• Publications
  • Influence
FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN
TLDR
We propose the architectural design of FORTRESS: a stateful firewall for SDN networks that leverages the stateful data plane architecture to move the logic of the firewall from the control plane to the data plane. Expand
  • 5
  • 1
  • PDF
Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues
TLDR
In this paper we introduce the main technologies supporting the Edge paradigm, survey existing issues, introduce relevant scenarios, and discusses benefits and caveats of the different existing solutions in the above introduced scenarios. Expand
  • 33
Foundations, Properties, and Security Applications of Puzzles: A Survey
TLDR
We provide a comprehensive study of the most important puzzle construction schemes available in the literature, categorizing them according to several attributes, such as resource type, verification type, and applications. Expand
  • 3
Intrusion Detection at the Network Edge: Solutions, Limitations, and Future Directions
TLDR
The low-latency, high bandwidth capabilities promised by 5G, together with the diffusion of applications that require high computing power and, again, low latency (such as videogames), are probably the main reasons—though not the only one—that have led to the introduction a new network architecture: Fog Computing, that consists in moving the computation services geographically close to where computing is needed. Expand
  • 4
  • PDF
Vessels Cybersecurity: Issues, Challenges, and the Road Ahead
TLDR
We describe the architecture and main features of the different systems, pointing out their main security issues, and specifying how they were exploited by attackers to cause service disruption. Expand
  • 3
  • PDF
Foundations, Properties, and Security Applications of Puzzles
TLDR
We provide a comprehensive study of the most important puzzle construction schemes available in the literature, categorizing them according to several attributes, such as resource type, verification type, and applications. Expand
  • 3
  • PDF
Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges
TLDR
We survey and classify methods, applications, and use-cases rooted on short-range audio channels for the provisioning of security services—including Two-Factor Authentication techniques, pairing solutions, device authorization strategies, defense methodologies, and attack schemes. Expand
  • 3
  • PDF
Cryptomining Makes Noise: a Machine Learning Approach for Cryptojacking Detection.
TLDR
A new cybersecurity attack,where an adversary illicitly runs crypto-mining software over the devices of unaware users, is emerging in both the literature and in the wild . Expand
  • 2
  • PDF
Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues
TLDR
The technological advances made in the last twenty years radically changed our society, improving our lifestyle in almost every aspect of our daily life. Expand
  • 1