关注
Daniele Antonioli
Daniele Antonioli
在 eurecom.fr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
3482020
MiniCPS: A toolkit for security research on CPS networks
D Antonioli, NO Tippenhauer
Proceedings of the First ACM workshop on cyber-physical systems-security and …, 2015
1442015
BIAS: Bluetooth Impersonation AttackS
D Antonioli, NO Tippenhauer, K Rasmussen
2020 IEEE symposium on security and privacy (SP), 549-562, 2020
1172020
Early evidence of effectiveness of digital contact tracing for SARS-CoV-2 in Switzerland
M Salathé, CL Althaus, N Anderegg, D Antonioli, T Ballauz, B Edouard, ...
medRxiv, 2020.09. 07.20189274, 2020
1122020
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR
D Antonioli, NO Tippenhauer, K Rasmussen
USENIX Security, 2019
1012019
Towards high-interaction virtual ICS honeypots-in-a-box
D Antonioli, A Agrawal, NO Tippenhauer
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and …, 2016
762016
Key negotiation downgrade attacks on bluetooth and bluetooth low energy
D Antonioli, NO Tippenhauer, K Rasmussen
ACM Transactions on Privacy and Security (TOPS) 23 (3), 1-28, 2020
61*2020
Gamifying ICS security training and research: Design, implementation, and results of S3
D Antonioli, HR Ghaeini, S Adepu, M Ochoa, NO Tippenhauer
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
60*2017
State-Aware Anomaly Detection for Industrial Control Systems
HR Ghaeini, D Antonioli, F Brasser, AR Sadeghi, NO Tippenhauer
Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC), 2018
512018
Legacy-Compliant Data Authentication for Industrial Control System Traffic
JH Castellanos, D Antonioli, NO Tippenhauer, M Ochoa
Proceedings of the International Conference on Applied Cryptography and …, 2017
392017
Decentralized privacy-preserving proximity tracing (2020)
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
352020
On-chip lightweight implementation of reduced NIST randomness test suite
VB Suresh, D Antonioli, WP Burleson
Proceedings of the IEEE Hardware-Oriented Security and Trust (HOST …, 2013
352013
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks
J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu, DJ Tian, ...
Proceedings of the USENIX Security Symposium (USENIX Security), 2021
322021
BLURtooth: Exploiting cross-transport key derivation in Bluetooth Classic and Bluetooth Low Energy
D Antonioli, NO Tippenhauer, K Rasmussen, M Payer
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
312022
Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android
D Antonioli, NO Tippenhauer, K Rasmussen
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019
282019
Taking control: Design and implementation of botnets for cyber-physical attacks with cpsbot
D Antonioli, G Bernieri, NO Tippenhauer
arXiv preprint arXiv:1802.00152, 2018
182018
Practical Evaluation of Passive COTS Eavesdropping in 802.11 b/n/ac WLAN
D Antonioli, S Siby, NO Tippenhauer
Proceedings of the International Conference on Cryptology and Network …, 2017
92017
Breakmi: Reversing, exploiting and fixing xiaomi fitness tracking ecosystem
M Casagrande, E Losiouk, M Conti, M Payer, D Antonioli
IACR Transactions on Cryptographic Hardware and Embedded Systems, 330-366, 2022
72022
BLUFFS: Bluetooth forward and future secrecy attacks and defenses
D Antonioli
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
42023
On the insecurity of vehicles against protocol-level bluetooth threats
D Antonioli, M Payer
2022 IEEE Security and Privacy Workshops (SPW), 353-362, 2022
32022
系统目前无法执行此操作,请稍后再试。
文章 1–20