M. Casagrande, E. Losiouk, M. Conti, M. Payer, D. Antonioli.
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem.
In Proceedings of the Transactions on Cryptographic Hardware and Embedded Systems 2022(TCHES 2022), 18-21 September, 2022, Leuven, Belgium
E. Bardhi, M. Conti, R. Lazzeretti, E. Losiouk, A. Taffal.
Sim2Testbed Transfer: NDN Performance Evaluation
In Proceedings of 5th International Workshop on Emerging Network Security 2022(ENS 2022) co-located with ARES 2022, 23-26 August, 2022, Vienna, Austria
A. Visintin, F. Toffalini, E. Losiouk, M. Conti, J. Zhou.
HolA: Holistic and Autonomous Attestation for IoT Networks.
In Proceedings of 4th International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security 2022(AIoTS2022) co-located with ACNS 2022, 20-23 June, 2022, Rome, Italy
AIoTS2022 best workshop paper
M. Casagrande, M. Conti, E. Losiouk, M. Fedeli.
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution.
In Journal of Cybersecurity Education, Research and Practice
P. Srihari Darbha, M. Conti, E. Losiouk, R. Ranjan Maiti.
Face Recognition Systems: Are you sure they only consider your face?
In Proceedings of the IEEE Workshop on the Internet of Safe Things(SafeThings 2022) co-located with IEEE S&P 2022, 23-26 May 2022, San Francisco, CA, USA
M. Conti, E. Losiouk, A. Visintin.
What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels.
In Proceedings of the 37th ACM/SIGAPP Symposium On Applied Computing(SAC 2022) Virtual event, 25-29 April 2022
A. Ruggia, E. Losiouk, L. Verderame, M. Conti, A. Merlo.
Repack Me If You Can: An Anti-Repackaging Solution based on Android Virtualization.
In Proceedings of Annual Computer Security Applications Conference(ACSAC 2021) Virtual event, 6-10 December 2021