Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
5G positioning with software-defined radios
- Ivan Palamà,
- Yago Lizarribar,
- Lorenzo Maria Monteforte,
- Giuseppe Santaromita,
- Stefania Bartoletti,
- Domenico Giustiniano,
- Giuseppe Bianchi,
- Nicola Blefari Melazzi
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 250, Issue Chttps://doi.org/10.1016/j.comnet.2024.110595AbstractPositioning is a key focus in 5G standardization, starting with 3GPP Release 16. However, most of the effort from the research community and work presented in the technical standardization has been limited mainly to simulation studies. This paper ...
- research-articleApril 2024
Composing eBPF Programs Made Easy With HIKe and eCLAT
- Andrea Mayer,
- Lorenzo Bracciale,
- Paolo Lungaroni,
- Giulio Sidoretti,
- Stefano Salsano,
- Giuseppe Bianchi,
- Pierpaolo Loreti
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 2Pages 1359–1371https://doi.org/10.1109/TNSM.2023.3325624With the rise of the Network Softwarization era, eBPF has become a hot technology for efficient packet processing on commodity hardware. However the development of custom eBPF solutions is a challenging process that requires highly qualified human ...
- research-articleDecember 2023
Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments
Computer Communications (COMS), Volume 212, Issue CPages 129–140https://doi.org/10.1016/j.comcom.2023.09.031AbstractEnterprise Wi-Fi networks are essential for businesses and public administrations as they provide a perfectly scalable and secure system. In the university environment, they are often deployed to offer services to students. One of the most famous ...
- research-articleAugust 2023
ScasDK - A Development Kit for Security Assurance test in Multi-Network-Function 5G
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 48, Pages 1–8https://doi.org/10.1145/3600160.3605044To ensure 5G infrastructure security, standardized Security Assurance Specification (SCAS) tests are being developed by 3GPP. However, executing these tests on complex 5G infrastructures with multiple closed-source network functions (NFs) poses a ...
- research-articleAugust 2023
JITScanner: Just-in-Time Executable Page Check in the Linux Operating System
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 78, Pages 1–8https://doi.org/10.1145/3600160.3605035Modern malware has become increasingly sophisticated, posing a significant threat to cybersecurity. As a result, researchers and security professionals are constantly seeking more advanced methods to detect and analyze malware. Most of these methods are ...
-
- ArticleAugust 2023
Time Is on My Side: Forward-Replay Attacks to TOTP Authentication
Security and Privacy in Social Networks and Big DataPages 109–126https://doi.org/10.1007/978-981-99-5177-2_7AbstractTime-based One-Time Password (TOTP) is a widely used method for two-factor authentication, whose operation relies on one-time codes generated from the device’s clock and validated using the servers’ clock. By introducing the notion of forward-...
- research-articleJune 2023
Balloons in the Sky: Unveiling the Characteristics and Trade-Offs of the Google Loon Service
IEEE Transactions on Mobile Computing (ITMV), Volume 22, Issue 6Pages 3165–3178https://doi.org/10.1109/TMC.2021.3135976The Google's Loon<inline-formula><tex-math notation="LaTeX">$^{TM}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mrow><mml:mi>T</mml:mi><mml:mi>M</mml:mi></mml:mrow></mml:msup></mml:math><inline-graphic xlink:href="serrano-ieq1-...
- proceedingNovember 2022
CoNEXT '22: Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies
CoNEXT is a premier and highly selective venue in computer networking. This year's exciting technical program helps us better understand and improve the performance, reliability and security of networks in all layers.
- research-articleJanuary 2023
eBPF Programming Made Easy with eCLAT
CNSM '22: Proceedings of the 18th International Conference on Network and Service ManagementArticle No.: 24, Pages 1–9With the rise of the Network Softwarization era, eBPF has become a hot technology for efficient packet processing on commodity hardware. However the development of custom eBPF solutions is a challenging process that requires highly qualified human ...
- research-articleOctober 2022
Metronome: Adaptive and Precise Intermittent Packet Retrieval in DPDK
IEEE/ACM Transactions on Networking (TON), Volume 31, Issue 3Pages 979–993https://doi.org/10.1109/TNET.2022.3208799The increasing performance requirements of modern applications place a significant burden on software-based packet processing. Most of today’s software input/output accelerations achieve high performance at the expense of reserving CPU resources ...
- research-articleSeptember 2022
Staggered HLL: Near-continuous-time cardinality estimation with no overhead
Computer Communications (COMS), Volume 193, Issue CPages 168–175https://doi.org/10.1016/j.comcom.2022.06.038AbstractMost of existing cardinality estimation algorithms do not support natively interval queries under a sliding window model and are thereby insensitive to data recency. We present Staggered-HyperLogLog (ST-HLL), a probabilistic data structure that ...
- research-articleJuly 2022
hXDP: Efficient software packet processing on FPGA NICs
- Marco Spaziani Brunella,
- Giacomo Belocchi,
- Marco Bonola,
- Salvatore Pontarelli,
- Giuseppe Siracusano,
- Giuseppe Bianchi,
- Aniello Cammarano,
- Alessandro Palumbo,
- Luca Petrucci,
- Roberto Bifulco
The network interface cards (NICs) of modern computers are changing to adapt to faster data rates and to help with the scaling issues of general-purpose CPU technologies. Among the ongoing innovations, the inclusion of programmable accelerators on the ...
- research-articleJuly 2022
Processor Security: Detecting Microarchitectural Attacks via Count-Min Sketches
- Kerem Arıkan,
- Alessandro Palumbo,
- Luca Cassano,
- Pedro Reviriego,
- Salvatore Pontarelli,
- Giuseppe Bianchi,
- Oğuz Ergin,
- Marco Ottavi
IEEE Transactions on Very Large Scale Integration (VLSI) Systems (ITVL), Volume 30, Issue 7Pages 938–951https://doi.org/10.1109/TVLSI.2022.3171810The continuous quest for performance pushed processors to incorporate elements such as multiple cores, caches, acceleration units, or speculative execution that make systems very complex. On the other hand, these features often expose unexpected ...
- research-articleJuly 2022
Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer
- Alessandro Palumbo,
- Luca Cassano,
- Bruno Luzzi,
- José Alberto Hernández,
- Pedro Reviriego,
- Giuseppe Bianchi,
- Marco Ottavi
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 128, Issue Chttps://doi.org/10.1016/j.sysarc.2022.102543AbstractSoftware exploitable Hardware Trojan Horses (HTHs) inserted into commercial CPUs allow the attacker to run his/her own software or to gain unauthorized privileges. Recently a novel menace raised: HTHs inserted by CAD tools. A ...
- research-articleDecember 2021
OpenNym: Privacy preserving recommending via pseudonymous group authentication
AbstractA user accessing an online recommender system typically has two choices: either agree to be uniquely identified and in return receive a personalized and rich experience, or try to use the service anonymously but receive a degraded non‐...
- short-paperNovember 2021
TooLate: Cryptographic Data Access Control for Offline Devices through Efficient Key Rotation
CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and PrivacyPages 57–62https://doi.org/10.1145/3462633.3483982The design of an access control technique for devices not connected to the Internet can present some very difficult challenges. Among others, how to properly handle user revocation stands out. In this paper, we present TooLate, a cryptosystem that ...
- research-articleSeptember 2021
FlowFight: High performance–low memory top-k spreader detection
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 196, Issue Chttps://doi.org/10.1016/j.comnet.2021.108239AbstractA recurring task in security monitoring/anomaly detection applications consists in finding the so-called top “spreaders” (“scanners”), for instance hosts which connect to a large number of distinct destinations or hit different ports. ...
- research-articleSeptember 2021
5G and Beyond for Contact Tracing
IEEE Communications Magazine (COMAG), Volume 59, Issue 9Pages 36–41https://doi.org/10.1109/MCOM.010.2001250The COVID-19 pandemic has suddenly raised the need for technological solutions able to trace contacts of people and provide location-based analytics. Several countries have adopted proximity-based (short-range) technologies, such as Bluetooth, which, ...
- research-articleSeptember 2021
Analytical grid generation and numerical assessment of tip leakage flows in sliding vane rotary machines
Advances in Engineering Software (ADES), Volume 159, Issue Chttps://doi.org/10.1016/j.advengsoft.2021.103030Highlights- New grid generation method suitable for any rotary vane machine geometry
- New ...
The research presents a new analytical grid generation methodology for computational fluid dynamics studies in positive displacement sliding vane rotary machines based on the user defined nodal displacement approach. This method is ...
- research-articleAugust 2021
Location Security under Reference Signals’ Spoofing Attacks: Threat Model and Bounds
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and SecurityArticle No.: 155, Pages 1–5https://doi.org/10.1145/3465481.3470098Most localization systems rely on measurements gathered from signals emitted by stations whose position is assumed known as ground truth, namely anchors. As demonstrated by a significant bulk of experimental research, location security is threatened ...