Gianluca Dini

Learn More
Currently, in the smartphone market, Android is the platform with the highest share. Due to this popularity and also to its open source nature, Android-based smartphones are now an ideal target for attackers. Since the number of malware designed for Android devices is increasing fast, Android users are looking for security solutions aimed at preventing(More)
Delay Tolerant Network (DTN) is a network paradigm used to deliver messages when network connectivity is not guaranteed. In a DTN, communication is made possible by carriers, mobile nodes that physically carry messages from a network partition to another. Selecting carriers that provide the best delivery probability is a crucial issue. However, if carriers(More)
In this paper, we present a scalable and secure protocol for key revocation in wireless sensor networks. The protocol guarantees an authenticated distribution of new keys that is efficient in terms of storage, communication and computing overhead. The proposed protocol reduces the number and the size of rekeying messages. It achieves the necessary level of(More)
8 %e Tracsgraphical programming environment promotes a modular approach to the development of distributed applications. A few types of reusa ble design components make the environmen both simple and powerful. M any programming tools and environments have been developed for parallel and distributed applications. Some of these systems define new(More)
Android users are constantly threatened by an increasing number of malicious applications (apps), generically called malware. Malware constitutes a serious threat to user privacy, money, device and file integrity. In this paper we note that, by studying their actions, we can classify malware into a small number of behavioral classes, each of which performs(More)
Fair exchange constitutes a fundamental mechanism for electronic commerce. Fair exchange assumes that it is possible to verify the correctness of the digital items to be exchanged. However, when an item is indescribable, i.e., it cannot be formally specified, its verification becomes difficult, if not impossible. This hinders a practical deployment of fair(More)
Distributed systems constructed using off-the-shelf communication infrastructures are becoming common vehicles for doing business in many important application domains. Large geographic extent due to increased globalization, increased probability of failures and highly dynamic loads, all contribute towards a partitionable and asynchronous characterization(More)
ZigBee outlines a new suite of protocols targeted at low-rate, low-power devices and sensor nodes. ZigBee Specification includes a number of security provisions and options. The security model specified in the Smart Energy Profile seems bound to become the reference security model for most of ZigBee applications. In this paper we review this security model(More)
A Delay Tolerant Network (DTN) relies on the implicit assumption that nodes cooperate towards message forwarding. However, this assumption cannot be satisfied when there are malicious nodes acting as blackholes and voluntarily attracting and dropping messages. In this paper we propose a reputation-based protocol for contrasting blackholes. Every node(More)
In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics(More)