Daniele Antonioli
Citata da
Citata da
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
MiniCPS: A toolkit for security research on CPS networks
D Antonioli, NO Tippenhauer
Proceedings of the First ACM workshop on cyber-physical systems-security and …, 2015
BIAS: Bluetooth Impersonation AttackS
D Antonioli, NO Tippenhauer, K Rasmussen
2020 IEEE symposium on security and privacy (SP), 549-562, 2020
Early evidence of effectiveness of digital contact tracing for SARS-CoV-2 in Switzerland
M Salathé, CL Althaus, N Anderegg, D Antonioli, T Ballauz, B Edouard, ...
medRxiv, 2020.09. 07.20189274, 2020
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR
D Antonioli, NO Tippenhauer, K Rasmussen
USENIX Security, 2019
Towards high-interaction virtual ICS honeypots-in-a-box
D Antonioli, A Agrawal, NO Tippenhauer
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and …, 2016
Key negotiation downgrade attacks on bluetooth and bluetooth low energy
D Antonioli, NO Tippenhauer, K Rasmussen
ACM Transactions on Privacy and Security (TOPS) 23 (3), 1-28, 2020
Gamifying ICS security training and research: Design, implementation, and results of S3
D Antonioli, HR Ghaeini, S Adepu, M Ochoa, NO Tippenhauer
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
State-Aware Anomaly Detection for Industrial Control Systems
HR Ghaeini, D Antonioli, F Brasser, AR Sadeghi, NO Tippenhauer
Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC), 2018
Legacy-Compliant Data Authentication for Industrial Control System Traffic
JH Castellanos, D Antonioli, NO Tippenhauer, M Ochoa
Proceedings of the International Conference on Applied Cryptography and …, 2017
On-chip lightweight implementation of reduced NIST randomness test suite
VB Suresh, D Antonioli, WP Burleson
Proceedings of the IEEE Hardware-Oriented Security and Trust (HOST …, 2013
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks
J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu, DJ Tian, ...
Proceedings of the USENIX Security Symposium (USENIX Security), 2021
BLURtooth: Exploiting cross-transport key derivation in Bluetooth Classic and Bluetooth Low Energy
D Antonioli, NO Tippenhauer, K Rasmussen, M Payer
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android
D Antonioli, NO Tippenhauer, K Rasmussen
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019
Taking control: Design and implementation of botnets for cyber-physical attacks with cpsbot
D Antonioli, G Bernieri, NO Tippenhauer
arXiv preprint arXiv:1802.00152, 2018
Practical Evaluation of Passive COTS Eavesdropping in 802.11 b/n/ac WLAN
D Antonioli, S Siby, NO Tippenhauer
Proceedings of the International Conference on Cryptology and Network …, 2017
Breakmi: Reversing, exploiting and fixing xiaomi fitness tracking ecosystem
M Casagrande, E Losiouk, M Conti, M Payer, D Antonioli
IACR Transactions on Cryptographic Hardware and Embedded Systems, 330-366, 2022
On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats
D Antonioli, M Payer
2022 IEEE Security and Privacy Workshops (SPW), 353-362, 2022
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
D Antonioli
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
MiniCPS public repository
D Antonioli, 0
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20