conti, Renato Figueiredo, Fangai Liu.
SEnD: a Social Network Friendship Enhanced Decentralized System to Circumvent Censorships.
In (IEEE) Transactions on Services Computing, 1-15, 2019.
DOI: 10.1109/TSC.2019.2942598. ISSN: 1939-1374.
(JCR IF 2018: 5.707; IT-ANVUR Class: 1)

[J125] Bharat Manral, Gaurav Somani, Kim-Kwang Raymond Choo, Mauro Conti, Manoj Singh Gaur.
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions.
In (ACM) Computing Surveys, 52(6): 1-38, 2019.
DOI: 10.1145/3361216, ISSN: 0360-0300.
(JCR IF 2018: 6.131; IT-ANVUR Class: 1)

[J124] Mauro Conti, Muhammad Hassan, Chhagan Lal.
BlockAuth: BlockChain based Distributed Producer Authentication in ICN.
In (Elsevier) Computer Network, in press, 2019.
(JCR IF 2018: 3.030; IT-ANVUR Class: 1)

[J123] Santhanakrishnan Anand, Ding Ding, Paolo Gasti, Mike O 'Neal, Mauro Conti, Kiran S. Balagani.
DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures.
In (IEEE) Transactions on Network and Service Management, in press, 2019.
(JCR IF 2016: 4.682; IT-ANVUR Class: 2)

[J118] Seyed farhad Aghili, Hamid Mala, Pallavi Kaliyar, Mauro Conti.
SecLAP: Secure and Lightweight RFID Authentication Protocol for Medical IoT.
In (Elsevier) Future Generation Computer Systems, in press, 2019.
(JCR IF 2018: 5.768; IT-ANVUR Class: 1)

[J117] Mohammad Mahdi Tajiki, Mohammad Shojafar, Behzad Akbari, Stefano Salsano, Mauro Conti, Mukesh Singhal.
Joint Failure Recovery, Fault Prevention, and Energy-efficient Resource Management for Real-time SFC in Fog-supported SDN.
In (Elsevier) Computer Networks, in press, 2019.
(JCR IF 2018: 3.030; IT-ANVUR Class: 1)

[J116] Neeraj Kumar, Gagangeet Singh Aujla, Ashok Kumar Das, Mauro Conti.
ECCAuth: Secure Authentication Protocol for Demand Reponse Management in Smart Grid Systems.
In IEEE Transaction on Industrial Informatics, 15(12): 6572-6582, 2019.
DOI: 10.1109/TII.2019.2922697, ISSN: 1551-3203.
(JCR IF 2018: 5.43; IT-ANVUR Class: 1)

[J115] Kiran Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu.
PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos.
In Journal of Computer Security, in press, 2019.
(JCR IF 2018: 1.071; IT-ANVUR Class: 1)

[J113] Neda Maleki, Amir Masoud Rahmani, Mauro Conti.
MapReduce: An Infrastructure Review and Research Insights.
In (Springer) Journal of Supercomputing, in press, 2019.
(JCR IF 2018: 1.532; IT-ANVUR Class: 2)

[J112] Mauro Conti, Chhagan Lal, Reza Mohammadi, Umashankar Rawat.
Lightweight Solutions to Countermeasure DDoS Attacks in Software Defined Networking.
In (Springer) Wireless Networks, 25, 2751-2768, 2019.
DOI: 10.1007/s11276-019-01991-y, ISSN: 1572-8196.
(JCR IF 2018: 1.98; IT-ANVUR Class: 1)

[J111] Deepa K., Radhamani G., Vinod P., Mohammad Shojafar, Neeraj Kumar, Mauro Conti.
Identification of Android Malware Using Refined System Calls.
In (Wiley) Concurrency and Computation: Practice and Experience, in press, 2019.
(JCR IF 2017: 1.114; IT-ANVUR Class: 1)

[J110] A. Ghosal, M. Conti.
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey.
In (IEEE) Communications Surveys and Tutorials, in press, 2019.
(JCR IF 2018: 20.230; IT-ANVUR Class: 2)

[J109] Vanga Odelu, Sourav Saha, Rajendra Prasath, Lakshminarayana Sadineni, Mauro Conti, Minho Jo.
Efficient Privacy Preserving Device Authentication in WBANs for Industrial e-Health Applications.
In (Elsevier) Computers and Security, in press, 2019.
(JCR IF 2018: 2.650; IT-ANVUR Class: 2)

[J108] Subir Halder, Amrita Ghosal, Mauro Conti.
Efficient Physical Intrusion Detection in Internet of Things: A Node Deployment Approach.
In (Elsevier) Computer Networks, in press, 2019.
(JCR IF 2018: 2.522; IT-ANVUR Class: 1)

[J107] Anshul Anand, Mauro Conti, Pallavi Kaliyar, Chhagan Lal.
TARE: Topology Adaptive Re-kEying Scheme for Secure Group Communication in IoT Networks.
In (Springer) Wireless Networks, in press, 2019.
(JCR IF 2018: 1.98; IT-ANVUR Class: 1)

[J106] Mohammad Hadi Alaeiyan, Saeed Parsa, Mauro Conti.
Analysis and Classification of Context-based Malware Behavior.
In (Elsevier) Computer Communications, in press, 2019.
(JCR IF 2017: 2.613; IT-ANVUR Class: 2)

[J105] Giuseppe Bianchi, Tooska Dargahi, Alberto Caponi, Mauro Conti.
Intelligent Conditional Collaborative Private Data Sharing.
In (Elsevier) Future Generation Computer Systems, in press, 2019.
DOI: 10.1016/j.future.2019.01.001, ISSN: 0167-739X.
(JCR IF 2017: 4.639; IT-ANVUR Class: 1)

[J104] Sarada Prasad Gochhayat, Pallavi Kaliyar, Mauro Conti, Prayag Tiwari, V. B. S. Prasath, Deepak Gupta.
LISA: Lightweight Context-aware IoT Service Architecture.
In Journal of Cleaner Production, in press, 2018.
(JCR IF 2017: 5.651; IT-ANVUR Class: 1)

[J103] Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
You Click I Steal: Analyzing and Detecting Click Hijacking Attacks in Web Pages.
In (Springer) International Journal of Information Security, 1-24, 2018.
DOI: 10.1007/s10207-018-0423-3, ISSN: 1615-5270.
(JCR IF 2017: 1.658; IT-ANVUR Class: 2)

[J101] Vinod P., Akka Zemmari, Mauro Conti.
A machine learning based approach to detect malicious android apps using discriminant system calls.
In (Elsevier) Future Generation Computer Systems, in press, 2018.
DOI: 10.1016/j.future.2018.11.021, ISSN: 0167-739X.
(JCR IF 2017: 4.639; IT-ANVUR Class: 1)

[J99] Ding Ding, Mauro Conti, Renato Figueiredo.
SAND: Social-Aware, Network-Failure Resilient, and Decentralized Microblogging System.
In (Elsevier) Future Generation Computer Systems, 93: 637-650, 2019.
DOI: 10.1016/j.future.2018.11.007, ISSN: 0167-739X.
(JCR IF 2017: 4.639; IT-ANVUR Class: 1)

[J96] Mauro Conti, Ralph Droms, Muhammad Hassan, Chhagan Lal.
Fair-RTT-DAS: A Robust and Efficient Dynamic Adaptive Streaming over ICN.
In (Elsevier) Computer Communications, 129: 209-225, 2018.
DOI: 10.1016/j.comcom.2018.07.033, ISSN: 0140-3664.
(JCR IF 2017: 2.613; IT-ANVUR Class: 2)

[J95] Mauro Conti, Ankit Gangwal, Sushmita Ruj.
On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective.
In (Elsevier) Computers & Security, 79: 162-189, 2018.
DOI: 10.1016/j.cose.2018.08.008, ISSN: 0167-4048.
(JCR IF 2017: 2.650; IT-ANVUR Class: 2)

[J93] M.M. Tajiki, M. Shojafar, B. Akbari, S. Salsano, M. Conti.
Software Defined Service Function Chaining with Failure Consideration for Fog Computing.
In (Wiley) Concurrency and Computation: Practice and Experience, in press, 2018.
(JCR IF 2017: 1.114; IT-ANVUR Class: 1)

[J92] Mauro Conti, Pallavi Kaliyar, Chhagan Lal.
CENSOR - Cloud Enabled Secure IoT Architecture over SDN Paradigm.
In (Wiley) Concurrency and Computation: Practice and Experience, in press, 2018.
(JCR IF 2017: 1.114; IT-ANVUR Class: 1)

[J90] Prashant Kumar, Meenakshi Tripathi, Ajay Nehra, Mauro Conti, Chhagan Lal.
SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN.
In (IEEE) Transactions on Network and Service Management, 15(4):1545-1559, 2018.
DOI: 10.1109/TNSM.2018.2861741, ISSN: 1932-4537.
(JCR IF 2016: 3.286; IT-ANVUR Class: 2)

[J89] Paola G Vinueza Naranjo, Zahra Pooranian, Mohammad Shojafar, Mauro Conti, Rajkumar Buyya.
FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments.
In (Elsevier) Journal of Parallel and Distributed Computing, in press, 2018.
DOI: 10.1016/j.jpdc.2018.07.003.
(JCR IF 2017: 1.93; IT-ANVUR Class: 1)

[J88] Mauro Conti, Sandeep Kumar, Chhagan Lal, Sushmita Ruj.
A Survey on Security and Privacy Issues of Bitcoin.
In (IEEE) Communications Surveys and Tutorials, 20(4):3416-3452, 2018.
DOI: 10.1109/COMST.2018.2842460, ISSN: 1553-877X.
(JCR IF 2017: 20.23; IT-ANVUR Class: 2)

[J85] Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor.
The Dark Side (-Channel) of Mobile Devices: A Survey on Network Traffic Analysis.
In (IEEE) Communications Surveys and Tutorials, 20(4):2658-2713, 2018.
DOI: 10.1109/COMST.2018.2843533, ISSN: 1553-877X.
(JCR IF 2017: 20.23; IT-ANVUR Class: 2)

[J84] Subir Halder, Amrita Ghosal, Mauro Conti.
LiMCA: An Optimal Clustering Algorithm for Lifetime Maximization of Internet of Things.
In (Springer) Wireless Networks, 1-19, 2018.
DOI: 10.1007/s11276-018-1741-0, ISSN: 1572-8196.
(JCR IF 2016: 1.584; IT-ANVUR Class: 1)

[J82] Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti.
A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
In (ACM) Computing Surveys, in press, 2018.
(JCR IF 2016: 6.748; IT-ANVUR Class: 1)

[J79] Po-Yen Lee, Chia-Mu Yu, Tooska Dargahi, Mauro Conti, Giuseppe Bianchi.
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things.
In (IEEE) Transactions on Information Forensics & Security, 13(8): 2031-2046, 2018.
DOI: 10.1109/TIFS.2018.2805291, ISSN: 1556-6021.
(JCR IF 2016: 4.332; IT-ANVUR Class: 1)

[J78] Wafa Ben Jaballah, Akka Zemmari, Gilberto Filé, Mauro Conti, Mohamed Mosbah.
Whac-A-Mole: Smart Node Positioning in Clone Attack in Wireless Sensor Networks.
In (Elsevier) Computer Communications, in press, 2018.
(JCR IF 2016: 3.338; IT-ANVUR Class: 2)

[J77] Hidayet Aksu, Leonardo Babun, Mauro Conti, Gabriele Tolomei, A. Selcuk Uluagac.
Advertising in the IoT Era: Vision and Challenges.
In (IEEE) Communications Magazine, in press, 2018.
(JCR IF 2017: 10.435; IT-ANVUR Class: 1)

[J76] Merylin Monaro, Chiara Galante, Riccardo Spolaor, Qian Qian Li, Luciano Gamberini, Mauro Conti, Giuseppe Sartori.
Covert Lie Detection Using Keyboard Dynamics.
In (Nature) Scientific Reports, in press, 2018.
(JCR IF 2017: 4.259)

[J75] Chia-Mu Yu, Sarada Prasad Gochhayat, Mauro Conti, Chun-Shien Lu.
Privacy Aware Data Deduplication for Side Channel in Cloud Storage.
In (IEEE) Transactions on Cloud Computing, 8(2): 597-609, 2020.
DOI: 10.1109/TCC.2018.2794542, ISSN: 2168-7161.

[J73] Moreno Ambrosin, Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik.
Security and Privacy Analysis of National Science Foundation Future Internet Architectures.
In (IEEE) Communications Surveys and Tutorials, 20(2): 1418-1442, 2018.
DOI: 10.1109/COMST.2018.2798280, ISSN: 1553-877X.
(JCR IF 2017: 17.188; IT-ANVUR Class: 2)

[J70] Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti.
Detecting Android Malware Leveraging Text Semantics of Network Flows.
In (IEEE) Transactions on Information Forensics & Security, 13(5): 1096-1109, 2017.
DOI: 10.1109/TIFS.2017.2771228, ISSN: 1556-6013.
(JCR IF 2016: 4.332; IT-ANVUR Class: 1)

[J69] QianQian Li, Sarada Prasad Gochhayat, Mauro Conti, FangAi Liu.
EnergIoT: A Solution to Improve Network Lifetime of IoT Devices.
In (Elsevier) Pervasive and Mobile Computing, 42: 124-133, 2017.
DOI: 10.1016/j.pmcj.2017.10.005, ISSN: 1574-1192.
(JCR IF 2016: 2.349; IT-ANVUR Class: 2)

[J68] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan.
Scale Inside-out: Rapid Mitigation of Cloud DDoS Attacks.
In (IEEE) Transactions on Dependable and Secure Computing, 15(6): 959-973, 2018.
DOI: 10.1109/TDSC.2017.2763160, ISSN: 1545-5971.
(JCR IF 2016: 4.41; IT-ANVUR Class: 1)

[J67] Riccardo Spolaor, Elia Dal Santo, Mauro Conti.
DELTA: Data Extraction and Logging Tool for Android.
In (IEEE) Transactions on Mobile Computing, 17(6): 1289-1302, 2017.
DOI: 10.1109/TMC.2017.2762692, ISSN: 1536-1233.
(JCR IF 2016: 3.822; IT-ANVUR Class: 1)

[J66] Giuseppe Cascavilla, Mauro Conti, David G Schwartz, Inbal Yahav.
The Insider on the Outside: A Novel System for the Detection of Information Leakers in Social Networks.
In (Springer) European Journal of Information Systems, 1-16, 2017.
DOI: 10.1080/0960085X.2017.1387712.
(JCR IF 2016: 2.819; IT-ANVUR Class: 1)

[J65] Moreno Ambrosin, Paolo Braca, Mauro Conti, Riccardo Lazzaretti.
ODIN: Obfuscation-based privacy preserving consensus algorithm for Decentralized Information fusion in smart device Networks.
In (ACM) Transactions on Internet Technology, 18(1): 1-22, 2017.
DOI: 10.1145/3137573, ISSN: 1533-5399.
(JCR IF 2017: 1.489; IT-ANVUR Class: 1)

[J63] Vincent F. Taylor, Riccardo Spolaor, Mauro Conti and Ivan Martinovic.
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis.
In (IEEE) Transactions on Information Forensics & Security, 13(1): 63-78, 2017.
DOI: 10.1109/TIFS.2017.2737970, ISSN: 1556-6013.
(JCR IF 2016: 4.332; IT-ANVUR Class: 1)

[J62] Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson.
Internet of Things security and forensics: Challenges and opportunities.
In (Elsevier) Future Generation Computer Systems, 78: 544-546, 2017.
DOI: 10.1016/j.future.2017.07.060.
(JCR IF 2016: 3.997; IT-ANVUR Class: 1)

[J61] Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur,
Mohamed Mosbah, Mauro Conti.
Android Inter-App Communication Threats and Detection Techniques: A Focus on App Collusion.
In (Elsevier) Computers & Security, in press, 2017.
(JCR IF 2016: 2.849; IT-ANVUR Class: 2)

[J60] Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mauro Conti, Athanasios Vasilakos.
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
In (IEEE) Journal of Biomedical and Health Informatics, in press, 2017.
DOI: 10.1109/JBHI.2017.2721545, ISSN: 2168-2194.
(JCR IF 2016: 3.451; IT-ANVUR Class: 1)

[J58] Rifaqat Ali, Arup Kumar Pal, Saru Kumari, Marimuthu Karuppiah, Mauro Conti.
A Secure User Authentication and Key-Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring.
In (Elsevier) Future Generation Computer Systems, in press, 2017.
DOI: doi.org/10.1016/j.future.2017.06.018, ISSN: 0167-739X.
(JCR IF 2016: 3.997; IT-ANVUR Class: 1)

[J55] Reza Mohammadi, Reza Javidan, Mauro Conti.
SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks.
In (IEEE) Transactions on Network and Service Management, 14(2): 487-497, 2017.
DOI: 10.1109/TNSM.2017.2701549.
(JCR IF 2016: 1.296; IT-ANVUR Class: 2)

[J54] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya.
DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions.
In (Elsevier) Computers Communications, 107: 30-48, 2017.
DOI: 10.1016/j.comcom.2017.03.010.
(JCR IF 2015: 2.099; IT-ANVUR Class: 2; Best Survey Paper 2020)

[J53] Fauzia Idrees, Muttukrishnan Rajarajan, Mauro Conti, Tom Chen, Yogachandran Rahulamathavan.
PIndroid: A novel Android malware detection system using ensemble learning methods.
In (Elsevier) Computers & Security, 68: 36-46, 2017.
DOI: 10.1016/j.cose.2017.03.011.
(JCR IF 2015: 1.640; IT-ANVUR Class: 2)

[J52] Tooska Dargahi, Alberto Caponi, Moreno Ambrosin, Giuseppe Bianchi, Mauro Conti.
A Survey on the Security of Stateful SDN Data Planes.
In (IEEE) Communications Surveys and Tutorials, 19(3): 1701-1725, 2017.
DOI: 10.1109/COMST.2017.2689819.
(JCR IF 2016: 9.220; IT-ANVUR Class: 2)

[J51] Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik, Christopher A. Wood.
Privacy-Aware Caching in Information-Centric Networking.
In (IEEE) Transactions on Dependable and Secure Computing, 1-14, 2017.
DOI: 10.1109/TDSC.2017.2679711, ISSN: 1545-5971.
(JCR IF 2015: 1.592; IT-ANVUR Class: 1)

[J48] Pericle Perazzo, Francesco Betti Sorbelli, Mauro Conti, Gianluca Dini, Cristina M. Pinotti.
Drone Path Planning for Secure Positioning and Secure Position Verification.
In (IEEE) Transactions on Mobile Computing, 16(9): 2478-2493, 2016.
DOI: 10.1109/TMC.2016.2627552, ISSN: 1536-1233.
(JCR IF 2015: 2.456; IT-ANVUR Class: 1)

[J46] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran.
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking.
In (IEEE/ACM) Transactions on Networking, 25(2): 1206-1219, 2016.
DOI: 10.1109/TNET.2016.2626287, ISSN: 1063-6692.
(JCR IF 2015: 2.186; IT-ANVUR Class: 1)

[J45] Moreno Ambrosin, Arman Anzanpour, Mauro Conti, Tooska Dargahi, Sanaz Rahimi Moosavi, Amir M. Rahmani, Pasi Liljeberg.
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices.
In (IEEE) Micro, 36(6): 25-35, 2016.
DOI: 10.1109/MM.2016.101, ISSN: 0272-1732.
(JCR IF 2015: 1.091; IT-ANVUR Class: 2)

[J44] Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
Colluding Browser Extension Attack on User Privacy and its Implication for Web Browsers.
In (Elsevier) Computers & Security, 63: 14-28, 2016.
DOI: 10.1016/j.cose.2016.09.003, ISSN: 0167-4048.
(JCR IF 2015: 1.640; IT-ANVUR Class: 2)

[J43] Claudio Ardagna, Kanishka Ariyapala, Mauro Conti, Cristina Pinotti, Julinda Stefa.
Anonymous End-to-End Communications in Adversarial Mobile Clouds Pervasive and Mobile Computing.
In (Elsevier) Pervasive and Mobile Computing, 2016.
DOI: 10.1016/j.pmcj.2016.09.001.
(JCR IF 2015: 1.719; IT-ANVUR Class: 2)

[J42] Vanga Odelu, Ashok Kumar Das, Mohammad Wazid, Mauro Conti.
Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
In (IEEE) Transactions on Smart Grid, 9(3): 1900-1910, 2016.
DOI: 10.1109/TSG.2016.2602282, ISSN: 1949-3061.
(JCR IF 2015: 4.252; IT-ANVUR Class: 1)

[J40] Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti.
Enhancing QoE for video streaming in MANETs via multi-constraint routing.
In (Springer) Wireless Networks, 1-22, 2016.
DOI: 10.1007/s11276-016-1325-9, ISSN: 1022-0038.
(JCR IF 2015: 1.006; IT-ANVUR Class: 1)

[J38] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti.
DDoS attacks in Cloud Computing: Collateral Damage to Non-targets.
In (Elsevier) Computer Networks, 157-171, 2016.
DOI: 10.1016/j.comnet.2016.03.022, ISSN: 1389-1286.
(JCR IF 2014: 1.256; IT-ANVUR Class: 1)

[J37] Mauro Conti, Nicola Dragoni, Viktor Lesyk.
A Survey of Man In The Middle Attacks.
In (IEEE) Communications Surveys and Tutorials, 18(3): 2027-2051, 2016.
DOI: 10.1109/COMST.2016.2548426, ISSN: 1553-877X.
(JCR IF 2014: 6.806; IT-ANVUR Class: 2)

[J36] Tooska Dargahi, Moreno Ambrosin, Mauro Conti, N. Asokan.
ABAKA: a Novel Attribute-Based k-Anonymous Collaborative Solution for LBSs.
In (Elsevier) Computer Communications, 85: 1-13, 2016.
DOI: 10.1016/j.comcom.2016.03.002, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class: 2)

[J35] Alberto Compagno, Mauro Conti, Antonio A. D'Amico, Gianluca Dini, Pericle Perazzo, Lorenzo Taponecco.
Modeling Enlargement Attacks Against UWB Distance Bounding.
In (IEEE) Transactions on Information Forensics & Security, 11(7): 1565-1577, 2016.
DOI: 10.1109/TIFS.2016.2541613, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J34] Alberto Giaretta, Sasitharan Balasubramaniam, Mauro Conti.
Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.
In (IEEE) Transactions on Information Forensics & Security, 11(4): 665-676, 2016.
DOI:10.1109/TIFS.2015.2505632, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J33] Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde.
Analyzing Android Encrypted Network Traffic to Identify User Actions.
In (IEEE) Transactions on Information Forensics & Security, 11(1): 114-125, 2016.
DOI: 10.1109/TIFS.2015.2478741, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J32] Smita Naval, Vijay Laxmi, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti.
Employing Program Semantics for Malware Detection.
In (IEEE) Transactions on Information Forensics & Security, 10(12): 2591-2604, 2015.
DOI: 10.1109/TIFS.2015.2469253, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J31] Fei Li, Yogachandran Rahulamathavan, Mauro Conti, Muttukrishnan Rajarajan.
Robust Access Control Framework for Mobile Cloud Computing Network.
In (Elsevier) Computer Communications, 68: 61-72, 2015.
DOI: 10.1016/j.comcom.2015.07.005, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class: 2)

[J30] Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan.
Android Security: A Survey of Issues, Malware Penetration and Defenses.
In (IEEE) Communications Surveys and Tutorials, 17(2): 998-1022, 2015.
DOI: 10.1109/COMST.2014.2386139, ISSN: 1553-877X.
(JCR IF 2014: 6.806; IT-ANVUR Class: 2)

[J29] Mauro Conti, Bruno Crispo, Daniele Diodati, Jukka K. Nurminen, Cristina M. Pinotti, Taavi Teemaa.
Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones.
In (IEEE) Transactions on Parallel and Distributed Systems, 26(10): 2778-2790, 2014
DOI: 10.1109/TPDS.2014.2360693, ISSN: 1045-9219.
(JCR IF 2013: 2.173; IT-ANVUR Class: 1)

[J28] Stefano Guarino, Eyup Canlar, Mauro Conti, Roberto Di Pietro, Agusti Solanas.
Provable Storage Medium for Data Storage Outsourcing.
In (IEEE) Transactions on Services Computing, 8(6): 985-997, 2014
DOI: 10.1109/TSC.2014.2355229, ISSN: 1939-1374.
(JCR IF 2013: 1.985; IT-ANVUR Class: 1)

[J27] Agusti Solanas, Constantinos Patsakis, Mauro Conti, Ioannis S. Vlachos, Victoria Ramos, Francisco Falcone, Octavian Postolache, Pablo A. Pérez-Martínez, Roberto Di Pietro, Despina N. Perrea, Antoni Martínez-Ballesté.
Smart Health: A Context-Aware Health Paradigm within Smart Cities.
In (IEEE) Communications Magazine, 52(8): 74-81, 2014.
DOI: 10.1109/MCOM.2014.6871673, ISSN: 0163-6804.
(JCR IF 2013: 4.460; IT-ANVUR Class: 1)

[J26] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
A Secure Alert Messaging System for Safe Driving.
In (Elsevier) Computer Communications, 46: 29-42, 2014.
DOI: 10.1016/j.comcom.2014.03.010, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class: 2)

[J25] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
In (IEEE) Transactions on Information Forensics & Security, 9(4): 681-694, 2014.
DOI: 10.1109/TIFS.2014.2307197, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J24] Claudio Ardagna, Mauro Conti, Mario Leone, Julinda Stefa.
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments.
In (IEEE) Transactions on Services Computing, 7(3): 373-386, 2014
DOI: 10.1109/TSC.2014.2304717, ISSN: 1939-1374.
(JCR IF 2013: 1.985; IT-ANVUR Class: 1)

[J23] Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes.
MOSES: Supporting and Enforcing Security Profiles on Smartphones.
In (IEEE) Transactions on Dependable and Secure Computing, 11(3): 211-22, 2014.
DOI: 10.1109/TDSC.2014.2300482, ISSN: 1545-5971.
(JCR IF 2013: 1.137; IT-ANVUR Class: 1)

[J22] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Fast and Secure Multi-hop Broadcast Solutions for Inter-Vehicular Communication.
In (IEEE) Transactions on Intelligent Transportation Systems, 15(1): 433-450, 2014.
DOI: 10.1109/TITS.2013.2277890, ISSN: 1524-9050.
(JCR IF 2013: 2.472; IT-ANVUR Class: 2)

[J21] Mauro Conti, Paolo Gasti, Marco Teoli.
A Lightweight Mechanism for Detection of Cache Pollution Attacks in Named Data Networking.
In (Elsevier) Computer Networks, 57(16): 3178-3191, 2013.
DOI: 10.1016/j.comnet.2013.07.034, ISSN: 1389-1286.
(JCR IF 2013: 1.282; IT-ANVUR Class: 1)

[J20] Bruno P.S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo.
Hybrid Static-Runtime Information Flow and Declassification Enforcement.
In (IEEE) Transactions on Information Forensics & Security, 8(8): 1294-1305, 2013.
DOI: 10.1109/TIFS.2013.2267798, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J19] Earlence Fernandes, Bruno Crispo, Mauro Conti.
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
In (IEEE) Transactions on Information Forensics & Security, 8(6): 1027-1037, 2013.
DOI: 10.1109/TIFS.2013.2259818, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J18] Mauro Conti, Arbnor Hasani, Bruno Crispo.
Virtual Private Social Networks and a Facebook Implementation.
In (ACM) Transactions on the Web, 7(3), 14:1--14:31, 2013.
DOI: 10.1145/2516633.2516636, ISSN: 1559-1131.
(JCR IF 2013: 1.595; IT-ANVUR Class: 1)

[J17] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Clone Wars: Distributed Detection of Clone Attack in Mobile WSNs.
In (Elsevier) Journal of Computer and System Sciences, 80(3): 654-669, 2014.
DOI: 10.1016/j.jcss.2013.06.017, ISSN: 0022-0000.
(JCR IF 2013: 1.091; IT-ANVUR Class: 1)

[J16] Mauro Conti, Jeroen Willemsen, Bruno Crispo.
Providing Source Location Privacy in Wireless Sensor Networks: a Survey.
In (IEEE) Communications Surveys and Tutorials, 15(3):1238-1280, 2013.
DOI: 10.1109/SURV.2013.011413.00118, ISSN: 1553-877X.
(JCR IF 2013: 6.490; IT-ANVUR Class: 2)

[J15] Eyup Serdar Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Windows Mobile LiveSD Forensics.
In (Elsevier) Journal of Network and Computer Applications, 36(2):677-684, 2013.
DOI: 10.1016/j.jnca.2012.12.024, ISSN: 1084-8045.
(JCR IF 2013: 1.772; IT-ANVUR Class: 2)

[J14] Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich.
CRêPE: a System for Enforcing Fine-Grained Context-Related Policies on Android.
In (IEEE) Transactions on Information Forensics & Security, 7(5): 1426-1438, 2012.
DOI: 10.1109/TIFS.2012.2204249, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J13] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Secure Data Aggregation in Wireless Sensor Networks.
In (IEEE) Transactions on Information Forensics & Security, 7(3): 1040-1052, 2012.
DOI: 10.1109/TIFS.2012.2189568, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J12] Luciana Marconi, Mauro Conti, Roberto Di Pietro.
CASSANDRA: a probabilistic, efficient, and privacy preserving solution to compute set intersection.
In (Springer) International Journal of Information Security, 10(5):301-319, 2011.
DOI: 10.1007/s10207-011-0133-6, ISSN: 1615-5262.
(JCR IF 2013: 0.941; IT-ANVUR Class: 2)

[J7] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Distributed Detection of Clone Attacks in Wireless Sensor Networks.
In (IEEE) Transactions on Dependable and Secure Computing , 8(5):685-698, 2011.
DOI: 10.1109/TDSC.2010.25, ISSN: 1545-5971.
(JCR IF 2013: 1.137; IT-ANVUR Class: 1)




Conference and Workshop papers

[C301] Pier Paolo Tricomi, Mauro Conti, V.S. Subrahmanian, Saurabh Kumar.
Climbing the Influence Tiers on TikTok: A Multimodal Study.
In Proceedings of the 18th International AAAI Conference on Web and Social Media
(ICWSM 2024)
, in press, Buffalo, NY, USA, 3-6 June, 2024.
(GGS:2/A, LiveSHINE:A+, MA:A+; Acceptance rate: 20%)

[C300] Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti.
"All of me": Mining Users' Attributes from their Public Spotify Playlists".
In Proceedings of ACM The Web Conference
(WWW 2024)
, in press, Singapore, 13-17 May, 2024.
(GGS:1/A++, CORE:A++, LiveSHINE:A++, MA:A++; Acceptance rate: 20,2%)

[C299] Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang.
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the User's Perception of Adversarial Webpages.
In Proceedings of ACM The Web Conference
(WWW 2024)
, in press, Singapore, 13-17 May, 2024.
(GGS:1/A++, CORE:A++, LiveSHINE:A++, MA:A++; Acceptance rate: 20,2%)

[C292] Tommaso Bianchi, Alessandro Brighente, Mauro Conti.
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles.
In Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(WISEC 2024)
, in press, Seoul, Korea, 27-30 May, 2024.
(GGS:2/A-,LiveSHINE:A-, MA:A-; Acceptance rate: 17%)

[C291] Alessandro Visintin, Edoardo Liberati, Riccardo Lazzeretti, Mauro Conti, Selcuk Uluagac.
X-Lock: a secure XOR-based fuzzy extractor for resource constrained devices.
In Proceedings of the 22nd International Conference on Applied Cryptography and Network Security
(ACNS 2024)
, in press, Abu Dhabi, UAE, 5-8 March, 2024.
(GGS:2/A-,CORE:B, LiveSHINE:A, MA:A-)

[C287] Mansouri Mohamad, Melek Onen, Wafa Ben Jaballah, Mauro Conti.
SOK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning.
In Proceedings of the 23rd Privacy Enhancing Technologies Symposium
(PETS 2023)
, in press, Lausanne, Switzerland, July 10-15 2023.
(GGS: 2/A-; CORE:A; MA:A-; Acceptance rate: 22%)

[C285] Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek.
Turning Privacy-preserving Mechanisms against Federated Learning.
In Proceedings of the ACM Conference on Computer and Communications Security
(ACM CCS 2023)
, in press, Copenhagen, Denmark, November 26-30, 2023.
(GGS: 1/A++; CORE:A++; LiveSHINE:A++; MA:A++; Acceptance rate: 19.9% )

[C284] Francesco Marchiori, Mauro Conti.
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication.
In Proceedings of the ACM Conference on Computer and Communications Security
(ACM CCS 2023)
, in press, Copenhagen, Denmark, November 26-30, 2023.
(GGS: 1/A++; CORE:A++; LiveSHINE:A++; MA:A++; Acceptance rate: 19.9% )

[C283] Jelle Vos, Mauro Conti, Zekeriya Erkin.
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model
In Proceedings of the 45th IEEE Symposium on Security and Privacy
(IEEE S&P 2024)
, in press, San Francisco, CA, USA, May 20-23, 2024.
(GGS: 1/A++, CORE:A++, LiveSHINE:A++, MA:A++)

[C278] Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin
Beware of Pickpockets: A Practical Attack against Blocking Cards.
In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses
(RAID 2023)
, in press, Hong Kong, October 16-18, 2023.
GGS: 1/A+; CORE:A; LiveSHINE:A+; MA:A+; Acceptance rate: 23.5%)

[C277] Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross Anderson, Mauro Conti.
Boosting Big Brother: Attacking Search Engines with Encodings.
In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses
(RAID 2023)
, in press, Hong Kong, October 16-18, 2023.
GGS: 1/A+; CORE:A; LiveSHINE:A+; MA:A+; Acceptance rate: 23.5%) (Best Paper Award)

[C276] Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability.
In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses
(RAID 2023)
, in press, Hong Kong, October 16-18, 2023.
GGS: 1/A+; CORE:A; LiveSHINE:A+; MA:A+; Acceptance rate: 23.5%)

[C273] Francesco Marchiori, Mauro Conti and Nino Vincenzo Verde.
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports.
In Proceedings of the 18th International Conference on Availability, Reliability and Security
(ARES 2023)
, Article 3, 1-11, Benevento, IT, August 29-September 1, 2023. >br> DOI: 10.1145/3600160.3600182.
GGS: 3/B; CORE:B; LiveSHINE:A-; MA:B; Acceptance rate: 19,1%)

[C267] Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini.
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks.
In Proceedings of the 8th IEEE European Symposium on Security and Privacy
(IEEE Euro S&P 2023)
, in press, Delft, NL, July 3 - 7, 2023.
(MA:C)

[C266] Marco Casagrande, Riccardo Cestaro, Eleonora Losiouk, Mauro Conti, Daniele Antonioli.
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem.
In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(ACM WiSec 2023)
, 85-95, Guildford, Surrey, UK, May 29 - June 01, 2023.
DOI: 10.1145/3558482.3590176.
(GGS:2/A-; LiveSHINE:A-, MA:A-; Acceptance rate: 25%)

[C265] Alessandro Lotto, Vaibhav Singh, Bhaskar Ramasubramanian, Alessandro Brighente, Mauro Conti, Radha Poovendran.
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks.
In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(ACM WiSec 2023)
, 133-144, Guildford, Surrey, UK, May 29 - June 01, 2023.
DOI: 10.1145/3558482.3590187.
(GGS:2/A-; LiveSHINE:A-, MA:A-; Acceptance rate: 25%)

[C264] Ko Zheng Teng, Trupil Limbasiya, Federico Turrin, Yan Lin Aung, Sudipta Chattopadhyay, Jianying Zhou, Mauro Conti.
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems.
In Proceedings of the 9th ACM Cyber-Physical System Security Workshop
(AsiaCCS 2023 Workshop: CPSS 2023)
, 3 - 13, Melbourne, Australia, July 10, 2023.
DOI: 10.1145/3592538.3594273. (Best Paper Award)

[C263] Sara Bardi, Mauro Conti, Luca Pajola and Pier Paolo Tricomi.
Social Honeypot for Humans: Luring People through Self-managed Instagram Pages Security.
In Proceedings of the 21st International Conference on Applied Cryptography and Network Security
(ACNS 2023)
, in press, Kyoto, Japan, June 19-22, 2023.
(GGS:2/A-,CORE:B, LiveSHINE:A, MA:A-)

[C261] Ankit Gangwal, Aakash Jain, Mauro Conti.
On the Feasibility of Profiling Electric Vehicles through Charging Data.
In Proceedings of the Inaugural ISOC Symposium on Vehicle Security and Privacy
(VehicleSec 2023)
, in press, San Diego, CA, USA, February 27, 2023.
(Zoox Best Paper Award Runner-up)

[C260] Elisa Sartori, Luca Pajola, Giovanni Da San Martino, Mauro Conti.
The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum.
In Proceedings of ACM The Web Conference
(WWW '23)
, in press, Austin, TX, USA, April 30-May 4, 2023.
(GGS A++/1, CORE:A++, LiveSHINE:A++, MA:A++)

[C256] Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti.
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2.
In Proceedings of the 13th ACM Conference on Data and Application Security and Privacy
(ACM SIGSAC CODASPY 2023)
, in press, Charlotte, NC, USA, April 24-26, 2023.
(LiveSHINE: B)

[C255] Xiuzhen Cheng, Mauro Conti, Hao Liu, Riccardo Spolaor, Federico Turrin.
Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel.
In Proceedings of the IEEE International Conference on Computer Communications
(INFOCOM 2023)
, in press, New York, USA, May 17-20, 2023.
(GGS A++/1; CORE:A++, LiveSHINE:A++, MA:A++; Acceptance rate:19%)

[C254] Giovanni Apruzzese, Mauro Conti, Ying Yuan.
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning.
In Proceedings of the 38th Annual Computer Security Applications Conference
(ACSAC 2022)
, pages 171-185, Austin, TX, USA, December 5-9, 2022.
DOI: 10.1145/3564625.3567980.
(GGS A/2; LiveSHINE:A+; MA:A+)[reusable badge]

[C250] Meng Li, Jianbo Gao, Zijian Zhang, Chaoping Fu, Chhagan Lal, Mauro Conti.
Graph Encryption for Shortest Path Queries With k Unsorted Nodes.
In Proceedings of 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2022)
, in press, Wuhan, China, October 28-30, 2022.
(CORE:B, MA:C)

[C249] Ankit Gangwal, Rahul Valluri, Mauro Conti.
Analyzing Price Deviations in DeFi Oracles.
In Proceedings of 21st International Conference on Cryptology and Network Security
(CANS 2022)
, in press, Abu Dhabi, UAE, November 13-16, 2022.
(CORE:B, MA:C)

[C248] Simone Soderi, Alessandro Brighente, Federico Turrin, Mauro Conti.
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks.
In Proceedings of the 19th Annual IEEE International Conference on Sensing, Communication, and Networking
(SECON 2022)
, in press, Virtual, September 20-23, 2022.
(GGS A-/2; CORE:B; LiveSHINE:A, MA:A; Acceptance rate: 26%)

[C240] Mauro Conti, Denis Donadel, Radha Poovendran and Federico Turrin.
EVExchange: A Relay Attack on Electric Vehicle Charging System.
In Proceedings of the 27th European Symposium on Research in Computer Security
(ESORICS 2022)
, in press, Copenhagen, Denmark, 26-30 September, 2022.
(GGS:1/A+; CORE:A; LiveSHINE:A+; MA:A+)

[C239] Kiran Balagani, Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Gene Tsudik.
We can hear your PIN drop: A new acoustic side channel attack to profile PIN pads keys.
In Proceedings of the 27th European Symposium on Research in Computer Security
(ESORICS 2022)
, in press, Copenhagen, Denmark, 26-30 September, 2022.
(GGS:1/A+; CORE:A; LiveSHINE:A+; MA:A+)

[C237] Emilie Bout, Alessandro Brighente, Mauro Conti, Valeria Loscri.
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks.
In Proceedings of the 17th International Conference on Availability, Reliability and Security
(ARES 2022)
, in press, Vienna, Austria, August 23-26, 2022.
(GGS:3/B; CORE:B; LiveSHINE:A-; MA:B; Acceptance rate: 20,33%)

[C233] Alessandro Visintin, Flavio Toffalini, Eleonora Losiouk, Mauro Conti, Zhou Jianying.
HolA: Holistic and Autonomous Attestation for IoT Networks.
In Proceedings of 4th International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security
(AIoTS 2022)
, in press, Rome, Italy, June 20-23, 2022.
(AIoTS 2022 Best Workshop Paper)

[C232] Kristina Hristakieva, Stefano Cresci, Giovanni Da San Martino, Mauro Conti, Preslav Nakov.
The Spread of Propaganda by Coordinated Communities on Social Media.
In Proceedings of 14th ACM Web Science Conference
(WebSci 2022)
, in press, Barcelona, Spain, June 26-29, 2022.
DOI:10.1145/3501247.3531543.
(MA:A++, Acceptance rate: 37%) (Best Paper Award)

[C227] Alessandro Brighente, Martina Camaioni, Mauro Conti, Ernesto Olivastri.
Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses.
In Proceedings of the 3rd Workshop on Blockchain Theory and Applications
(BRAIN 2022, workshop of PerCom 2022)
, in press, Pisa, IT, March 21-25, 2022.
(GGS: 1/A+; CORE:A++, LiveSHINE:A+, MA:A)

[C225] Matteo Cardaioli, Pier Paolo Tricomi, Mauro Conti, Gene Tsudik.
Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection.
In Proceedings of the 20th International Conference on Pervasive Computing and Communications
(PerCom 2022)
, in press, Pisa, IT, March 21-25, 2022.
(GGS: 1/A+; CORE:A++, LiveSHINE:A+, MA:A)

[C224] Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu.
Building Embedded Systems Like It's 1996.
In Proceedings of the Network and Distributed System Security Symposium
(NDSS 2022)
, in press, San Diego, CA, USA, February 27-March 3, 2022.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A+)

[C223] Jinwoo Kim, Eduard Marin, Mauro Conti, Seungwon Shin.
EqualNet: A Secure and Practical Defense for Long-term Network.
In Proceedings of the Network and Distributed System Security Symposium
(NDSS 2022)
, in press, San Diego, CA, USA, February 27-March 3, 2022.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A+)

[C218] Antonio Ruggia, Eleonora Losiouk, Luca Verderame, Mauro Conti, Alessio Merlo.
Repack Me If You Can: An Anti-Repackaging Solution based on Android Virtualization.
In Proceedings of the Annual Computer Security Applications Conference
(ACSAC)
, pages 970-981, Virtual, December 6-10, 2021.
DOI: 10.1145/3485832.3488021.
(GGS: 2/A; LiveSHINE: A+; MA: A+; Acceptance rate: 24,5%, ACSAC 2021 Distinguished Artifact Award)

[C215] Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci.
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand.
In Proceedings of the 31st USENIX Security Symposium
(USENIX Security 2022)
, in press, Boston, MA, August 10-12, 2022.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++)

[C213] Enkeleda Bardhi, Mauro Conti, Eleonora Losiouk, Riccardo Lazzeretti.
ICN PATTA: ICN Privacy Attack Through Traffic Analysis.
In Proceedings of the 46th IEEE Conference on Local Computer Networks
(IEEE LCN 2021)
, 443-446, Virtual, October 4, 2021.
DOI: 10.1109/LCN52139.2021.9525013.
(GGS:2/A-; LiveSHINE:A-, MA:A-; Acceptance rate: <30%)

[C211] Mohamad Mansouri, Wafa Jaballah, Melek ĂƒÂƒĂ‚Â–nen, Masoom Rabbani, Mauro Conti.
FADIA: FAirness-Driven collaboratIve remote Attestation.
In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(ACM WiSec 2021)
, 60-71, Virtual, 28 June-2 July, 2021.
DOI:10.1145/3448300.3468284
(GGS:3/B; LiveSHINE: A-; MA: B; Acceptance rate: 28%)

[C210] Giovanni Barbieri, Mauro Conti, Nils Ole Tippenhauer, Federico Turrin.
Assessing the Use of Insecure ICS Protocols via IXP Network traffic Analysis.
In Proceedings of the 30th International Conference on Computer Communications and Networks
(ICCCN 2021)
, in press, Athens, Greece, 19-22 July, 2021.
(MA:C; Acceptance rate: 25%)

[C209] Matteo Cardaioli, Mauro Conti, Andrea Di Sorbo, Enrico Fabrizio, Sonia Laudanna, Corrado Aaron Visaggio.
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency.
In Proceedings of the 30th International Conference on Computer Communications and Networks
(ICCCN 2021)
, 1-9, Athens, Greece, 19-22 July, 2021.
DOI: 10.1109/ICCCN52240.2021.9522339.
(MA:C; Acceptance rate: 25%)

[C208] Alessandro Brighente, Mauro Conti, Izza Sadaf.
Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand.
In Proceedings of the 26th European Symposium on Research in Computer Security.
(ESORICS 2021)
, in press, Darmstadt, Germany, 4-8 October 2021.
(GGS 2/A, CORE:A, LiveSHINE:A+, MA:A)

[C206] Luca Pajola, Mauro Conti.
Fall of Giants: How popular text-based MLaaS fall against a simple adversarial attack.
In Proceedings of the 6th IEEE European Symposium on Security and Privacy
(IEEE EuroS&P 2021)
, in press, Vienna, Austria, 7-11 September 2021.
DOI: 10.1109/EuroSP51992.2021.00023
(MA:C)

[C202] Flavio Toffalini, Mariano Graziano, Mauro Conti, Jianying Zhou.
SnakeGX: a sneaky attack against SGX Enclaves.
In Proceedings of the 19th International Conference on Applied Cryptography and Network Security
(ACNS 2021)
, in press, Kamakura, Japan, June 21-24, 2021.
DOI:10.1007/978-3-030-78372-3_1
(GGS:2/A-,CORE:B, LiveSHINE:A, MA:A-; Acceptance rate: 16.9%)

[C201] Matteo Cardaioli, Pallavi Kaliyar, Pasquale Capuozzo, Mauro Conti, Giuseppe Sartori and Merylin Monaro.
Predicting Twitter Users' Political Orientation: An Application to the Italian Political Scenario.
In Proceedings of the IEEE/ACM International Conference on Social Networks Analysis and Mining
(ASONAM 2020)
, 159-165, Virtual, December 7-10, 2020.
DOI:10.1109/ASONAM49781.2020.9381470.
(LiveSHINE:B, MA:C; Acceptance rate: 17.8%)

[C200] Ankit Gangwal, Mauro Conti, Gianluca Lain, Samuele Giuliano Piazzetta.
Detecting Covert Cryptomining using HPC.
In Proceedings of 19th International Conference on Cryptology and Network Security
(CANS 2020)
, in press, Vienna, December 14-16, 2020.
(CORE:B, MA:C; Acceptance rate: 27.86%)

[C195] Pier Paolo Tricomi, Mauro Conti.
PvP: Profiling versus Player! Exploiting Gaming Data for Player Recognition.
In Proceedings of the 23rd Information Security Conference
(ISC 2020)
, vol. 12472, pp: 393-408, Bali, Indonesia, December 16-20, 2020.
DOI: 10.1007/978-3-030-62974-8_22; ISBN: 978-3-030-62974-8.
(GGS: 3/B-; CORE:B, LiveSHINE:B, MA:C; Acceptance rate: 23%)

[C194] Federico Turrin, Alessandro Erba, Nils Ole Tippenhauer, Mauro Conti.
A Statistical Analysis Framework for ICS Process Datasets.
In Proceedings of the Joint Workshop on CPS & IoT Security and Privacy
(ACM CCS 2020 workshop: CPSIoTSec 2020)
, in press, Orlando, USA, November 9, 2020.

[C192] Mirko Polato, Fabio Aiolli, Mauro Conti, Stjepan Picek.
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems.
In Proceedings of the 25th European Symposium on Research in Computer Security
(ESORICS 2020)
, in press, Guildford, UK, September 14-18, 2020.
(GGS: 2/A; CORE: A, LiveSHINE: A+, MA: A; Acceptance rate: 19,67%)

[C191] Matteo Cardaioli, Mauro Conti, Kiran Balagani, Paolo Gasti.
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies Through Audio Leakage.
In Proceedings of the 25th European Symposium on Research in Computer Security
(ESORICS 2020)
, in press, Guildford, UK, September 14-18, 2020.
(GGS: 2/A; CORE: A, LiveSHINE: A+, MA: A; Acceptance rate: 19,67%)

[C190] Pier Paolo Tricomi, Mauro Conti, Gene Tsudik.
De-auth of the blue! Transparent De-authentication using Bluetooth Low Energy Beacon.
In Proceedings of the 25th European Symposium on Research in Computer Security
(ESORICS 2020)
, in press, Guildford, UK, September 14-18, 2020.
(GGS: 2/A; CORE: A, LiveSHINE: A+, MA: A; Acceptance rate: 19,67%)

[C189] Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti.
Improving Password Guessing via Representation Learning.
In Proceedings of the 42nd IEEE Symposium on Security and Privacy
(IEEE S&P 2021)
, in press, San Francisco, CA, May 23-27, 2021.
(GGS: 1/A++; CORE:A++; LiveSHINE:A++; MA:A++)

[C187] Yifei Chen, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti.
One-Time, Oblivious, and Unlinkable Query Processing over Encrypted Data On Cloud.
In Proceedings of the 22nd International Conference on Information and Communications Security.
(ICICS 2020)
, in press, Virtual, August 24-27, 2020.
(GGS:3/B; CORE: B; LiveSHINE: B; MA: B; Acceptance rate: 23.7%)

[C184] Giuseppe Bernieri, Mauro Conti, Matteo Sovilla, Federico Turrin.
ALISI: A Lightweight Identification System based on Iroha.
In Proceedings of the 35th Annual ACM Symposium on Applied Computing.
(ACM SAC 2020)
, in press, Virtual, March 30 - April 3, 2020.
(GGS: 2/A-; CORE: B; LiveSHINE: A; MA: A-; Acceptance rate: 25.00%)

[C182] Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac.
I see your smart home activities, even encrypted!.
In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks.
(ACM WiSec 2020)
, 207-218, Virtual, July 8-10, 2020.
DOI: 10.1145/3395351.3399421.
(GGS:3/B; LiveSHINE: A-; MA: B)

[C181] Amrita Ghosal, Subir Halder, Mauro Conti.
STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles.
In Proceedings of the 54th IEEE International Conference on Communications.
(IEEE ICC 2020)
, pp. 1-6, Dublin, Ireland, June 7\9611, 2020.
DOI: 10.1109/ICC40277.2020.9148649.
(GGS:2/A; CORE: B; LiveSHINE: A+; MA: A+)

[C180] Filippo Berto, Luca Calderoni, Mauro Conti, Eleonora Losiouk.
Spatial Bloom Filter in Named Data Networking: a Memory Efficient Solution.
In Proceedings of the 35th ACM/SIGAPP Symposium On Applied Computing.
(SAC 2020)
, pp. 274-277, Brno, Czech Republic, March 30 - April 3, 2020.
DOI: 10.1145/3341105.3374074.
(GGS:2/A-; CORE: B; LiveSHINE: A; MA: A)

[C179] Alberto Compagno, Mauro Conti, Eleonora Losiouk, Gene Tsudik, Sebastiano Valle.
A Proactive Cache Privacy Attack on NDN.
In Proceedings of the 2020 IEEE/IFIP Network Operations and Management Symposium.
(NOMS 2020)
, pp. 1-7, Budapest, Hungary, April 20-24, 2020.
DOI: 10.1109/NOMS47738.2020.9110318.
(GGS:3/B ; CORE: B; LiveSHINE: A-; MA: B)

[C174] Subir Halder, Mauro Conti, Sajal K. Das.
COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks.
In Proceedings of the 21st International Conference on Distributed Computing and Networking.
(ICDCN 2020)
, 1-10, Kolkata, India, January 4-7, 2020.
DOI: 10.1145/3369740.3369787.
(GGS: 3/B-; CORE: B; LiveSHINE: B-; MA: C)

[C173] Eduard Marin, Nicola Bucciol, Mauro Conti.
An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures.
In Proceedings of the 26th ACM Conference on Computer and Communications Security.
(ACM CCS 2019)
, pages 1101-1114, London, UK, November 11-15, 2019.
DOI: 10.1145/3319535.3354194, ISBN: 978-1-4503-6747-9.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++)

[C169] Giuseppe Bernieri, Mauro Conti, Federica Pascucci.
MimePot: a Model-based Honeypot for Industrial Control Networks.
In Proceedings of the 2019 IEEE International Conference on Systems, Man, and Cybernetic.
(IEEE SMC 2019)
, pp. 433-438, Bari, Italy, October 6-9, 2019.
DOI:10.1109/SMC.2019.8913891.
(GGS: 2/A-; CORE: B; LiveSHINE: B; MA: A++)

[C165] Flavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, Mauro Conti.
ScaRR: Scalable Runtime Remote Attestation for Complex Systems.
In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses.
(RAID 2019)
, in press, Beijing, China, September 23-25, 2019.
(GGS: 1/A+; CORE: A+; LiveSHINE: A+)

[C164] Mauro Conti, Ankit Gangwal, Michele Todero.
Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages.
In Proceedings of the 14th International Conference on Availability, Reliability and Security.
(ARES 2019)
, pp. 1-8, Canterbury, UK, August 26-29, 2019.
DOI:10.1145/3339252.3339255.
(GGS: 3/B; CORE: B; LiveSHINE: A-; Acceptance rate: 20.75%)

[C163] Md. Hajian Berenjestanaki, Mauro Conti, Ankit Gangwal.
On the Exploitation of Online SMS Receiving Services to Forge ID Verification.
In Proceedings of the 14th International Conference on Availability, Reliability and Security.
(ARES 2019)
, pp. 1-5, Canterbury, UK, August 26-29, 2019.
DOI:10.1145/3339252.3339276.
(GGS: 3/B; CORE: B; LiveSHINE: A-; Acceptance rate: 20.75%)

[C162] Amrita Ghosal, Subir Halder and Mauro Conti.
DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia Things
In Proceedings of the 28th IEEE International Conference on Computer Communications and Networks.
(IEEE ICCCN 2019)
, pp. 1-9, Valencia, Spain, July 29 - August 1 2019.
DOI:10.1109/ICCCN.2019.8846929.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 29.00%)

[C158] Muhammad Hassan, Hani Salah, Mauro Conti, Frank H. P. Fitzek, Thorsten Strufe.
CoMon-DAS: A Framework for Efficient and Robust Dynamic Adaptive Streaming over NDN.
In Proceedings of the 24th IEEE Symposium on Computers and Communications.
(IEEE ISCC 2019)
, in press, Barcelona, Spain, June 29 - July 3 2019.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C157] Stefano Calzavara, Mauro Conti, Riccardo Focardi, Alvise Rabitti, Gabriele Tolomei.
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities.
In Proceedings of the 4th IEEE European Symposium on Security and Privacy.
(IEEE Euro S&P 2019)
, pp. 528-543, Stockholm, Sweden, June 17-19 2019. DOI:10.1109/EuroSP.2019.00045.
(MA: C; Acceptance rate: 22.9%)

[C153] Shubhani Aggarwal, Mohammad Shojafar, Neeraj Kumar, Mauro Conti.
A New Secure Data Dissemination Model in Internet of Drones.
In Proceedings of the 53rd IEEE International Conference on Communications
(IEEE ICC 2019)
, pp. 23-34, Shanghai, China, May 20-24, 2019.
DOI:10.1109/ICC.2019.8761372.
(GGS: 2/A; CORE: B; LiveSHINE: A+; MA: A+; Acceptance rate: 39.00%)

[C151] Subir Halder, Mauro Conti.
Don't Hesitate to Share! A Novel IoT Data Protection Scheme Based on BGN.
In Proceedings of the 34th ACM Symposium On Applied Computing
(ACM SAC 2019)
, pp. 284-291, Limassol, Cyprus, April 8-12, 2019.
DOI:10.1145/3297280.3297310.
(GGS: 2/A-; CORE: B; LiveSHINE: A; MA: A-; Acceptance rate: 25.00%; ACM-DADS '19 track Best Paper and runner up for ACM SAC '19 Best Paper)

[C150] Fabio Aiolli, Mauro Conti, Ankit Gangwal, Mirko Polato.
Mind Your Wallet's Privacy: Identifying Bitcoin Wallet Apps and User's Actions through Network Traffic Analysis.
In Proceedings of the 34th ACM Symposium On Applied Computing
(ACM SAC 2019)
, pages 1484-1491, Limassol, Cyprus, April 8-12, 2019.
DOI: 10.1145/3297280.3297430, ISBN: 978-1-4503-5933-7.
(GGS: 2/A-; CORE: B; LiveSHINE: A; MA: A-; Acceptance rate: 25.00%)

[C149] Jo Vligen, Md Masoom Rabbani, Mauro Conti, Nele Mentens.
SACHa: Self-Attestation of Configurable Hardware.
In Proceedings of the Design Automation and Test in Europe Conference
(DATE 2019)
, pp. 746-751, Firenze Fiera, Florence, Italy, March 25-29, 2019.
DOI:10.23919/DATE.2019.8714775.
(GGS: 2/A; CORE: B; LiveSHINE: A++; MA: A; Acceptance rate: 24.00%)

[C143] Giovanna Carofiglio, Alberto Compagno, Mauro Conti, Fabio De Gaspari, Luca Muscariello.
IaaS-Aided Access Control for Information-Centric IoT.
In Proceedings of the 43rd IEEE Conference on Local Computer Networks
(IEEE LCN 2018)
, 208-216, Chicago, USA, October 1-4 2018.
DOI:10.1109/LCN.2018.8638228.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 30.00%)

[C142] Alberto Compagno, Mauro Conti, Stefano Munari, Riccardo Lazzeretti.
GATE and FENCE: Geo-Blocking Protocols for Named Data Networking.
In Proceedings of the 43rd IEEE Conference on Local Computer Networks
(IEEE LCN 2018)
, 580-588, Chicago, USA, October 1-4 2018.
DOI:10.1109/LCN.2018.8638053.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 30.00%)

[C139] Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter.
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In Proceedings of the 23rd European Symposium on Research in Computer Security
(ESORICS 2018)
, pp. 595-617, Barcelona, Spain, September 3-7, 2018.
DOI:10.1007/978-3-319-99073-6_29, ISBN: 978-3-319-99073-6.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 20.00%)

[C138] Kiran Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu.
SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
In Proceedings of the 23rd European Symposium on Research in Computer Security
(ESORICS 2018)
, pp. 263-280, Barcelona, Spain, September 3-7, 2018.
DoI: 10.1007/978-3-319-99073-6_13, ISBN: 978-3-319-99073-6.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 20.00%)

[C136] Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi.
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In Proceedings of the 27th USENIX Security Symposium
(USENIX Security 2018)
, pp. 1213-1227, Baltimore, USA, August 15-17, 2018.
DOI: 10.5555/3277203.3277294, ISBN: 978-1-931971-46-1.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 19.08%)

[C131] Mauro Conti, Ralph Droms, Muhammad Hassan, Sebastiano Valle.
QoE Degradation Attack in Dynamic Adaptive Streaming over ICN.
In Proceedings of the 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2018)
, in press, Chania, Greece, June 12-15, 2018.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B)

[C128] Andrea Biondo, Mauro Conti, Daniele Lain.
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets.
In Proceedings of the Network and Distributed System Security Symposium
(NDSS 2018)
, in press, San Diego, CA, February 18-21, 2018.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A+)

[C127] Wafa Ben Jaballah, Mauro Conti, Claudio E. Palazzi.
The Position Cheating Attack on Inter-Vehicular Online Gaming.
In Proceedings of the 15th IEEE Consumer Communications and Networking Conference
(IEEE CCNC 2018)
, in press, Las Vegas, USA, January 12-15, 2018.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C125] Zahra Pooranian, Mohammad Shojafar, Paola G. Vinueza Naranjo, Luca Chiaraviglio, Mauro Conti.
A Novel Distributed Fog-based Networked Architecture to Preserve Energy of Fog Data Center.
In Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems
(IEEE MASS 2017)
, pages 604-609, Orlando, Florida, USA, October 22-25, 2017.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B)

[C118] Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor.
Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2017)
, pages 278-296, Oslo, Norway. September 11-13, 2017.
DOI: 10.1007/978-3-319-66402-6_17, ISBN: 978-3-319-66401-9.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 15.88%)

[C113] Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti.
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In Proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses
(RAID 2017)
, pages 48-69, Atlanta, Georgia, USA, September 18-20, 2017.
DOI: 10.1007/978-3-319-66332-6_3, ISBN: 978-3-319-66332-6.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A+)

[C108] Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti and Radha Poovendran.
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices.
In Proceedings of the 15th International Conference on Applied Cryptography and Network Security
(ACNS 2017)
, pages 83-102, Kanazawa, Japan, June 10-12, 2017.
DOI: 10.1007/978-3-319-61204-1_5, ISBN: 978-3-319-61203-4.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B)

[C105] Giulio Lovisotto, Mauro Conti, Ivan Martinovic and Gene Tsudik.
FADEWICH: Fast Deauthentication over the Wireless Channel.
In Proceedings of the 37th IEEE International Conference on Distributed Computing
(ICDCS 2017)
, pages 2294-2301, Atlanta, Georgia, USA, June 5-8, 2017.
DOI: 10.1109/ICDCS.2017.296, ISBN: 978-1-5386-1792-2, ISSN: 1063-6927.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 16.94%)

[C101] Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik.
Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP.
In Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2017)
, pages 703-715, Abu Dhabi, UAE, April 2 - 6, 2017.
DOI: 10.1145/3052973.3053005, ISBN: 978-1-4503-4944-4.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 18.66%)

[C95] Jyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, M.S. Gaur, Mauro Conti, Muttukrishnan Rajarajan.
sPECTRA: A Precise FramEwork for Analyzing CrypTographic VulneRabilities in Android Apps.
In Proceedings of the 14th Annual IEEE Consumer Communications & Networking Conference
(IEEE CCNC 2017)
, pages 854-860, Las Vegas, Nevada, USA, January 8 - 11, 2017.
DOI: 10.1109/CCNC.2017.7983245, ISBN: 978-1-5090-6196-9, ISSN: 2331-9860.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C91] Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter.
SANA: Secure and Scalable Aggregate Network Attestation.
In Proceedings of the 23nd ACM Conference on Computer and Communications Security
(ACM CCS 2016)
, pages 731-742, Vienna, Austria, October 24 - 28, 2016.
DOI: 10.1145/2976749.2978335, ISBN: 978-1-4503-4139-4, ISSN: 1543-7221.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 16.36%)

[C88] Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash.
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
In Proceedings of the 25th USENIX Security Symposium
(USENIX Security 2016)
, pages 531-548, Austin, TX, USA, August 10-12, 2016.
ISBN: 978-1-931971-32-4.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 15.55%)

[C84] Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi.
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In Proceedings of the 16th Privacy Enhancing Technologies Symposium
(PETS 2016)
, Darmstadt, Germany, July 19-22, 2016.
DOI: 10.1515/popets-2016-0050.
(CORE: B; MA: A-)

[C83] Ankit Gangwal, Megha Gupta, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
ELBA: Efficient Layer Based Routing Algorithm in SDN.
In Proceedings of the 25th IEEE International Conference on Computer Communication and Networks
(IEEE ICCCN 2016)
, pages 1-7, Waikoloa, Hawaii, USA, August 1-4, 2016.
DOI: 10.1109/ICCCN.2016.7568515, ISBN: 978-1-5090-2279-3.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-)

[C81] Mauro Conti, Claudio Guarisco, Riccardo Spolaor.
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery.
In Proceedings of the 14th International Conference on Applied Cryptography and Network Security
(ACNS 2016)
, pages 611-628, London (Guildford), UK, June 19-22, 2016.
DOI: 10.1007/978-3-319-39555-5_33, ISBN: 978-331939554-8, ISSN: 0302-9743.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B; Acceptance rate: 19.12%)

[C76] Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic
AppScanner: Automatic Fingerprinting of Smartphone Apps From Encrypted Network Traffic.
In Proceedings of the 1st IEEE European Symposium on Security and Privacy
(IEEE Euro S&P 2016)
, pages 439-454, Saarbrücken, Germany, March 21-24, 2016.
DOI: 10.1109/EuroSP.2016.40, ISBN: 978-150901751-5.
(MA: C; Acceptance rate: 17.26%)

[C74] Lovely Sinha, Shweta Bhandari, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
FlowMine: Android App Analysis via Data Flow.
In Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference
(IEEE CCNC 2016)
, pages 435-441, Las Vegas, Nevada, USA, January 9 - 12, 2016.
DOI: 10.1109/CCNC.2016.7444819, ISBN: 978-146739292-1.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C67] Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Marco Negro, Mohaned Qunaibit, Ahmad-Reza Sadeghi.
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In Proceedings of the 22nd ACM Conference on Computer and Communications Security
(ACM CCS 2015)
, pages 952-963, Denver, Colorado, USA, October 12 - 16, 2015.
DOI: 10.1145/2810103.2813671, ISBN: 978-145033832-5, ISSN: 1543-7221.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 19.81%)

[C62] Julien Mineraud, Federico Lancerin, Sasitharan Balasubramaniam, Mauro Conti, Sasu Tarkoma.
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data.
In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2015)
, pages 523-530, Helsinki, Finland, 20 - 22 August, 2015.
DOI: 10.1109/Trustcom.2015.415, ISBN: 978-146737951-9.
(CORE: A; Acceptance rate: 28.00%)

[C60] Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik.
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking.
In Proceedings of the 24th IEEE International Conference on Computer Communications and Networks
(IEEE ICCCN 2015)
, Las Vegas, Nevada, USA, August 3 - 6, 2015.
DOI: 10.1109/ICCCN.2015.7288477, ISBN: 978-147999964-4, ISSN: 1095-2055.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 25.00%)

[C58] Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi V. Mancini, Gene Tsudik.
Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking.
In Proceedings of the 13th International Conference on Applied Cryptography and Network Security
(ACNS 2015)
, pages 243-262, New York, NY, USA, June 2-5, 2015.
DOI: 10.1007/978-3-319-28166-7_12, ISBN: 978-331928165-0, ISSN: 0302-9743.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B; Acceptance rate: 21.02%; Best Student Paper Award)

[C57] Ding Ding, Mauro Conti, Renato Figueiredo.
Impact of Country-scale Internet Disconnection on Structured and Social P2P Overlays.
In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2015)
, Boston; MA, USA, June 14-17, 2015.
DOI: 10.1109/WoWMoM.2015.7158168, ISBN: 978-147998461-9.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B; Acceptance rate: 21.00%)

[C56] Pericle Perazzo, Kanishka Ariyapala, Mauro Conti, Gianluca Dini.
The Verifier Bee: a Path Planner for Drone-Based Secure Location Verification.
In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2015)
, Boston; MA, USA, June 14-17, 2015.
DOI: 10.1109/WoWMoM.2015.7158150, ISBN: 978-147998461-9.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B; Acceptance rate: 21.00%)

[C54] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran.
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2015)
, pages 183-201, Singapore, April 14-17, 2015.
DOI: 10.1145/2714576.2714612, ISBN: 978-145033245-3.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 17.84%)

[C51] Anil Saini, Manoj Gaur, Vijay Laxmi, Tushar Singhal and Mauro Conti.
Privacy Leakage Attacks in Browsers by Colluding Extensions.
In Proceedings of the 10th International Conference on Information Systems Security
(ICISS 2014)
, pages 257-276, Hyderabad, India, December 16-20, 2014.
DOI: 10.1007/978-3-319-13841-1_15, ISBN: 978-331913840-4, ISSN: 0302-9743.
(GGS: 3/B-; CORE: B; LiveSHINE: B; MA: C; Acceptance rate: 25/129 - 19.37%)

[C46] Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti.
Evaluation of Android Anti Malware Techniques against Dalvik Bytecode Obfuscation.
In Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2014)
, pages 414-421, Beijing, China, September 24-26, 2014.
DOI: 10.1109/TrustCom.2014.54, ISBN: 978-147996513-7.
(CORE: A)

[C45] Parvez Faruki, Vijay Ganmoor, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
Platform Neutral Sandbox for Analyzing Android Malware and Resource Hoggers.
In Proceedings of the 10th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2014)
, pages 556-560, Beijing, China, September 24-26, 2014.
DOI: 10.1007/978-3-319-23829-6_43, ISBN:978-3-319-23829-6, ISSN: 1867-8211.
(CORE: B; LiveSHINE: A; MA: C)

[C43] Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter.
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2014)
, pages 76-93, Wroclaw, Poland, September 7-11, 2014.
DOI: 10.1007/978-3-319-11203-9_5, ISBN: 978-3-319-11202-2.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 58/234 - 24.79%)

[C42] Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez.
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2014)
, pages 183-201, Wroclaw, Poland, September 7-11, 2014.
DOI: 10.1007/978-3-319-11203-9_11, ISBN: 978-3-319-11202-2.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 58/234 - 24.79%)

[C39] Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik.
Covert Ephemeral Communication in Named Data Networking.
In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2014)
, pages 15-26, Kyoto, Japan, June 4-6, 2014.
DOI: 10.1145/2590296.2590306, ISBN: 978-1-4503-2800-5.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 52/260 - 20.00%)

[C34] Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik.
Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking.
In Proceedings of the 38th IEEE Conference on Local Computer Networks
(IEEE LCN 2013)
, pages 630-638, Sydney, Australia, October 21-24, 2013.
DOI: 10.1109/LCN.2013.6761300, ISBN: 978-147990537-9.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 53/201 - 26.40%)

[C31] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Secure Verification of Location Claims on a Vehicular Safety Application.
In Proceedings of the 22nd International Conference on Computer Communications and Networks
(IEEE ICCCN 2013)
, pages 1-7, Nassau, Bahamas, June 30-August 2, 2013.
DOI: 10.1109/ICCCN.2013.6614193, ISBN: 978-146735774-6.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 86/300 - 28.66%)

[C30] Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik.
Cache Privacy in Name-Data Networking.
In Proceedings of the 33rd International Conference on Distributed Computing Systems
(IEEE ICDCS 2013)
, pages 41-51, Philadephia, PA, USA, July 8-11, 2013.
DOI: 10.1109/ICDCS.2013.12, ISBN: 978-0-7695-5000-8.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 61/464 - 13.14%)

[C27] Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich.
DEMO: Demonstrating the Effectiveness of MOSESdroid for Separation of Execution Modes.
In Proceedings of the 19th ACM Conference on Computer and Communications Security
(ACM SIGSAC CCS 2012)
, pages 998-1000, Raleigh, NC, USA, October 16-18, 2012.
DOI: 10.1145/2382196.2382304, ISBN: 978-145031650-7.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++)

[C22] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Wireless Sensor Replica Detection in Mobile Environments.
In Proceedings of the 13th International Conference on Distributed Computing and Networking
(ICDCN 2012)
, pages 249-264, Hong Kong, January 3-6, 2012.
DOI: 10.1007/978-3-642-25959-3_19, ISBN: 978-364225958-6.
(GGS: 3/B-; CORE: B; LiveSHINE: B-; MA: C)

[C21] Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Events Privacy in WSNs: a New Model and its Application.
In Proceedings of the 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2011)
, pages 1-9, Lucca, Italy, June 20-24, 2011.
DOI: 10.1109/WoWMoM.2011.5986491, ISBN: 978-145770351-5.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B; Acceptance rate: 32/173 - 18.49%)

[C20] Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo.
Mind How You Answer Me! (Transparently Authenticating the User of a Smartphone when Answering or Placing a Call).
In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2011)
, pages 249-259, Hong Kong, March 22-24, 2011.
DOI: 10.1145/1966913.1966945, ISBN: 978-145030564-8.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 35/217 - 16.12%)

[C18] Mauro Conti, Bruno Crispo, Roberto Di Pietro, Luciana Marconi.
Time Warp: How Time Affects Privacy in LBSs. Threats and countermeasures.
In Proceedings of the 12th International Conference on Information and Communications Security
(ICICS 2010 - Springer LNCS)
, pages 325-339, Barcelona, Spain, December 15-17, 2010.
DOI: 10.1007/978-3-642-17650-0_23, ISBN: 978-3-642-17649-4.
(GGS: 3/B; CORE: B; LiveSHINE: B; MA: B; Acceptance rate: 31/134 - 23.13%)

[C17] Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo.
CRePE: Context-Related Policy Enforcement for Android.
In Proceedings of the 13th Information Security Conference
(ISC 2010 - Springer LNCS)
, pages 331-354, Boca Raton, FL, USA, October 25 - 28, 2010.
DOI: 10.1007/978-3-642-18178-8_29, ISBN: 978-3-642-18177-1.
(GGS: 3/B; CORE: B; LiveSHINE: B; Acceptance rate: 22/134 - 16.41%)

[C15] Luciana Marconi, Mauro Conti, Roberto Di Pietro.
CED2: Communication Efficient Disjointness Decision.
In Proceedings of the 6th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2010 - Springer LNCS)
, pages 290-306, Singapore, September 7 - 9, 2010.
DOI: 10.1007/978-3-642-16161-2_17, ISBN: 978-3-642-16160-5.
(CORE: B; LiveSHINE: A; MA: C; Acceptance rate: 28/112 - 25.00%)

[C9] Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini.
Sec-TMP: a Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
In Proceedings of the 5th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2009 - Springer LNICST)
, pages 265-284, Athens, Greece, September 14-18, 2009.
DOI: 10.1007/978-3-642-05284-2_15, ISBN: 978-3-642-05283-5.
(CORE: B; LiveSHINE: A; MA: C; Acceptance rate: 20/76 - 26.31%)

[C7] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Securely Computing an Approximate Median in Wireless Sensor Networks.
In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks
(ACM SecureComm 2008)
, pages 1-10, Istanbul, Turkey, September 22-25, 2008.
DOI: 10.1145/1460877.1460885, ISBN: 978-160558241-2.
(CORE: B; LiveSHINE: A; MA: C; Acceptance rate: 26/123 - 21.13%)

[C4] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks.
In Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing
(ACM MobiHoc 2007)
, pages 80-89, Montréal, Quebec, Canada, September 9-14, 2007.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A++; Acceptance rate: 27/146 - 18.49%; Sapienza CS Dpt 2007 Best PhD Student Paper Award)
DOI: 10.1145/1288107.1288119, ISBN: 978-159593684-4.

[C2] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
In Proceedings of the 2006 IEEE International Conference on Systems, Man, and Cybernetics
(IEEE SMC '06)
, pages 1468-1473, Taipei, Taiwan, October 8-11, 2006.
DOI: 10.1109/ICSMC.2006.384924, ISBN: 978-1-4244-0099-7.
(GGS: 2/A-; CORE: B; LiveSHINE: B; MA: A++)


Patents

[P10] Mauro Conti, Alessandro Brighente.
System and methods for overvoltage protection of a load in a wireless power receiver.
IT Patent n. 102022000009941, 2022.
WIPO Patent. n. WO2023/218422 A1, 2023.
[More Info: KnowledgeShare]

[P9] Mauro Conti, Alessandro Visintin.
Device for enabling a confidential and secure transmission of the video signal sent from a computer to its screen.
IT Patent n. 102021000007808, 2021.

[P8] Mauro Conti, Alessandro Visintin.
Device for real-time modification of the video signal coming out from a computer to enhance user experience.
IT Patent n. 102021000001022, 2021.

[P7] Mauro Conti, Denis Donadel, Federico Turrin
A fingerprinting-based countermeasure against electric vehicle supply equipment relay attacks.
IT Patent n. 102020000029117, 2020.
[More Info: KnowledgeShare]

[P6] Hsiao Ying LIN, Mauro Conti, Amrita Ghosal, Subir Halder.
Policy-based automotive secure Over-the-air update.
CN Patent n. CN2019/117399, 2020.
[More Info: Google Patents]

[P5] Mauro Conti, Stefano Cecconello, Piero Romare, Mattia Carlucci.
A method for user identification through analysis of variations of external auditory canal.
IT Patent n. 102020000001192, 2020.
WIPO Patent. n. WO2021148932, 2021.
[More Info: IT; Patentscope; Google Patents]

[P4] Mauro Conti, Eleonora Losiouk, Pierre Sedon.
Method and software solution to control the Bluetooth channel.
IT Patent n. 102019000020775, 2019.
WIPO Patent n. WO2021094890, 2021.
[More Info: IT; EN; Patentscope; Google Patents]

[P3] Mauro Conti, Rabbani Md Masoom, Nele Mentens, Jo Vliegen.
Configurable hardware device.
GB Patent n. GB1806997, 2018.
EU Patent n. EP3788537, 2021.
US Patent n. US11640483 B2, 2023.
[More Info: IT; EN; Google Patents]

[P2] Mauro Conti, Claudio Guarisco, Riccardo Spolaor.
A method for recognizing whether a user terminal is human or robot.
IT Patent n. MI2014A002112, 2014.
EU Patent n. EP3230920 B1, 2020.
[More Info:
IT; EN; Google Patents]

[P1] Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo.
User authentication method for access to a mobile user terminal and corresponding mobile user terminal.
IT Patent n. TO2010A001069, 2010.
USA Patent n. US 20120164978 A1, 2014.
[More Info: Google Patents]


Hacking Conferences (w/o published proceedings)

[H4] Riccardo Spolaor, Riccardo Bonafede, Veelasha Moonsamy, Mauro Conti.
No Free Charge Theorem 2.0: How to steal private information from a mobile device using a powerbank.
In BlackHat Europe 2018, Excel London, United Kingdom, December 3-6, 2018.

[H3] Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi.
POSTER: The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In CSAW Europe 2018 Applied Research Competition, Valence, France, November 8-10, 2018.

[H2] Andrea Biondo, Mauro Conti, Daniele Lain.
Back To The Epilogue: How to Evade Windows' Control Flow Guard with Less than 16 Bytes.
In BlackHat Asia Briefings '18, Marina Bay Sands, Singapore, March 20-23, 2018.

[H1] Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik.
Skype & Type: Keystroke Leakage over VoIP.
In BlackHat USA Briefings '17, Mandalay Bay, Las Vegas, USA July 22-27, 2017.


Top

All Publications (Click here for selected publications)

(see also: Google Scholar - DBLP - Scopus - WoS - AMiner - MS Academic - academia.edu - ResearchGate - Panda Search - Padua Research)
(Journal ranked according to JCR and Italian-ANVUR-VQR-2012; conference ranked according to CORE/LiveSHINE/MicrosoftAcademic/Italian-GII-GRIN-SCIE)


Quick links:     Journal papers    Books    Book chapters    Reference Works    Conference & Workshop papers    Patents    Theses    Hacking Conferences


Journal papers

[J261] Rahul Saha, Gulshan Kumar, G. Geetha, Mauro Conti, William J Buchanan.
Application of Randomness for Security and Privacy in Multi-Party Computation.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2024.
(JCR IF 2023: 7.329; IT-ANVUR Class: 1)

[J260] Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti, Tai Hoon Kim.
PREVIR: Fortifying Vehicular Networks against Denial of Service Attacks.
In (IEEE) Access, in press, 2024.
(JCR IF 2022: 3.367)

[J259] Mauro Conti, Ankit Gangwal, Aashish Paliwal.
De-authentication using Ambient Light Sensor.
In (IEEE) Access, Vol. 12, pp. 28225-28324, 2024.
DOI: 10.1109/ACCESS.2024.3367607; ISSN: 2169-3536.
(JCR IF 2022: 3.367)

[J258] Rahul Saha, Tannishtha Devgun, Mauro Conti, Gulshan Kumar, Reji Thomas.
GREPHRO: Nature-inspired Optimization Duo for Internet-of-Things.
In (Elsevier) Internet of Things, in press, 2024.
(JCR IF 2022: 5.900)

[J257] Alessandro Brighente, Mauro Conti, Andrea De Salve.
EDIT: a Data Inspection Tool for Smart Contracts Temporal Behavior Modeling and Prediction.
In (Elsevier) Future Generation Computer Systems, in press, 2024.
(JCR IF 2023: 7.307; IT-ANVUR Class: 1)

[J256] Jin Han, Yun-feng Ren, Alessandro Brighente, Mauro Conti.
RANGO: A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems.
In (ACM) Transactions on Intelligent Systems and Technology, in press, 2024.
(JCR IF 2023: 10.489)

[J255] Mauro Conti, Yoosef Habibi, Ehsan Nowroozi.
SPRITZ-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents.
In (Springer) Multimedia Tools and Applications, in press, 2024.
DOI: 10.1007/s11042-024-18111-4.
(JCR IF 2023: 2.577; IT-ANVUR Class: 2)

[J254] Mauro Conti, Chhagan Lal, Vaishali Shirsath.
SPARQ: SYN Protection using Acyclic Redundancy Check and Quartile Range on P4 Switches.
In (Elsevier) Computer Communications, in press, 2023.
(JCR IF 2023: 5.047; IT-ANVUR Class: 2)

[J253] Ying Yuan, Giovanni Apruzzese, Mauro Conti.
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning.
In (ACM) Digital Threats: Research and Practice, in press, 2023.
DOI: 10.1145/3638253.
(JCR IF 2023: 2.42)

[J252] Rekha Goyat, Gulshan Kumar, Tannishtha Devgun, Rahul Saha, Mauro Conti, Joel Rodrigues.
PRIBADI: A Decentralized Privacy-preserving Authentication in Wireless Multimedia Sensor Networks for Smart Cities.
In (Springer) Cluster Computing, in press, 2023.
(JCR IF 2023: 2.303; IT-ANVUR Class: 2)

[J251] Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Nicoḷ Dal Fabbro, Riccardo Lazzeretti.
Anonymous Federated Learning via Named-Data Networking.
In (Elsevier) Future Generation Computer Systems, in press, 2023.
DOI: 10.1016/j.future.2023.11.009
(JCR IF 2023: 7.307, IT-ANVUR Class: 1)

[J250] Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, Selcuk Uluagac.
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices.
In (IEEE) Security & Privacy Special Issue: Security and Privacy for the Metaverse, in press, 2023.
(JCR IF 2023: 3.105)

[J249] Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, Selcuk Uluagac.
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization.
In (IEEE) Transactions on Services Computing, in press, 2023.
(JCR IF 2023: 11.019, IT-ANVUR Class: 1)

[J248] Yanan Zhao, Haiyang Yu, Yuhao Liang, Alessandro Brighente, Mauro Conti, Jianfei Sun, Yilong Ren.
Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon.
In (IEEE) Transactions on Intelligent Transportation Systems, in press, 2023.
DOI: 10.1109/TITS.2023.3329488.
(JCR IF 2023: 9.551, IT-ANVUR Class: 2)

[J247] Jin Han, Cao Ran, Alessandro Brighente, Mauro Conti.
Light-YOLOv5: A Lightweight Drone Detector for Resource Constrained Cameras.
In (IEEE) Internet of Things Journal, Vol. 11(6), pp. 11046-11057, 2024.
DOI: 10.1109/JIOT.2023.3329221, ISSN: 2327-4662.
(JCR IF 2023: 10.238)

[J246] Meng Li, Yanzhe Shen, Guixin Ye, Jialing He, Xin Zheng, Zijian Zhang, Liehuang Zhu, Mauro Conti.
Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics.
In (IEEE) Transactions on Knowledge and Data Engineering, in press, 2023.
(JCR IF 2023: 8.9, IT-ANVUR Class: 1)

[J245] Alessandro Brighente, Mauro Conti, Gabriele Di Renzone, Giacomo Peruzzi, Alessandro Pozzebon.
Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective.
In (IEEE) Internet of Things Journal, vol. 11, no. 5, pp. 7309-7324, 2024.
DOI: 10.1109/JIOT.2023.3322532.
(JCR IF 2023: 11.1)

[J244] Mohamed El-Zawawy, Chhagan Lal, Mauro Conti.
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles.
In (IEEE) Transactions on Intelligent Transportation Systems, Volume 25 (2), pp. 2017-2033, 2023.
DOI: 10.1109/TITS.2023.3316775, ISSN: 1558-0016.
(JCR IF 2023: 9.551; IT-ANVUR Class: 2)

[J243] Meng Li, Jianbo Gao, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti.
Time-Restricted, Verifiable, and Efficient Query Processing over Encrypted Data on Cloud.
In (IEEE)Transactions on Services Computing, in press, 2023.
(JCR IF 2022: 11.019; IT-ANVUR Class: 1)

[J242] Mohamed A. El-Zawawy, Pallavi Kaliyar, Mauro Conti, Sokratis Katsikas.
Honey-List Based Authentication Protocol for Industrial IoT Swarms.
In (Elsevier) Computer Communications, in press, 2023.
(JCR IF 2022: 6; IT-ANVUR Class: 2)

[J241] Yassine Mekdad, Ahmet Aris, Abbas Acar, Mauro Conti, Riccardo Lazzeretti, Abdeslam El Fergougui, Selcuk Uluagac.
A Comprehensive Security and Performance Assessment of UAV Authentication Schemes.
In Security and Privacy, e338, 2023.
DOI: 10.1002/spy2.338.

[J240] Gulshan Kumar, Rahul Saha, Mauro Conti, Tannishtha Devgun, Rekha Goyat, Joel J. P. C. Rodrigues.
COUNT: Blockchain Framework for Resource Accountability in E-healthcare.
In (Elsevier) Computer Communications, in press, 2023.
(JCR IF 2022: 6; IT-ANVUR Class: 2)

[J239] Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk.
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey.
In (IEEE) Communications Surveys and Tutorials, in press, 2023.
(JCR IF 2022: 33.84; IT-ANVUR Class: 2)

[J238] Mauro Conti, Gulshan Kumar, Rahul Saha.
RAPCOL: A Range-free Power Efficient Cooperative Localization with Heterogeneous devices for Industrial Internet-of-Things.
In (Springer) Cluster Computing, in press, 2023.
DOI: 10.1007/s10586-023-04106-7.
(JCR IF 2022: 2.303; IT-ANVUR Class: 2)

[J237] Jennifer Bellizzi, Eleonora Losiouk, Mauro Conti, Christian Colombo, Mark Vella.
VEDRANDO: A novel way to reveal stealthy attack steps on Android through Memory Forensics.
In (MDPI) Journal of Cybersecurity and Privacy, in press, 2023.

[J236] Tayyab Khan, Karan Singh, Mohd Shariq, Khaleel Ahmad, K.S. Savita, Ali Ahmadian, Soheil Salahshour, Mauro Conti.
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach.
In (Elsevier) Computer Communications, in press, 2023.
DOI: 10.1016/j.comcom.2023.06.014.
(JCR IF 2022: 5.047; IT-ANVUR Class: 2)

[J235]Mauro Conti, Luca Pajola, Pier Paolo Tricomi.
Turning captchas against humanity: Captcha-based attacks in online social media.
In (Elsevier) Online Social Networks and Media, in press, 2023.
DOI: 10.1016/j.osnem.2023.100252.
(JCR IF 2022: 7.61)

[J234] PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Mamoun Alazab, Mauro Conti, Xiaochun Cheng.
PIGNUS: A Deep Learning Model for IDS in Industrial Internet-of-Things.
In (Elsevier) Computers & Security, in press, 2023.
(JCR IF 2021: 5.105; IT-ANVUR Class: 2)

[J233] Miao He, Jianbing Ni, Meng Li, Alessandro Brighente, Mauro Conti.
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach.
In (IEEE) Transactions on Wireless Communications, vol. 23, no. 1, pp. 276-289, 2024.
DOI: 10.1109/TWC.2023.3277448
(JCR IF 2023: 6.779; IT-ANVUR Class: 1)

[J232] Matteo Cardaioli, Mauro Conti, Gabriele Orazi, Pier Paolo Tricomi, Gene Tsudik.
BLUFADER: Blurred Face Detection & Recognition for Privacy-Friendly Continuous Authentication.
In (Elsevier) Pervasive and Mobile Computing, in press, 2023.
(JCR IF 2023: 3.848; IT-ANVUR Class: 2)

[J231] Zhihao Wang, Ding Ding, Min Ren, Mauro Conti.
TANGO: A Temporal Spatial Dynamic Graph Model for Event Prediction.
In (Elsevier) Neurocomputing, in press, 2023.
(JCR IF 2021: 5.779; IT-ANVUR Class: 2)

[J230] Anand Kumar, Karan Singh, Mohd Shariq, Chhagan Lal, Mauro Conti, Ruhul Amin, Shehzad Ashraf Chaudhry.
An Efficient and Reliable ultralightweight RFID Authentication Scheme for Healthcare Systems.
In (Elsevier) Computer Communications, in press, 2023.
(JCR IF 2022: 5.047; IT-ANVUR Class: 2)

[J229] Ehsan Nowroozi, Mohammadreza Mohammadi, Erkan Savas, Mauro Conti.
SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks.
In (IEEE) Transactions on Network and Service Management, vol. 20, no. 2, pp. 2096-2105, 2023.
DOI: 10.1109/TNSM.2023.3267831; ISSN: 1932-4537.
(JCR IF 2020: 3.878; IT-ANVUR Class: 2)

[J228] Hossein Ahmadvand, Chhagan Lal, Hadi Hemmati, Mehdi Sookhak, Mauro Conti.
Privacy-Preserving and Security in SDN-based IoT: A Survey.
In (IEEE) Access, in press, 2023.
DOI: 10.1109/ACCESS.2023.3267764; ISSN: 2169-3536.
(JCR IF 2022: 3.367)

[J227] Rekha Goyat, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Rahul Saha, Reji Thomas.
BENIGREEN: Blockchain-based Energy-Efficient Privacy-Preserving Scheme for Green IoTs.
In (IEEE) Internet of Things Journal, in press, 2023.
DOI: 10.1109/JIOT.2023.3268325; ISSN: 2327-4662.
(JCR IF 2020: 9.471)

[J226]Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, Selcuk Uluagac.
A Survey on Security and Privacy Issues of UAVs.
In (Elsevier) Computer Networks , in press, 2023.
(JCR IF 2021: 4.235; IT-ANVUR Class: 1)

[J225] Dongkai Chen, Mauro Conti, Luca Pajola, V.S. Subrahmanian.
A Novel Review Helpfulness Measure based on the User-Review-Item Paradigm.
In (ACM) Transactions on the Web, Vol. 17(4), pp. 1-31, 2023.
DOI: 10.1145/3585280.
(JCR IF 2021: 4.235; IT-ANVUR Class: 1)

[J224] Mauro Conti, Luciano Gamberini, Federica Nenna, Luca Pajola, Pier Paolo Tricomi.
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality.
In (IEEE) Access, vol. 11, pp. 9859-9875, 2023.
DOI:10.1109/ACCESS.2023.3240071, ISSN: 2169-3536.
(JCR IF 2022: 3.367)

[J223]Anas Alsoliman, Giulio Rigoni, Marco Levorato, Cristina Pinotti, Mauro Conti.
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics.
In (ACM) Transactions on Cyber-Physical Systems, 7, 2, Article 12, 2022.
DOI:10.1145/3579999
(JCR IF 2020: 3.08)

[J222] Sanaz Soltani, Mohammad Shojafar, Alessandro Brighente, Mauro Conti, Rahim Tafazolli.
Poisoning Bearer Context Migration in O-RAN 5G Network.
In (IEEE) Wireless Communications Letters, in press, 2022.
DOI: 10.1109/LWC.2022.3227676;
(JCR IF 2020: 11.98)

[J221] Ehsan Nowroozi, Abhishek, Mohammad Reza Mohammadi, Mauro Conti.
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework.
In (IEEE) Transactions on Network and Service Management, vol. 20, no. 2, pp. 1332-1344, 2022.
DOI: 10.1109/TNSM.2022.3225217; ISSN: 1932-4537.
(JCR IF 2020: 3.878; IT-ANVUR Class: 2)

[J220] Meng Li, Jianbo Gao, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti, Mamoun Alazab.
Mnemosyne: Privacy-Preserving Ride Matching with Collusion-Resistant Driver Exclusion.
In (IEEE) Transactions on Vehicular Technology, vol. 72, no. 4, pp. 5139-5151, 2022.
DOI: 10.1109/TVT.2022.3225175.
(JCR IF 2022: 6.239; IT-ANVUR Class: 2)

[J219] Saiqin Xu, Alessandro Brighente, Baixiao Chen, Mauro Conti, Xiancheng Cheng.
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets with Sparse Prior for 1D Line-of-Sight Scenarios.
In (IEEE) Transactions on Vehicular Technology, vol. 72, no. 4, pp. 4683-4696, 2022.
DOI: 10.1109/TVT.2022.3224586; ISSN: 1939-9359.
(JCR IF 2022: 6.239; IT-ANVUR Class: 2)

[J218] Reza Mohammadi, Chhagan Lal, Mauro Conti.
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN.
In International Journal of Information Security , Volume 101, 2022.
DOI: 10.1007/s10207-022-00641-3, ISSN 0045-7906.
(JCR IF 2021: 2.427; IT-ANVUR Class: 2)

[J217] Pls Jayalaxmi, Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim.
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey.
In (IEEE) Access, in press, 2022.
DOI: 10.1109/ACCESS.2022.3220622.
(JCR IF 2022: 3.367)

[J216] Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Kim-Kwang Raymond Choo, Mauro Conti.
CovertSYS: A Systematic Covert Communication Approach for Providing Perfectly Secure End-to-End Conversation via Social Networks.
In (Elsevier) Journal of Information Security and Applications, in press, 2022.
(JCR IF 2021: 4.96)

[J215] Mohamed A. El-Zawawy, Alessandro Brighente, Mauro Conti.
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain.
In (IEEE) Transactions on Network and Service Management, in press, 2022.
DOI: 10.1109/TNSM.2022.3217320.
(JCR IF 2021: 4.195; IT-ANVUR Class: 2)

[J214] Mauro Conti, Shubham Khandhar, Vinod P.
A few-shot malware classification approach for unknown family recognition using malware feature visualization.
In (Elsevier) Computers & Security, Vol. 122, 102887, 2022.
DOI: 10.1016/j.cose.2022.10288; ISSN: 0167-4048.
(JCR IF 2021: 5.105; IT-ANVUR Class: 2)

[J213] Amrita Ghosal, Subir Halder, Mauro Conti.
Secure Over-The-Air Software Update for Connected Vehicles.
In (Elsevier) Computer Networks, in press, 2022.
(JCR IF 2020: 4.474; IT-ANVUR Class: 1)

[J212] Alessandro Brighente, Mauro Conti, Denis Donadel, Federico Turrin.
EVScout2.0: Electric Vehicle Profiling Through Charging Profile.
In (ACM) Transactions on Cyber-Physical Systems, in press, 2022.
DOI: 10.1145/3565268.
(JCR IF 2021: 3.08)

[J211] Ankur Bang, Udai Pratap Rao, Andrea Visconti, Alessandro Brighente, Mauro Conti.
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions.
In (Elsevier) Computers & Security, in press, 2022.
DOI: 10.1016/j.cose.2022.102914; ISSN: 0167-4048.
(JCR IF 2021: 5.105; IT-ANVUR Class: 2)

[J210] Mohd Shariq, Karan Singh, Chhagan Lal, Mauro Conti, Tayyab Khan.
ESRAS: An Efficient and Secure Ultra-lightweight RFID Authentication Scheme for Low-cost Tags.
In (Elsevier) Computer Networks, in press, 2022.
(JCR IF 2020: 4.474; IT-ANVUR Class: 1)

[J209] Meng Li, Yifei Chen, Liehaung Zhu, Zijian Zhang, Jianbing Ni, Chhagan Lal, Mauro Conti.
Astraea: Anonymous and Secure Auditing based on Private Smart Contracts for Donation Systems.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2022.
(JCR IF 2021: 7.329; IT-ANVUR Class: 1)

[J208] Alessio Vitella, Mauro Conti, Vinod P.
Obfuscation Detection in Android Applications using Deep Learning.
In (Elsevier) Journal of Information Security and Applications, Volume 70, 2022.
DOI: 10.1016/j.jisa.2022.103311, ISSN: 22142134.
(JCR IF 2021: 4.96)

[J207] Subir Halder, Amrita Ghosal, Mauro Conti.
Dynamic Super Round Based Distributed Task Scheduling for UAV Networks.
In (IEEE) Transactions on Wireless Communications, in press, 2022.
DOI: 10.1109/TWC.2022.3200366.
(JCR IF 2021: 7.016; IT-ANVUR Class: 1)

[J206] Meng Li, Yifei Chen, Chhagan Lal, Mauro Conti, Fabio Martinelli, Mamoun Alazab.
Nereus: Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2022.
DOI:10.1109/TDSC.2022.3192367.
(JCR IF 2021: 7.329; IT-ANVUR Class: 1)

[J205] PLS Jayalaxmi, Gulshan Kumar, Rahul Saha, Mauro Conti, Tai-hoon Kim, Reji Thomas.
DeBot: A Deep Learning-based Model for Bot Detection in Industrial Internet-of-Things.
In (Elsevier) Computers and Electrical Engineering, Vol. 102, 2022.
DOI: 10.1016/j.compeleceng.2022.108214; ISSN: 0045-7906.
(JCR IF 2021: 4.152; IT-ANVUR Class: 4)

[J204] Jamshid Pirayesh, Alberto Giaretta, Mauro Conti, Parviz Keshavarzi.
A PLS-HECC-based Device Authentication and Key Agreement Scheme for Smart Home Networks.
In (Elsevier) Computer Networks, Volume 216, 2022.
DOI: 10.1016/j.comnet.2022.109077; ISSN 1389-1286, 2022.
(JCR IF 2020: 4.474; IT-ANVUR Class: 1)

[J203] Simone Soderi, Riccardo Colelli, Federico Turrin, Federica Pascucci, Mauro Conti.
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2022.
DOI: 10.1109/TDSC.2022.3179562; ISSN: 1545-5971.
(JCR IF 2021: 7.329; IT-ANVUR Class: 1)

[J202] Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tannishtha Devgun, Joel J. P. C. Rodrigues.
Adaptive Intrusion Detection in Edge Computing using Cerebellar Model Articulation Controller and Spline Fit.
In (IEEE) Transactions on Services Computing, in press, 2022.
DOI: 10.1109/TSC.2022.3178471, ISSN: 1939-1374.
(JCR IF 2021: 8.216; IT-ANVUR Class: 1)

[J201] Ashish Kumar, Rahul Saha, Gulshan Kumar, Mauro Conti, William J. Buchanan, Tai-Hoon Kim.
A Comprehensive Survey of Authentication Methods in Internet-of-Things and Its Conjunctions.
In (Elsevier) Journal of Networking and Computer Applications, Volume 204, 2022.
DOI: 10.1016/j.jnca.2022.103414, ISSN: 10848045.
(JCR IF 2021: 6.281; IT-ANVUR Class: 2)

[J200] Gabriele Etta, Matteo Cinelli, Alessandro Galeazzi, Carlo Michele Valensise, Walter Quattrociocchi, Mauro Conti.
Comparing the impact of social media regulations on news consumption.
In (IEEE) Transactions on Computational Social Systems, Pages 1-11, 2022.
DOI: 10.1109/TCSS.2022.3171391, ISSN: 2329924X.

[J199] Marco Casagrande, Mauro Conti, Monica Fedeli, Eleonora Losiouk.
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution.
In Journal of Cybersecurity Education, Research and Practice, in press, 2022.

[J198] Gabriele Etta, Alessandro Galeazzi, Jamie Ray Hutchings, Connor Stirling James Smith, Walter Quattrociocchi, Mauro Conti, Giulio Valentino Dalla Riva.
COVID-19 infodemic on Facebook and containment measures in Italy, United Kingdom and New Zealand.
In PLOS ONE, 17(5), 2022.
DOI: 10.1371/journal.pone.0267022.
(JCR IF 2020: 3.24)

[J197] Reza Mohammadi, Chhagan Lal, Mauro Conti.
SHFD: SDN-based HTTP Flooding Attack Defender.
In (Elsevier) Computers and Electrical Engineering, in press, 2022.
(JCR IF 2020: 3.818; IT-ANVUR Class: 4)

[J196] Ehsan Nowroozi, Yassine Mekdad, Mohammad Berenjestanaki, Mauro Conti, Abdeslam El Fergougui.
Demystifying the Transferability of Adversarial Attacks in Computer Networks.
In (IEEE) Transactions on Network and Service Management, in press, 2022.
DOI: 10.1109/TNSM.2022.3164354, ISSN: 1932-4537.
(JCR IF 2020: 3.878; IT-ANVUR Class: 2)

[J195] Arshdeep Singh, Gulshan Kumar, Rahul Saha, Mauro Conti, Mamoun Alazab, Reji Thomas.
Consensus in Blockchains: State-of-the-art Approaches and Open Futuristic Opportunities.
In (Elsevier) Journal of Systems Architecture, in press, 2022.
(JCR IF 2021: 4.97; IT-ANVUR Class: 3)

[J194] Mauro Conti, Gulshan Kumar, Pranav Nerurkar, Rahul Saha, Luigi Vigneri.
A Survey on Security Challenges and Solutions in IOTA.
In (Elsevier) Journal of Network and Computer Applications, Volume 203, 2022.
DOI: 10.1016/j.jnca.2022.103383, ISSN: 10848045.
(JCR IF 2021: 6.281; IT-ANVUR Class: 2)

[J193] Mauro Conti, Jenil Gathani, Pier Paolo Tricomi.
Virtual Influencers in Online Social Media.
In (IEEE) Communication Magazine, vol. 60, no. 8, pp. 86-91, 2022.
DOI: 10.1109/MCOM.001.2100786.
(JCR IF 2020: 9.619)

[J192] Meng Li, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti, Mamoun Alazab.
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack.
In (IEEE/ACM) Transactions on Networking, Volume 30, Issue 5, Pages 2060 - 2073, 2022.
DOI: 10.1109/TNET.2022.3157654; ISSN: 1558-2566.
(JCR IF 2020: 3.315; IT-ANVUR Class: 1)

[J191] Giovanni Apruzzese, Luca Pajola, Mauro Conti.
The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems.
In (IEEE) Transactions on Network and Service Management, Volume 19, Issue 4, Pages 5152 - 5169, 2022.
DOI: 10.1109/TNSM.2022.3157344, ISSN: 1932-4537.
(JCR IF 2020: 3.878; IT-ANVUR Class: 2)

[J190] Alakesh Kalita, Alessandro Brighente, Manas Khatua, Mauro Conti.
Effect of DIS Attack on 6TiSCH Network Formation.
In (IEEE) Communications Letters, Vol. 26(5), pp. 1190-1193, 2022.
DOI: 10.1109/LCOMM.2022.3155992; ISSN: 1558-2558.
(JCR IF 2021: 3.436; IT-ANVUR Class: 1)

[J189] Mohamed A. El-Zawawy, Parvez Faruki, Mauro Conti.
Formal Model for Inter-Component Communication and its Security in Android Computing.
In (Springer) Computing, Vol. 104, 1839-1865, 2022.
DOI: 10.1007/s00607-022-01069-2.
(JCR IF 2020: 2.220; IT-ANVUR Class: 2)

[J188] Fran Casino, Thomas K. Dasaklis, George Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, Istvan Borocz, Agusti Solanas, Mauro Conti, Constantinos Patsakis.
Research trends, challenges, and emerging topics in digital forensics: A review of reviews.
In (IEEE) Access, Vol. 10, pp. 25464-25493, 2022.
DOI: 10.1109/ACCESS.2022.3154059; ISSN: 2169-3536.
(JCR IF 2022: 3.367)

[J187] Federico Tavella, Alberto Giaretta, Mauro Conti, Sasitharan Balasubramaniam.
A Machine Learning-based Approach to Detect Threats in Bio-Cyber DNA Storage Systems.
In (Elsevier) Computer Communications, Volume 187, Pages 59 - 70, 2022.
DOI: 10.1016/j.comcom.2022.01.023, ISSN: 01403664.
(JCR IF 2021: 3.167; IT-ANVUR Class: 2)

[J186] Mohamed A. El-Zawawy, Alessandro Brighente, Mauro Conti.
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones.
In (Elsevier) Computer Networks, in press, 2022.
DOI: 10.1016/j.comnet.2022.108804, ISSN: 13891286.
(JCR IF 2020: 4.474; IT-ANVUR Class: 1)

[J185] Meng Li, Yifei Chen, Chhagan Lal, Mauro Conti.
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks.
In (IEEE) Transactions on Green Communications and Networking, in press, 2022.
DOI: 10.1109/TGCN.2022.3144641, ISSN: 2473-2400.
(JRC IF 2020: 6.06)

[J184] Milad Taleby Ahvanooey, Mark Zhu, Wojciech Mazurczyk, Qianmu Li, Kim-Kwang Raymond Choo, Birij B. Gupta, Mauro Conti.
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey.
In (IEEE) Internet of Things Journal, Vol. 9(10), pp. 7639-7663, 2021.
DOI: 10.1109/JIOT.2021.3138073, ISSN: 2327-4662.
(JRC IF 2020: 9.936)

[J183] Vasilios Koutsokostas, Nikolaos Lykousas, Theodoros Apostolopoulos, Gabriele Orazi, Amrita Ghosal, Fran Casino, Mauro Conti, Constantinos Patsakis.
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents.
In (Elsevier) Computers & Security, Vol. 114, 102582, 2022.
DOI: 10.1016/j.cose.2021.102582, ISSN 0167-4048.
(JCR IF 2018: 3.06; IT-ANVUR Class: 2)

[J182] Meng Li, Yifei Chen, Chhagan Lal, Mauro Conti, Mamoun Alazab, Donghui Hu.
Eunomia: Anonymous and Secure Vehicular Digital Forensics based on Blockchain.
In (IEEE) Transactions on Dependable and Secure Computing, in press, 2021.
DOI: 10.1109/TDSC.2021.3130583, ISSN: 1545-5971.
(JCR IF 2019: 6.864; IT-ANVUR Class: 1)

[J181] Fabio Aiolli, Mauro Conti, Stjepan Picek, Mirko Polato.
On the Feasibility of Crawling-based Attacks against Recommender Systems.
In Journal of Computer Security, in press, 2021.
DOI: 10.3233/JCS-210041, ISSN 1875-8924.
(JCR IF 2021: 1.15; IT-ANVUR Class: 1)

[J180] Ankur O. Bang, Udai Pratap Rao, Pallavi Kaliyar, Mauro Conti.
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey.
In (ACM) Computing Surveys, 5 (22), pp. 1-36, 2021.
DOI: 10.1145/3494524.
(JCR IF 2020: 7.99; IT-ANVUR Class: 1)

[J179] Milad Taleby Ahvanooey, Xuefang Zhu, Qianmu Li, Wojciech Mazurczyk, Kim-Kwang Raymond Choo, B.B. Gupta, Mauro Conti.
Misinformation Detection on Social Media: Challenges and The Road Ahead.
In IT Professional, Vol.4(1), pp. 34-40, 2021.
DOI: 10.1109/MITP.2021.3120876, ISSN: 1941-045X.
(JCR IF 2020: 3.70; IT-ANVUR Class: 4)

[J178] Zahra Pooranian, Mauro Conti, Hamed Haddadi, Rahim Tafazolli.
Online Advertising Security: Issues, Taxonomy, and Future Directions.
In (IEEE) Communications Surveys and Tutorials, 23(4), pp. 2494-2524, 2021.
DOI: 10.1109/COMST.2021.3118271, ISSN: 1553-877X.
(JCR IF 2021: 23.70; IT-ANVUR Class: 2)

[J177] Gulshan Kumar, Rahul Saha, Mauro Conti.
DHACS: Smart Contract-based Decentralized Hybrid Access Control for Industrial Internet of Things.
In (IEEE) Transactions on Industrial Informatics, in press, 2021.
DOI: 10.1109/TII.2021.3108676, ISSN: 1551-3203.
(JCR IF 2020: 9.112; IT-ANVUR Class: 1)

[J176] Koosha Mohammad Hossein, Mohammad Esmaeil Esmaeili, Tooska Dargahi, Ahmad Khonsari, Mauro Conti.
BCHealth: A Novel Blockchain-Based Privacy-Preserving Architecture for IoT Healthcare Applications.
In (Elsevier) Computer Communications, Vol. 180, pp. 31-47, 2021.
DOI: 10.1016/j.comcom.2021.08.011, ISSN: 0140-3664.
(JCR IF 2021: 3.167; IT-ANVUR Class: 2)

[J175] Meng Li, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti, Fabio Martinelli.
Privacy for 5G-Supported Vehicular Networks.
In (IEEE) Open Journal of the Communications Society, 1935-1956, 2021.
DOI: 10.1109/OJCOMS.2021.3103445, ISSN: 2644-125X.
(JCR IF 2020: 1.16)

[J174] Sarah Sullivan, Alessandro Brighente, Sathish Kumar, Mauro Conti.
5G Security Challenges and Solutions: A Review by OSI Layers.
In (IEEE) Access, 1-21, 2021.
DOI: 10.1109/ACCESS.2021.3105396, ISSN: 2169-3536.
(JCR IF 2020: 3.367)

[J173] Habib Mostafaei, Mohammad Shojafar, Mauro Conti.
TEL: Low-Latency Failover Traffic Engineering in Data Plane.
In (IEEE) Transactions on Network and Service Management, 1-14, 2021.
DOI: 10.1109/TNSM.2021.3099620, ISSN: 1932-4537.
(JCR IF 2019: 5.333; IT-ANVUR Class: 2)

[J172] Meng Li, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti, Mamoun Alazab.
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain.
In (IEEE) Transactions on Network and Service Management, 18(4): 4697-4710, 2021.
DOI: 10.1109/TNSM.2021.3098439, ISSN: 1932-4537.
(JCR IF 2019: 5.333; IT-ANVUR Class: 2)

[J171] Mohamed El-Zawawy, Eleonora Losiouk, Mauro Conti.
Vulnerabilities in Android WebView Objects: Still Not the End!
In (Elsevier) Computers & Security, Vol. 109.C, 2021.
DOI: 10.1016/j.cose.2021.102395.
(JCR IF 2019: 4.438; IT-ANVUR Class: 2)

[J170] Mauro Conti, Denis Donadel, Federico Turrin.
A Survey on Industrial Control System Testbeds and Datasets for Security Research.
In (IEEE) Communications Surveys and Tutorials, in press, 2021.
DOI: 10.1109/COMST.2021.3094360, ISSN: 1553-877X.
(JCR IF 2021: 23.70; IT-ANVUR Class: 2)

[J169] Reza Mohammadi, Amin Nazari, Mohammad Nassiri, Mauro Conti.
An SDN-based Framework for QoS Routing in Internet of Underwater Things.
In (Springer) Telecommunication Systems , Vol. 78, pp.253-266, 2021.
DOI: 10.1007/s11235-021-00812-y.
(JCR IF 2019: 1.734; IT-ANVUR Class: 3 - area 09)

[J168] Andrea Agiollo, Mauro Conti, Pallavi Kaliyar, TsungNan Lin, Luca Pajola.
DETONAR: Detection of Routing Attacks in RPL-based IoT.
In (IEEE) Transactions on Network and Service Management, 18(2): 1178-1190, 2021.
DOI: 10.1109/TNSM.2021.3075496, ISSN: 1932-4537.
(JCR IF 2019: 5.333; IT-ANVUR Class: 2)

[J167] Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran.
Covert Channel-Based Transmitter Authentication in Controller Area Networks.
In (IEEE) Transactions on Dependable and Secure Computing, 2021.
DOI: 10.1109/TDSC.2021.3068213; ISSN: 1545-5971.
(JCR IF 2019: 6.864; IT-ANVUR Class: 1)

[J166] Subir Halder, Mauro Conti, Sajal K Das.
A Holistic Approach to Power Efficiency in a Clock Offset Based Intrusion Detection System for Controller Area Networks.
In (Elsevier) Pervasive and Mobile Computing, Vol.73, 101385, 2021.
DOI: 10.1016/j.pmcj.2021.101385, ISSN 1574-1192.
(JCR IF 2019: 2.725; IT-ANVUR Class: 2)

[J165] Hao Liu, Riccardo Spolaor, Federico Turrin, Riccardo Bonafede, Mauro Conti.
USB Powered Devices: A Survey of Side-Channel Threats and Countermeasures.
In (Elsevier) High-Confidence Computing, Vol.1.1, 100007, 2021.
DOI: 10.1016/j.hcc.2021.100007, ISSN: 2667-2952.

[J164] Gulshan Kumar, Rahul Saha, Chhagan Lal, Mauro Conti.
Internet-of-Forensic (IoF): A Blockchain Based Digital Forensics Framework for IoT Applications.
In (Elsevier) Future Generation Computer Systems, Vol. 120, pp. 13-25, 2021.
DDOI: 10.1016/j.future.2021.02.016, ISSN: 0167-739X
(JCR IF 2018: 5.768; IT-ANVUR Class: 1)

[J163] Neda Maleki, Amir Masoud Rahmani, Mauro Conti.
SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling.
In (Elsevier) Journal of Network and Computer Applications, 176, 102944, 2021.
DOI: 10.1016/j.jnca.2020.102944
(JCR IF 2019: 5.570; IT-ANVUR Class: 2)

[J162] Subir Halder, Mauro Conti.
CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem.
In (IEEE) Transactions on Cloud Computing, in press, 2020.
(JCR IF 2019: 4.714)

[J161] Aanshi Bhardwaj, Veenu Mangat, Renu Vig, Subir Halder, Mauro Conti.
Distributed Denial of Service Attacks on Cloud: State-of-the-Art Scientific and Commercial Solutions.
In (Elsevier) Computer Science Review, in press, 2020.
(JCR IF 2019: 7.707; IT-ANVUR Class: 2)

[J160] Nagarathna Ravi, S. Mercy Shalinie, Mauro Conti, Chhagan lal.
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller.
In (IEEE) Transactions on Network and Service Management, in press, 2020.
(JCR IF 2016: 4.682; IT-ANVUR Class: 2)

[J159] Amrita Ghosal, Sang Sagong, Subir Halder, Kalana Sahabandu, Mauro Conti, Radha Poovendran, Linda Bushnell.
Truck Platoon Security: State-of-the-Art and Road Ahead.
In (Elsevier) Computer Networks, in press, 2020.
(JCR IF 2020: 4.200; IT-ANVUR Class: 1)

[J158] Meng Li, Chhagan Lal, Mauro Conti, Donghui Hu.
LEChain: A Blockchain-based Lawful Evidence Management Scheme for Digital Forensics.
In (Elsevier) Future Generation Computer Systems, in press, 2020.
(JCR IF 2018: 5.768; IT-ANVUR Class: 1)

[J157] Giuseppe Bernieri, Stefano Cecconello, Mauro Conti, Gianluca Lain.
TAMBUS: A Novel Authentication Method Through Covert Channels for Securing Industrial Networks.
In (Elsevier) Computer Networks, in press, 2020.
(JCR IF 2020: 4.200; IT-ANVUR Class: 1)

[J156] Neda Maleki, Hamid Reza Faragardi, Amir Masoud Rahmani, Mauro Conti, Jay Lofstead.
TMaR: A Two-stage MapReduce Scheduler for Heterogeneous Environments.
In Human-centric Computing and Information Sciences, in press, 2020.
(JRC IF 2019: 3.700)

[J155] Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti, Mritunjay Rai, Reji Thomas, Mamoun Alazab, Tai-hoon Kim.
Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things.
In (IEEE) Internet of Things Journal, in press, 2020.
(JRC IF 2020: 9.936)

[J154] Meng Li, Yifei Chen, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti.
Privacy-preserving Navigation Supporting Similar Queries in Vehicular Networks.
In (IEEE) Transactions on Dependable and Secure Computing, Vol. 19(2), pp. 1133-1148, 2020.
DOI: 10.1109/TDSC.2020.3017534, ISSN: 1545-5971.
(JCR IF 2018: 6.404; IT-ANVUR Class: 1)

[J153] Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise.
Collective Remote Attestation at the Internet of Things Scale: State-of-the-art and Future Challenges.
In (IEEE) Communications Surveys and Tutorials, 22(4): 2447-2461, 2020.
DOI: 10.1109/COMST.2020.3008879, ISSN: 1553-877X.
(JCR IF 2019: 22.97; IT-ANVUR Class: 2)

[J152] Neminath Hubballi, Mayank Swarnkar, Mauro Conti.
BitProb: Probabilistic Bit Signatures for Accurate Application Identification.
In (IEEE) Transactions on Network and Service Management, in press, 2020.
DOI: 10.1109/TNSM.2020.2999856, ISSN: 1932-4537.
(JCR IF 2016: 4.682; IT-ANVUR Class: 2)

[J151] Subir Halder, Amrita Ghosal, Mauro Conti.
Secure Over-The-Air Software Updates in Connected Vehicles: A Survey.
In (Elsevier) Computer Networks, Volume 178, 107343, 2020.
DOI: 10.1016/j.comnet.2020.107343; ISSN: 1389-1286.
(JCR IF 2019: 3.030; IT-ANVUR Class: 1)

[J150] Mohammad Hadi Alaeiyan, Saeed Parsa, Vinod P, Mauro Conti.
Detection of algorithmically-generated domains: An adversarial machine learning approach.
In (Elsevier) Computer Communications, 160: 661-673, 2020. .
DOI: 10.1016/j.comcom.2020.04.033, ISSN: 0140-3664.
(JCR IF 2018: 2.766; IT-ANVUR Class: 2)

[J149] Mauro Conti, Pallavi Kaliyar, Chhagan Lal.
A Robust Multicast Communication Protocol for Low power and Lossy Networks.
In (Elsevier) Journal of Network and Computer Applications, in press, 2020.
(JCR IF 2019: 5.27; IT-ANVUR Class: 2)

[J148] Mauro Conti, Ankit Gangwal, Muhammad Hassan, Chhagan Lal, Eleonora Losiouk.
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions.
In (IEEE) Communications Surveys and Tutorials, in press, 2020.
DOI: 10.1109/COMST.2020.2994526, ISSN: 1553-877X.
(JCR IF 2019: 22.97; IT-ANVUR Class: 2)

[J147] Pallavi Kaliyar, Wafa Ben Jaballah, Mauro Conti, Chhagan Lal.
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks.
In (Elsevier) Computers & Security, in press, 2020.
(JCR IF 2018: 3.06; IT-ANVUR Class: 2)

[J146] Abdelmadjid Benarfa, Muhammad Hassan, Eleonora Losiouk, Alberto Compagno, Mohamed bachir Yagoubi, Mauro Conti.
ChoKIFA+: An Early Detection and Mitigation Approach against Interest Flooding Attacks in NDN.
In International Journal of Information Security , 1-17, in press, 2020.
DOI: 10.1007/s10207-020-00500-z, ISSN: 1553-877X.
(JCR IF 2018: 1.822; IT-ANVUR Class: 2)

[J145] Muhammad Hassan, Mauro Conti, Chhagan Lal.
NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN.
In (Elsevier) Computer Networks, in press, 2020.
(JCR IF 2019: 3.030; IT-ANVUR Class: 1)

[J144] Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti.
On Defending Against Label Flipping Attacks on Malware Detection Systems.
In (Springer) Neural Computing and Applications, in press, 2020.
(JCR IF 2018: 4.664; IT-ANVUR Class: 2)

[J143] Rahim Taheri, Reza Javidan, Mohammad Shojafar, Vinod P, Mauro Conti.
Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach.
In (Springer) Cluster Computing, in press, 2020.
(JCR IF 2018: 1.851; IT-ANVUR Class: 2)

[J142] Edlira Dushku, Md Masoom Rabbani, Mauro Conti, Luigi V. Mancini, Silvio Ranise.
SARA: Secure Asynchronous Remote Attestation for IoT systems.
In (IEEE) Transactions on Information Forensics & Security, 15(1): 3123-3136, 2020.
DOI: 10.1109/TIFS.2020.2983282, ISSN: 1556-6013.
(JCR IF 2019: 6.211; IT-ANVUR Class: 1)

[J141] Mohamed El-Zawawy, Eleonora Losiouk, Mauro Conti.
Don't Let Next-Intent Vulnerability Be Your Next Nightmare: Type System Based Approach to Detect It in Android Apps.
In International Journal of Information Security, in press, 2020.
(JCR IF 2018: 1.822; IT-ANVUR Class: 2)

[J140] Meng Li, Donghui Hu, Chhagan Lal, Mauro Conti, Zijian Zhang.
Blockchain-enabled Secure Energy Trading with Verifiable Fairness in Industrial Internet of Things.
In IEEE Transaction on Industrial Informatics, 16(10): 6564-6574, 2020.
DOI: 10.1109/TII.2020.2974537, ISSN: 1551-3203.
(JCR IF 2019: 7.377; IT-ANVUR Class: 1)

[J139] Jay Dave, Parvez Faruki, Vijay Laxmi, Akka Zemmari, Manoj Gaur, Mauro Conti.
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage.
In (Elsevier) Computer Communications, in press, 2020.
(JCR IF 2018: 2.766; IT-ANVUR Class: 2)

[J138] Yuan-Gen Wang, Guopu Zhu, Jin Li, Mauro Conti, Jiwu Huang.
Defeating Lattice-Based Data Hiding Code via Decoding Security Hole.
In (IEEE) Transactions on Circuits and Systems for Video Technology, 31(1):76-87, 2021.
DOI: 10.1109/TCSVT.2020.2971590, ISSN: 1558-2205s.
(JCR IF 2018: 4.046)

[J137] Wafa Ben Jaballah, Mauro Conti, Chhagan Lal.
Security and Design Requirements for Software-Defined VANETs.
In (Elsevier) Computer Network, in press, 2020.
(JCR IF 2018: 3.030; IT-ANVUR Class: 1)

[J136] Amrita Ghosal, Mauro Conti.
Security Issues and Challenges in V2X: A Survey.
In (Elsevier) Computer Network, in press, 2020.
(JCR IF 2018: 3.030; IT-ANVUR Class: 1)

[J135] Stefano Calzavara, Mauro Conti, Riccardo Focardi, Alvise Rabitti, Gabriele Tolomei.
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery.
In (IEEE) Security and Privacy, in press, 2020.
(JCR IF 2018: 1.596)

[J134] Mauro Conti, Pallavi Kaliyar, Md Masoom Rabbani, Silvio Ranise.
Attestation-enabled Secure and Scalable Routing protocol for IoT Networks.
In (Elsevier) Ad Hoc Networks , in press, 2019.
(JCR IF 2015: 3.490; IT-ANVUR Class: 4)

[J133] Matteo Cinelli, Mauro Conti, Livio Finos, Grisolia Francesco, Petra Kralj Novak, Antonio Peruzzi, Maurizio Tesconi, Fabiana Zollo, Walter Quattrociocchi.
(Mis)Information Operations: An Integrated Perspective.
In Journal of Information Warfare, 18(3): 83-98, 2019.
DOI:10.1080/01402390.2018.1563779, ISSN: 1445-3347.

[J132] Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti.
Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features.
In (Elsevier) Future Generation Computer Systems, in press, 2019.
(JCR IF 2018: 5.768; IT-ANVUR Class: 1)

[J131] Anshul Arora, Sateesh K Peddoju, Mauro Conti.
PermPair: Android Malware Detection using Permission Pairs.
In (IEEE) Transactions on Information Forensics & Security, 2019.
DOI: 10.1109/TIFS.2019.2950134, ISSN: 1556-6013.
(JCR IF 2018: 6.211; IT-ANVUR Class: 1)

[J130] Mauro Conti, Chhagan Lal.
Context-based Co-presence Detection Techniques: A Survey.
In (Elsevier) Computers & Security, 1-20, 2019.
DOI: 10.1016/j.cose.2019.101652, ISSN: 0167-4048.
(JCR IF 2018: 3.06; IT-ANVUR Class: 2)

[J129] Stefano Cecconello, Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik.
Skype & Type: Keyboard Eavesdropping in Voice-over-IP.
In (ACM) Transactions on Privacy & Security, 22(4), 2019.
DOI: 10.1145/3365366, ISSN: 2471-2566.
(JCR IF 2018: 2.103; IT-ANVUR Class: 1)

[J128] Neetesh Saxena, Mauro Conti, Kim-Kwang Raymond, Narendra S. Chaudhari.
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices.
In (IEEE) Transactions on Information Forensics & Security, 1-16, 2019.
DOI: 10.1109/TIFS.2019.2940908, ISSN: 1556-6013.
(JCR IF 2018: 6.211; IT-ANVUR Class: 1)

[J127] Ankit Gangwal, Mauro Conti.
Cryptomining cannot Change its Spots: Detecting Covert Cryptomining using Magnetic Side-channel.
In (IEEE) Transactions on Information Forensics & Security, 1-10, 2019.
DOI: 10.1109/TIFS.2019.2945171, ISSN: 1556-6021.
(JCR IF 2018: 6.211; IT-ANVUR Class: 1)

[J126] Ding Ding, Kyuho Jeong, Shuning Xing, Mauro Conti, Renato Figueiredo, Fangai Liu.
SEnD: a Social Network Friendship Enhanced Decentralized System to Circumvent Censorships.
In (IEEE) Transactions on Services Computing, 1-15, 2019.
DOI: 10.1109/TSC.2019.2942598, ISSN: 1939-1374.
(JCR IF 2018: 5.707; IT-ANVUR Class: 1)

[J125] Bharat Manral, Gaurav Somani, Kim-Kwang Raymond Choo, Mauro Conti, Manoj Singh Gaur.
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions.
In (ACM) Computing Surveys, 52(6): 1-38, 2019.
DOI: 10.1145/3361216, ISSN: 0360-0300.
(JCR IF 2018: 6.131; IT-ANVUR Class: 1)

[J124] Mauro Conti, Muhammad Hassan, Chhagan Lal.
BlockAuth: BlockChain based Distributed Producer Authentication in ICN.
In (Elsevier) Computer Network, in press, 2019.
(JCR IF 2018: 3.030; IT-ANVUR Class: 1)

[J123] Santhanakrishnan Anand, Ding Ding, Paolo Gasti, Mike O'Neal, Mauro Conti, Kiran S. Balagani.
DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures.
In (IEEE) Transactions on Network and Service Management, in press, 2019.
(JCR IF 2016: 4.682; IT-ANVUR Class: 2)

[J122] Md Masoom Rabbani, Jo Vliegen, Jori Winderickx, Mauro Conti, Nele Mentens.
SHeLA: Scalable Heterogeneous Layered Attestation.
In (IEEE) Internet of Things Journal, in press, 2019.
(JCR IF 2018: 9.515)

[J121] Federico Tavella, Alberto Giaretta, Triona Marie Dooley-Cullinane, Mauro Conti, Lee Coffey, Sasitharan Balasubramaniam.
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks.
In (IEEE) Transactions on Emerging Topics in Computing, 9(3): 1566-1580, 2019.
DOI: 10.1109/TETC.2019.2932685, ISSN: 2168-6750.
(JCR IF 2018: 4.989)

[J120] Mohammad Hadi Alaeiyan, Ali Dehghantanha, Tooska Dargahi, Mauro Conti, Saeed Parsa.
A Multi-label Fuzzy Relevance Clustering system for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks.
In Transaction of Cyber-Physical Systems, in press, 2019.

[J119] Tooska Dargahi, Ali Dehghantanha, Pooneh Nikkhah Bahrami, Mauro Conti, Giuseppe Bianchi, Loris Benedetto.
A Cyber-Kill-Chain Based Taxonomy of Crypto-Ransomware Features.
In (Springer) Journal of Computer Virology and Hacking Techniques, in press, 2019.

[J118] Seyed farhad Aghili, Hamid Mala, Pallavi Kaliyar, Mauro Conti.
SecLAP: Secure and Lightweight RFID Authentication Protocol for Medical IoT.
In (Elsevier) Future Generation Computer Systems, in press, 2019.
(JCR IF 2018: 5.768; IT-ANVUR Class: 1)

[J117] Mohammad Mahdi Tajiki, Mohammad Shojafar, Behzad Akbari, Stefano Salsano, Mauro Conti, Mukesh Singhal.
Joint Failure Recovery, Fault Prevention, and Energy-efficient Resource Management for Real-time SFC in Fog-supported SDN.
In (Elsevier) Computer Networks, in press, 2019.
(JCR IF 2018: 3.030; IT-ANVUR Class: 1)

[J116] Neeraj Kumar, Gagangeet Singh Aujla, Ashok Kumar Das, Mauro Conti.
ECCAuth: Secure Authentication Protocol for Demand Reponse Management in Smart Grid Systems.
In IEEE Transaction on Industrial Informatics, 15(12): 6572-6582, 2019.
DOI: 10.1109/TII.2019.2922697, ISSN: 1551-3203.
(JCR IF 2018: 5.43; IT-ANVUR Class: 1)

[J115] Kiran Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu.
PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos.
In Journal of Computer Security, in press, 2019.
(JCR IF 2018: 1.071; IT-ANVUR Class: 1)

[J114] Reza Mohammadi, Mauro Conti, Chhagan Lal, K. Satish.
SYN-Guard: An effective countermeasure for SYN flooding attack in Software Defined Networking.
In (Wiley) International Journal of Communication Systems, in press, 2019.
(JCR IF 2018: 1.717; IT-ANVUR Class: 3)

[J113] Neda Maleki, Amir Masoud Rahmani, Mauro Conti.
MapReduce: An Infrastructure Review and Research Insights.
In (Springer) Journal of Supercomputing, in press, 2019.
(JCR IF 2018: 1.532; IT-ANVUR Class: 2)

[J112] Mauro Conti, Chhagan Lal, Reza Mohammadi, Umashankar Rawat.
Lightweight Solutions to Countermeasure DDoS Attacks in Software Defined Networking.
In (Springer) Wireless Networks, 25, 2751-2768, 2019.
DOI: 10.1007/s11276-019-01991-y, ISSN: 1572-8196.
(JCR IF 2018: 1.98; IT-ANVUR Class: 1)

[J111] Deepa K., Radhamani G., Vinod P., Mohammad Shojafar, Neeraj Kumar, Mauro Conti.
Identification of Android Malware Using Refined System Calls.
In (Wiley) Concurrency and Computation: Practice and Experience, in press, 2019.
(JCR IF 2017: 1.114; IT-ANVUR Class: 1)

[J110] A. Ghosal, M. Conti.
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey.
In (IEEE) Communications Surveys and Tutorials, in press, 2019.
(JCR IF 2018: 20.230; IT-ANVUR Class: 2)

[J109] Vanga Odelu, Sourav Saha, Rajendra Prasath, Lakshminarayana Sadineni, Mauro Conti, Minho Jo.
Efficient Privacy Preserving Device Authentication in WBANs for Industrial e-Health Applications.
In (Elsevier) Computers and Security, in press, 2019.
(JCR IF 2018: 2.650; IT-ANVUR Class: 2)

[J108] Subir Halder, Amrita Ghosal, Mauro Conti.
Efficient Physical Intrusion Detection in Internet of Things: A Node Deployment Approach.
In (Elsevier) Computer Networks, in press, 2019.
(JCR IF 2018: 2.522; IT-ANVUR Class: 1)

[J107] Anshul Anand, Mauro Conti, Pallavi Kaliyar, Chhagan Lal.
TARE: Topology Adaptive Re-kEying Scheme for Secure Group Communication in IoT Networks.
In (Springer) Wireless Networks, in press, 2019.
(JCR IF 2018: 1.98; IT-ANVUR Class: 1)

[J106] Mohammad Hadi Alaeiyan, Saeed Parsa, Mauro Conti.
Analysis and Classification of Context-based Malware Behavior.
In (Elsevier) Computer Communications, in press, 2019.
(JCR IF 2017: 2.613; IT-ANVUR Class: 2)

[J105] Giuseppe Bianchi, Tooska Dargahi, Alberto Caponi, Mauro Conti.
Intelligent Conditional Collaborative Private Data Sharing.
In (Elsevier) Future Generation Computer Systems, in press, 2019.
DOI: 10.1016/j.future.2019.01.001, ISSN: 0167-739X.
(JCR IF 2017: 4.639; IT-ANVUR Class: 1)

[J104] Sarada Prasad Gochhayat, Pallavi Kaliyar, Mauro Conti, Prayag Tiwari, V. B. S. Prasath, Deepak Gupta.
LISA: Lightweight Context-aware IoT Service Architecture.
In Journal of Cleaner Production, in press, 2018.
(JCR IF 2017: 5.651; IT-ANVUR Class: 1)

[J103] Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
You Click I Steal: Analyzing and Detecting Click Hijacking Attacks in Web Pages.
In (Springer) International Journal of Information Security, 1-24, 2018.
DOI: 10.1007/s10207-018-0423-3, ISSN: 1615-5270.
(JCR IF 2017: 1.658; IT-ANVUR Class: 2)

[J102] Attaullah Buriro, Bruno Crispo, Mauro Conti.
ANSWERAUTH: A Bimodal Behavioral Biometric-based User Authentication Scheme for Smartphones.
In (Elsevier) Journal of Information Security and Applications, Volume 170, 2018.
DOI: 10.1016/j.comnet.2020.107118; ISSN 1389-1286.
(JCR IF 2017: 1.747; IT-ANVUR Class: 4)

[J101] Vinod P., Akka Zemmari, Mauro Conti.
A machine learning based approach to detect malicious android apps using discriminant system calls.
In (Elsevier) Future Generation Computer Systems, in press, 2018.
DOI: 10.1016/j.future.2018.11.021, ISSN: 0167-739X.
(JCR IF 2017: 4.639; IT-ANVUR Class: 1)

[J100] Balu Deokate, Chhagan lal, Denis Trcek, Mauro Conti.
MACARON: A Novel Mobility-aware Cross-layer Routing for P2P Network over MANET.
In (Elsevier) Computers and Electrical Engineering, in press, 2018.
(JCR IF 2017: 1.747; IT-ANVUR Class: 4)

[J99] Ding Ding, Mauro Conti, Renato Figueiredo.
SAND: Social-Aware, Network-Failure Resilient, and Decentralized Microblogging System.
In (Elsevier) Future Generation Computer Systems, 93: 637-650, 2019.
DOI: 10.1016/j.future.2018.11.007, ISSN: 0167-739X.
(JCR IF 2017: 4.639; IT-ANVUR Class: 1)

[J98] Brijesh B. Mehta, Udai Pratap Rao, Ruchika Gupta, Mauro Conti.
Towards privacy preserving unstructured big data publishing.
In Journal of Intelligent and Fuzzy Systems, in press, 2018.
(JCR IF 2017: 1.426; IT-ANVUR Class: 4)

[J97] Ding Ding, Mauro Conti, Renato Figueiredo.
Wide-scale Internet Disconnection: Impact and Recovery on Social-based P2P Overlays.
In (IEEE) Transactions on Network Science and Engineering, 6(7): 734-747, 2018.
DOI: 10.1109/TNSE.2018.2871980, ISSN: 2327-4697.

[J96] Mauro Conti, Ralph Droms, Muhammad Hassan, Chhagan Lal.
Fair-RTT-DAS: A Robust and Efficient Dynamic Adaptive Streaming over ICN.
In (Elsevier) Computer Communications, 129: 209-225, 2018.
DOI: 10.1016/j.comcom.2018.07.033, ISSN: 0140-3664.
(JCR IF 2017: 2.613; IT-ANVUR Class: 2)

[J95] Mauro Conti, Ankit Gangwal, Sushmita Ruj.
On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective.
In (Elsevier) Computers & Security, 79: 162-189, 2018.
DOI: 10.1016/j.cose.2018.08.008, ISSN: 0167-4048.
(JCR IF 2017: 2.650; IT-ANVUR Class: 2)

[J94] Agostino Sturaro, Simone Silvestri, Mauro Conti, Sajal K. Das.
A Realistic Model for Failure Propagation in Interdependent Cyber-Physical Systems.
In (IEEE) Transactions on Network Science and Engineering, 7(2): 817-831, 2020.
DOI: 10.1109/TNSE.2018.2872034, ISSN: 2327-4697
(JCR IF 2018: 2.47; IT-ANVUR Class: 1)

[J93] M.M. Tajiki, M. Shojafar, B. Akbari, S. Salsano, M. Conti.
Software Defined Service Function Chaining with Failure Consideration for Fog Computing.
In (Wiley) Concurrency and Computation: Practice and Experience, in press, 2018.
(JCR IF 2017: 1.114; IT-ANVUR Class: 1)

[J92] Mauro Conti, Pallavi Kaliyar, Chhagan Lal.
CENSOR - Cloud Enabled Secure IoT Architecture over SDN Paradigm.
In (Wiley) Concurrency and Computation: Practice and Experience, in press, 2018.
(JCR IF 2017: 1.114; IT-ANVUR Class: 1)

[J91] Armir Bujari, Mauro Conti, Carla De Francesco, Claudio E Palazzi.
Fast Multi-hop Broadcast of Alert Messages in VANETs: An Analytical Model.
In (Elsevier) Ad Hoc Networks, in press, 2018.
(JCR IF 2017: 3.151; IT-ANVUR Class: 4)

[J90] Prashant Kumar, Meenakshi Tripathi, Ajay Nehra, Mauro Conti, Chhagan Lal.
SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN.
In (IEEE) Transactions on Network and Service Management, 15(4):1545-1559, 2018.
DOI: 10.1109/TNSM.2018.2861741, ISSN: 1932-4537.
(JCR IF 2016: 3.286; IT-ANVUR Class: 2)

[J89] Paola G Vinueza Naranjo, Zahra Pooranian, Mohammad Shojafar, Mauro Conti, Rajkumar Buyya.
FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments.
In (Elsevier) Journal of Parallel and Distributed Computing, in press, 2018.
DOI: 10.1016/j.jpdc.2018.07.003.
(JCR IF 2017: 1.93; IT-ANVUR Class: 1)

[J88] Mauro Conti, Sandeep Kumar, Chhagan Lal, Sushmita Ruj.
A Survey on Security and Privacy Issues of Bitcoin.
In (IEEE) Communications Surveys and Tutorials, 20(4):3416-3452, 2018.
DOI: 10.1109/COMST.2018.2842460, ISSN: 1553-877X.
(JCR IF 2017: 20.23; IT-ANVUR Class: 2)

[J87] Zahra Pooranian, Jemal H. Abawajy, Vinod P, Mauro Conti.
Scheduling Distributed Energy Resource Operation and Daily Power Consumption for a Smart Building to Optimize Economic and Environmental Parameters.
In Energies, MDPI Journal, 11(6): 1348, 2018.
DOI: 10.3390/en11061348, ISSN: 1996-1073.
(JCR IF 2017: 2.7; IT-ANVUR Class: 2)

[J86] Chuan Zhao, Shengnan Zhao, Bo Zhang, Zhongtian Jia, Zhenxiang Chen, Mauro Conti.
Secure Comparison under Ideal/Real Simulation Paradigm.
In (IEEE) Access, 1-15 (Early Access), 2018.
DOI: 10.1109/ACCESS.2018.2837665, ISSN: 2169-3536.
(JCR IF 2016: 3.244)

[J85] Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor.
The Dark Side (-Channel) of Mobile Devices: A Survey on Network Traffic Analysis.
In (IEEE) Communications Surveys and Tutorials, 20(4):2658-2713, 2018.
DOI: 10.1109/COMST.2018.2843533, ISSN: 1553-877X.
(JCR IF 2017: 20.23; IT-ANVUR Class: 2)

[J84] Subir Halder, Amrita Ghosal, Mauro Conti.
LiMCA: An Optimal Clustering Algorithm for Lifetime Maximization of Internet of Things.
In (Springer) Wireless Networks, 1-19, 2018.
DOI: 10.1007/s11276-018-1741-0, ISSN: 1572-8196.
(JCR IF 2016: 1.584; IT-ANVUR Class: 1)

[J83] Giuseppe Cascavilla, Filipe Beato, Andrea Burattin, Mauro Conti, Luigi Vincenzo Mancini.
OSSINT - Open Source Social Network Intelligence. An efficient and effective way to uncover "private" information in OSN profiles.
In (Elsevier) Online Social Networks and Media, in press, 2018.

[J82] Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti.
A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
In (ACM) Computing Surveys, in press, 2018.
(JCR IF 2016: 6.748; IT-ANVUR Class: 1)

[J81] Seyedeh Narjes Fallah, Ravinesh Deo, Mohammad Shojafar, Mauro Conti, Sh Shamshirband.
Computational intelligence approaches for energy load forecasting in smart energy management grids: state of the art, future challenges and research directions.
In Energies, MDPI Journal, in press, 2018.
(JCR IF 2017: 2.7; IT-ANVUR Class: 2)

[J80] Mauro Conti, Fabio De Gaspari, Luigi V. Mancini.
A Novel Stealthy Attack to Gather SDN Configuration-Information.
In (IEEE) Transactions on Emerging Topics in Computing, 8(2): 328-340, 2020.
DOI: 10.1109/TETC.2018.2806977, ISSN: 2168-6750.
(JCR IF 2018: 4.989)

[J79] Po-Yen Lee, Chia-Mu Yu, Tooska Dargahi, Mauro Conti, Giuseppe Bianchi.
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things.
In (IEEE) Transactions on Information Forensics & Security, 13(8): 2031-2046, 2018.
DOI: 10.1109/TIFS.2018.2805291, ISSN: 1556-6021.
(JCR IF 2016: 4.332; IT-ANVUR Class: 1)

[J78] Wafa Ben Jaballah, Akka Zemmari, Gilberto Filé, Mauro Conti, Mohamed Mosbah.
Whac-A-Mole: Smart Node Positioning in Clone Attack in Wireless Sensor Networks.
In (Elsevier) Computer Communications, in press, 2018.
(JCR IF 2016: 3.338; IT-ANVUR Class: 2)

[J77] Hidayet Aksu, Leonardo Babun, Mauro Conti, Gabriele Tolomei, A. Selcuk Uluagac.
Advertising in the IoT Era: Vision and Challenges.
In (IEEE) Communications Magazine, in press, 2018.
(JCR IF 2017: 10.435; IT-ANVUR Class: 1)

[J76] Merylin Monaro, Chiara Galante, Riccardo Spolaor, Qian Qian Li, Luciano Gamberini, Mauro Conti, Giuseppe Sartori.
Covert Lie Detection Using Keyboard Dynamics.
In (Nature) Scientific Reports, in press, 2018.
(JCR IF 2017: 4.259)

[J75] Chia-Mu Yu, Sarada Prasad Gochhayat, Mauro Conti, Chun-Shien Lu.
Privacy Aware Data Deduplication for Side Channel in Cloud Storage.
In (IEEE) Transactions on Cloud Computing, 8(2): 597-609, 2020.
DOI: 10.1109/TCC.2018.2794542, ISSN: 2168-7161.

[J74] Minho Jo, Ashok Kumar Das, Mohammad Wazid, Odelu Vanga, Neeraj Kumar, Mauro Conti.
Design of Secure User Authenticated Key Management Protocol for Generic IoT Network.
In (IEEE) Internet of Things Journal, 5(1): 269-282, 2018.
DOI: 10.1109/JIOT.2017.2780232, ISSN: 2327-4662.
(JCR IF 2017: 7.596)

[J73] Moreno Ambrosin, Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik.
Security and Privacy Analysis of National Science Foundation Future Internet Architectures.
In (IEEE) Communications Surveys and Tutorials, 20(2): 1418-1442, 2018.
DOI: 10.1109/COMST.2018.2798280, ISSN: 1553-877X.
(JCR IF 2017: 17.188; IT-ANVUR Class: 2)

[J72] Paola G. V. Naranjo, Zahra Pooranian, Shahaboddin Shamshirband, Jemal H. Abawajy, Mauro Conti.
Fog over Virtualized IoT: New Opportunity for Context-Aware Networked Applications and a Case Study.
In (MDPI) Applied Sciences, in press, 2017.

[J71] Fatemeh Hajeforosh, Zahra Pooranian, Ali Shabani, Mauro Conti.
Evaluating the High Frequency Behavior of the Modified Grounding Scheme in Wind Farms.
In (MDPI) Applied Sciences, in press, 2017.

[J70] Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti.
Detecting Android Malware Leveraging Text Semantics of Network Flows.
In (IEEE) Transactions on Information Forensics & Security, 13(5): 1096-1109, 2017.
DOI: 10.1109/TIFS.2017.2771228, ISSN: 1556-6013.
(JCR IF 2016: 4.332; IT-ANVUR Class: 1)

[J69] QianQian Li, Sarada Prasad Gochhayat, Mauro Conti, FangAi Liu.
EnergIoT: A Solution to Improve Network Lifetime of IoT Devices.
In (Elsevier) Pervasive and Mobile Computing, 42: 124-133, 2017.
DOI: 10.1016/j.pmcj.2017.10.005, ISSN: 1574-1192.
(JCR IF 2016: 2.349; IT-ANVUR Class: 2)

[J68] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan.
Scale Inside-out: Rapid Mitigation of Cloud DDoS Attacks.
In (IEEE) Transactions on Dependable and Secure Computing, 15(6): 959-973, 2018.
DOI: 10.1109/TDSC.2017.2763160, ISSN: 1545-5971.
(JCR IF 2016: 4.41; IT-ANVUR Class: 1)

[J67] Riccardo Spolaor, Elia Dal Santo, Mauro Conti.
DELTA: Data Extraction and Logging Tool for Android.
In (IEEE) Transactions on Mobile Computing, 17(6): 1289-1302, 2017.
DOI: 10.1109/TMC.2017.2762692, ISSN: 1536-1233.
(JCR IF 2016: 3.822; IT-ANVUR Class: 1)

[J66] Giuseppe Cascavilla, Mauro Conti, David G Schwartz, Inbal Yahav.
The Insider on the Outside: A Novel System for the Detection of Information Leakers in Social Networks.
In (Springer) European Journal of Information Systems, 1-16, 2017.
DOI: 10.1080/0960085X.2017.1387712.
(JCR IF 2016: 2.819; IT-ANVUR Class: 1)

[J65] Moreno Ambrosin, Paolo Braca, Mauro Conti, Riccardo Lazzaretti.
ODIN: Obfuscation-based privacy preserving consensus algorithm for Decentralized Information fusion in smart device Networks.
In (ACM) Transactions on Internet Technology, 18(1): 1-22, 2017.
DOI: 10.1145/3137573, ISSN: 1533-5399.
(JCR IF 2017: 1.489; IT-ANVUR Class: 1)

[J64] Amin Azmoodeh, Ali Dehghantanha, Mauro Conti, Raymond Choo.
Detecting Crypto-Ransomware in IoT Networks Based On Energy Consumption Footprint.
In (Springer) Journal of Ambient Intelligence and Humanized Computing, 1-12, 2017.
DOI: 10.1007/s12652-017-0558-5.
(JCR IF 2016: 1.588)

[J63] Vincent F. Taylor, Riccardo Spolaor, Mauro Conti and Ivan Martinovic.
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis.
In (IEEE) Transactions on Information Forensics & Security, 13(1): 63-78, 2017.
DOI: 10.1109/TIFS.2017.2737970, ISSN: 1556-6013.
(JCR IF 2016: 4.332; IT-ANVUR Class: 1)

[J62] Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson.
Internet of Things security and forensics: Challenges and opportunities.
In (Elsevier) Future Generation Computer Systems, 78: 544-546, 2017.
DOI: 10.1016/j.future.2017.07.060.
(JCR IF 2016: 3.997; IT-ANVUR Class: 1)

[J61] Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur,
Mohamed Mosbah, Mauro Conti.
Android Inter-App Communication Threats and Detection Techniques: A Focus on App Collusion.
In (Elsevier) Computers & Security, in press, 2017.
(JCR IF 2016: 2.849; IT-ANVUR Class: 2)

[J60] Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mauro Conti, Athanasios Vasilakos.
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
In (IEEE) Journal of Biomedical and Health Informatics, in press, 2017.
DOI: 10.1109/JBHI.2017.2721545, ISSN: 2168-2194.
(JCR IF 2016: 3.451; IT-ANVUR Class: 1)

[J59] Seyed Hossein Hosseini Nazhad, Mohammad Shojafar, Shahaboddin Shamshirband, Mauro Conti.
An Efficient Routing Protocol for the QoS Support of Large-Scale MANETs.
In (Wiley) International Journal of Communication Systems, in press, 2017.
DOI: 10.1002/dac.3384, ISSN: 1099-1131.
(JCR IF 2016: 1.066; IT-ANVUR Class: 3)

[J58] Rifaqat Ali, Arup Kumar Pal, Saru Kumari, Marimuthu Karuppiah, Mauro Conti.
A Secure User Authentication and Key-Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring.
In (Elsevier) Future Generation Computer Systems, in press, 2017.
DOI: doi.org/10.1016/j.future.2017.06.018, ISSN: 0167-739X.
(JCR IF 2016: 3.997; IT-ANVUR Class: 1)

[J57] Riccardo Spolaor, QianQian Li, Merylin Monaro, Mauro Conti, Luciano Gamberini, Giuseppe Sartori.
Biometric Authentication Methods on Smartphones: A Survey.
In Psychnology Journal, 14(2): 87-98, 2017.

[J56] Chhagan Lal, Roberto Petroccia, Konstantinos Pelekanakis, Mauro Conti, João Alves.
Towards the Development of Secure Underwater Acoustic Networks.
In (IEEE) Journal of Oceanic Engineering, 42(4): 1075-1087, 2017.
DOI: 10.1109/JOE.2017.2716599, ISSN: 0364-9059.
(JCR IF 2016: 2.297)

[J55] Reza Mohammadi, Reza Javidan, Mauro Conti.
SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks.
In (IEEE) Transactions on Network and Service Management, 14(2): 487-497, 2017.
DOI: 10.1109/TNSM.2017.2701549.
(JCR IF 2016: 1.296; IT-ANVUR Class: 2)

[J54] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya.
DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions.
In (Elsevier) Computers Communications, 107: 30-48, 2017.
DOI: 10.1016/j.comcom.2017.03.010.
(JCR IF 2015: 2.099; IT-ANVUR Class: 2; Best Survey Paper 2020)

[J53] Fauzia Idrees, Muttukrishnan Rajarajan, Mauro Conti, Tom Chen, Yogachandran Rahulamathavan.
PIndroid: A novel Android malware detection system using ensemble learning methods.
In (Elsevier) Computers & Security, 68: 36-46, 2017.
DOI: 10.1016/j.cose.2017.03.011.
(JCR IF 2015: 1.640; IT-ANVUR Class: 2)

[J52] Tooska Dargahi, Alberto Caponi, Moreno Ambrosin, Giuseppe Bianchi, Mauro Conti.
A Survey on the Security of Stateful SDN Data Planes.
In (IEEE) Communications Surveys and Tutorials, 19(3): 1701-1725, 2017.
DOI: 10.1109/COMST.2017.2689819.
(JCR IF 2016: 9.220; IT-ANVUR Class: 2)

[J51] Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik, Christopher A. Wood.
Privacy-Aware Caching in Information-Centric Networking.
In (IEEE) Transactions on Dependable and Secure Computing, 1-14, 2017.
DOI: 10.1109/TDSC.2017.2679711, ISSN: 1545-5971.
(JCR IF 2015: 1.592; IT-ANVUR Class: 1)

[J50] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan, Rajkumar Buyya.
Combating DDoS Attacks in Cloud: Requirements, Trends, and Future Directions.
In (IEEE) Cloud Computing, 4(1): 22-32, 2017.
DOI: 10.1109/MCC.2017.14.
(JCR IF 2015: 1.86)

[J49] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan.
DDoS victim service containment to minimize the internal collateral damages in cloud computing.
In (Elsevier) Computers & Electrical Engineering, 59: 165-179, 2016.
DOI: dx.doi.org/10.1016/j.compeleceng.2016.12.004.
(JCR IF 2015: 1.084; IT-ANVUR Class: 4)

[J48] Pericle Perazzo, Francesco Betti Sorbelli, Mauro Conti, Gianluca Dini, Cristina M. Pinotti.
Drone Path Planning for Secure Positioning and Secure Position Verification.
In (IEEE) Transactions on Mobile Computing, 16(9): 2478-2493, 2016.
DOI: 10.1109/TMC.2016.2627552, ISSN: 1536-1233.
(JCR IF 2015: 2.456; IT-ANVUR Class: 1)

[J47] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya.
Service Resizing for Quick DDoS Mitigation in Cloud Computing Environment.
In (Springer) Annals of Telecommunications, 72(5-6): 237-252, 2016.
DOI: 10.1007/s12243-016-0552-5, ISSN: 0003-4347.
(JCR IF 2015: 0.722; IT-ANVUR Class: 3 - area 09)

[J46] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran.
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking.
In (IEEE/ACM) Transactions on Networking, 25(2): 1206-1219, 2016.
DOI: 10.1109/TNET.2016.2626287, ISSN: 1063-6692.
(JCR IF 2015: 2.186; IT-ANVUR Class: 1)

[J45] Moreno Ambrosin, Arman Anzanpour, Mauro Conti, Tooska Dargahi, Sanaz Rahimi Moosavi, Amir M. Rahmani, Pasi Liljeberg.
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices.
In (IEEE) Micro, 36(6): 25-35, 2016.
DOI: 10.1109/MM.2016.101, ISSN: 0272-1732.
(JCR IF 2015: 1.091; IT-ANVUR Class: 2)

[J44] Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
Colluding Browser Extension Attack on User Privacy and its Implication for Web Browsers.
In (Elsevier) Computers & Security, 63: 14-28, 2016.
DOI: 10.1016/j.cose.2016.09.003, ISSN: 0167-4048.
(JCR IF 2015: 1.640; IT-ANVUR Class: 2)

[J43] Claudio Ardagna, Kanishka Ariyapala, Mauro Conti, Cristina Pinotti, Julinda Stefa.
Anonymous End-to-End Communications in Adversarial Mobile Clouds Pervasive and Mobile Computing.
In (Elsevier) Pervasive and Mobile Computing, 2016.
DOI: 10.1016/j.pmcj.2016.09.001.
(JCR IF 2015: 1.719; IT-ANVUR Class: 2)

[J42] Vanga Odelu, Ashok Kumar Das, Mohammad Wazid, Mauro Conti.
Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
In (IEEE) Transactions on Smart Grid, 9(3): 1900-1910, 2016.
DOI: 10.1109/TSG.2016.2602282, ISSN: 1949-3061.
(JCR IF 2015: 4.252; IT-ANVUR Class: 1)

[J41] Wafa Ben Jaballah, Mauro Conti, Claudio Palazzi, Mohamed Mosbah.
Impact of Malicious Nodes Positioning on Vehicular Alert Messaging System.
In (Elsevier) Ad Hoc Networks , 52: 3-16, 2016.
DOI: 10.1016/j.adhoc.2016.08.008, ISSN: 1570-8705.
(JCR IF 2015: 1.660; IT-ANVUR Class: 4)

[J40] Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti.
Enhancing QoE for video streaming in MANETs via multi-constraint routing.
In (Springer) Wireless Networks, 1-22, 2016.
DOI: 10.1007/s11276-016-1325-9, ISSN: 1022-0038.
(JCR IF 2015: 1.006; IT-ANVUR Class: 1)

[J39] Teing Yee Yang, Ali Dehghantanha, Kim-Kwang Raymond Choo, Mauro Conti, Tooska Dargahi.
Forensic Investigation of Cooperative Storage Cloud Service: Symform As a Case Study.
In (Wiley) Journal of Forensic Sciences, 2016.
DOI: 10.1111/1556-4029.13271.
(JCR IF 2015: 1.322)

[J38] Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti.
DDoS attacks in Cloud Computing: Collateral Damage to Non-targets.
In (Elsevier) Computer Networks, 157-171, 2016.
DOI: 10.1016/j.comnet.2016.03.022, ISSN: 1389-1286.
(JCR IF 2014: 1.256; IT-ANVUR Class: 1)

[J37] Mauro Conti, Nicola Dragoni, Viktor Lesyk.
A Survey of Man In The Middle Attacks.
In (IEEE) Communications Surveys and Tutorials, 18(3): 2027-2051, 2016.
DOI: 10.1109/COMST.2016.2548426, ISSN: 1553-877X.
(JCR IF 2014: 6.806; IT-ANVUR Class: 2)

[J36] Tooska Dargahi, Moreno Ambrosin, Mauro Conti, N. Asokan.
ABAKA: a Novel Attribute-Based k-Anonymous Collaborative Solution for LBSs.
In (Elsevier) Computer Communications, 85: 1-13, 2016.
DOI: 10.1016/j.comcom.2016.03.002, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class: 2)

[J35] Alberto Compagno, Mauro Conti, Antonio A. D'Amico, Gianluca Dini, Pericle Perazzo, Lorenzo Taponecco.
Modeling Enlargement Attacks Against UWB Distance Bounding.
In (IEEE) Transactions on Information Forensics & Security, 11(7): 1565-1577, 2016.
DOI: 10.1109/TIFS.2016.2541613, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J34] Alberto Giaretta, Sasitharan Balasubramaniam, Mauro Conti.
Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.
In (IEEE) Transactions on Information Forensics & Security, 11(4): 665-676, 2016.
DOI:10.1109/TIFS.2015.2505632, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J33] Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde.
Analyzing Android Encrypted Network Traffic to Identify User Actions.
In (IEEE) Transactions on Information Forensics & Security, 11(1): 114-125, 2016.
DOI: 10.1109/TIFS.2015.2478741, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J32] Smita Naval, Vijay Laxmi, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti.
Employing Program Semantics for Malware Detection.
In (IEEE) Transactions on Information Forensics & Security, 10(12): 2591-2604, 2015.
DOI: 10.1109/TIFS.2015.2469253, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J31] Fei Li, Yogachandran Rahulamathavan, Mauro Conti, Muttukrishnan Rajarajan.
Robust Access Control Framework for Mobile Cloud Computing Network.
In (Elsevier) Computer Communications, 68: 61-72, 2015.
DOI: 10.1016/j.comcom.2015.07.005, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class: 2)

[J30] Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan.
Android Security: A Survey of Issues, Malware Penetration and Defenses.
In (IEEE) Communications Surveys and Tutorials, 17(2): 998-1022, 2015.
DOI: 10.1109/COMST.2014.2386139, ISSN: 1553-877X.
(JCR IF 2014: 6.806; IT-ANVUR Class: 2)

[J29] Mauro Conti, Bruno Crispo, Daniele Diodati, Jukka K. Nurminen, Cristina M. Pinotti, Taavi Teemaa.
Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones.
In (IEEE) Transactions on Parallel and Distributed Systems, 26(10): 2778-2790, 2014
DOI: 10.1109/TPDS.2014.2360693, ISSN: 1045-9219.
(JCR IF 2013: 2.173; IT-ANVUR Class: 1)

[J28] Stefano Guarino, Eyup Canlar, Mauro Conti, Roberto Di Pietro, Agusti Solanas.
Provable Storage Medium for Data Storage Outsourcing.
In (IEEE) Transactions on Services Computing, 8(6): 985-997, 2014
DOI: 10.1109/TSC.2014.2355229, ISSN: 1939-1374.
(JCR IF 2013: 1.985; IT-ANVUR Class: 1)

[J27] Agusti Solanas, Constantinos Patsakis, Mauro Conti, Ioannis S. Vlachos, Victoria Ramos, Francisco Falcone, Octavian Postolache, Pablo A. Pérez-Martínez, Roberto Di Pietro, Despina N. Perrea, Antoni Martínez-Ballesté.
Smart Health: A Context-Aware Health Paradigm within Smart Cities.
In (IEEE) Communications Magazine, 52(8): 74-81, 2014.
DOI: 10.1109/MCOM.2014.6871673, ISSN: 0163-6804.
(JCR IF 2013: 4.460; IT-ANVUR Class: 1)

[J26] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
A Secure Alert Messaging System for Safe Driving.
In (Elsevier) Computer Communications, 46: 29-42, 2014.
DOI: 10.1016/j.comcom.2014.03.010, ISSN: 0140-3664.
(JCR IF 2014: 1.695; IT-ANVUR Class: 2)

[J25] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
In (IEEE) Transactions on Information Forensics & Security, 9(4): 681-694, 2014.
DOI: 10.1109/TIFS.2014.2307197, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J24] Claudio Ardagna, Mauro Conti, Mario Leone, Julinda Stefa.
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments.
In (IEEE) Transactions on Services Computing, 7(3): 373-386, 2014
DOI: 10.1109/TSC.2014.2304717, ISSN: 1939-1374.
(JCR IF 2013: 1.985; IT-ANVUR Class: 1)

[J23] Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes.
MOSES: Supporting and Enforcing Security Profiles on Smartphones.
In (IEEE) Transactions on Dependable and Secure Computing, 11(3): 211-22, 2014.
DOI: 10.1109/TDSC.2014.2300482, ISSN: 1545-5971.
(JCR IF 2013: 1.137; IT-ANVUR Class: 1)

[J22] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Fast and Secure Multi-hop Broadcast Solutions for Inter-Vehicular Communication.
In (IEEE) Transactions on Intelligent Transportation Systems, 15(1): 433-450, 2014.
DOI: 10.1109/TITS.2013.2277890, ISSN: 1524-9050.
(JCR IF 2013: 2.472; IT-ANVUR Class: 2)

[J21] Mauro Conti, Paolo Gasti, Marco Teoli.
A Lightweight Mechanism for Detection of Cache Pollution Attacks in Named Data Networking.
In (Elsevier) Computer Networks, 57(16): 3178-3191, 2013.
DOI: 10.1016/j.comnet.2013.07.034, ISSN: 1389-1286.
(JCR IF 2013: 1.282; IT-ANVUR Class: 1)

[J20] Bruno P.S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo.
Hybrid Static-Runtime Information Flow and Declassification Enforcement.
In (IEEE) Transactions on Information Forensics & Security, 8(8): 1294-1305, 2013.
DOI: 10.1109/TIFS.2013.2267798, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J19] Earlence Fernandes, Bruno Crispo, Mauro Conti.
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
In (IEEE) Transactions on Information Forensics & Security, 8(6): 1027-1037, 2013.
DOI: 10.1109/TIFS.2013.2259818, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J18] Mauro Conti, Arbnor Hasani, Bruno Crispo.
Virtual Private Social Networks and a Facebook Implementation.
In (ACM) Transactions on the Web, 7(3), 14:1--14:31, 2013.
DOI: 10.1145/2516633.2516636, ISSN: 1559-1131.
(JCR IF 2013: 1.595; IT-ANVUR Class: 1)

[J17] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Clone Wars: Distributed Detection of Clone Attack in Mobile WSNs.
In (Elsevier) Journal of Computer and System Sciences, 80(3): 654-669, 2014.
DOI: 10.1016/j.jcss.2013.06.017, ISSN: 0022-0000.
(JCR IF 2013: 1.091; IT-ANVUR Class: 1)

[J16] Mauro Conti, Jeroen Willemsen, Bruno Crispo.
Providing Source Location Privacy in Wireless Sensor Networks: a Survey.
In (IEEE) Communications Surveys and Tutorials, 15(3):1238-1280, 2013.
DOI: 10.1109/SURV.2013.011413.00118, ISSN: 1553-877X.
(JCR IF 2013: 6.490; IT-ANVUR Class: 2)

[J15] Eyup Serdar Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Windows Mobile LiveSD Forensics.
In (Elsevier) Journal of Network and Computer Applications, 36(2):677-684, 2013.
DOI: 10.1016/j.jnca.2012.12.024, ISSN: 1084-8045.
(JCR IF 2013: 1.772; IT-ANVUR Class: 2)

[J14] Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich.
CRêPE: a System for Enforcing Fine-Grained Context-Related Policies on Android.
In (IEEE) Transactions on Information Forensics & Security, 7(5): 1426-1438, 2012.
DOI: 10.1109/TIFS.2012.2204249, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J13] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Secure Data Aggregation in Wireless Sensor Networks.
In (IEEE) Transactions on Information Forensics & Security, 7(3): 1040-1052, 2012.
DOI: 10.1109/TIFS.2012.2189568, ISSN: 1556-6013.
(JCR IF 2013: 2.065; IT-ANVUR Class: 1)

[J12] Luciana Marconi, Mauro Conti, Roberto Di Pietro.
CASSANDRA: a probabilistic, efficient, and privacy preserving solution to compute set intersection.
In (Springer) International Journal of Information Security, 10(5):301-319, 2011.
DOI: 10.1007/s10207-011-0133-6, ISSN: 1615-5262.
(JCR IF 2013: 0.941; IT-ANVUR Class: 2)

[J11] Mauro Conti, Bruno Crispo, Roberto Di Pietro, Luciana Marconi.
Time in privacy preserving LBSs: an overlooked dimension.
In (Hindawi) International Journal of Vehicular Technology, 2011:1-12, Article ID 486975, 2011.
DOI: 10.1155/2011/486975, ISSN: 1687-5702

[J10] Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini.
Preserving privacy against external and internal threats in WSN data aggregation.
In (Springer) Telecommunication Systems, 52(4):2163-2176, 2013.
DOI: 10.1007/s11235-011-9539-8, ISSN: 1018-4864.
(JCR IF 2013: 1.163; IT-ANVUR Class: 3 - area 09)

[J9] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Who counterfeited my ViagraTM ? (Probabilistic item removal detection via RFID tag cooperation)
In (EURASIP) Journal on Wireless Communications and Networking, 2011:1-13, Article ID 575171, 2011.
DOI: 10.1155/2011/575171, ISSN: 1687-1499.
(JCR IF 2013: 0.805; IT-ANVUR Class: 4)

[J8] Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini.
Secure Topology Maintenance and Events Collection in WSNs.
In (Wiley) Security and Communication Networks, 4(7):744-762, 2011.
DOI: 10.1002/sec.280, ISSN: 1939-0114.
(JCR IF 2013: 0.433; IT-ANVUR Class: 3)

[J7] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Distributed Detection of Clone Attacks in Wireless Sensor Networks.
In (IEEE) Transactions on Dependable and Secure Computing , 8(5):685-698, 2011.
DOI: 10.1109/TDSC.2010.25, ISSN: 1545-5971.
(JCR IF 2013: 1.137; IT-ANVUR Class: 1)

[J6] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs.
In (EURASIP) Journal on Wireless Communications and Networking , 2009:1-13, Article ID 8, 2009.
DOI: 10.1155/2009/945943, ISSN: 1687-1499.
(JCR IF 2013: 0.805; IT-ANVUR Class: 4)

[J5] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi.
eRIPP-FS: Enforcing Privacy and Security in RFID.
In (Wiley) Security and Communication Networks , 3(1): 58-70, 2010.
DOI: 10.1002/sec.120, ISSN: 1939-0114.
(JCR IF 2013: 0.433; IT-ANVUR Class: 3)

[J4] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Secure Median Computation in Wireless Sensor Networks.
In (Elsevier) Ad Hoc Networks , 7(8): 1448-1462, 2009.
DOI: 10.1016/j.adhoc.2009.04.007, ISSN: 1570-8705.
(JCR IF 2013: 1.943; IT-ANVUR Class: 4)

[J3] Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia and Luigi V. Mancini.
Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks.
In (Wiley) Security and Communication Networks, 2(2): 195-213, 2009.
DOI: 10.1002/sec.95, ISSN: 1939-0122.
(JCR IF 2013: 0.433; IT-ANVUR Class: 3)

[J2] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
Distributed Data Source Verification in Wireless Sensor Networks.
In (Elsevier) Information Fusion , 10(4): 342-353, 2009.
DOI: 10.1016/j.inffus.2009.01.002, ISSN: 1566-2535.
(JCR IF 2013: 3.472; IT-ANVUR Class: 4)

[J1] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini.
ECCE: Enhanced Cooperative Channel Establishment for secure pair-wise communication in Wireless Sensor Networks.
In (Elsevier) Ad Hoc Networks , 5(1): 49-62, 2007.
DOI: 10.1016/j.adhoc.2006.05.013, ISSN: 1570-8705.
(JCR IF 2013: 1.943; IT-ANVUR Class: 4)


Books

[B4] Sushmita Ruj, Salil Kanhere, Mauro Conti.
Blockchains: Fundamentals, Applications and Security. (Edited Book)
(Springer), to appear, 2022.

[B3] Mauro Conti, Gaurav Somani, Radha Poovendran.
Versatile Cybersecurity. (Edited Book)
Advances in Information Security. Series Volume 72, 2018.
(Springer) (Series Editor: Sushil Jajodia).
DOI: 10.1007/978-3-319-97643-3, ISSN: 1568-2633, ISBN 978-3-3199-7642-6.

[B2] Ali Dehghantanha, Mauro Conti, Tooska Dargahi.
Cyber Threat Intelligence. (Edited Book)
Advances in Information Security. Series Volume 70, 2018.
(Springer) (Series Editor: Sushil Jajodia).
DOI: 10.1007/978-3-319-73951-9, ISSN: 1568-2633, ISBN 978-3-3197-3950-2.

[B1] Mauro Conti.
Secure Wireless Sensor Networks: Threats and Solutions.
Advances in Information Security. Series Volume 65, 2015.
(Springer) (Series Editor: Sushil Jajodia).
DOI: 10.1007/978-1-4939-3460-7, ISSN: 1568-2633, ISBN 978-1-4939-3458-4.


Book Chapters

[K16] Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti.
Cryptocurrency wallets: assessment and security.
In Blockchain for Cybersecurity in Cyber-Physical Systems, to appear, 2022.
(Springer) (Editors: Mamoun Alazab, Yassine Maleh, Imed Romdhani).

[K15] Mauro Conti, Gulshan Kumar, Chhagan Lal, Sushmita Ruj, Rahul Saha.
Blockchain-based Distributed and Secure Digital Forensic Investigation Systems.
In Blockchains: Fundamentals, Applications and Security, to appear, 2022.
(Springer) (Editors: Sushmita Ruj, Salil Kanhere, Mauro Conti).

[K14] Alessandro Brighente, Mauro Conti, Andrea De Salve.
The Ethereum Blockchain: Implementation and Security Aspects.
In Blockchains: Fundamentals, Applications and Security, to appear, 2022.
(Springer) (Editors: Sushmita Ruj, Salil Kanhere, Mauro Conti).

[K13] Mauro Conti, Ankit Gangwal, Chhagan Lal, Sushmita Ruj.
Bitcoin Blockchain System: An Overview of Security and Privacy Aspects.
In Blockchains: Fundamentals, Applications and Security, to appear, 2022.
(Springer) (Editors: Sushmita Ruj, Salil Kanhere, Mauro Conti).

[K12] Mauro Conti, Pallavi Kaliyar, Chhagan Lal.
Secure Machine to Machine Communication in Industrial Internet of Things.
In Security and Privacy Trends in the Industrial Internet of Things, pp 199-219, 2019.
(Springer) Advanced Sciences and Technologies for Security Applications. (Editors: Cristina Alcaraz).
DOI: 10.1007/978-3-030-12330-7_10, ISBN: 978-3-030-12330-7.

[K11] Mauro Conti, Edlira Dushku, Luigi V. Mancini.
Distributed Services Attestation in IoT.
In From Database to Cyber Security, to appear, 2018.
(Springer) (Editors: P. Samarati, I. Ray, I. Ray).

[K10] Ema Kušen, Mark Strembeck, Mauro Conti.
Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube.
In Lecture Notes on Social Networks, pp 63-83, 2018.
(Springer) (Editors: R. Alhajj, U. Glässer, H. Liu, R. Wittek, D. Zeng).
DOI: 10.1007/978-3-030-02592-2_4, ISBN: 978-3-030-02592-2.

[K9] Rehana Yasmin, M. Reza Memarian , Ville Leppänen, Mauro Conti.
Investigating the possibility of data leakage in time of live VM migration.
In Cyber Threat Intelligence, to appear, 2017.
(Springer) (Editors: Mauro Conti, Ali Dehghantanha, Tooska Dargahi).

[K8] Samuel Laurén, M. Reza Memarian, Mauro Conti, Ville Leppänen.
Analysis of Security in Modern Container Platforms.
In Research Advances in Cloud Computing, to appear, 2017.
(Springer) (Editors: Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya).

[K7] Mohammad Reza Memarian, Diogo Fernandes, Pedro Inacio, Ville Leppänen, Mauro Conti.
Applications of Trusted Computing in Cloud Context.
In Research Advances in Cloud Computing, to appear, 2017.
(Springer) (Editors: Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya).

[K6] Tooska Dargahi, Ali Dehghantanha, Mauro Conti.
Forensics Analysis of Android Mobile VoIP Apps.
In Contemporary digital forensic investigations of cloud and mobile applications, to appear, 2016.
(Elsevier) (Editors: Kim-Kwang Raymond Choo, Ali Dehghantanha).

[K5] Tooska Dargahi, Ali Dehghantanha, Mauro Conti.
Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
In Contemporary digital forensic investigations of cloud and mobile applications, to appear, 2016.
(Elsevier) (Editors: Kim-Kwang Raymond Choo, Ali Dehghantanha).

[K4] Hossein Fereidooni, Veelasha Moonsamy, Mauro Conti, Lejla Batina.
Efficient Classification of Android Malware in the wild using Robust Static Features.
In Protecting Mobile Networks and Devices: Challenges and Solutions, to appear, 2016.
(CRC Press - Taylor & Francis) (Editors: Weizhi Meng, Xiapu Luo, Jianying Zhou, Steven Furnell).

[K3] Mauro Conti, Fabio De Gaspari, Luigi Vincenzo Mancini.
Anonymity in an electronic society: A survey.
In Cyber Deception, pp 283-312, 2016.
(Springer) (Editors: Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, and Cliff Wang).
DOI: 10.1007/978-3-319-32699-3_12, ISBN: 978-3-319-32697-9.

[K2] Parvez Faruki, Vijay Laxmi, Manoj Gaur, Shweta Bhandari, Mauro Conti.
DroidAnalyst: Synergic Framework for Static and Dynamic App Analysis.
In Recent Advances in Computational Intelligence in Defense and Security, Volume 621, pp 519-552, 2015.
(Springer) (Editors: Rami Abielmona, Rafael Falcon, Nur Zincir-Heywood, Hussein Abbass).
DOI: 10.1007/978-3-319-26450-9_20, ISSN: 1860-949X.

[K1] Mauro Conti, Roberto Di Pietro, Luciana Marconi.
Privacy for LBSs: On Using a Footprint model to face the enemy.
In Advanced Research in Data Privacy, Studies in Computational Intelligence. Volume 567, pp 169-195, 2015.
(Springer) (Editors: Guillermo Navarro-arribas, Vincenc Torra).
DOI: 10.1007/978-3-319-09885-2_10, ISSN: 1860-949X, ISBN: 978-3-319-09884-5.


Reference Works

[R1] Mauro Conti, Federico Turrin.
Cyber Forensics for CPS.
In Encyclopedia of Cryptography, Security and Privacy, pp 1-3, 2021.
(Springer) (Editors: Sushil Jajodia, Pierangela Samarati, Moti Yung).
DOI: 10.1007/978-3-642-27739-9_1722-1, ISBN: 978-3-642-27739-9.


Conference and Workshop papers

[C305] Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek.
Beyond PhantomSponges: Enhancing Sponge Attack on Object Detection Models.
In Proceedings of the ACM Workshop on Wireless Security and Machine Learning.
(ACM SIGSAC WiSec workshop: WiseML 2024)
, in press, Seoul, Korea, 27-30 May, 2024.

[C304] Francesco Marchiori, Mauro Conti.
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems.
In Proceedings of the ACM Workshop on Wireless Security and Machine Learning.
(ACM SIGSAC WiSec workshop: WiseML 2024)
, in press, Seoul, Korea, 27-30 May, 2024.

[C303] Christina Kreza, Stefanos Koffas, Behrad Tajalli, Mauro Conti, Stjepan Picek.
Backdoors on manifold learning.
In Proceedings of the ACM Workshop on Wireless Security and Machine Learning.
(ACM SIGSAC WiSec workshop: WiseML 2024)
, in press, Seoul, Korea, 27-30 May, 2024.

[C302] Diogo Rodrigues, Goncalo Macedo, Mauro Conti, Pedro Pinto.
A Prototype for Generating Random Key Sounds to Prevent Keyboard Acoustic Side-Channel Attacks.
In Proceedings of the 22nd IEEE Mediterranean Electrotechnical Conference
(MELECON 2024)
, in press, Porto, Portugal, 25-27 June, 2024.
(MA:C)

[C301] Pier Paolo Tricomi, Mauro Conti, V.S. Subrahmanian, Saurabh Kumar.
Climbing the Influence Tiers on TikTok: A Multimodal Study.
In Proceedings of the 18th International AAAI Conference on Web and Social Media
(ICWSM 2024)
, in press, Buffalo, NY, USA, 3-6 June, 2024.
(GGS:2/A, LiveSHINE:A+, MA:A+; Acceptance rate: 20%)

[C300] Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti.
"All of me": Mining Users' Attributes from their Public Spotify Playlists".
In Proceedings of ACM The Web Conference
(WWW 2024)
, in press, Singapore, 13-17 May, 2024.
(GGS:1/A++, CORE:A++, LiveSHINE:A++, MA:A++; Acceptance rate: 20,2%)

[C299] Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang.
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the User's Perception of Adversarial Webpages.
In Proceedings of ACM The Web Conference
(WWW 2024)
, in press, Singapore, 13-17 May, 2024.
(GGS:1/A++, CORE:A++, LiveSHINE:A++, MA:A++; Acceptance rate: 20,2%)

[C298] Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, Selcuk Uluagac.
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones.
In Proceedings of the IEEE International Conference on Communications: Communication and Information System Security Symposium
(ICC 2024)
, in press, Denver, CO, USA, 9-13 June, 2024.
(GGS:2/A, LiveSHINE:A+, MA:A+; Acceptance rate: 40%)

[C297] Filippo Giambartolomei, Marc Barcelo, Alessandro Brighente, Aitor Urbieta, Mauro Conti.
Penetration Testing of 5G Core Network Web Technologies.
In Proceedings of the IEEE International Conference on Communications: Communication and Information System Security Symposium
(ICC 2024)
, in press, Denver, CO, USA, 9-13 June, 2024.
(GGS:2/A, LiveSHINE:A+, MA:A+; Acceptance rate: 40%)

[C296] Meng Li, Jianbo Gao, Zijian Zhang, Mauro Conti, Mamoun Alazab.
Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets.
In Proceedings of the IEEE International Conference on Communications: Communication and Information System Security Symposium
(ICC 2024)
, in press, Denver, CO, USA, 9-13 June, 2024.
(GGS:2/A, LiveSHINE:A+, MA:A+; Acceptance rate: 40%)

[C295] Alessandro Brighente, Saiqin Xu, Simone Soderi, Mauro Conti.
Physical Layer Authentication for Distributed RIS (DRIS) enabled VLC Systems.
In Proceedings of the IEEE International Conference on Communications: Communication and Information System Security Symposium
(ICC 2024)
, in press, Denver, CO, USA, 9-13 June, 2024.
(GGS:2/A, LiveSHINE:A+, MA:A+; Acceptance rate: 40%)

[C294] Alessandro Brighente, Mauro Conti, Sitora Salaeva, Federico Turrin.
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection.
In Proceedings of the 6th ACNS Workshop on Security in Machine Learning and its Applications
(SiMLA 2024)
, in press, Abu Dhabi, UAE, 5-8 March, 2024.

[C293] Harsha Vasudev, Shariq Mohamad, Sanjeev Dwivedi, Mauro Conti.
LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles.
In Proceedings of the 25th International Conference on Distributed Computing and Networking
(ICDCN 2024)
, in press, Chennai, India, 4-7 January, 2024.
(LiveSHINE:B-, MA:C)

[C292] Tommaso Bianchi, Alessandro Brighente, Mauro Conti.
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles.
In Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(WISEC 2024)
, in press, Seoul, Korea, 27-30 May, 2024.
(GGS:2/A-,LiveSHINE:A-, MA:A-; Acceptance rate: 17%)

[C291] Alessandro Visintin, Edoardo Liberati, Riccardo Lazzeretti, Mauro Conti, Selcuk Uluagac.
X-Lock: a secure XOR-based fuzzy extractor for resource constrained devices.
In Proceedings of the 22nd International Conference on Applied Cryptography and Network Security
(ACNS 2024)
, in press, Abu Dhabi, UAE, 5-8 March, 2024.
(GGS:2/A-,CORE:B, LiveSHINE:A, MA:A-)

[C290] Kavya Balasubramanian, Adithya Gowda Baragur, Denis Donadel, Dinuka Sahabandu, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran.
POSTER: CANLP: NLP-Based Intrusion Detection System for CAN.
In Proceedings of the 39th ACM/SIGAPP Symposium On Applied Computing
(ACM SAC 2024)
, in press, Avila, Spain, April 8-12, 2024.
(GGS:2/A-, CORE:B, LiveSHINE:A, MA:A)

[C289] Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde.
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation.
In Proceedings of the 6th Annual Workshop on Cyber Threat Intelligence and Hunting
(IEEE BigData 2023 Workshop: CYBERHUNT 2023)
, pp. 3053-3062, Sorrento, Italy, December 15-18, 2023.
DOI: 10.1109/BigData59044.2023.10386116.

[C288] Ankit Gangwal, Apoorva Thirupathi, Alessandro Brighente, Mauro Conti.
A First Look at Shill Looping in NFT Ecosystem.
In Proceedings of the 15th IEEE International Workshop on Information Forensics and Security
(IEEE WIFS 2023)
, in press, Nuremberg, Germany, December 4-7, 2023.
(MA:C)

[C287] Mansouri Mohamad, Melek Onen, Wafa Ben Jaballah, Mauro Conti.
SOK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning.
In Proceedings of the 23rd Privacy Enhancing Technologies Symposium
(PETS 2023)
, in press, Lausanne, Switzerland, July 10-15 2023.
(GGS: 2/A-; CORE:A; MA:A-; Acceptance rate: 22%)

[C286] Harsh Kasyap, Somanath Tripathy, Mauro Conti.
HDFL: Private and Robust Federated Learning using Hyperdimensional Computing.
In Proceedings of the 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(TrustCom 2023)
, in press, Exeter, UK, November 1-3, 2023.
(GGS: 1/A++; CORE:A++; LiveSHINE:A++; MA:A++)

[C285] Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek.
Turning Privacy-preserving Mechanisms against Federated Learning.
In Proceedings of the ACM Conference on Computer and Communications Security
(ACM CCS 2023)
, in press, Copenhagen, Denmark, November 26-30, 2023.
(GGS: 1/A++; CORE:A++; LiveSHINE:A++; MA:A++; Acceptance rate: 19.9%)

[C284] Francesco Marchiori, Mauro Conti.
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication.
In Proceedings of the ACM Conference on Computer and Communications Security
(ACM CCS 2023)
, in press, Copenhagen, Denmark, November 26-30, 2023.
(GGS: 1/A++; CORE:A++; LiveSHINE:A++; MA:A++; Acceptance rate: 19.9% )

[C283] Jelle Vos, Mauro Conti, Zekeriya Erkin.
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model
In Proceedings of the 45th IEEE Symposium on Security and Privacy
(IEEE S&P 2024)
, in press, San Francisco, CA, USA, May 20-23, 2024.
(GGS: 1/A++, CORE:A++, LiveSHINE:A++, MA:A++)

[C282] Victoria Bull, Niclas Finne, Andrea Agiollo, Pallavi Kaliyar, Luca Pajola, Thiemo Voigt, Mauro Conti.
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network.
In Proceedings of the 6th International Workshop on Attacks and Defenses for Internet-of-Things
(ESORICS 2023 Workshop: ADIoT 2023)
, in press, The Hague, NL, September 25-29, 2023.

[C281] Alessandro Visintin, Mauro Conti.
Leveraging social networks for mergers and acquisitions forecasting.
In Proceedings of the 24th International Conference on Web Information Systems Engineering
(WISE 2023)
, in press, Melbourne, Australia, October 25-27, 2023.
(GGS: 3/B; CORE:B; LiveSHINE:B; MA:B)

[C280] Massimiliano Baldo, Tommaso Bianchi, Mauro Conti, Alessio Trevisan, Federico Turrin.
HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments.
In Proceedings of the 9th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems
(ESORICS 2023 Workshop: CyberICPS 2023)
, in press, The Hague, NL, September 28, 2023.

[C279] Samaneh Mohammadi, Mohammadreza Mohammadi, Sima Sinaei, Ali Balador, Ehsan Nowroozi, Francesco Flammini, Mauro Conti.
Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition.
In Proceedings of the 18th Conference on Computer Science and Intelligence Systems
(FedCSIS 2023)
, in press, Warsaw, PL, September 17-20, 2023.
(GGS: 3/B-; CORE:B; LiveSHINE:B; MA:C)

[C278] Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin
Beware of Pickpockets: A Practical Attack against Blocking Cards.
In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses
(RAID 2023)
, in press, Hong Kong, October 16-18, 2023.
GGS: 1/A+; CORE:A; LiveSHINE:A+; MA:A+; Acceptance rate: 23.5%)

[C277] Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross Anderson, Mauro Conti.
Boosting Big Brother: Attacking Search Engines with Encodings.
In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses
(RAID 2023)
, in press, Hong Kong, October 16-18, 2023.
GGS: 1/A+; CORE:A; LiveSHINE:A+; MA:A+; Acceptance rate: 23.5%) (Best Paper Award)

[C276] Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability.
In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses
(RAID 2023)
, in press, Hong Kong, October 16-18, 2023.
GGS: 1/A+; CORE:A; LiveSHINE:A+; MA:A+; Acceptance rate: 23.5%)

[C275] Riccardo Cestaro, Mauro Conti, Elonora Mancini and Federico Turrin.
OpenScope-sec: An ADS-B Simulator to Support the Security Research.
In Proceedings of the 2nd Workshop on Cybersecurity in Industry 4.0
(ARES 2023 workshop: SecIndustry2023)
, Article 116, 1-6, Benevento, IT, August 29-September 01, 2023.
DOI:10.1145/3600160.3605065.

[C274] Alessandro Brighente, Mauro Conti, Giacomo Peruzzi, Alessandro Pozzebon.
ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning
In Proceedings of the 2023 IEEE Sensors Applications Symposium
(SAS 2023)
, in press, Ottawa, Ontario, Canada, July 18-20, 2023.

[C273] Francesco Marchiori, Mauro Conti and Nino Vincenzo Verde.
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports.
In Proceedings of the 18th International Conference on Availability, Reliability and Security
(ARES 2023)
, Article 3, 1-11, Benevento, IT, August 29-September 1, 2023. >br> DOI: 10.1145/3600160.3600182.
GGS: 3/B; CORE:B; LiveSHINE:A-; MA:B; Acceptance rate: 19,1%)

[C272] Francesco Luigi De Faveri, Luca Cosuti, Pier Paolo Tricomi, Mauro Conti.
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections.
In Proceedings of the 9th International Symposium on Security and Privacy in Social Networks and Big Data
(SocialSec 2023)
, in press, Canterbury, UK, August 14-16, 2023.

[C271] Federico Carboni, Mauro Conti, Denis Donadel, Mariano Sciacco.
If you're scanning this, it's too late! A QR Code-based Fuzzing Methodology To Identify Input Vulnerabilities In Mobile Apps.
In Proceedings of the 4th International Workshop on Security in Mobile Technologies
(SecMT 2023)
, in press, Kyoto, Japan, June 19-22, 2023.

[C270] Pier Paolo Tricomi, Sousan Tarahomi, Christian Cattai, Francesco Martini, Mauro Conti.
Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training.
In Proceedings of the 32nd International Conference on Computer Communications and Networks
(ICCCN 2023)
, in press, Honolulu, HI, USA, July 24-27, 2023.
(MA:C)

[C269] Giuseppe Cascavilla, Gemma Catolino, Mauro Conti, Dimos Mellios, Damian A. Tamburri.
When the Few Outweigh the Many: Illicit Content Recognition with Few-shot Learning.
In Proceedings of the 20th International Conference on Security and Cryptography
(SECRYPT 2023)
, in press, Rome, IT, July 10-12, 2023.
(LiveSHINE:C, MA:C)

[C268] Tommaso Bianchi, Surudhi Asokraj, Alessandro Brighente, Mauro Conti, Radha Poovendran.
QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer.
In Proceedings of the 97th IEEE Vehicular Technology Conference
(IEEE VTC 2023)
, in press, Florence, IT, June 20-23, 2023.
(GGS:2/A; LiveSHINE:A+, MA:A+)

[C267] Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini.
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks.
In Proceedings of the 8th IEEE European Symposium on Security and Privacy
(IEEE Euro S&P 2023)
, in press, Delft, NL, July 3 - 7, 2023.
(MA:C)

[C266] Marco Casagrande, Riccardo Cestaro, Eleonora Losiouk, Mauro Conti, Daniele Antonioli.
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem.
In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(ACM WiSec 2023)
, 85-95, Guildford, Surrey, UK, May 29 - June 01, 2023.
DOI: 10.1145/3558482.3590176.
(GGS:2/A-; LiveSHINE:A-, MA:A-; Acceptance rate: 25%)

[C265] Alessandro Lotto, Vaibhav Singh, Bhaskar Ramasubramanian, Alessandro Brighente, Mauro Conti, Radha Poovendran.
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks.
In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(ACM WiSec 2023)
, 133-144, Guildford, Surrey, UK, May 29 - June 01, 2023.
DOI: 10.1145/3558482.3590187.
(GGS:2/A-; LiveSHINE:A-, MA:A-; Acceptance rate: 25%)

[C264] Ko Zheng Teng, Trupil Limbasiya, Federico Turrin, Yan Lin Aung, Sudipta Chattopadhyay, Jianying Zhou, Mauro Conti.
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems.
In Proceedings of the 9th ACM Cyber-Physical System Security Workshop
(AsiaCCS 2023 Workshop: CPSS 2023)
, 3 - 13, Melbourne, Australia, July 10, 2023.
DOI: 10.1145/3592538.3594273. (Best Paper Award)

[C263] Sara Bardi, Mauro Conti, Luca Pajola and Pier Paolo Tricomi.
Social Honeypot for Humans: Luring People through Self-managed Instagram Pages Security.
In Proceedings of the 21st International Conference on Applied Cryptography and Network Security
(ACNS 2023)
, in press, Kyoto, Japan, June 19-22, 2023.
(GGS:2/A-,CORE:B, LiveSHINE:A, MA:A-)

[C262] Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti.
Going in Style: Audio Backdoors through Stylistic Transformations.
In Proceedings of the 48th IEEE International Conference on Acoustics, Speech, and Signal Processing
(ICASSP 2023)
, in press, Rhodes, Greece, June 4-10, 2023.
(GGS A/2, LiveSHINE:A+, MA:A+)

[C261] Ankit Gangwal, Aakash Jain, Mauro Conti.
On the Feasibility of Profiling Electric Vehicles through Charging Data.
In Proceedings of the Inaugural ISOC Symposium on Vehicle Security and Privacy
(VehicleSec 2023)
, in press, San Diego, CA, USA, February 27, 2023.
(Zoox Best Paper Award Runner-up)

[C260] Elisa Sartori, Luca Pajola, Giovanni Da San Martino, Mauro Conti.
The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum.
In Proceedings of ACM The Web Conference
(WWW '23)
, in press, Austin, TX, USA, April 30-May 4, 2023.
(GGS A++/1, CORE:A++, LiveSHINE:A++, MA:A++)

[C259] Pier Paolo Tricomi, Marco Chilese, Mauro Conti, Ahmad-Reza Sadeghi.
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms.
In Proceedings of 15th ACM Web Science Conference
(WebSci 2022)
, in press, Austin, TX, USA, April 30-May 1, 2023.
(MA:A++, Acceptance rate: 36%)

[C258] Emilie Bout, Valentin Bout, Alessandro Brighente, Mauro Conti, Valeria LoscrĂƒÂ¬.
Evaluation of Channel Hopping Strategies Against Smart Jamming Attacks.
In Proceedings of the 2023 IEEE International Conference on Communications
(ICC 2023)
, in press, Rome, Italy, May 28-June 01, 2023.
(GGS A/2, LiveSHINE:A+, MA:A+)

[C257] Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti.
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders.
In Proceedings of the 2023 IEEE International Conference on Communications
(ICC 2023)
, in press, Rome, Italy, May 28-June 01, 2023.
(GGS A/2, LiveSHINE:A+, MA:A+)

[C256] Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti.
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2.
In Proceedings of the 13th ACM Conference on Data and Application Security and Privacy
(ACM SIGSAC CODASPY 2023)
, in press, Charlotte, NC, USA, April 24-26, 2023.
(LiveSHINE: B)

[C255] Xiuzhen Cheng, Mauro Conti, Hao Liu, Riccardo Spolaor, Federico Turrin.
Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel.
In Proceedings of the IEEE International Conference on Computer Communications
(INFOCOM 2023)
, in press, New York, USA, May 17-20, 2023.
(GGS A++/1; CORE:A++, LiveSHINE:A++, MA:A++; Acceptance rate:19%)

[C254] Giovanni Apruzzese, Mauro Conti, Ying Yuan.
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning.
In Proceedings of the 38th Annual Computer Security Applications Conference
(ACSAC 2022)
, pages 171-185, Austin, TX, USA, December 5-9, 2022.
DOI: 10.1145/3564625.3567980.
(GGS A/2; LiveSHINE:A+; MA:A+)[reusable badge]

[C253] Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu.
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks.
In Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security
(ACM CCS 2022 workshop: AISec 2022)
, in press, Los Angeles, USA, November 11, 2022.
(LiveSHINE:C)

[C252] Antonio Ruggia, Eleonora Losiouk, Luca Verderame, Mauro Conti, Alessio Merlo.
Under the Hood of MARVEL.
In Proceedings of the Learning from Authoritative Security Experiment Results Workshop
(NDSS Workshop: LASER 2021)
, in press, Virtual, December 8 2021.

[C251] Adriaan de Vos, Alessandro Brighente, Mauro Conti.
Threat Sensitive Networking: on the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions.
In Proceedings of the 8th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems
(ESORICS 2022 Workshop: CyberICPS 2022)
, in press, Copenhagen, Denmark, September 26-29, 2022.

[C250] Meng Li, Jianbo Gao, Zijian Zhang, Chaoping Fu, Chhagan Lal, Mauro Conti.
Graph Encryption for Shortest Path Queries With k Unsorted Nodes.
In Proceedings of 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2022)
, in press, Wuhan, China, October 28-30, 2022.
(CORE:B, MA:C)

[C249] Ankit Gangwal, Rahul Valluri, Mauro Conti.
Analyzing Price Deviations in DeFi Oracles.
In Proceedings of 21st International Conference on Cryptology and Network Security
(CANS 2022)
, in press, Abu Dhabi, UAE, November 13-16, 2022.
(CORE:B, MA:C)

[C248] Simone Soderi, Alessandro Brighente, Federico Turrin, Mauro Conti.
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks.
In Proceedings of the 19th Annual IEEE International Conference on Sensing, Communication, and Networking
(SECON 2022)
, in press, Virtual, September 20-23, 2022.
(GGS A-/2; CORE:B; LiveSHINE:A, MA:A; Acceptance rate: 26%)

[C247] Arshdeep Singh, Rahul Saha, Mauro Conti, Gulshan Kumar.
PoSC: Combined Score for Consensus in Internet-of-Things Applications.
In Proceedings of 4th International Conference on Blockchain Computing and Applications
(BCCA 2022)
, pp. 173-180, San Antonio, TX, USA, September 5-7, 2022.
DOI: 10.1109/BCCA55292.2022.9921888.

[C246] Alessandro Brighente, Mauro Conti, Harsha Vasudev.
SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles.
In Proceedings of 30th International Conference on Software, Telecommunications, and Computer Networks
(SoftCOM2022)
, in press, Split, Croatia, September 22-24, 2022.
(LiveSHINE:C, MA:C)

[C245] Alessandro Brighente, Mauro Conti, Harsha Vasudev.
MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles.
In Proceedings of the 20th IEEE International Conference on Dependable, Autonomic & Secure Computing
(DASC 2022)
, in press, Calabria, Italy, September 12-15, 2022.
(CORE:C; LiveSHINE:B)

[C244] Alessandro Brighente, Mauro Conti, Savio Sciancalepore.
Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing.
In Proceedings of the 17th International Conference on Availability, Reliability and Security
(ARES 2022)
, in press, Vienna, Austria, August 23-26, 2022.
DOI: 10.1145/3538969.3543784.

[C243] Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Ahmed Taffal.
Sim2Testbed Transfer: NDN Performance Evaluation.
In Proceedings of the 5th International Workshop on Emerging Network Security
(ENS 2022)
, in press, Vienna, Austria, August 23-26, 2022.

[C242] Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti, Mamoun Alazab.
Repetitive, Oblivious, and Unlinkable SkNN over Encrypted-and-Updated Data on Cloud.
In Proceedings of the 24th International Conference on Information and Communications Security
(ICICS 2022)
, pp. 261-280, Vol. 13407, Canterbury, UK, 5-8 September, 2022.
DOI: 10.1007/978-3-031-15777-6_15; ISBN: 978-3-031-15777-6.
(GGS:3/B; CORE:B; LiveSHINE:B; MA:B)

[C241] Alessandro Brighente, Mauro Conti, Gulshan Kumar, Reza Ghanbari, Rahul Saha.
Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering.
In Proceedings of the 6th IEEE International Symposium on Measurements & Networking
(M&N 2022)
, in press, Padua, Italy, 18-20 July, 2022.

[C240] Mauro Conti, Denis Donadel, Radha Poovendran and Federico Turrin.
EVExchange: A Relay Attack on Electric Vehicle Charging System.
In Proceedings of the 27th European Symposium on Research in Computer Security
(ESORICS 2022)
, in press, Copenhagen, Denmark, 26-30 September, 2022.
(GGS:1/A+; CORE:A; LiveSHINE:A+; MA:A+)

[C239] Kiran Balagani, Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Gene Tsudik.
We can hear your PIN drop: A new acoustic side channel attack to profile PIN pads keys.
In Proceedings of the 27th European Symposium on Research in Computer Security
(ESORICS 2022)
, in press, Copenhagen, Denmark, 26-30 September, 2022.
(GGS:1/A+; CORE:A; LiveSHINE:A+; MA:A+)

[C238] Valerio Bellandi, Paolo Ceravolo, Mauro Conti, Maryam Ehsanpour.
Contactless Authentication for Wearable Devices Using RFID.
In Proceedings of the 2022 IEEE International Conference on Digital Health
(IEEE ICDH)
, in press, Barcelona, Spain 11-16 July, 2022.

[C237] Emilie Bout, Alessandro Brighente, Mauro Conti, Valeria Loscri.
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks.
In Proceedings of the 17th International Conference on Availability, Reliability and Security
(ARES 2022)
, in press, Vienna, Austria, August 23-26, 2022.
(GGS:3/B; CORE:B; LiveSHINE:A-; MA:B; Acceptance rate: 20,33%)

[C236] Matteo Cardaioli, Alessio Miolla, Mauro Conti, Giuseppe Sartori, Merylin Monaro, Cristina Scarpazza, NicolĂƒÂƒĂ‚Â² Navarin.
Face the Truth: Interpretable Emotion Genuineness Detection.
In Proceedings of the IEEE World Congress on Computational Intelligence
(WCCI 2022)
, in press, Padua, Italy, July 18-23, 2022.
(LiveSHINE:C, MA:B)

[C235] Mauro Conti, Francesco Trolese, Federico Turrin.
ICSpot: A High-Interaction Honeypot for Industrial Control Systems.
In Proceedings of the International Symposium on Networks, Computers and Communications
(ISNCC'22)
, in press, Shenzhen, China, July 19-22, 2022.
(CORE:C)

[C234] Irene Amerini, Mauro Conti, Luca Pajola.
PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart.
In Proceedings of the IEEE World Congress on Computational Intelligence
(WCCI 2022)
, in press, Padua, Italy, July 18-23, 2022.
(LiveSHINE:C, MA:B)

[C233] Alessandro Visintin, Flavio Toffalini, Eleonora Losiouk, Mauro Conti, Zhou Jianying.
HolA: Holistic and Autonomous Attestation for IoT Networks.
In Proceedings of 4th International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security
(AIoTS 2022)
, in press, Rome, Italy, June 20-23, 2022.
(AIoTS 2022 Best Workshop Paper)

[C232] Kristina Hristakieva, Stefano Cresci, Giovanni Da San Martino, Mauro Conti, Preslav Nakov.
The Spread of Propaganda by Coordinated Communities on Social Media.
In Proceedings of 14th ACM Web Science Conference
(WebSci 2022)
, in press, Barcelona, Spain, June 26-29, 2022.
DOI:10.1145/3501247.3531543.
(MA:A++, Acceptance rate: 37%) (Best Paper Award)

[C231] Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek.
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers.
In Proceedings of the ACM Workshop on Wireless Security and Machine Learning
(WiseML 2022)
, pp. 57-62, San Antonio, TX, USA, May 16-19, 2022.
DOI:3522783.3529523.

[C230] Stefanos Koffas, Stjepan Picek, Mauro Conti.
Dynamic Backdoors with Global Average Pooling.
In Proceedings of the IEEE International Conference on Artificial Intelligence Circuits and Systems 2022
(AICAS 2022)
, in press, Incheon, Korea, June 13-15, 2022.

[C229] Marco Casagrande, Eleonora Losiouk, Mauro Conti, Mathias Payer, Daniele Antonioli.
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem.
In Transactions on Cryptographic Hardware and Embedded Systems 2022 issue 3
(TCHES 2022 issue 3)
, in press, Leuven, Belgium, September 18-21, 2022.

[C228] Pavan Srihari Darbha, Mauro Conti, Eleonora Losiouk, Rajib Ranjan Maiti.
Face Recognition Systems: Are you sure they only consider your face?
In Proceedings of the 6th IEEE Workshop on the Internet of Safe Things
(SafeThings 2022, co-located with the 43rd IEEE S&P)
, in press, San Francisco, CA, USA, May 26, 2022.

[C227] Alessandro Brighente, Martina Camaioni, Mauro Conti, Ernesto Olivastri.
Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses.
In Proceedings of the 3rd Workshop on Blockchain Theory and Applications
(BRAIN 2022, workshop of PerCom 2022)
, in press, Pisa, IT, March 21-25, 2022.
(GGS: 1/A+; CORE:A++, LiveSHINE:A+, MA:A)

[C226] Mauro Conti, Eleonora Losiouk, Alessandro Visintin.
POSTER: What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels.
In Proceedings of the 37th ACM/SIGAPP Symposium On Applied Computing
(ACM SAC 2022)
, in press, Virtual, April 25 - 29, 2022.
(GGS: 2/A-; CORE: B; LiveSHINE: A; MA: A-)

[C225] Matteo Cardaioli, Pier Paolo Tricomi, Mauro Conti, Gene Tsudik.
Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection.
In Proceedings of the 20th International Conference on Pervasive Computing and Communications
(PerCom 2022)
, in press, Pisa, IT, March 21-25, 2022.
(GGS: 1/A+; CORE:A++, LiveSHINE:A+, MA:A)

[C224] Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu.
Building Embedded Systems Like It's 1996.
In Proceedings of the Network and Distributed System Security Symposium
(NDSS 2022)
, in press, San Diego, CA, USA, February 27-March 3, 2022.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A+)

[C223] Jinwoo Kim, Eduard Marin, Mauro Conti, Seungwon Shin.
EqualNet: A Secure and Practical Defense for Long-term Network.
In Proceedings of the Network and Distributed System Security Symposium
(NDSS 2022)
, in press, San Diego, CA, USA, February 27-March 3, 2022.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A+)

[C222] Yifei Chen, Meng Li, Shuli Zheng, Chhagan Lal, Mauro Conti.
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.
In Proceedings of the 17th International Workshop on Security and Trust Management
(ESORICS 2021 Workshop: STM 2021)
, in press, Darmstadt, Germany, October 8, 2021.
DOI:10.1007/978-3-030-91859-0_3, ISBN: 978-3-030-91859-0.

[C221] Alessandro Brighente, Mauro Conti, Reza Ghanbari, Gulshan Kumar, Rahul Saha.
Knocking on Tangle's Doors: Security Analysis of IOTA Ports.
In Proceedings of the 2021 Workshop on Blockchain Security, Application, and Performance
(IEEE Blockchain 2021 Workshop: BSAP 2021)
, in press, Melbourne, Australia, December 6-8, 2021.

[C220] Trupil Limbasiya, Amrita Ghosal, Mauro Conti.
AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks.
In Proceedings of the 23rd International Conference on Distributed Computing and Networking
(ICDCN 2021)
, in press, New Delhi, India, January 4-7, 2022.
(LiveSHINE:B-; MA:C; Acceptance rate: 32.3%)

[C219] Matteo Cardaioli, Stefano Cecconello, Merylin Monaro, Giuseppe Sartori, Mauro Conti, Graziella OrrĂƒÂƒĂ‚Â¹.
Malingering Scraper: A novel framework to reconstruct honest profiles from malingerer psychopathological tests.
In Proceedings of the 28th International Conference on Neural Information Processing
(ICONIP)
, 433-440, Virtual, December 8-12, 2021.
DOI: 10.1007/978-3-030-92310-5_50
(GGS: 3/B; CORE:B; MA:B)

[C218] Antonio Ruggia, Eleonora Losiouk, Luca Verderame, Mauro Conti, Alessio Merlo.
Repack Me If You Can: An Anti-Repackaging Solution based on Android Virtualization.
In Proceedings of the Annual Computer Security Applications Conference
(ACSAC)
, pages 970-981, Virtual, December 6-10, 2021.
DOI: 10.1145/3485832.3488021.
(GGS: 2/A; LiveSHINE: A+; MA: A+; Acceptance rate: 24,5%, ACSAC 2021 Distinguished Artifact Award)

[C217] Rahul Saha, Gulshan Kumar, Alessandro Brighente, Mauro Conti.
Towards an Enhanced Reputation System for IOTA's Coordicide.
In Proceedings of the Third International Conference on Blockchain Computing and Applications
(BCCA 2021)
, pp. 26-33, Tartu, Estonia, November 15-17, 2021.
DOI: 10.1109/BCCA53669.2021.9656975.

[C216] Yassine Mekdad, Giuseppe Bernieri, Mauro Conti, Abdeslam El Fergougui.
The Rise of ICS Malware: A Comparative Analysis.
In Proceedings of the 2nd International Workshop on Cyber-Physical Security for Critical Infrastructures Protection
(CPS4CIP 2021)
, in press, Virtual, October 4-8, 2022.

[C215] Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci.
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand.
In Proceedings of the 31st USENIX Security Symposium
(USENIX Security 2022)
, in press, Boston, MA, August 10-12, 2022.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++)

[C214] Pier Paolo Tricomi, Mauro Conti and Vinod P.
Secure Static Content Delivery for CDN using Blockchain Technology.
In Proceedings of the 5th International Workshop on Cryptocurrencies and Blockchain Technology
(CBT 2021)
, in press, Virtual, October 4-8, 2021.

[C213] Enkeleda Bardhi, Mauro Conti, Eleonora Losiouk, Riccardo Lazzeretti.
ICN PATTA: ICN Privacy Attack Through Traffic Analysis.
In Proceedings of the 46th IEEE Conference on Local Computer Networks
(IEEE LCN 2021)
, 443-446, Virtual, October 4, 2021.
DOI: 10.1109/LCN52139.2021.9525013.
(GGS:2/A-; LiveSHINE:A-, MA:A-; Acceptance rate: <30%)

[C212] Oguzhan Ersoy, Ziya A. Genc, Zekeriya Erkin, Mauro Conti.
Practical Exchange for Unique Digital Goods.
In Proceedings of the 3rd IEEE International Conference on Decentralized Applications and Infrastructures
(IEEE DAPPS 2021)
, 49-58, Virtual, August 23-26, 2021.
DOI: 10.1109/DAPPS52256.2021.00011.

[C211] Mohamad Mansouri, Wafa Jaballah, Melek Onen, Masoom Rabbani, Mauro Conti.
FADIA: FAirness-Driven collaboratIve remote Attestation.
In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(ACM WiSec 2021)
, 60-71, Virtual, 28 June-2 July, 2021.
DOI:10.1145/3448300.3468284
(GGS:3/B; LiveSHINE: A-; MA: B; Acceptance rate: 28%)

[C210] Giovanni Barbieri, Mauro Conti, Nils Ole Tippenhauer, Federico Turrin.
Assessing the Use of Insecure ICS Protocols via IXP Network traffic Analysis.
In Proceedings of the 30th International Conference on Computer Communications and Networks
(ICCCN 2021)
, in press, Athens, Greece, 19-22 July, 2021.
(MA:C; Acceptance rate: 25%)

[C209] Matteo Cardaioli, Mauro Conti, Andrea Di Sorbo, Enrico Fabrizio, Sonia Laudanna, Corrado Aaron Visaggio.
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency.
In Proceedings of the 30th International Conference on Computer Communications and Networks
(ICCCN 2021)
, 1-9, Athens, Greece, 19-22 July, 2021.
DOI: 10.1109/ICCCN52240.2021.9522339.
(MA:C; Acceptance rate: 25%)

[C208] Alessandro Brighente, Mauro Conti, Izza Sadaf.
Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand.
In Proceedings of the 26th European Symposium on Research in Computer Security.
(ESORICS 2021)
, in press, Darmstadt, Germany, 4-8 October 2021.
(GGS 2/A, CORE:A, LiveSHINE:A+, MA:A)

[C207] Yassine Mekdad, Giuseppe Bernieri, Mauro Conti, Abdeslam El Fergougui.
A Threat Model Method for ICS Malware: the TRISIS case.
In Proceedings of the Malicious Software and Hardware in Internet of Things.
(MAL-IoT 2021)
, 221-228, Virtual, 11 May 2021.
DOI: doi.org/10.1145/3457388.3458868

[C206] Luca Pajola, Mauro Conti.
Fall of Giants: How popular text-based MLaaS fall against a simple adversarial attack.
In Proceedings of the 6th IEEE European Symposium on Security and Privacy
(IEEE EuroS&P 2021)
, in press, Vienna, Austria, 7-11 September 2021.
DOI: 10.1109/EuroSP51992.2021.00023
(MA:C)

[C205] Luca Attanasio, Mauro Conti, Denis Donadel, Federico Turrin.
MiniV2G: An Electric Vehicle Charging Emulator.
In Proceedings of 7th ACM Cyber-Physical System Security Workshop
(ACM SIGSAC ASIACCS 2021 Workshop: CPSS 2021)
, 65-73, Virtual, 7 June, 2021.
DOI:10.1145/3457339.3457980

[C204] Marco Casagrande, Mauro Conti, Eleonora Losiouk.
Contact Tracing Made Un-relay-able.
In Proceedings of the 11th ACM Conference on Data and Application Security and Privacy
(ACM SIGSAC COSDASPY 2021)
, 221-232, Virtual, April 26-28, 2021.
DOI: 10.1145/3422337.3447829.
(LiveSHINE:B, MA:C, B, C)

[C203] Daniele Mari, Samuele Giuliano Piazzetta, Sara Bordin, Luca Pajola, Sebastiano Verde, Simone Milani, Mauro Conti.
Looking through walls: Inferring Scenes from Video-Surveillance Encrypted Traffic.
In Proceedings of 46th IEEE International Conference on Acoustic, Speech and Signal Processing
(IEEE ICASSP 2021)
2595-2599, Toronto, Ontario, Canada, 6-11 June, 2021.
DOI: 10.1109/ICASSP39728.2021.9414391
(GGS 2/A, CORE:B, LiveSHINE:A+, MA:A+)

[C202] Flavio Toffalini, Mariano Graziano, Mauro Conti, Jianying Zhou.
SnakeGX: a sneaky attack against SGX Enclaves.
In Proceedings of the 19th International Conference on Applied Cryptography and Network Security
(ACNS 2021)
, in press, Kamakura, Japan, June 21-24, 2021.
DOI:10.1007/978-3-030-78372-3_1
(GGS:2/A-,CORE:B, LiveSHINE:A, MA:A-; Acceptance rate: 16.9%)

[C201] Matteo Cardaioli, Pallavi Kaliyar, Pasquale Capuozzo, Mauro Conti, Giuseppe Sartori and Merylin Monaro.
Predicting Twitter Users' Political Orientation: An Application to the Italian Political Scenario.
In Proceedings of the IEEE/ACM International Conference on Social Networks Analysis and Mining
(ASONAM 2020)
, 159-165, Virtual, December 7-10, 2020.
DOI:10.1109/ASONAM49781.2020.9381470.
(LiveSHINE:B, MA:C; Acceptance rate: 17.8%)

[C200] Ankit Gangwal, Mauro Conti, Gianluca Lain, Samuele Giuliano Piazzetta.
Detecting Covert Cryptomining using HPC.
In Proceedings of 19th International Conference on Cryptology and Network Security
(CANS 2020)
, in press, Vienna, December 14-16, 2020.
(CORE:B, MA:C; Acceptance rate: 27.86%)

[C199] Ioanna Angeliki Kapetanidou, Muhammad Hassan, Christos-Alexandros Sarros, Mauro Conti, Vassilis Tsaoussidis.
Reputation-based Trust: A robust mechanism for Dynamic Adaptive Streaming over Named Data Networking.
In Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering
(IEEE BigDataSE 2020 co-located with IEEE TrustCom 2020)
, i114-121, Guangzhou, China, December 29, 2020 - January 1, 2021.
DOI: 10.1109/BigDataSE50710.2020.00023.

[C198] Anas Alsoliman, Giulio Rigoni, Marco Levorato, Mauro Conti, Cristina Pinotti, Nils Ole Tippenhauer.
COTS Drone Detection using Video Streaming Characteristics.
In Proceedings of 22nd International Conference on Distributed Computing and Networking
(ICDCN 2021)
, 166-175, Virtual, January 5-8, 2021.
DOI: 10.1145/3427796.3428480
(GGS: 3/B-; CORE:B, LiveSHINE:B-, MA:C)

[C197] Gabriele Etta, Alessandro Galeazzi, Matteo Cinelli, Walter Quattrociocchi and Mauro Conti.
Questionability of hashtags in a segregated environment: the case of Gab.
In Proceedings of Workshop on Disinformation and Coordinated Inauthentic Behavior.
(DisInfo 2020)
, vol. 10, no. 3, pp. 1252-1262, Virtual, October 06, 2020.
DOI: 10.1109/TCSS.2022.3171391, ISSN: 2329-924X.

[C196] Francesco Bizzaro, Mauro Conti, Maria Silvia Pini.
Proof of Evolution: Leveraging Blockchain Mining for a Cooperative Execution of Genetic Algorithms.
In Proceedings of the IEEE International Conference on Blockchain
(IEEE Blockchain 2020)
, in press, Virtual, November 2-6, 2020.

[C195] Pier Paolo Tricomi, Mauro Conti.
PvP: Profiling versus Player! Exploiting Gaming Data for Player Recognition.
In Proceedings of the 23rd Information Security Conference
(ISC 2020)
, vol. 12472, pp: 393-408, Bali, Indonesia, December 16-20, 2020.
DOI: 10.1007/978-3-030-62974-8_22; ISBN: 978-3-030-62974-8.
(GGS: 3/B-; CORE:B, LiveSHINE:B, MA:C; Acceptance rate: 23%)

[C194] Federico Turrin, Alessandro Erba, Nils Ole Tippenhauer, Mauro Conti.
A Statistical Analysis Framework for ICS Process Datasets.
In Proceedings of the Joint Workshop on CPS & IoT Security and Privacy
(ACM CCS 2020 Workshop: CPSIoTSec 2020)
, in press, Orlando, USA, November 9, 2020.

[C193] Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Luca Pajola, Federico Turrin.
Fake News Spreaders Profiling Through Behavioural Analysis.
PAN@CLEF 2020: Profiling Fake News Spreaders on Twitter.
In CLEF 2020 Labs and Workshops, Notebook Papers
(CLEF 2020)
, in press, Thessaloniki, Greece, September 22-25, 2020.

[C192] Mirko Polato, Fabio Aiolli, Mauro Conti, Stjepan Picek.
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems.
In Proceedings of the 25th European Symposium on Research in Computer Security
(ESORICS 2020)
, in press, Guildford, UK, September 14-18, 2020.
(GGS: 2/A; CORE: A, LiveSHINE: A+, MA: A; Acceptance rate: 19,67%)

[C191] Matteo Cardaioli, Mauro Conti, Kiran Balagani, Paolo Gasti.
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies Through Audio Leakage.
In Proceedings of the 25th European Symposium on Research in Computer Security
(ESORICS 2020)
, in press, Guildford, UK, September 14-18, 2020.
(GGS: 2/A; CORE: A, LiveSHINE: A+, MA: A; Acceptance rate: 19,67%)

[C190] Pier Paolo Tricomi, Mauro Conti, Gene Tsudik.
De-auth of the blue! Transparent De-authentication using Bluetooth Low Energy Beacon.
In Proceedings of the 25th European Symposium on Research in Computer Security
(ESORICS 2020)
, in press, Guildford, UK, September 14-18, 2020.
(GGS: 2/A; CORE: A, LiveSHINE: A+, MA: A; Acceptance rate: 19,67%)

[C189] Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti.
Improving Password Guessing via Representation Learning.
In Proceedings of the 42nd IEEE Symposium on Security and Privacy
(IEEE S&P 2021)
, in press, San Francisco, CA, May 23-27, 2021.
(GGS: 1/A++; CORE:A++; LiveSHINE:A++; MA:A++)

[C188] Andrea Calesso, Mauro Conti, Martino Grasselli.
CyberWolf in Wall Street: Assessing Vulnerabilities of ICT-Intensive Financial Markets.
In Proceedings of the 3rd International Workshop on Cyber Threat Intelligence Management
(ARES 2020 workshop: CyberTIM 2020)
, in press, Virtual, August 25-28, 2020.
(GGS: 3/B; CORE:B, LiveSHINE:A-, MA:B)

[C187] Yifei Chen, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti.
One-Time, Oblivious, and Unlinkable Query Processing over Encrypted Data On Cloud.
In Proceedings of the 22nd International Conference on Information and Communications Security.
(ICICS 2020)
, in press, Virtual, August 24-27, 2020.
(GGS:3/B; CORE: B; LiveSHINE: B; MA: B; Acceptance rate: 23.7%)

[C186] Mauro Conti, Giulio Rigoni, Flavio Toffalini.
ASAINT: A Spy App Identification System based on Network Traffic.
In Proceedings of the International Workshop on Security of Mobile Applications.
(IWSMA 2020)
, Article 51, 1-8, Virtual, August 25-28, 2020.
DOI: 10.1145/3407023.3407076.

[C185] Francesco Betti Sorbelli, Mauro Conti, Cristina Maria Pinotti, Giulio Rigoni.
UAVs Path Deviation Attacks: Survey and Research Challenges.
In Proceedings of the 2nd International Workshop on Internet of Autonomous Unmanned Vehicles
(IAUV 2020)
, pp. 1-6, Virtual, June 22-26, 2020.
DOI: 10.1109/SECONWorkshops50264.2020.9149780.

[C184] Giuseppe Bernieri, Mauro Conti, Matteo Sovilla, Federico Turrin.
ALISI: A Lightweight Identification System based on Iroha.
In Proceedings of the 35th Annual ACM Symposium on Applied Computing.
(ACM SAC 2020)
, in press, Virtual, March 30 - April 3, 2020.
(GGS: 2/A-; CORE: B; LiveSHINE: A; MA: A-; Acceptance rate: 25.00%)

[C183] Mattia Carlucci, Stefano Cecconello, Mauro Conti, Piero Romare.
Eathentication: A Chewing-based Authentication Method.
In Proceedings of the 8th IEEE Conference on Communications and Network Security.
(IEEE CNS 2020)
, in press, Virtual, June 29 - July 1, 2020.
(MA: C; Acceptance rate: 27.8%)

[C182] Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac.
I see your smart home activities, even encrypted!.
In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks.
(ACM WiSec 2020)
, 207-218, Virtual, July 8-10, 2020.
DOI: 10.1145/3395351.3399421.
(GGS:3/B; LiveSHINE: A-; MA: B)

[C181] Amrita Ghosal, Subir Halder, Mauro Conti.
STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles.
In Proceedings of the 54th IEEE International Conference on Communications.
(IEEE ICC 2020)
, pp. 1-6, Dublin, Ireland, June 7\9611, 2020.
DOI: 10.1109/ICC40277.2020.9148649.
(GGS:2/A; CORE: B; LiveSHINE: A+; MA: A+)

[C180] Filippo Berto, Luca Calderoni, Mauro Conti, Eleonora Losiouk.
Spatial Bloom Filter in Named Data Networking: a Memory Efficient Solution.
In Proceedings of the 35th ACM/SIGAPP Symposium On Applied Computing.
(SAC 2020)
, pp. 274-277, Brno, Czech Republic, March 30 - April 3, 2020.
DOI: 10.1145/3341105.3374074.
(GGS:2/A-; CORE: B; LiveSHINE: A; MA: A)

[C179] Alberto Compagno, Mauro Conti, Eleonora Losiouk, Gene Tsudik, Sebastiano Valle.
A Proactive Cache Privacy Attack on NDN.
In Proceedings of the 2020 IEEE/IFIP Network Operations and Management Symposium.
(NOMS 2020)
, pp. 1-7, Budapest, Hungary, April 20-24, 2020.
DOI: 10.1109/NOMS47738.2020.9110318.
(GGS:3/B ; CORE: B; LiveSHINE: A-; MA: B)

[C178] Md Masoom Rabbani, Jo Vligen, Mauro Conti, Nele Mentens.
SHeFU: Secure Hardware-Enabled Protocol for Firmware Updates.
In Proceedings of the 2020 IEEE International Symposium on Circuits & Systems
(ISCAC 2020)
, pp. 1-5, Sevilla, Spain, May 17-20, 2020.
DOI: 10.1109/ISCAS45731.2020.9180850.
(GGS:B; CORE: C; LiveSHINE: A+; MA: A-)

[C177] Matteo Cardaioli, Merylin Monaro, Mauro Conti, Giuseppe Sartori.
Detecting identity deception in online context: a practical approach based on keystroke dynamics.
In Proceedings of the 11th International Conference on Applied Human Factors and Ergonomics.
(AHFE 2020)
, pages 41-48, San Diego, California, USA, June 16-20, 2020.
DOI: 10.1007/978-3-030-52581-1_6, ISBN: 978-3-030-52580-4.

[C176] Giuseppe Bernieri, Mauro Conti, Federico Turrin.
KingFisher: an Industrial Security Framework based on Variational Autoencoders.
In Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems.
(SenSys-ML 2019)
, 7-12, New York, USA, November 10, 2019.
DOI: 10.1145/3362743.3362961.

[C175] Mauro Conti, Edlira Dushku, Luigi V. Mancini, Md Masoom Rabbani, Silvio Ranise.
Remote Attestation as a Service for IoT.
In Proceedings of the 6th IEEE International Conference on Internet of Things: Systems, Management and Security.
(IOTSMS 2019)
, pp. 320-325, Granada, Spain, October 22-25, 2019.
DOI: 10.1109/IOTSMS48152.2019.8939224.

[C174] Subir Halder, Mauro Conti, Sajal K. Das.
COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks.
In Proceedings of the 21st International Conference on Distributed Computing and Networking.
(ICDCN 2020)
, Article 22, 1-10, Kolkata, India, January 4-7, 2020.
DOI: 10.1145/3369740.3369787.
(GGS: 3/B-; CORE: B; LiveSHINE: B-; MA: C)

[C173] Eduard Marin, Nicola Bucciol, Mauro Conti.
An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures.
In Proceedings of the 26th ACM Conference on Computer and Communications Security.
(ACM CCS 2019)
, pages 1101-1114, London, UK, November 11-15, 2019.
DOI: 10.1145/3319535.3354194, ISBN: 978-1-4503-6747-9.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++)

[C172] Michael Piskozub, Riccardo Spolaor, Mauro Conti, Ivan Martinovic.
On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks.
In Proceedings of the 6th ACMWorkshop on Moving Target Defence.
(ACM CCS 2019 workshop: MTD 2019)
, 1-12, London, UK, November 11, 2019.
DOI: 10.1145/3338468.3356825.

[C171] Mauro Conti, Muhammad Hassan, Md Masoom Rabbani, Silvio Ranise.
RICe: Remote Attestation of Internet of Mobile Things in Information Centric Networking.
In Proceedings of the Human-centered cybersecurity International workshop at CHITALY 2019.
(The Biannual Conference of the Italian SIGCHI Chapter)
, in press, Padua, Italy, September 23-25, 2019.

[C170] Neda Maleki, Mohammad Loni, Masoud Daneshtalab, Mauro Conti, Hossein Fotouhi.
SoFA: A Spark-oriented Fog Architecture.
In Proceedings of the 45th Annual Conference of the IEEE Industrial Electronics Society.
(IEEE IECON 2019)
, pp. 2792-2799, Lisbon, Portugal, October 14-17, 2019.
DOI: 10.1109/IECON.2019.8927065.
(MA: A-)

[C169] Giuseppe Bernieri, Mauro Conti, Federica Pascucci.
MimePot: a Model-based Honeypot for Industrial Control Networks.
In Proceedings of the 2019 IEEE International Conference on Systems, Man, and Cybernetic.
(IEEE SMC 2019)
, 433-438, Bari, Italy, October 6-9, 2019.
DOI:10.1109/SMC.2019.8913891.
(GGS: 2/A-; CORE: B; LiveSHINE: B; MA: A++)

[C168] Giuseppe Bernieri, Mauro Conti, Gabriele Pozzan.
AMON: an Automaton MONitor for Industrial Cyber-Physical Security.
In Proceedings of the 14th International Workshop on Frontiers in Availability, Reliability and Security.
(ARES 2019 workshop: FARES 2019)
, Article 33, pp. 1-10, Canterbury, UK, August 26-29, 2019.
DOI:10.1145/3339252.3340521.

[C167] Mauro Conti, Giuseppe Bernieri, Federico Turrin.
Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks.
In Proceedings of the IEEE International Symposium on Measurements & Networking.
(IEEE M&N 2019)
, pp. 1-6, Catania, Italy, July 8-10, 2019.
DOI:10.1109/IWMN.2019.8805036.

[C166] Pallavi Kaliyar, Mauro Conti.
POSTER: Secure and Scalable routing protocol for Internet of Things.
In Proceedings of the ACM Celebration of Women in Computing: womENcourage 2019.
(womENcourage 2019)
, in press, Roma, Italy, September 16-18, 2019.

[C165] Flavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, Mauro Conti.
ScaRR: Scalable Runtime Remote Attestation for Complex Systems.
In 22nd International Symposium on Research in Attacks, Intrusions and Defenses.
(RAID 2019)
, in press, Beijing, China, September 23-25, 2019.
(GGS: 1/A+; CORE: A+; LiveSHINE: A+)

[C164] Mauro Conti, Ankit Gangwal, Michele Todero.
Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages.
In Proceedings of the 14th International Conference on Availability, Reliability and Security.
(ARES 2019)
, Article 16, 1-8, Canterbury, UK, August 26-29, 2019.
DOI:10.1145/3339252.3339255.
(GGS: 3/B; CORE: B; LiveSHINE: A-; Acceptance rate: 20.75%)

[C163] Md. Hajian Berenjestanaki, Mauro Conti, Ankit Gangwal.
On the Exploitation of Online SMS Receiving Services to Forge ID Verification.
In Proceedings of the 14th International Conference on Availability, Reliability and Security.
(ARES 2019)
, pp. 1-5, Canterbury, UK, August 26-29, 2019.
DOI:10.1145/3339252.3339276.
(GGS: 3/B; CORE: B; LiveSHINE: A-; Acceptance rate: 20.75%)

[C162] Amrita Ghosal, Subir Halder and Mauro Conti.
DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia Things
In Proceedings of the 28th IEEE International Conference on Computer Communications and Networks.
(IEEE ICCCN 2019)
, pp. 1-9, Valencia, Spain, July 29 - August 1 2019.
DOI:10.1109/ICCCN.2019.8846929.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 29.00%)

[C161] Abdelmadjid Benarfa, Muhammad Hassan, Alberto Compagno, Eleonora Losiouk, Mohamed bachir Yagoubi, Mauro Conti.
ChoKIFA: A New Detection and Mitigation Approach against Interest Flooding Attacks in NDN.
In Proceedings of the 17th International Conference on Wired/Wireless Internet Communications.
(IFIP WWIC 2019)
, vol. 11618, Bologna, Italy, June 17-18, 2019.
DoI:10.1007/978-3-030-30523-9_5, ISBN: 978-3-030-30523-9.
(LiveSHINE: C; MA: C)

[C160] Luca Pajola, Luca Pasa, Mauro Conti.
Threat is in the Air: Machine Learning for Wireless Network Applications.
In Proceedings of the ACM Workshop on Wireless Security and Machine Learning.
(ACM SIGSAC WiSec workshop: WiseML 2019)
, pp. 16-21, Miami, FL, USA, May 14, 2019.
DOI:10.1145/3324921.3328783.
(GGS: 3/B; LiveSHINE: A-; MA: B)

[C159] Mauro Conti, Edlira Dushku, Luigi Vincenzo Mancini.
RADIS: Remote Attestation of Distributed IoT Services.
In Proceedings of the 6th IEEE International Conference on Software Defined Systems.
(IEEE SDS 2019)
, pp. 25-32, Rome, Italy, June 10-13 2019.
DOI:10.1109/SDS.2019.8768670.

[C158] Muhammad Hassan, Hani Salah, Mauro Conti, Frank H. P. Fitzek, Thorsten Strufe.
CoMon-DAS: A Framework for Efficient and Robust Dynamic Adaptive Streaming over NDN.
In Proceedings of the 24th IEEE Symposium on Computers and Communications.
(IEEE ISCC 2019)
, pp. 1-7, Barcelona, Spain, June 29 - July 3 2019.
DOI:10.1109/ISCC47284.2019.8969686.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C157] Stefano Calzavara, Mauro Conti, Riccardo Focardi, Alvise Rabitti, Gabriele Tolomei.
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities.
In Proceedings of the 4th IEEE European Symposium on Security and Privacy.
(IEEE Euro S&P 2019)
, pp. 528-543, Stockholm, Sweden, June 17-19 2019. DOI:10.1109/EuroSP.2019.00045.
(MA: C; Acceptance rate: 22.9%)

[C156] Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran.
Detecting ADS-B Spoofing Attacks using Deep Neural Networks.
In Proceedings of the 7th IEEE Conference on Communications and Network Security.
(IEEE CNS 2019)
, 187-195, Washington, D.C., June 10-12 2019.
DOI:10.1109/CNS.2019.8802732.
(MA: C; Acceptance rate: 27.8%)

[C155] Seyed Farhad Aghili, Hamid Mala, Mohammad Shojafar, Mauro Conti.
PAKIT: Proactive Authentication and Key Agreement Protocol for Internet of Things.
In Proceedings of the 1st International workshop on Resilient and Secure IoT.
(IEEE INFOCOM 2019 workshop: Resilient and Secure IoT for Health 2019)
, 348-353, Paris, France, 29 April - 2 May 2019.
DOI:10.1109/INFCOMW.2019.8845220.

[C154] Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Radha Poovendran.
TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks.
In Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems
(ICCPS 2019)
, 23-34, Montreal, Canada, April 16-18, 2019.
DOI:10.1145/3302509.3313783.

[C153] Shubhani Aggarwal, Mohammad Shojafar, Neeraj Kumar, Mauro Conti.
A New Secure Data Dissemination Model in Internet of Drones.
In Proceedings of the 53rd IEEE International Conference on Communications
(IEEE ICC 2019)
, pp. 23-34, Shanghai, China, May 20-24, 2019.
DOI:10.1109/ICC.2019.8761372.
(GGS: 2/A; CORE: B; LiveSHINE: A+; MA: A+; Acceptance rate: 39.00%)

[C152] Hassan Naderi, Vinod P., Mauro Conti, Saeed Parsa, Mohammad Hadi Alaeiyan.
Malware Signature Generation using by Locality Sensitive Hashing.
In Proceedings of the 2nd ISEA International Conference on Security & Privacy 2018.
(ISEA ISAP 2018)
, vol. 939, MNIT, Jaipur, India, January 9-11, 2019.
DOI:10.1007/978-981-13-7561-3_9.

[C151] Subir Halder, Mauro Conti.
Don't Hesitate to Share! A Novel IoT Data Protection Scheme Based on BGN.
In Proceedings of the 34th ACM Symposium On Applied Computing
(ACM SAC 2019)
, pp. 284-291, Limassol, Cyprus, April 8-12, 2019.
DOI:10.1145/3297280.3297310.
(GGS: 2/A-; CORE: B; LiveSHINE: A; MA: A-; Acceptance rate: 25.00%; ACM-DADS '19 track Best Paper and runner up for ACM SAC '19 Best Paper)

[C150] Fabio Aiolli, Mauro Conti, Ankit Gangwal, Mirko Polato.
Mind Your Wallet's Privacy: Identifying Bitcoin Wallet Apps and User's Actions through Network Traffic Analysis.
In Proceedings of the 34th ACM Symposium On Applied Computing
(ACM SAC 2019)
, pages 1484-1491, Limassol, Cyprus, April 8-12, 2019.
DOI: 10.1145/3297280.3297430, ISBN: 978-1-4503-5933-7.
(GGS: 2/A-; CORE: B; LiveSHINE: A; MA: A-; Acceptance rate: 25.00%)

[C149] Jo Vligen, Md Masoom Rabbani, Mauro Conti, Nele Mentens.
SACHa: Self-Attestation of Configurable Hardware.
In Proceedings of the Design Automation and Test in Europe Conference
(DATE 2019)
, pp. 746-751, Firenze Fiera, Florence, Italy, March 25-29, 2019.
DOI:10.23919/DATE.2019.8714775.
(GGS: 2/A; CORE: B; LiveSHINE: A++; MA: A; Acceptance rate: 24.00%)

[C148] Mayank Swarnkar, Neminath Hubballi, Nikhil Tripathi, Mauro Conti.
AppHunter: Mobile Application Traffic Classification.
In Proceedings of the 12th IEEE International Conference on Advanced Networks and Telecommunications Systems
(IEEE ANTS 2018)
, pp.1-6, Indore, India, December 16-19, 2018.
DOI:10.1109/ANTS.2018.8710170.

[C147] Mauro Conti, Pallavi Kaliyar, Md Masoom Rabbani, Silvio Ranise.
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things.
In Proceedings of the 14th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
(IEEE WiMob 2018)
, 1-8, Limassol, Cyprus, October 15-17, 2018.
DOI:10.1109/WiMOB.2018.8589115.
(GGS: 3/B; LiveSHINE: B; MA: B)

[C146] Tommi GrĂƒÂƒĂ‚Â¶ndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan.
All you need is "love": Evading hate speech detection.
In Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security
(ACM CCS 2018 workshop: AISec 2018)
, pp. 2-12, Toronto, Canada, October 19, 2018.
DOI:10.1145/3270101.3270103.

[C145] Sankardas Roy, Daniele Tomasi, Mauro Conti, Shiva Bhusal, Arkajyoti Roy, Jiang Li.
Optimizing Message Ferry Scheduling in a DTN.
In Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access
(ACM MobiWac)
, 113-117, Montreal, Canada October 28 - November 2, 2018.
DOI:10.1145/3265863.3265884.
(LiveSHINE:C; MA:C)

[C144] Moreno Ambrosin; Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise.
PADS: Practical Attestation for Highly Dynamic Swarm Topologies.
In Proceedings of the 7th International Workshop on Secure Internet of Things
(ESORICS 2018 workshop: SIoT 2018)
, pp.18-27, Barcelona, Spain, September 3-7, 2018.
DOI:10.1109/SIoT.2018.00009.

[C143] Giovanna Carofiglio, Alberto Compagno, Mauro Conti, Fabio De Gaspari, Luca Muscariello.
IaaS-Aided Access Control for Information-Centric IoT.
In Proceedings of the 43rd IEEE Conference on Local Computer Networks
(IEEE LCN 2018)
, 208-216, Chicago, USA, October 1-4 2018.
DOI:10.1109/LCN.2018.8638228.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 30.00%)

[C142] Alberto Compagno, Mauro Conti, Stefano Munari, Riccardo Lazzeretti.
GATE and FENCE: Geo-Blocking Protocols for Named Data Networking.
In Proceedings of the 43rd IEEE Conference on Local Computer Networks
(IEEE LCN 2018)
, 580-588, Chicago, USA, October 1-4 2018.
DOI:10.1109/LCN.2018.8638053.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 30.00%)

[C141] Giuseppe Bernieri, Mauro Conti, Federica Pascucci.
A Novel Architecture for Cyber-Physical Security in Industrial Control Networks.
In Proceedings of the 4th International Forum on Research and Technologies for Society and Industry
(RTSI 2018)
, pp. 1-6, Palermo, Italy, September 10-13 2018.
DOI:10.1109/RTSI.2018.8548438.

[C140] Angelo Capossele, Mauro Conti, Andrea Gaglione, Riccardo Lazzeretti, Paolo Missier, Michele Nati.
Leveraging blockchain to enable smart-health applications.
In Proceedings of the 4th International Forum on Research and Technologies for Society and Industry
(RTSI 2018)
, Palermo, Italy, September 10-13 2018.
DOI:10.1016/j.jksuci.2021.09.004, ISSN 1319-1578.

[C139] Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter.
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In Proceedings of the 23rd European Symposium on Research in Computer Security
(ESORICS 2018)
, pp. 595-617, Barcelona, Spain, September 3-7, 2018.
DOI:10.1007/978-3-319-99073-6_29, ISBN: 978-3-319-99073-6.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 20.00%)

[C138] Kiran Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu.
SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
In Proceedings of the 23rd European Symposium on Research in Computer Security
(ESORICS 2018)
, pp. 263-280, Barcelona, Spain, September 3-7, 2018.
DoI: 10.1007/978-3-319-99073-6_13, ISBN: 978-3-319-99073-6.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 20.00%)

[C137] Neda Maleki, Amir Masoud Rahmani, Mauro Conti.
POSTER: An Intelligent Framework to Parallelize Hadoop Phases.
In Proceedings of the 27th International Symposium on High-Performance Parallel and Distributed Computing
(ACM HPDC 2018)
, in press, Tempe, Arizona, USA, June 11-15, 2018.
(GGS: 2/A; CORE: A; LiveSHINE: A; MA: A)

[C136] Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi.
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In Proceedings of the 27th USENIX Security Symposium
(USENIX Security 2018)
, pp. 1213-1227, Baltimore, USA, August 15-17, 2018.
DOI: 10.5555/3277203.3277294, ISBN: 978-1-931971-46-1.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 19.08%)

[C135] Merylin Monaro, Marta Businaro, Riccardo Spolaor, Qian Qian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori.
The Online Identity Detection via Keyboard Dynamics.
In Proceedings of the IEEE Future Technologies Conference
(FTC)
, pp. 342-357, Vancouver, Canada, November 13-14, 2018.
DOI: 10.1007/978-3-030-02683-7_24, ISBN: 978-3-030-02683-7.

[C134] Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lin Wang, Bo Yang, Mauro Conti.
Deep and Broad Learning based Detection of Android Malware via Network Traffic.
In Proceedings of the IEEE/ACM International Symposium on Quality of Service
(IWQoS)
, in press, Alberta, Canada, June 4-6, 2018.

[C133] Mauro Conti, Ankit Gangwal, Sarada Prasad Gochhayat, Gabriele Tolomei.
Spot the Difference: Your Bucket is Leaking - A Novel Methodology to Expose A/B Testing Effortlessly.
In Proceedings of the 4th IEEE Workshop on Security and Privacy in the Cloud
(IEEE CNS 2018 workshop: SPC 2018)
, pages 1-7, Beijing, China, May 30, 2018.
DOI: 10.1109/CNS.2018.8433122, ISBN: 978-1-5386-4586-4.

[C132] Sana Belguith, Sarada Prasad Gochhayat, Mauro Conti, Giovanni Russello.
Emergency Access Control Management Via Attribute Based Encrypted QR Codes.
In Proceedings of the 4th IEEE Workshop on Security and Privacy in the Cloud
(IEEE CNS 2018 workshop: SPC 2018)
, in press, Beijing, China, May 30, 2018.

[C131] Mauro Conti, Ralph Droms, Muhammad Hassan, Sebastiano Valle.
QoE Degradation Attack in Dynamic Adaptive Streaming over ICN.
In Proceedings of the 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2018)
, in press, Chania, Greece, June 12-15, 2018.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B)

[C130] Zahra Pooranian, Kang-Cheng Chen, Chia-Mu Yu, Mauro Conti.
RARE: Defeating Side Channels based on Data-Deduplication in Cloud Storage.
In Proceedings of the 7th International workshop on Cloud Computing Systems, Networks, and Applications
(IEEE INFOCOM 2018 workshop: CCSNA 2018)
, in press, Honolulu, USA, April 16, 2018.

[C129] Amit Kumar Sikder, Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya, Mauro Conti.
IoT-based Smart Lighting Communication Protocols for Smart Cities.
In Proceedings of the 8th IEEE Annual Computing and Communication Workshop and Conference
(CCWC 2018)
, in press, Las Vegas, NV, USA, January 8-10, 2018.

[C128] Andrea Biondo, Mauro Conti, Daniele Lain.
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets.
In Proceedings of the Network and Distributed System Security Symposium
(NDSS 2018)
, in press, San Diego, CA, February 18-21, 2018.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A+)

[C127] Wafa Ben Jaballah, Mauro Conti, Claudio E. Palazzi.
The Position Cheating Attack on Inter-Vehicular Online Gaming.
In Proceedings of the 15th IEEE Consumer Communications and Networking Conference
(IEEE CCNC 2018)
, in press, Las Vegas, USA, January 12-15, 2018.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C126] Mauro Conti, Daniele Lain, Riccardo Lazzaretti, Giulio Lovisotto, Walter Quattrociocchi.
It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via
Propagation Features.
In Proceedings of the 9th IEEE International Workshop on Information Forensics and Security
(IEEE WIFS 2017)
, in press, Rennes, France, December 4-7, 2017.

[C125] Zahra Pooranian, Mohammad Shojafar, Paola G. Vinueza Naranjo, Luca Chiaraviglio, Mauro Conti.
A Novel Distributed Fog-based Networked Architecture to Preserve Energy of Fog Data Center.
In Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems
(IEEE MASS 2017)
, pages 604-609, Orlando, Florida, USA, October 22-25, 2017.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B)

[C124] Matteo Brunati, Mauro Conti, Alessandro Tezza.
SNIFFO: Security of Networks and Intelligence for Field Operations.
In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
(IEEE WiMob 2017)
, in press, Rome, Italy, October 9-11, 2017.
(GGS: 3/B; LiveSHINE: B; MA: B; Acceptance rate: 28%)

[C123] Mauro Conti, Ankit Gangwal, Manoj Singh Gaur.
A Comprehensive and Effective Mechanism for DDoS Detection in SDN.
In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
(IEEE WiMob 2017)
, pages 1-8, Rome, Italy, October 9-11, 2017.
DOI: 10.1109/WiMOB.2017.8115796, ISBN: 978-1-5386-3839-2.
(GGS: 3/B; LiveSHINE: B; MA: B; Acceptance rate: 28%)

[C122] Reza Mohammadi, Reza Javidan, Manijeh Kehstgari, Mauro Conti, Chhagan Lal.
Practical Extensions to Countermeasure DoS attacks in Software Defined Networking.
In Proceedings of the 3rd IEEE Conference on Network Functions Virtualization and Software Defined Networking
(IEEE NFV-SDN 2017)
, in press, Berlin, Germany, November 6-8, 2017.

[C121] Mauro Conti, Ankit Gangwal.
Blocking Intrusions at Border using Software Defined-Internet Exchange Point (SD-IXP).
In Proceedings of the 3rd IEEE Conference on Network Functions Virtualization and Software Defined Networking
(IEEE NFV-SDN 2017)
, pages 1-6, Berlin, Germany, November 6-8, 2017.
DOI: 10.1109/NFV-SDN.2017.8169838, ISBN: 978-1-5386-3285-7.

[C120] Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Gaur, Akka Zemmari, Mohamed Mosbah, Daya Ram Sharma and Mauro Conti.
Unraveling Reflection Induced Sensitive Leaks in Android Apps.
In Proceedings of the 12th International Conference on Risks and Security of Internet and Systems
(CRISIS 2017)
, in press, Dinard, France. September 19-21, 2017.
(CORE: C; MA: C)

[C119] Qianqian Li, Reza Mohammadi, Mauro Conti, Chuanhuang Li and Xiaolin Li.
GolfEngine: Network Management System for Software Defined Networking.
In Proceedings of the 13th IEEE International Conference on Intelligent Computer Communication and Processing
(ICCP 2017)
, in press, Cluj-Napoca, Romania. September 7-9, 2017.
(CORE: C)

[C118] Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor.
Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2017)
, pages 278-296, Oslo, Norway. September 11-13, 2017.
DOI: 10.1007/978-3-319-66402-6_17, ISBN: 978-3-319-66401-9.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 15.88%)

[C117] Matteo Di Pirro, Mauro Conti and Riccardo Lazzeretti.
Ensuring Information Security by Using Haskell Advanced Type System.
In Proceedings of the 51st International Carnahan Conference on Security Technology
(ICCST 2017)
, in press, Madrid, Spain. October 23-26, 2017.

[C116] Ema Kusen, Giuseppe Cascavilla, Kathrin Figl, Mauro Conti and Mark Strembeck.
Identifying Emotions in Social Media: Comparison of Word-emotion lexicons.
In Proceedings of the 4th International Symposium on Social Networks Analysis, Management and Security
(SNAMS 2017)
, in press, Prague, Czech Republic. August 21-23, 2017.

[C115] Merylin Monaro, Riccardo Spolaor, Qianqian Li, Mauro Conti, Luciano Gamberini and Giuseppe Sartori.
Type Me the Truth! Detecting Deceitful Users via Keystroke Dynamics.
In Proceedings of the 6th International Workshop on Cyber Crime
(ARES 2017 workshop: IWCC 2017)
, pages 1-6, Reggio Calabria, Italy, August 29 - September 1, 2017.
DOI: 10.1145/3098954.3104047, ISBN: 978-1-4503-5257-4.

[C114] Mauro Conti, Pallavi Kaliyar, Chhagan Lal.
REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks.
In Proceedings of the 1st International Workshop on Criminal Use of Information Hiding
(ARES 2017 workshop: CUING 2017)
, pages 1-8, Reggio Calabria, Italy, August 29 - September 1, 2017.
DOI: 10.1145/3098954.3106070, ISBN: 978-1-4503-5257-4.

[C113] Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti.
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In Proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses
(RAID 2017)
, pages 48-69, Atlanta, Georgia, USA, September 18-20, 2017.
DOI: 10.1007/978-3-319-66332-6_3, ISBN: 978-3-319-66332-6.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A+)

[C112] Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise.
POSTER: Toward Secure and Efficient Attestation for highly Dynamic Swarms.
In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(ACM SIGSAC WiSec 2017)
, pages 281-282, Boston, USA, July 18-20, 2017.
DOI: 10.1145/3098243.3106026, ISBN: 978-1-4503-5084-6.
(GGS: 3/B; LiveSHINE: A-; MA: B)

[C111] Moreno Ambrosin, Stefano Cecconello, Mauro Conti,and Daniele Lain.
POSTER: A Roaming-based Denial of Service Attack on LTE Networks.
In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
(ACM SIGSAC WiSec 2017)
, pages 283-284, Boston, USA, July 18-20, 2017.
DOI: 10.1145/3098243.3106027, ISBN: 978-1-4503-5084-6.
(GGS: 3/B; LiveSHINE: A-; MA: B)

[C110] Ema Kusen, Mark Strembeck, Giuseppe Cascavilla and Mauro Conti.
The Influence of Emotional Valence Shifts on the Spread of Information in Social Networks.
In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
(ASONAM 2017)
, pages 321-324, Sydney, Australia, 31 July - 03 August, 2017.
DOI: 10.1145/3110025.3110031, ISBN: 978-1-4503-4993-2.
(GGS: 3/B-; LiveSHINE: B; MA: B-)

[C109] Hossein Fereidooni, Tommaso Frassetto, Markus Miettinen, Ahmad-Reza Sadeghi, Mauro Conti.
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
In Proceedings of the 2nd IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health
(CHASE 2017 workshop: SEARCH 2017)
, pages 19-24, Philadelphia, Pennsylvania, USA, July 17-19, 2017.
DOI: 10.1109/CHASE.2017.54, ISBN: 978-1-5090-4722-2.

[C108] Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti and Radha Poovendran.
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices.
In Proceedings of the 15th International Conference on Applied Cryptography and Network Security
(ACNS 2017)
, pages 83-102, Kanazawa, Japan, June 10-12, 2017.
DOI: 10.1007/978-3-319-61204-1_5, ISBN: 978-3-319-61203-4.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B)

[C107] Mauro Conti, Fabio De Gaspari and Luigi V. Mancini.
Know Your Enemy: Stealth Configuration-Information Gathering in SDN.
In Proceedings of the 12th International Conference on Green, Pervasive and Cloud Computing
(GPC 2017)
, pages 386-401, Cetara, Italy, May 11-14, 2017.
DOI: 10.1007/978-3-319-57186-7, ISBN: 978-3-319-57185-0.
(CORE: C; LiveSHINE: C; MA: C)

[C106] Maddalena Favaretto, Riccardo Spolaor, Mauro Conti and Marco Ferrante.
You Surf So Strange Today: Anomaly Detection in Web services via HMM and CTMC.
In Proceedings of the 12th International Conference on Green, Pervasive and Cloud Computing
(GPC 2017)
, pages 426-440, Cetara, Italy, May 11-14, 2017.
DOI: 10.1007/978-3-319-57186-7_32, ISBN: 978-3-319-57185-0.
(CORE: C; LiveSHINE: C; MA: C)

[C105] Giulio Lovisotto, Mauro Conti, Ivan Martinovic and Gene Tsudik.
FADEWICH: Fast Deauthentication over the Wireless Channel.
In Proceedings of the 37th IEEE International Conference on Distributed Computing
(ICDCS 2017)
, pages 2294-2301, Atlanta, Georgia, USA, June 5-8, 2017.
DOI: 10.1109/ICDCS.2017.296, ISBN: 978-1-5386-1792-2, ISSN: 1063-6927.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 16.94%)

[C104] Alberto Compagno, Mauro Conti, Muhammad Hassan Khan.
ICN-based Authentication Protocol for a Simplified LTE Architecture.
In Proceedings of the 2016 Workshop on Communication Security
(Eurocrypt 2017 workshop: WCS 2017)
, pages 125-140, Paris, France, April 30, 2017.
DOI: 10.1007/978-3-319-59265-7_9, ISBN: 978-3-319-59265-7.

[C103] Marco Baesso, Pasquale Capuozzo, Mauro Conti, Luciano Gamberini, Merylin Monaro, Giuseppe Sartori, Riccardo Spolaor.
You Are How You Play: Authenticating Mobile Users via Game Playing.
In Proceedings of the 2016 Workshop on Communication Security
(Eurocrypt 2017 workshop: WCS 2017)
, pages 79-96, Paris, France, April 30, 2017.
DOI: 10.1007/978-3-319-59265-7_6, ISBN: 978-3-319-59265-7.

[C102] Shanshan Wang, Qiben Yan, Zhenxiang Chen, Mauro Conti, Bo Yang, Chuan Zhao.
TextDroid: Semantics-based Detection of Mobile Malware Using Network Flows.
In Proceedings of the 2016 International Workshop on The Security, Privacy, and Digital Forensics of Mobile Systems and Networks
(IEEE INFOCOM 2017 workshop: MobiSec 2017)
, in press, Atlanta, Georgia, USA, May 1, 2017.

[C101] Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik.
Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP.
In Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2017)
, pages 703-715, Abu Dhabi, UAE, April 2 - 6, 2017.
DOI: 10.1145/3052973.3053005, ISBN: 978-1-4503-4944-4.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 18.66%)

[C100] Ankit Gangwal, Mauro Conti, Manoj Singh Gaur.
PANORAMA: Real-time Bird's Eye View of an OpenFlow Network.
In Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control
(IEEE ICNSC 2017)
, pages 204-209, Catanzaro, Italy, May 16-18, 2017.
DOI: 10.1109/ICNSC.2017.8000092, ISBN: 978-1-5090-4429-0.
(GGS: 3/B; LiveSHINE: B; MA: B)

[C99] Jyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti.
POSTER: Detection of Information Leaks via Reflection in Android Apps.
In Proceedings of the 12th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2017)
, pages 911-913, Abu Dhabi, UAE, April 2 - 6, 2017.
DOI: http://dx.doi.org/10.1145/3052973.3055162, ISBN 978-1-4503-4944-4.
(GGS: 2/A-; CORE: B; LiveSHINE: A+)

[C98] Vittoria Cozza, Zisis Tsiatsikas, Mauro Conti, Georgios Kambourakis.
Why Snoopy loves online services: An Analysis of (lack of) Privacy in Online Services.
In Proceedings of the 3rd International Conference on Information Systems Security and Privacy
(ICISSP 2017)
, pages 431-438, Porto, Portugal, February 19 - 21, 2017.
DOI: 10.5220/0006207204310438, ISBN: 978-989-758-209-7.

[C97] Venkatesh Gauri Shankar, Gaurav Somani, Manoj Singh Gaur, Vijay Laxmi and Mauro Conti.
AndroTaint: An Efficient Android Malware Detection Framework using Dynamic Taint analySIs.
In Proceedings of the Asia Security and Privacy Conference
(Asia S&P 2017)
, pages 1-13, Surat, India, January 29 - February 1, 2017.
DOI: 10.1109/ISEASP.2017.7976989, ISBN: 978-1-5090-5942-3.

[C96] Mauro Conti, Fabio De Gaspari, Luigi V. Mancini.
Anonymity in an electronic society.
In Proceedings of the 1st Annual Italian Conference on Cybersecurity
(ITASEC 2017)
, in press, Venice, Italy, January 17 - 20, 2017.

[C95] Jyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, M.S. Gaur, Mauro Conti, Muttukrishnan Rajarajan.
sPECTRA: A Precise FramEwork for Analyzing CrypTographic VulneRabilities in Android Apps.
In Proceedings of the 14th Annual IEEE Consumer Communications & Networking Conference
(IEEE CCNC 2017)
, pages 854-860, Las Vegas, Nevada, USA, January 8 - 11, 2017.
DOI: 10.1109/CCNC.2017.7983245, ISBN: 978-1-5090-6196-9, ISSN: 2331-9860.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C94] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Nishanth Devarajan.
Amplified Distributed Denial of Service Attack in Software Defined Networking.
In Proceedings of the 8th Annual IEEE/IFIP International Conference on New Technologies, Mobility and Security
(IEEE/IFIP NTMS 2016)
, pages 1-4, Larnaca, Cyprus, November 21 - 23, 2016.
DOI: 10.1109/NTMS.2016.7792432, ISBN: 978-1-5090-2914-3, ISSN: 2157-4960.
(LiveSHINE: B-; MA: C)

[C93] Hossein Fereidooni, Mauro Conti, Danfeng Yao, Alessandro Sperduti.
ANASTASIA: ANdroid mAlware detection using STAtic analySIs of Applications.
In Proceedings of the 8th Annual IEEE/IFIP International Conference on New Technologies, Mobility and Security
(IEEE/IFIP NTMS 2016)
, pages 1-5, Larnaca, Cyprus, November 21 - 23, 2016.
DOI: 10.1109/NTMS.2016.7792435, ISBN: 978-1-5090-2914-3, ISSN: 2157-4960.
(LiveSHINE: B-; MA: C)

[C92] Anna Spagnolli, Mauro Conti, Giorgia Guerra, Jonathan Freeman, David Kirsh, Aimee van Wynsberghe.
Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions.
In Proceedings of the 5th International Workshop on Symbiotic Interaction
(Symbiotic 2016)
, pages 5-22, Padua, Italy, September 29 - 30, 2016.
DOI: 10.1007/978-3-319-57753-1_2, ISBN: 978-3-319-57752-4.

[C91] Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter.
SANA: Secure and Scalable Aggregate Network Attestation.
In Proceedings of the 23nd ACM Conference on Computer and Communications Security
(ACM CCS 2016)
, pages 731-742, Vienna, Austria, October 24 - 28, 2016.
DOI: 10.1145/2976749.2978335, ISBN: 978-1-4503-4139-4, ISSN: 1543-7221.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 16.36%)

[C90] Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran.
Despicable Me(ter): Anonymous and Fine-grained Metering Data Reporting with Dishonest Meters.
In Proceedings of the 4rd IEEE Conference on Communications and Network Security
(IEEE CNS 2016)
, in press, Philadelphia, PA USA, October 17 - 19, 2016.
(MA: C; Acceptance rate: 29.00%)

[C89] Alberto Compagno, Mauro Conti, Ralph Droms.
OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN.
In Proceedings of the 3rd ACM Conference on Information-Centric Networking
(ACM ICN 2016)
, pages 166-175, Kyoto, Japan, September 26-28, 2016.
DOI: 10.1145/2984356.2984374, ISBN: 978-145034467-8.

[C88] Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash.
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
In Proceedings of the 25th USENIX Security Symposium
(USENIX Security 2016)
, pages 531-548, Austin, TX, USA, August 10-12, 2016.
ISBN: 978-1-931971-32-4.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 15.55%)

[C87] Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter.
POSTER: Toward a Secure and Scalable Attestation.
In Proceedings of the 9th ACM Conference on Wireless Network Security
(ACM SIGSAC WiSec 2016)
, pages 229-230, Darmstadt, Germany, July 18 - 20, 2016.
DOI: 10.1145/2939918.2942425, ISBN: 978-145034270-4.
(GGS: 3/B; LiveSHINE: A-; MA: B)

[C86] Chhagan Lal, Roberto Petroccia, Mauro Conti, João Alves.
Secure Underwater Acoustic Networks: Current and Future Research Directions.
In Proceedings of the 2016 IEEE/NATO Underwater Communications and Networking
(IEEE/NATO UComm 2016)
, La Spezia, Italy, August 30 - September 1, 2016.
DOI: 10.1109/UComms.2016.7583466, ISBN: 978-150902696-8.

[C85] Alessandro Sforzin, Mauro Conti, Félix Gómez Mármol and Jens-Matthias Bohli.
RPiDS: Raspberry Pi IDS. A Fruitful Intrusion Detection System for IoT.
In Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing
(IEEE ATC 2016)
, in press, Toulouse, France, July 18-21, 2016.
(CORE: C; MA: C)

[C84] Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi.
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In Proceedings of the 16th Privacy Enhancing Technologies Symposium
(PETS 2016)
, Darmstadt, Germany, July 19-22, 2016.
DOI: 10.1515/popets-2016-0050.
(CORE: B; MA: A-)

[C83] Ankit Gangwal, Megha Gupta, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
ELBA: Efficient Layer Based Routing Algorithm in SDN.
In Proceedings of the 25th IEEE International Conference on Computer Communication and Networks
(IEEE ICCCN 2016)
, pages 1-7, Waikoloa, Hawaii, USA, August 1-4, 2016.
DOI: 10.1109/ICCCN.2016.7568515, ISBN: 978-1-5090-2279-3.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-)

[C82] Parvez Faruki, Akka Zemmari, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
MimeoDroid: Large Scale Dynamic App analysis on Cloned Devices via Machine Learning Classifiers.
In Proceedings of the 3rd IEEE International Workshop on Reliability and Security Data Analysis
(IEEE DSN 2016 workshop; RSDA 2016)
, pages 60-65, London (Guildford), UK, June 19-22, 2016.
DOI:10.1109/DSN-W.2016.33, ISBN: 978-146738891-7.

[C81] Mauro Conti, Claudio Guarisco, Riccardo Spolaor.
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery.
In Proceedings of the 14th International Conference on Applied Cryptography and Network Security
(ACNS 2016)
, pages 611-628, London (Guildford), UK, June 19-22, 2016.
DOI: 10.1007/978-3-319-39555-5_33, ISBN: 978-331939554-8, ISSN: 0302-9743.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B; Acceptance rate: 19.12%)

[C80] Mauro Conti, Michele Nati, Enrico Rotundo, Riccardo Spolaor.
Mind The Plug! Laptop-User Recognition Through Power Consumption.
In Proceedings of the 2016 International Workshop on IoT Privacy, Trust, and Security
(ACM AsiaCCS 2016 workshop: IoTPTS 2016)
, pages 37-44, Xi'an, China, May 30 - June 3, 2016.
DOI: 10.1145/2899007.2899009, ISBN: 978-145034283-4.

[C79] Ding Ding, Mauro Conti, Agusti Solanas.
A Smart Health Application and its Related Privacy Issues.
In Proceedings of the 2016 Smart City Security and Privacy Workshop
(IEEE CPS Week workshop: SCSP-W 2016)
, pages 11-15, Vienna, Austria, April 11, 2016.
DOI: 10.1109/SCSPW.2016.7509558, ISBN: 978-150902924-2.

[C78] Kanishka Ariyapala, Hoang Giang Do, Huynh Ngoc Anh, Wee Keong Ng, Mauro Conti.
Host and Network Based Intrusion Detection For Android Smartphones.
In Proceedings of the 2016 Workshop on Security, Trust, Privacy and Analytics
(IEEE AINA 2016 workshop: STPA 2016)
, pages 849-854, Crans-Montana, Switzerland, March 23-25, 2016.
DOI: 10.1109/WAINA.2016.35, ISBN: 978-150901857-4.

[C77] Valeriu-Daniel Stanciu, Riccardo Spolaor, Mauro Conti, Cristiano Giuffrida.
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks.
In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy
(ACM SIGSAC CODASPY 2016)
, pages 105-112, New Orleans, LA, USA, March 9-11, 2016.
DOI: 10.1145/2857705.2857748, ISBN: 978-145033935-3.
(LiveSHINE: B; Acceptance rate: 30.00%)

[C76] Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic
AppScanner: Automatic Fingerprinting of Smartphone Apps From Encrypted Network Traffic.
In Proceedings of the 1st IEEE European Symposium on Security and Privacy
(IEEE Euro S&P 2016)
, pages 439-454, Saarbrücken, Germany, March 21-24, 2016.
DOI: 10.1109/EuroSP.2016.40, ISBN: 978-150901751-5.
(MA: C; Acceptance rate: 17.26%)

[C75] Agostino Sturaro, Simone Silvestri, Mauro Conti, Sajal K. Das.
Toward a Realistic Model for Failure Propagation in Interdependent Networks.
In Proceedings of the 2016 International Conference on Computing, Networking and Communications
(IEEE ICNC 2016)
, Kauai, Hawaii, USA, February 15-18, 2016.
DOI: 10.1109/ICCNC.2016.7440711, ISBN: 978-146738579-4.

[C74] Lovely Sinha, Shweta Bhandari, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
FlowMine: Android App Analysis via Data Flow.
In Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference
(IEEE CCNC 2016)
, pages 435-441, Las Vegas, Nevada, USA, January 9 - 12, 2016.
DOI: 10.1109/CCNC.2016.7444819, ISBN: 978-146739292-1.
(GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B)

[C73] Mahdi Rabbania, Reza Khoshkanginib, H.S. Nagendraswamya, Mauro Conti.
Hand Drawn Optical Circuit Recognition.
In Proceedings of the 7th International Conference on Intelligent Human Computer Interaction
(Elsevier IHCI 2015)
, pages 41-48, Allahabad, India, December 14-16, 2015.
DOI: 10.1016/j.procs.2016.04.064, ISSN: 1877-0509.
(MA: C)

[C72] Shohreh Hosseinzadeh, Sami Hyrynsalmi, Mauro Conti, Ville Leppänen.
Security and Privacy in Cloud Computing via Obfuscation and Diversification: a Survey.
In Proceedings of the 2nd IEEE International Workshop on Enterprise Security
(IEEE CloudCom 2015 workshop: ES 2015)
, pages 529-535, Vancouver, Canada, November 30 - December 3, 2015.
DOI: 10.1109/CloudCom.2015.29, ISBN: 978-146739560-1.

[C71] Mauro Conti, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi.
TRAP: using TaRgeted Ads to unveil Google personal Profiles.
In Proceedings of the 7th IEEE International Workshop on Information Forensics and Security
(IEEE WIFS 2015)
, Rome, Italy, November 16-19, 2015.
DOI: 10.1109/WIFS.2015.7368607, ISBN: 978-146736802-5.

[C70] Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran.
Verifiable and Privacy-preserving Fine-Grained Data-Collection for Smart Metering.
In Proceedings of the 1st IEEE Workshop on Security and Privacy in Cybermatics
(IEEE CNS 2015 workshop: SPiCy 2015)
, pages 655-658, Florence, Italy, September 30, 2015.
DOI: 10.1109/CNS.2015.7346882, ISBN: 978-146737876-5.

[C69] QianQian Li, Ding Ding, Mauro Conti.
Brain-Computer Interface Applications: Security and Privacy Challenges.
In Proceedings of the 1st IEEE Workshop on Security and Privacy in Cybermatics
(IEEE CNS 2015 workshop: SPiCy 2015)
, pages 663-666, Florence, Italy, September 30, 2015.
DOI: 10.1109/CNS.2015.7346884, ISBN: 978-146737876-5.

[C68] Kanishka Ariyapala, Mauro Conti, Cristina M. Pinotti.
CaT: Evaluating Cloud-aided TLS for Smartphone Energy Efficiency.
In Proceedings of the 1st IEEE Workshop on Security and Privacy in Cybermatics
(IEEE CNS 2015 workshop: SPiCy 2015)
, pages 601-609, Florence, Italy, September 30, 2015.
DOI: 10.1109/CNS.2015.7346874, ISBN: 978-146737876-5.

[C67] Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Marco Negro, Mohaned Qunaibit, Ahmad-Reza Sadeghi.
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In Proceedings of the 22nd ACM Conference on Computer and Communications Security
(ACM CCS 2015)
, pages 952-963, Denver, Colorado, USA, October 12 - 16, 2015.
DOI: 10.1145/2810103.2813671, ISBN: 978-145033832-5, ISSN: 1543-7221.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++; Acceptance rate: 19.81%)

[C66] Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi V. Mancini.
Boten ELISA: A Novel Approach for Botnet C&C in Online Social Networks.
In Proceedings of the 3rd IEEE Conference on Communications and Network Security
(IEEE CNS 2015)
, pages 74-82, Florence, Italy, September 28 - 30, 2015.
DOI: 10.1109/CNS.2015.7346813, ISBN: 978-1-4673-7876-5.
(MA: C; Acceptance rate: 28.00%)

[C65] Jyoti Gajrani, Jitendra Sarswat, Meenakshi Tripathi, Vijay Laxmi, Manoj Gaur, Mauro Conti.
A Robust Dynamic Analysis System Preventing SandBox Detection by Android Malware.
In Proceedings of the 8th International Conference on Security of Information and Networks
(ACM SIN 2015)
, Sochi, Russia, September 8 - 10, 2015.
DOI: 10.1145/2799979.2800004, ISBN: 978-145033453-2.
(CORE: C; LiveSHINE: C; MA: C)

[C64] Giuseppe Cascavilla, Mauro Conti, David G. Schwartz, Inbal Yahav.
Revealing Censored Information Through Comments and Commenters in Online Social Networks.
In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
(IEEE/ACM ASONAM 2015)
, pages 675-680, Paris, France, August 25 - 28, 2015.
DOI: 10.1145/2808797.2809290, ISBN: 978-145033854-7.
(GGS: 3/B-; LiveSHINE: B; MA: B-)

[C63] Mohammad Reza Memarian, Mauro Conti, Ville Leppänen.
EyeCloud: A BotCloud Detection System.
In Proceedings of the 5th IEEE International Symposium on Trust and Security in Cloud Computing
(IEEE TSCloud 2015)
, pages 1067-1072, Helsinki, Finland, 20 - 22 August, 2015.
DOI: 10.1109/Trustcom.2015.484, ISBN: 978-146737951-9.

[C62] Julien Mineraud, Federico Lancerin, Sasitharan Balasubramaniam, Mauro Conti, Sasu Tarkoma.
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data.
In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2015)
, pages 523-530, Helsinki, Finland, 20 - 22 August, 2015.
DOI: 10.1109/Trustcom.2015.415, ISBN: 978-146737951-9.
(CORE: A; Acceptance rate: 28.00%)

[C61] Andrea Burattin, Mauro Conti, Daniele Turato.
Toward an Anonymous Process Mining.
In Proceedings of the 3rd IEEE International Conference on Future Internet of Things and Cloud
(IEEE FiCloud 2015)
, pages 58-63, Rome, Italy, August 24 - 26, 2015.
DOI: 10.1109/FiCloud.2015.9, ISBN: 978-146738103-1.

[C60] Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik.
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking.
In Proceedings of the 24th IEEE International Conference on Computer Communications and Networks
(IEEE ICCCN 2015)
, Las Vegas, Nevada, USA, August 3 - 6, 2015.
DOI: 10.1109/ICCCN.2015.7288477, ISBN: 978-147999964-4, ISSN: 1095-2055.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 25.00%)

[C59] Moreno Ambrosin, Mauro Conti, Tooska Dargahi.
On the Feasibility of Attribute-Based Encryption on Smartphone Devices.
In Proceedings of the 1st International Workshop on IoT challenges in Mobile and Industrial System
(MobiSys 2015 workshop: IoT-Sys 2015)
, pages 49-54, Florence, Italy, May 18, 2015.
DOI: 10.1145/2753476.2753482, DOI: 978-145033502-7.

[C58] Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi V. Mancini, Gene Tsudik.
Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking.
In Proceedings of the 13th International Conference on Applied Cryptography and Network Security
(ACNS 2015)
, pages 243-262, New York, NY, USA, June 2-5, 2015.
DOI: 10.1007/978-3-319-28166-7_12, ISBN: 978-331928165-0, ISSN: 0302-9743.
(GGS: 3/B; CORE: B; LiveSHINE: A; MA: B; Acceptance rate: 21.02%; Best Student Paper Award)

[C57] Ding Ding, Mauro Conti, Renato Figueiredo.
Impact of Country-scale Internet Disconnection on Structured and Social P2P Overlays.
In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2015)
, Boston; MA, USA, June 14-17, 2015.
DOI: 10.1109/WoWMoM.2015.7158168, ISBN: 978-147998461-9.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B; Acceptance rate: 21.00%)

[C56] Pericle Perazzo, Kanishka Ariyapala, Mauro Conti, Gianluca Dini.
The Verifier Bee: a Path Planner for Drone-Based Secure Location Verification.
In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2015)
, Boston; MA, USA, June 14-17, 2015.
DOI: 10.1109/WoWMoM.2015.7158150, ISBN: 978-147998461-9.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B; Acceptance rate: 21.00%)

[C55] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Impact of Security Threats in Vehicular Alert Messaging Systems.
In Proceedings of the 1st IEEE Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems
(IEEE ICC 2015 workshop: IoTCPS 2015)
, pages 2627-2632, London, UK, June 8-12, 2015.
DOI: 10.1109/ICCW.2015.7247575, ISBN: 978-146736305-1.

[C54] Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran.
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2015)
, pages 183-201, Singapore, April 14-17, 2015.
DOI: 10.1145/2714576.2714612, ISBN: 978-145033245-3.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 17.84%)

[C53] Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde.
Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis.
In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
(ACM SIGSAC CODASPY 2015)
, pages 297-304, San Antonio, TX, USA, March 2-4, 2015.
DOI: 10.1145/2699026.2699119, ISBN: 978-145033191-3.
(LiveSHINE: B; Acceptance rate: 21.00%)

[C52] Giovanni Toso, Daniele Munaretto, Michele Zorzi, Mauro Conti.
Attack Resilient Underwater Networks Through Software Defined Networking.
In Proceedings of the 9th ACM International Conference on Underwater Networks & Systems
(WUWNet 2014)
, Rome, Italy, November 12-14, 2014.
DOI: 10.1145/2671490.2674589, ISBN: 978-145033277-4.
(LiveSHINE: B)

[C51] Anil Saini, Manoj Gaur, Vijay Laxmi, Tushar Singhal and Mauro Conti.
Privacy Leakage Attacks in Browsers by Colluding Extensions.
In Proceedings of the 10th International Conference on Information Systems Security
(ICISS 2014)
, pages 257-276, Hyderabad, India, December 16-20, 2014.
DOI: 10.1007/978-3-319-13841-1_15, ISBN: 978-331913840-4, ISSN: 0302-9743.
(GGS: 3/B-; CORE: B; LiveSHINE: B; MA: C; Acceptance rate: 25/129 - 19.37%)

[C50] Mauro Conti, Earlence Fernandes, Justin Paupore, Atul Prakash, Daniel Simionato.
OASIS: Operational Access Sandboxes for Information Security.
In Proceedings of the 4th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices
(ACM SIGSAC CCS 2014 workshop: SPSM 2014)
, pages 105-110, Scottsdale, AZ, USA, November 3-7, 2014.
DOI: 10.1145/2666620.2666629, ISBN: 978-1-4503-3155-5, ISSN: 1543-7221.

[C49] Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni, Mauro Conti.
Secure Message Delivery Games for Device-to-Device Communications.
In Proceedings of the 5th Conference on Decision and Game Theory for Security
(GameSec 2014)
, pages 195-215, Los Angeles, CA, USA, November 6-7, 2014.
DOI: 10.1007/978-3-319-12601-2, ISBN: 978-3-319-12600-5.

[C48] Smita Naval, Vijay Laxmi, Manoj Gaur, Sachin Raja, Muttukrishnan Rajarajan, Mauro Conti.
Environment-Reactive Malware Behavior: Detection and Categorization.
In Proceedings of the 3rd International Workshop on Quantitative Aspects in Security Assurance
(ESORICS 2014 workshop: QASA 2014)
, pages 167-182, Wroclaw, Poland, September 10-11, 2014.
DOI: 10.1007/978-3-319-17016-9_11, ISBN: 978-3-319-17015-2, ISSN: 0302-9743.

[C47] Giuseppe Cascavilla, Andrea Burattin, Mauro Conti.
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks.
In Proceedings of the 9th International Conference on Risks and Security of Internet and Systems
(CRiSIS 2014)
, pages 83-99, Trento, Italy, August 27-29, 2014.
DOI: 10.1007/978-3-319-17127-2_6, ISBN: 978-3-319-17126-5, ISSN: 0302-9743.
(CORE: C; MA: C; Acceptance rate: 14/48 - 29.16%)

[C46] Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti.
Evaluation of Android Anti Malware Techniques against Dalvik Bytecode Obfuscation.
In Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2014)
, pages 414-421, Beijing, China, September 24-26, 2014.
DOI: 10.1109/TrustCom.2014.54, ISBN: 978-147996513-7.
(CORE: A)

[C45] Parvez Faruki, Vijay Ganmoor, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti.
Platform Neutral Sandbox for Analyzing Android Malware and Resource Hoggers.
In Proceedings of the 10th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2014)
, pages 556-560, Beijing, China, September 24-26, 2014.
DOI: 10.1007/978-3-319-23829-6_43, ISBN:978-3-319-23829-6, ISSN: 1867-8211.
(CORE: B; LiveSHINE: A; MA: C)

[C44] Filipe Beato, Mauro Conti, Bart Preneel, Dario Vettore.
VirtualFriendship: Hiding interactions on Online Social Networks.
In Proceedings of the 2nd IEEE Conference on Communications and Network Security
(IEEE CNS 2014)
, pages 328-336, San Francisco, CA, USA, October 29-31, 2014.
DOI: 10.1109/CNS.2014.6997501, ISBN: 978-147995890-0.
(MA: C; Acceptance rate: 38/130 - 29.23%)

[C43] Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter.
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2014)
, pages 76-93, Wroclaw, Poland, September 7-11, 2014.
DOI: 10.1007/978-3-319-11203-9_5, ISBN: 978-3-319-11202-2.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 58/234 - 24.79%)

[C42] Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez.
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS 2014)
, pages 183-201, Wroclaw, Poland, September 7-11, 2014.
DOI: 10.1007/978-3-319-11203-9_11, ISBN: 978-3-319-11202-2.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 58/234 - 24.79%)

[C41] Reza Khoshkangini, Syroos Zaboli, Mauro Conti.
Efficient Routing Protocol via Ant Colony Optimization (ACO) and Breadth First Search (BFS).
In Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing
(IEEE CPSCom 2014)
, pages 374-380, Taipei, Taiwan, September 1-3, 2014.
DOI: 10.1109/iThings.2014.69, ISBN: 978-1-4799-5967-9.

[C40] Kamil Majdanik, Cristiano Giuffrida, Mauro Conti, Herbert Bos.
I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics.
In Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment
(DIMVA 2014)
, pages 92-111, Egham, UK, July 10-14, 2014.
DOI: 10.1007/978-3-319-08509-8_6, ISBN: 978-3-319-08508-1.
(GGS: 3/B-; CORE: C; LiveSHINE: A-; Acceptance rate: 23.30%)

[C39] Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik.
Covert Ephemeral Communication in Named Data Networking.
In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2014)
, pages 15-26, Kyoto, Japan, June 4-6, 2014.
DOI: 10.1145/2590296.2590306, ISBN: 978-1-4503-2800-5.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 52/260 - 20.00%)

[C38] Moreno Ambrosin, Armir Bujari, Mauro Conti, Fabio De Gaspari, Claudio Palazzi.
Smartphone and Laptop Frameworks for Vehicular Networking Experimentation.
In Proceedings of the 2013 IEEE/IFIP Wireless Days Conference
(IEEE/IFIP WD 2013)
, pages 1-6, Valencia, Spain, November 13-15, 2013.
DOI: 10.1109/WD.2013.6686481, ISBN: 978-1-4799-0543-0.

[C37] Wafa Ben Jaballah, Mauro Conti, Roberto Di Pietro, Mohamed Mosbah, Nino Vincenzo Verde.
MASS: An Efficient and Secure Broadcast Authentication Scheme for Resource Constrained Devices.
In Proceedings of the 8th International Conference on Risks and Security of Internet and Systems
(CRiSIS 2013)
, pages 1-9, La Rochelle, France, October 23-25, 2013.
DOI: 10.1109/CRiSIS.2013.6766350.
(CORE: C; MA: C)

[C36] Eyup Serdar Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
CREPUSCOLO: a Collusion Resistant Privacy Preserving Location Verification System.
In Proceedings of the 8th International Conference on Risks and Security of Internet and Systems
(CRiSIS 2013)
, La Rochelle, France, October 23-25, 2013.
DOI: 10.1109/CRiSIS.2013.6766357, ISBN: 978-364241097-0.
(CORE: C; MA: C)

[C35] Mauro Conti, Nicola Dragoni, Sebastiano Gottardo.
MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities.
In Proceedings of the 9th International Workshop on Security & Trust management
(ESORICS 2013 workshop: STM 2013)
, pages 65-81, Egham, UK, September 12-13, 2013.
DOI: 10.1007/978-3-642-41098-7_5, ISBN: 978-364241097-0.

[C34] Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik.
Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking.
In Proceedings of the 38th IEEE Conference on Local Computer Networks
(IEEE LCN 2013)
, pages 630-638, Sydney, Australia, October 21-24, 2013.
DOI: 10.1109/LCN.2013.6761300, ISBN: 978-147990537-9.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 53/201 - 26.40%)

[C33] Kanishka Ariyapala, Mauro Conti, Chamath Keppitiyagama.
ContextOS: a Context Aware Operating System for Mobile Devices.
In Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing
(IEEE CPSCom 2013)
, pages. 976-984, Beijing, China, August 20-23, 2013.
DOI: 10.1109/GreenCom-iThings-CPSCom.2013.168, ISBN: 978-076955046-6.

[C32] Claudio Ardagna, Mauro Conti, Mario Leone, Julinda Stefa.
Preserving Smartphone Users' Anonymity in Cloudy Days.
In Proceedings of the 3rd International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems
(IEEE ICCCN 2013 workshop: IEEE MobiPST 2013)
, pages 1-5, Nassau, Bahamas, June 30-August 2, 2013.
DOI: 10.1109/ICCCN.2013.6614170, ISBN: 978-146735774-6.

[C31] Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio Palazzi.
Secure Verification of Location Claims on a Vehicular Safety Application.
In Proceedings of the 22nd International Conference on Computer Communications and Networks
(IEEE ICCCN 2013)
, pages 1-7, Nassau, Bahamas, June 30-August 2, 2013.
DOI: 10.1109/ICCCN.2013.6614193, ISBN: 978-146735774-6.
(GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-; Acceptance rate: 86/300 - 28.66%)

[C30] Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik.
Cache Privacy in Name-Data Networking.
In Proceedings of the 33rd International Conference on Distributed Computing Systems
(IEEE ICDCS 2013)
, pages 41-51, Philadephia, PA, USA, July 8-11, 2013.
DOI: 10.1109/ICDCS.2013.12, ISBN: 978-0-7695-5000-8.
(GGS: 2/A; CORE: A; LiveSHINE: A+; MA: A; Acceptance rate: 61/464 - 13.14%)

[C29] Filipe Beato, Mauro Conti, Bart Preneel.
Friend in the Middle (FiM): Tackling Social Networks De-Anonymization.
In Proceedings of the 5th IEEE International Workshop on SECurity and SOCial Networking 2013
(IEEE SESOC 2013, workshop of PerCom 2013)
, pages. 279-284, San Diego, CA, USA, March 18-22, 2013.
DOI: 10.1109/PerComW.2013.6529495, ISBN: 978-146735077-8.

[C28] Mauro Conti, Daniele Diodati, Cristina M. Pinotti, Bruno Crispo.
Optimal Solutions for Pairing Services on Smartphones: a Strategy to Minimize Energy Consumption.
In Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing
(IEEE CPSCom 2012)
, pages 269-276, Besançon, France, November 20-23, 2012.
DOI: 10.1109/GreenCom.2012.51, ISBN: 978-0-7695-4865-4.

[C27] Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich.
DEMO: Demonstrating the Effectiveness of MOSESdroid for Separation of Execution Modes.
In Proceedings of the 19th ACM Conference on Computer and Communications Security
(ACM SIGSAC CCS 2012)
, pages 998-1000, Raleigh, NC, USA, October 16-18, 2012.
DOI: 10.1145/2382196.2382304, ISBN: 978-145031650-7.
(GGS: 1/A++; CORE: A++; LiveSHINE: A++; MA: A++)

[C26] Mauro Conti, Radha Poovendran, Marco Secchiero.
FakeBook: Detecting Fake Profiles in On Line Social Networks.
In Proceedings of the 1st IEEE/ACM International Workshop on Cybersecurity of Online Social Network
(IEEE/ACM CSOSN 2012)
, pages 1071-1078, Istanbul, Turkey, August 26, 2012.
DOI: 10.1109/ASONAM.2012.185, ISBN: 978-0-7695-4799-2.

[C25] Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes.
MOSES: Supporting Operation Modes on Smartphones.
In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies
(ACM SIGSAC SACMAT 2012)
, pages 3-12, Newark, NJ, US, June 20-22, 2012.
DOI: 10.1145/2295136.2295140, ISBN: 978-145031295-0.
(GGS: 2/A-; CORE: C; LiveSHINE: A+; MA: A+; Acceptance rate: 19/73 - 26.03%)

[C24] Mauro Conti.
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion).
In Proceedings of the 20th International Workshop on Security Protocols
(IWSP 2012 - Springer LNCS)
, pages 214-222, Cambridge, UK, April 11-12, 2012.
DOI: 10.1007/978-3-642-35694-0_23, ISBN: 978-3-642-35693-3.
(CORE: C)

[C23] Eyup Serdar Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System.
In Proceedings of the 20th International Workshop on Security Protocols
(IWSP 2012 - Springer LNCS)
, pages 199-213, Cambridge, UK, April 11-12, 2012.
DOI: 10.1007/978-3-642-35694-0_22, ISBN: 978-364235693-3.
(CORE: C)

[C22] Mauro Conti, Roberto Di Pietro, Angelo Spognardi.
Wireless Sensor Replica Detection in Mobile Environments.
In Proceedings of the 13th International Conference on Distributed Computing and Networking
(ICDCN 2012)
, pages 249-264, Hong Kong, January 3-6, 2012.
DOI: 10.1007/978-3-642-25959-3_19, ISBN: 978-364225958-6.
(GGS: 3/B-; CORE: B; LiveSHINE: B-; MA: C)

[C21] Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Events Privacy in WSNs: a New Model and its Application.
In Proceedings of the 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
(IEEE WoWMoM 2011)
, pages 1-9, Lucca, Italy, June 20-24, 2011.
DOI: 10.1109/WoWMoM.2011.5986491, ISBN: 978-145770351-5.
(GGS: 3/B; CORE: A; LiveSHINE: C; MA: B; Acceptance rate: 32/173 - 18.49%)

[C20] Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo.
Mind How You Answer Me! (Transparently Authenticating the User of a Smartphone when Answering or Placing a Call).
In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
(ACM SIGSAC ASIACCS 2011)
, pages 249-259, Hong Kong, March 22-24, 2011.
DOI: 10.1145/1966913.1966945, ISBN: 978-145030564-8.
(GGS: 2/A-; CORE: B; LiveSHINE: A+; Acceptance rate: 35/217 - 16.12%)

[C19] Mauro Conti, Arbnor Hasani, Bruno Crispo.
Virtual Private Social Networks.
In Proceedings of the 1st ACM Conference on Data and Application Security and Privacy
(ACM SIGSAC CODASPY 2011)
, pages 39-50, San Antonio, TX, USA, February 21-23, 2011.
DOI: 10.1145/1943513.1943521, ISBN: 978-145030466-5.
(LiveSHINE: B; Acceptance rate: 21/69 - 30.43%)

[C18] Mauro Conti, Bruno Crispo, Roberto Di Pietro, Luciana Marconi.
Time Warp: How Time Affects Privacy in LBSs. Threats and countermeasures.
In Proceedings of the 12th International Conference on Information and Communications Security
(ICICS 2010 - Springer LNCS)
, pages 325-339, Barcelona, Spain, December 15-17, 2010.
DOI: 10.1007/978-3-642-17650-0_23, ISBN: 978-3-642-17649-4.
(GGS: 3/B; CORE: B; LiveSHINE: B; MA: B; Acceptance rate: 31/134 - 23.13%)

[C17] Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo.
CRePE: Context-Related Policy Enforcement for Android.
In Proceedings of the 13th Information Security Conference
(ISC 2010 - Springer LNCS)
, pages 331-354, Boca Raton, FL, USA, October 25 - 28, 2010.
DOI: 10.1007/978-3-642-18178-8_29, ISBN: 978-3-642-18177-1.
(GGS: 3/B; CORE: B; LiveSHINE: B; Acceptance rate: 22/134 - 16.41%)

[C16] Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei.
The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack.
In Proceedings of the 8th ACM International Symposium on Mobility Management and Wireless Access
(ACM MobiWac 2010)
, pages 99-106, Bodrum, Turkey, October 17 - 21, 2010.
DOI: 10.1145/1868497.1868514, ISBN: 978-1-4503-0277-7.
(LiveSHINE: C; MA: C)

[C15] Luciana Marconi, Mauro Conti, Roberto Di Pietro.
CED2: Communication Efficient Disjointness Decision.
In Proceedings of the 6th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2010 - Springer LNCS)
, pages 290-306, Singapore, September 7 - 9, 2010.
DOI: 10.1007/978-3-642-16161-2_17, ISBN: 978-3-642-16160-5.
(CORE: B; LiveSHINE: A; MA: C; Acceptance rate: 28/112 - 25.00%)

[C14] Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini.
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks.
In Proceedings of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications
(IEEE TSP 2010)
, pages 910-915, Bradford, UK, June 29 - July 1, 2010.
DOI: 10.1109/CIT.2010.169, ISBN: 978-076954108-2.

[C13] Roberto Bragantini, Mauro Conti, Roberto Di Pietro.
Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance.
In Proceedings of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications
(IEEE TSP 2010)
, pages 1096-1101, Bradford, UK, June 29 - July 1, 2010.
DOI: 10.1109/CIT.2010.200, ISBN: 978-076954108-2.

[C12] Mauro Conti.
Censorship-Resilient Communications Throughout Information Scattering (Transcript of Discussion).
In Proceedings of the 18th International Workshop on Security Protocols
(IWSP 2010 - Springer LNCS)
, pages 90-97, Cambridge, UK, March 24-26, 2010.
DOI: 10.1007/978-3-662-45921-8_15, ISBN: 978-3-662-45920-1.
(CORE: C)

[C11] Stefano Ortolani, Mauro Conti, Bruno Crispo.
Censorship-Resilient Communications Throughout Information Scattering.
In Proceedings of the 18th International Workshop on Security Protocols
(IWSP 2010 - Springer LNCS)
, pages 82-89, Cambridge, UK, March 24-26, 2010.
DOI: 10.1007/978-3-662-45921-8_14, ISBN: 978-3-662-45920-1.
(CORE: C)

[C10] Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro.
Event Handoff Unobservability in WSN.
In Proceedings of the 2010 IFIP Open Research Problems in Network Security Conference
(IFIP iNetSec 2010)
, pages 20-28, Sofia, Bulgaria, March 05-06, 2010.
DOI: 10.1007/978-3-642-19228-9_3, ISBN: 978-3-642-19227-2.

[C9] Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini.
Sec-TMP: a Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
In Proceedings of the 5th International Conference on Security and Privacy in Communication Networks
(ICST SecureComm 2009 - Springer LNICST)
, pages 265-284, Athens, Greece, September 14-18, 2009.
DOI: 10.1007/978-3-642-05284-2_15, ISBN: 978-3-642-05283-5.
(CORE: B; LiveSHINE: A; MA: C; Acceptance rate: 20/76 - 26.31%)

[C8] Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei.
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.
In Proceedings of the 7th International Conference on Wired / Wireless Internet Communications
(WWIC 2009 - Springer LNCS)
, pages 85-96, Enschede, The Netherlands, May 27-29, 2009.
DOI: 10.1007/978-3-642-02118-3_8, ISBN: 978-3-642-02117-6.

[C7] Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia.
Securely Computing an Approximate Median in Wireless Sensor Networks.
In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks
(ACM SecureComm 2008)
, pages 1-10, Istanbul, Turkey, September 22-25, 2008.
DOI: 10.1145/1460877.1460885, ISBN: 978-160558241-2.
(CORE: B; LiveSHINE: A; MA: C; Acceptance rate: 26/123 - 21.13%)

[C6] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks.
In Proceedings of the 1st ACM Conference on Wireless Network Security
(ACM SIGSAC WiSec 2008)
, pages 214-219, Alexandria, VA, USA, March 31 - April 2, 2008.
DOI: 10.1145/1352533.1352568, ISBN: 978-159593814-5.
(GGS: 3/B; LiveSHINE: A-; MA: B; Acceptance rate: 16/96 - 16.66%)

[C5] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi.
FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronization.
In Proceedings of the 33rd Annual Conference of the IEEE Industrial Electronics Society
(IEEE IECON 07)
, pages 52-57, Taipei, Taiwan, November 5-8, 2007.
DOI: 10.1109/IECON.2007.4460365, ISBN: 978-1-4244-0783-5.

[C4] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks.
In Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing
(ACM MobiHoc 2007)
, pages 80-89, Montréal, Quebec, Canada, September 9-14, 2007.
(GGS: 1/A+; CORE: A; LiveSHINE: A+; MA: A++; Acceptance rate: 27/146 - 18.49%; Sapienza CS Dpt 2007 Best PhD Student Paper Award)
DOI: 10.1145/1288107.1288119, ISBN: 978-159593684-4.

[C3] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi.
RIPPFS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy.
In Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops
(IEEE PerCom 2007 workshop: PerComW 2006)
, pages 229-234, New York, NY, USA, March 19, 2007.
DOI: 10.1109/PERCOMW.2007.100, ISBN: 978-0-7695-2788-8.

[C2] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei.
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
In Proceedings of the 2006 IEEE International Conference on Systems, Man, and Cybernetics
(IEEE SMC '06)
, pages 1468-1473, Taipei, Taiwan, October 8-11, 2006.
DOI: 10.1109/ICSMC.2006.384924, ISBN: 978-1-4244-0099-7.
(GGS: 2/A-; CORE: B; LiveSHINE: B; MA: A++)

[C1] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini.
Secure Cooperative Channel Establishment in Wireless Sensor Networks.
In Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops
(IEEE PerCom 2006 workshop: PerComW 2006)
, pages 327-331, Pisa, Italy, March 13, 2006.
DOI: 10.1109/PERCOMW.2006.121, ISBN: 0-7695-2520-2.


Patents

[P10] Mauro Conti, Alessandro Brighente.
System and methods for overvoltage protection of a load in a wireless power receiver.
IT Patent n. 102022000009941, 2022.
WIPO Patent. n. WO2023/218422 A1, 2023.
[More Info: KnowledgeShare]

[P9] Mauro Conti, Alessandro Visintin.
Device for enabling a confidential and secure transmission of the video signal sent from a computer to its screen.
IT Patent n. 102021000007808, 2021.

[P8] Mauro Conti, Alessandro Visintin.
Device for real-time modification of the video signal coming out from a computer to enhance user experience.
IT Patent n. 102021000001022, 2021.

[P7] Mauro Conti, Denis Donadel, Federico Turrin
A fingerprinting-based countermeasure against electric vehicle supply equipment relay attacks.
IT Patent n. 102020000029117, 2020.
[More Info: KnowledgeShare]

[P6] Hsiao Ying LIN, Mauro Conti, Amrita Ghosal, Subir Halder.
Policy-based automotive secure Over-the-air update.
CN Patent n. CN2019/117399, 2020.
[More Info: Google Patents]

[P5] Mauro Conti, Stefano Cecconello, Piero Romare, Mattia Carlucci.
A method for user identification through analysis of variations of external auditory canal.
IT Patent n. 102020000001192, 2020.
WIPO Patent. n. WO2021148932, 2021.
[More Info: IT; Patentscope; Google Patents]

[P4] Mauro Conti, Eleonora Losiouk, Pierre Sedon.
Method and software solution to control the Bluetooth channel.
IT Patent n. 102019000020775, 2019.
WIPO Patent n. WO2021094890, 2021.
[More Info: IT; EN; Patentscope; Google Patents]

[P3] Mauro Conti, Rabbani Md Masoom, Nele Mentens, Jo Vliegen.
Configurable hardware device.
GB Patent n. GB1806997, 2018.
EU Patent n. EP3788537, 2021.
US Patent n. US11640483 B2, 2023.
[More Info: IT; EN; Google Patents]

[P2] Mauro Conti, Claudio Guarisco, Riccardo Spolaor.
A method for recognizing whether a user terminal is human or robot.
IT Patent n. MI2014A002112, 2014.
EU Patent n. EP3230920 B1, 2020.
[More Info:
IT; EN; Google Patents]

[P1] Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo.
User authentication method for access to a mobile user terminal and corresponding mobile user terminal.
IT Patent n. TO2010A001069, 2010.
USA Patent n. US 20120164978 A1, 2014.
[More Info: Google Patents]




Theses

[T2] Mauro Conti.
Securing Wireless Sensor Networks,
PhD Thesis - University of Rome "La Sapienza" (Italy), February 2009.

[T1] Mauro Conti.
Protocolli per comunicazioni sicure nelle reti di sensori Wireless,
Tesi di Laurea - University of Rome "La Sapienza" (Italy), May 2005.


Hacking Conferences (w/o published proceedings)

[H4] Riccardo Spolaor, Riccardo Bonafede, Veelasha Moonsamy, Mauro Conti.
No Free Charge Theorem 2.0: How to steal private information from a mobile device using a powerbank.
In BlackHat Europe 2018, Excel London, United Kingdom, December 3-6, 2018.

[H3] Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi.
POSTER: The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In CSAW Europe 2018 Applied Research Competition, Valence, France, November 8-10, 2018.

[H2] Andrea Biondo, Mauro Conti, Daniele Lain.
Back To The Epilogue: How to Evade Windows' Control Flow Guard with Less than 16 Bytes.
In BlackHat Asia Briefings '18, Marina Bay Sands, Singapore, March 20-23, 2018.

[H1] Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik.
Skype & Type: Keystroke Leakage over VoIP.
In BlackHat USA Briefings '17, Mandalay Bay, Las Vegas, USA July 22-27, 2017.


Top

website hit counter