


default search action
ITASEC/SERICS 2025: Bologna, Italy
- Gabriele Costa, Rebecca Montanari, Michele Carminati, Giada Sciarretta:
Proceedings of the Joint National Conference on Cybersecurity (ITASEC & SERICS 2025), Bologna, Italy, February 03-08, 2025. CEUR Workshop Proceedings 3962, CEUR-WS.org 2025 - Stefano Bistarelli, Emanuele Burberi, Francesco Santini:
A Classification of Malware Sandboxes and Their Architectures. - Luca Lobascio, Giuseppina Andresini, Annalisa Appice, Donato Malerba:
Adversarial Training to Improve Accuracy and Robustness of a Windows PE Malware Detection Model. - Vita Santa Barletta, Danilo Caivano, Christian Catalano, Samuele del Vescovo, Michele Scalera:
Towards the Responsible/Trustworthy AI in Multi-Domain Operations for Cyber Social Security: A Black-Box AML Case Study in the CAN Bus Frame Detection Task. - Camilla Cespi Polisiani, Maria Carla Calzarossa, Marco Zuppelli, Luca Caviglione, Massimo Guarascio:
Improving MQTT Security Through the Generation of Malicious Test Cases. - Rosolino Alaimo, Silvia Schilleci, Alessandra Dino, Stefano Mangione, Ilenia Tinnirello, Domenico Garlisi, Roberto Corallo:
Undercover Disruption: Stealth Jamming Attacks on 5G Synchronization Stages. - David Domingo Martín, Rodrigo Martín Sánchez-Ledesma, Marta Irene García Cid:
Application of Quantum Resistant Cryptography to Smart Grid deployments. - Haitham S. Al-Sinani, Nabil Sahli, Chris J. Mitchell, Mohamed Al-Siyabi:
Advancing Ethical Hacking with AI: A Linux-Based Experimental Study. - Charlotte Millan, Lotfi Chaâri, Amel Aissaoui, Eric Gilbert:
Attack Originality Detector Using Machine Learning. - Diego Soi, Silvia Lucia Sanna, Angelica Liguori, Marco Zuppelli, Leonardo Regano, Davide Maiorca, Luca Caviglione, Giuseppe Manco, Giorgio Giacinto:
On the Feasibility of Android Stegomalware: A Detection Study. - Francesco Buccafurri, Vincenzo De Angelis, Sara Lazzaro, Carmen Licciardi:
Securing Telephone Communication with Trusted Services. - Gianluca De Lucia, Alessio Merlo, Luca Caviglione:
A GPU Covert Channel Based on Workload Manipulation Through the CuPy Library. - Giovanni Bartolomeo:
Revocable Anonymous Credentials from Attribute-Based Encryption. - Andrea Augello, Alessandra De Paola, Giuseppe Lo Re, Antoine Menager:
HDDroid: Federated Hyperdimensional Computing for Mobile Malware Detection. - Francesco Panebianco, Andrea Isgrò, Stefano Longari, Stefano Zanero, Michele Carminati:
Guessing As A Service: Large Language Models Are Not Yet Ready For Vulnerability Detection. - Victoria Popa, Guglielmo Cola, Caterina Senette, Maurizio Tesconi:
How effective are Large Language Models (LLMs) at inferring people's personality based on texts they authored? - Luca Olivieri, Aradhita Mukherjee, Nabendu Chaki, Agostino Cortesi:
Cross-chain Smart Contracts and dApps Verification by Static Analysis: Limits and Challenges. - Maria Di Gisi, Giuseppe Fenza, Mariacristina Gallo, Vincenzo Loia, Claudio Stanzione:
Cognitive Filter Bubble: Investigating Bias and Neutrality Vulnerabilities of LLMs in Sensitive Contexts. - Martina Cerulli, Manlio Gaudioso, Domenico Serra, Carmine Sorgente:
Preventing Disinformation Spread Across Network Clusters by Strategic Edge Deletions: a Lagrangian Heuristic. - Farwa Batool, Giuseppe Lo Re, Marco Morana, Mario Tortorici:
Multi-Domain Fake News Detection Exploiting Ensemble Learning Techniques. - Giuseppe Fenza, Domenico Furno, Vincenzo Loia, Pio Pasquale Trotta:
Multi-LLM Agents Architecture for Claim Verification. - Maurizio Giacobbe, Ida Falco, Sarah Zanafi, Carmine Colarusso, Jiregna Abdissa Olana, Antonio Puliafito, Eugenio Zimeo:
Key challenges in LoRaWAN-based Edge-Cloud infrastructures for security-sensitive smart cities applications. - Pierciro Caliandro, Matteo Ciccaglione, Andrea Pepe, Giuseppe Bianchi, Alessandro Pellegrini:
VMORPH: A Virtualization/Metamorphic Framework for Binary Obfuscation and Intellectual Property Protection. - Sikandar Mehmood Abbasi, Stefano Longari:
CANPak: An Intrusion Detection System against Error Frame Attacks for Controller Area Network. - Davide Giannubilo, Tommaso Giorgeschi, Michele Carminati, Stefano Zanero, Stefano Longari:
A Deep Learning Approach for False Data Injection Attacks Detection in Smart Water Infrastructure. - Marco Balossini, Michele Carminati, Stefano Zanero, Stefano Longari:
Micro-Mobility Security: A Holistic Approach via Mobile App Analysis. - Lorenzo Bettini, Rosario Pugliese, Francesco Tiezzi:
On Policies for Bartering Access to Resources. - Stefano Bistarelli, Sara Geoli, Chiara Luchini, Ivan Mercanti:
Analysis and Study of a Cybersecurity Maturity Assessment System for SMEs. - Marzieh Kordi, Francesco Mariotti, Paolo Lollini, Roberto Magrini, Andrea Bondavalli:
On the Usage of ChatGPT for Integrating CAPEC Attacks into ADVISE Meta Ontology. - Gianluca Capozzi, Giordano Laurenzi, Marco Mormando, Carmine Gianni, Gianluca Marcilli, Giuseppe Antonio Di Luna, Leonardo Querzoni:
BinSAFE: Extending Functions Embeddings to Entire Binaries. - Isabella Marasco, Karina Chichifoi, Silvio Russo, Claudio Zanasi:
Enhancing Training Time for Sustainability of Intrusion Detection Systems based on Machine Learning. - Martina Lucaccini:
Digital Authoritarianism: ICT-enabled Repression Across Regime Types. - Badaruddin Chachar, Marc Cavazza, Andrea Bracciali, Pietro Ferrara, Agostino Cortesi:
Finding Vulnerabilities in Solidity Smart Contracts with In-Context Learning. - Alessandro Sanna, Daniele Canavese, Leonardo Regano, Davide Maiorca, Giorgio Giacinto:
Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data Sets. - Danilo Dell'Orco, Lorenzo Valeriani, Giuseppe Bianchi, Alessandro Pellegrini, Alessio Merlo:
Challenging Antivirus against Elusive Android Malware over Time. - Andrea Bernardini, Mario Lezoche, Simone Angelini, Giovanna Dondossola, Roberta Terruggia:
Advancing Internet-Connected Devices Posture Analysis with a Meta-Search Engine: A Case Study in Energy Systems. - Andrea Augello, Alessandra De Paola, Giuseppe Lo Re, Marena Jestin:
A Stackelberg Approach to Federated Learning for Malware Detection. - Lorenzo Bracciale, Matteo Coni, Pierpaolo Loreti, Emanuele Raso, Giuseppe Bianchi:
Forgotten & Reclaimed: Detecting and Preventing Subdomain Takeover in the Italian Medical Landscape. - Leonardo Sagratella, Andrea Bernardini, Francesco D'Alterio, Marina Settembre, Roberta Terruggia:
Evaluating SCAS Tests in Closed Source 5G Core Network. - Alessandro Gaudenzi, Lorenzo Nodari, Rodolfo V. Valentim, Danilo Giordano, Idilio Drago, Alessandra Russo, Federico Cerutti:
Towards Cyber Resilience against APTs. - Arianna Quinci, Giacomo Belocchi, Francesco Quaglia, Giuseppe Bianchi:
Stateful Handling of Critical Events: Leveraging eBPF to Realize eXtended Finite State Machine Abstractions. - Berenice Fernández Nieto, Daisy Romanini, Yuhui Zhu:
Cybersecurity Education Showdown: A Comparative Analysis of K-12 Education Systems in the United States, the European Union and China. - Francesco Camarda, Alessandra De Paola, Salvatore Drago, Pierluca Ferraro, Giuseppe Lo Re:
Managing Concept Drift in Online Intrusion Detection Systems with Active Learning. - Ioannis Kefaloukos, Nikolay Tcholtchev, Michail-Alexandros Kourtis, Giorgos Oikonomakis, Emmanouil Eleftherios Rompogiannakis, Evangelos Markakis:
The Internet of Quantum Things (IoQT) - A New Frontier in Quantum Emulation and Simulation. - Giovanni Ciaramella, Luca Petrillo, Margaret Varilek, Francesco Mercaldo, Giovanni Comandè, Fabio Martinelli:
Leveraging Pre-trained LLMs for GDPR Compliance in Online Privacy Policies. - Dennis Glenn Ejeh, Gian Luca Foresti, Marino Miculan, Axel De Nardin:
Real-Time Anomaly Detection in Docker Containers: A Continuous Learning Approach Using SF-SOINN. - Edoardo Manenti, Pasquale Caporaso, Giuseppe Bianchi, Francesco Quaglia:
VFSMon: an Innovative Reference Monitor in Linux. - Francesco Mancini, Lorenzo Cannella, Giorgia Messina, Marco Centenaro, Ivan Di Pietro, Alessandro Greco, Samuela Persia, Francesca Cuomo, Giuseppe Bianchi:
5G Security Assurance: Lessons Learned from 3GPP SCAS Tests on Virtualized Network Architectures. - Francesco Di Gennaro, Alessandro Cucchiarelli, Christian Morbidoni, Luca Spalazzi:
A Comparative Analysis of Datasets for Intrusion Detection in Software-Defined Networks. - Massimiliano Baldo, Fabio Ionut Ion, Marino Miculan, Matteo Paier, Vincenzo Riccio:
OWSM: Empowering Rego for Stateful Access Control. - Dimitri Galli, Andrea Venturi, Isabella Marasco, Mirco Marchetti:
Evaluating Explainability of Graph Neural Networks for Network Intrusion Detection with Structural Attacks. - Sara Da Canal, Francesco Mancini, Luca Mastrobattista, Giuseppe Bianchi:
Optimizing 5G Protocol Fuzzing: Structure-Aware Techniques and Feedback Integration. - Luca Barbieri, Abdelkrim Menina, Riccardo Bassoli, Frank H. P. Fitzek:
The Security of Quantum Computing in 6G: from Technical Perspectives to Ethical Implications. - Nicolò Romandini, Luca Capacci, Rebecca Montanari:
CrawLLMentor: An LLM-Powered Tool to Assist Pen Testers in Identifying Business Logic Vulnerabilities. - Sara Tibidò, Nadia Spatari, Azzurra Ragone:
Children and Artificial Intelligence. Towards an Italian Discussion on Artificial Intelligence, Children's Rights and Regulatory Sandboxes. - Federica Casarosa, Giovanni Comandè:
Reporting potential vulnerabilities: a plea for coordination. - Alessio Di Santo, Walter Tiberti, Dajana Cassioli:
An Adaptive Dual-Stack QKD-PQC Framework for Secure and Reliable Inter-Site Communication. - Luca Minnei, Giorgio Piras, Angelo Sotgiu, Maura Pintor, Ambra Demontis, Davide Maiorca, Battista Biggio:
An Experimental Analysis of Semi-supervised Learning for Malware Detection. - Maria Gagliardi, Chiara D'Elia:
A Proportional Approach to Cybersecurity Challanges in the Financial Sector: Ideas from Post-Quantum Cryptography Legal Analysis. - Daniele Ghiani, Daniele Angioni, Angelo Sotgiu, Maura Pintor, Battista Biggio:
Understanding Regression in Continual Learning for Malware Detection. - Gabriele Fioretti, Lorenzo Goglia, Eugenio Zimeo:
LLM-based Fact-Checking: A Pipeline for Studying Information Disorder. - Andrea Ruffo:
The informational disorder and Artificial Intelligence; between major insidies and possible contrasting tools. - Francesco Romeo, Francesco Blefari, Francesco Aurelio Pironti, Angelo Furfaro:
Unveiling Attack Patterns from CTF Network Logs with Process Mining Techniques. - Stefano Solari, Umberto Pedrotti, Enrico Castelli, Gianluca Ceccoli, Alessandro Oneto, Enrico Russo:
Cyber-DRIVE: Dynamic Risk Versatile Engine for Cyber Security Risk Analysis, Situational Awareness and Incident Response. - Matteo Busi, Riccardo Focardi, Sana Gul, Flaminia L. Luccio:
Automated Analysis of Key Management Policies. - Tancredi Orlando, Luca D'Agati, Francesco Longo, Giovanni Merlino:
A Survey of WebAssembly Usage for Embedded Applications: Safety and Portability Considerations. - Giampaolo Bella, Sergio Esposito, Mirko Giuseppe Mangano, Salvatore Riccobene, Daniele Francesco Santamaria, Gabriele Veneziano Broccia:
PECSo: A Privacy Enhancing Framework for Applications in the Automotive Domain. - Fabio Seferi:
A working experimentation model for cyber resilience regulatory sandboxes. - Alberto Musa, Emanuele Parisi, Luca Barbierato, Edoardo Patti, Andrea Acquaviva, Francesco Barchi:
Integrating OpenTitan as a Security Controller for Cryptographic Tasks in RISC-V SoCs. - Stefano Longari, Gregorio Galletti, Jan Holle, Stefano Zanero:
CANter: Data-Link Layer Detection of Drop-and-Spoof Attacks on CAN and CAN FD. - Alessandro Bertani, Danilo Caraccio, Stefano Zanero, Mario Polino:
Confidential Computing: A Security Overview and Future Research Directions.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.