Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Cataldo Basile"'
Publikováno v:
Sensors, Vol 24, Iss 2, p 590 (2024)
The Internet of Things (IoT) is rapidly growing, with an estimated 14.4 billion active endpoints in 2022 and a forecast of approximately 30 billion connected devices by 2027. This proliferation of IoT devices has come with significant security challe
Externí odkaz:
https://doaj.org/article/4552fd9c7ac0429abe09d838c0d7db31
Publikováno v:
Data in Brief, Vol 41, Iss , Pp 107968- (2022)
The widespread adoption of encryption in computer network traffic is increasing the difficulty of analyzing such traffic for security purposes. The data set presented in this data article is composed of network statistics computed on captures of TCP
Externí odkaz:
https://doaj.org/article/bf00b73b041543cb9dbe69c0a52e698e
This paper presents a formal model of the features, named security capabilities, offered by the controls used for enforcing security policies in computer networks. It has been designed to support policy refinement and policy translation and address u
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1bbaec839ae66cdf3f6d0487c8d58e14
https://zenodo.org/record/7194633
https://zenodo.org/record/7194633
Autor:
Leonardo Regano, Mariano Ceccato, Alessio Viticchié, Cataldo Basile, Paolo Tonella, Marco Torchiano
Code hardening is meant to fight malicious tampering with sensitive code executed on client hosts. Code splitting is a hardening technique that moves selected chunks of code from client to server. Although widely adopted, the effective benefits of co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a9c0517693c37c6dd421df420a2b452f
http://hdl.handle.net/11583/2747308
http://hdl.handle.net/11583/2747308
Publikováno v:
IEEE/ACM Transactions on Networking
IEEE/ACM transactions on networking
(2017). doi:10.1109/TNET.2017.2708096
info:cnr-pdr/source/autori:Valenza F.; Basile C.; Canavese D.; Lioy A./titolo:Classification and Analysis of Communication Protection Policy Anomalies/doi:10.1109%2FTNET.2017.2708096/rivista:IEEE%2FACM transactions on networking (Print)/anno:2017/pagina_da:/pagina_a:/intervallo_pagine:/volume
IEEE/ACM transactions on networking
(2017). doi:10.1109/TNET.2017.2708096
info:cnr-pdr/source/autori:Valenza F.; Basile C.; Canavese D.; Lioy A./titolo:Classification and Analysis of Communication Protection Policy Anomalies/doi:10.1109%2FTNET.2017.2708096/rivista:IEEE%2FACM transactions on networking (Print)/anno:2017/pagina_da:/pagina_a:/intervallo_pagine:/volume
This paper presents a classification of the anomalies that can appear when designing or implementing communication protection policies. Together with the already known intra- and inter-policy anomaly types, we introduce a novel category, the inter-te
Publikováno v:
IEEE/ACM Transactions on Networking
This paper introduces an approach towards automaticenforcement of security policies in NFV networks anddynamic adaptation to network changes. The approach relieson a refinement model that allows the dynamic transformationof high-level security requir
Publikováno v:
JOURNAL OF SYSTEMS AND SOFTWARE
Software protection techniques are used to protect valuable software assets against man-at-the-end attacks. Those attacks include reverse engineering to steal confidential assets, and tampering to break the software’s integrity in unauthorized ways
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d14e03d8705913868f18e1726d737fd5
http://hdl.handle.net/10278/3743231
http://hdl.handle.net/10278/3743231
Autor:
Cataldo Basile, Marco Torchiano, Bjorn De Sutter, Paolo Tonella, Paolo Falcarin, Bart Coppens, Mariano Ceccato
Publikováno v:
EMPIRICAL SOFTWARE ENGINEERING
When critical assets or functionalities are included in a piece of software accessible to the end users, code protections are used to hinder or delay the extraction or manipulation of such critical assets. The process and strategy followed by hackers
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e0d364310b5a3337c85f94ec00942bc2
http://hdl.handle.net/10278/3743230
http://hdl.handle.net/10278/3743230