Contact InfoDepartment of Information Engineering
and Computer Science (DISI)
University of Trento
via Sommarive 14, I-38123 Povo (TN), Italy
Some of my recent papers (check also the full list)
- Attaullah Buriro, Bruno Crispo, Filippo DelFrari, Jeffrey Klardie, Konrad Wrona, ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones presented at PASSWORDS 2015.
- Yury Zhauniarovich, Maqsood Ahmad, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci, StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. presented at Codaspy 2015 .
- Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes MOSES: Supporting and Enforcing Security Profiles on Smartphones. Published on IEEE Transactions on Dependable and Secure Computing, 11(3): 211-223 (2014).
- Mobile Platforms Security and Privacy: Smartphones are rapidly becoming the computing and communication platform used by people to perform many activities besides placing and receiving phone calls. However, the protection and security models provided by such platforms do not address many security and privacy concerns of their users. This research activity aim at extending the security models and mechanisms of existing smart-phone platforms to support context-aware application without jeopardising the security and the privacy of their users. Particularly challenging in this domain is to find solutions that can increase the security and the privacy of users and at the same time, they are easy to understand and to use.
- Encrypted Queries for Cloud This research aims at developing new algorithms and protocols allowing to perform complex queries (i.e. SQL-like) over encrypted data thus obtaining end-to-end confidentiality for Cloud scenarios. The requirement is to prevent or limit the leakage of information about the data are queried, about the query itself (including the source) and about the results of the query. All operations are performed over encrypted data, so there is no need ever to have the data in plaintext. We also study the feasibility of such methods in realistic scenarios (i.e. e-healthcare application, publisher-subscriber systems).
- Malware Detection and Analysis This activity is characterized by two main thread. The first aims at discovering new possible attacks and attack vectors for infrastructure and system besides Internet, in order to show the vulnerabilities of such systems. The second thread aims at investigating new techniques and method to detect malware using the anomaly behavior approach. We introduced a new black-box technique based on I/O correlations to detect malware. The technique is particularly effective to detect malware harvesting private information such keyloggers and spyware. The novelty is based on manipulating the input of a process and correlating it with the produced output. By profiling also the memory writes, the techniques is resilient to many evasion techniques such as aggressive buffering or any linear input transformation that such malware might use. Current work investigates the use of kernel level features for fingerprinting applications.
- Policy Enforcement: The goal of this line of work is to design and implement new methods and extend existing techniques to assure the enforcement of a specified behavior or of a set of specified security requirements. We explored the problem in several contexts and systems (e.g., java virtual machine, SOA) supporting different settings (e.g., outsourcing, cloud computing). We also extend the traditional approach of preventing policy violations with the possibly to correct, compensate or tolerate violations that may inevitably occur in complex systems and when compliance is required. We study also the introduction of meaningful and experimental indicators to assess the security performance of such methods and techniques.
Research projects I am currently involved in
NeCS: European Network fro Cyber Security (EU)
The European Network for Cybersecurity (NECS) was formed in response to the increased need of highly qualified experts able to cope with all the aspects of the European cyber security strategy that is currently under implementation.There is indeed an evident need and opportunity to grow a new generation of young researchers able to answer this demand for expertize. This 4-year project for a cybersecurity research and training network aims at contributing to answer this increased demand of human expertise in the field.
TENACE: Protecting National Critical Infrastructures From Cyber Threats (National)
The TENACE project will investigates the protection of national critical infrastructures (CI) from cyber threats following a collaborative approach whenever appropriate. TENACE addresses three scenarios: financial infrastructures, power grid and transportation systems that represent three widely different settings with distinct interdepencies, threats, vulnerabilities and possible countermeasures. TENACE has the objective of defining collaborative technical and organizational methodologies to raise the protection of such CIs with the specific target of looking at the common steps in order to develop a unifying metodology and understanding the underground economics fuelling an attacker.
The SECENTIS Project will provide an innovative training program at the Doctoral level to educate a new generation of security experts capable to tackle the scientific and technical challenges raised by the combination of new technologies (e.g., cloud computing, mobile applications, and the Software-as-a-Service paradigm) and to manage the impact of these changes in industry.
Scientific events I am currently involved in
- ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2016) , Darmstadt, Germany, 18-20 July 2016. (Program Committee member)
- ISC 2016: the 19th Information Security Conference , Honululu, HI, USA, 5-7 September 2016. (Program Committee member)