Zobrazeno 1 - 10
of 124
pro vyhledávání: '"Riccardo Focardi"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 2 (2019)
Voltage fault injection is a powerful active side channel attack that modifies the execution-flow of a device by creating disturbances on the power supply line. The attack typically aims at skipping security checks or generating side-channels that gr
Externí odkaz:
https://doaj.org/article/5e1b8a12d5ad4fa1a8850acd99b0b576
Publikováno v:
SN Computer Science. 4
Publikováno v:
Computer Security – ESORICS 2022 ISBN: 9783031171451
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5630daca58514f7b83f889d99b525912
https://doi.org/10.1007/978-3-031-17146-8_16
https://doi.org/10.1007/978-3-031-17146-8_16
Autor:
Flaminia L. Luccio, Riccardo Focardi
Publikováno v:
CCS
Hardware Security Modules (HSMs) are trusted machines that perform sensitive operations in critical ecosystems. They are usually required by law in financial and government digital services. The most important feature of an HSM is its ability to stor
Autor:
Flaminia L. Luccio, Riccardo Focardi
Publikováno v:
Protocols, Strands, and Logic ISBN: 9783030916305
Protocols, Strands, and Logic
Protocols, Strands, and Logic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8225366b2b44379c140bfc64e5872154
http://hdl.handle.net/10278/3746587
http://hdl.handle.net/10278/3746587
Publikováno v:
CSF
2020 IEEE 33rd Computer Security Foundations Symposium (CSF)
2020 IEEE 33rd Computer Security Foundations Symposium (CSF)
Session management is a fundamental component of web applications: despite the apparent simplicity, correctly implementing web sessions is extremely tricky, as witnessed by the large number of existing attacks. This motivated the design of formal met
Autor:
Flaminia L. Luccio, Riccardo Focardi
Publikováno v:
CSF
Physical Unclonable Functions (PUFs) are a promising technology to secure low-cost devices. A PUF is a function whose values depend on the physical characteristics of the underlying hardware: the same PUF implemented on two identical integrated circu
We propose a methodology to leverage machine learning (ML) for the detection of web application vulnerabilities. We use it in the design of Mitch, the first ML solution for the black-box detection of cross-site request forgery vulnerabilities. Finall
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::de2ef892ceeb4d6768ddcc0d9be9466c
http://hdl.handle.net/11577/3330817
http://hdl.handle.net/11577/3330817
Publikováno v:
Journal of Logical and Algebraic Methods in Programming. 87:110-126
In the last few years, many security researchers proposed to endow the web platform with more rigorous foundations, thus allowing for a precise reasoning on web security issues. Given the complexity of the Web, however, research efforts in the area a
Publikováno v:
IEEE Symposium on Security and Privacy
2019 IEEE Symposium on Security and Privacy (SP)
2019 IEEE Symposium on Security and Privacy (SP)
HTTPS aims at securing communication over the Web by providing a cryptographic protection layer that ensures the confidentiality and integrity of communication and enables client/server authentication. However, HTTPS is based on the SSL/TLS protocol