![]() |
Professor at the Department of Computer Science and Information Engineering (DISI) University of Trento via Sommarive 14, I-38123 Povo (TN), Italy
|
News
- Security Embedded has been founded! Security Embedded is an innovative startup offering services and products in the domain of IIot and OT security. We have just been accepted to showcase our portfolio of solutions at the Prototype for Humanity at Dubai in November. Visit the company website if you are interested to know more...and we are hiring too.
-
CROSSCON (EU Research Innovative Action)
I am the scientific coordinator of an interesting EU research project ( >6M Euro) called CROSSCON. IoT developers face a very fragmented landscape made of very different devices, from bare metal devices with few KB of RAM and limited or no security protection to devices equipped with powerful support for AI and with built-in hardware (HW) to implement Root of Trust (RoT) and Trusted Execution Environments (TEE). Such different devices coexist, and it is an open challenge to guarantee an acceptable level of security across the whole system to avoid “easy” entry points for attackers. CROSSCON aims at addressing all these issues by designing a new open, flexible, highly portable and vendor independent IoT security stack that can run across a variety of different edge devices and multiple HW platforms to offer a consistent security baseline across an entire IoT system. A high-level assurance is guaranteed by the formal verification of the stack specifications.
Some of my recent papers (check also the full list)
- Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson, Cached and Confused: Web Cache Deception in the Wild. accepted at Usenix Security 2020. The paper raised already the attention of many experts (e.g. James Kettle, Omer Gil ) and it was cover by specialized media (e.g., The Daily Swig, ZDNet).
- Mahmoud Ammar, Giovanni Russello, Bruno Crispo, Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications 38: 8-27 (2018).
- Mahmoud Ammar and Bruno Crispo, "Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices" accepted and presented at the Annual Computer Security Applications Conference (ACSAC'20) . The paper deals with the difficult problem of recovering from a comprimsed state in teh context of embedded systems.
Research Interests
- Large-scale analysis of web-based attacks: Recently, I started working on large-scale analysis of new web-based attacks. The first target here is the discovery of new vulnerabilities and attacks to exploit them. The second is the analysis of the potential impact of each of these vulnerabilities by analyzing large portions of website and how many of these are subject to the discovered vulnerabilities. So far one of the most important results of this research has been the discovery and exploitation of the Relative Path Overwrite (RPO) attack. The most important exploit we study about it was the Web Cache Deception work that will be presented at Usenix Security 2020.
- Security of Internet of Things: This research thread investigates the problem of protecting Internet of Things and cyber-physical systems. In particular, I study the emergence of new attack vectors caused by the interconnection of subsystems that have never been connected to Internet before. I don't limit my research to attacks, but I also investigate defense mechanisms. My main interest is on the protection of the simplest classes of devices, that are also the most widely deployed, that could not be equipped with special hardware to protect cryptographic keys and in some cases not even with primary memory protection. In this domain, my interest is on software-based solutions.
- Behavioural Biometrics: Several field studies show that users are very reluctant on using traditional authentication methods like PIN and password to authenticate to the new generation of devices like smartphone, smart watches, fitness bands, etc. In this activity I am interested in designing and evaluating new user authentication methods for IoT. These methods are based on behavioral biometrics, thus biometrics based on how users perform particular activities. MEMS technology embedded in almost all these new devices allows the implementation of new biometrics without the need for additional or specialized hardware. Here the challenge is to design methods that users accept and find easy to use and that achieve the necessary accuracy to provide the desired level of security. This topic of research is typically multidisciplinary since involves competences in the area of security and privacy, machine learning and computer-human interactions.
- Adversarial Learning: How not to jump into the bandwagon of AI nowadays?! Recently, I started working on this topic too. However, just a small part of the activity is devoted to applications of adversarial learning, that account for 95% of the research you can find around, while most of the research I do here tries to be more fundamental and study how to design learning algorithms that make adversarial attacks more difficult. This research thread is in collaboration with Prof. Bergadano from University of Torino.
- Mobile Platforms Security and Privacy: Smartphones became a pervasive computing and communication platform used by people to perform many activities besides placing and receiving phone calls. However, the protection and security models supported by such platforms have been shown not to adequately address security and privacy concerns of their users. This research activity is structured in two different threads. The first, aims at extending and strengthening the security models and mechanisms of existing smart-phone platforms and OSes. Particularly challenging in this domain is to find solutions that can increase the security and privacy of users without affecting usability. The second thread, acts directly on the mobile applications. Here the focus is the development of innovative techniques that combine static and dynamic approaches to analyse the security of applications. Particularly challenging is the analysis of the code uploaded only at runtime and the analysis of programming constructs that hide their semantics (i.e. reflections).
Research projects I am currently involved in
-
CyberSec4Europe (EU)
CyberSec4Europe is a pilot for a future European Cybersecurity Competence Network – a new digital ecosystem built of a network of centres of cybersecurity expertise, with a central hub. The project designs, tests and demonstrates potential governance structures for a future European Cybersecurity Competence Network using best practice examples derived from concepts like CERN as well the expertise and experience of partners.
Scientific events I am currently involved in
- Program Committe of the AsiaCCS 2023.
- Program Committe of Esorics 2023.
- General Chair 6th International NeCS Winter PhD School 2023
- Program Committe of Usenix Security 2022.
- Program Committe of Usenix Security 2021.