Program Committee

ICICS 2017: The 19th International Conference on Information and Communications Security.

STM 2017: 13th International Workshop on Security and Trust Management.

C&TC 2017: Cloud and Trusted Computing 2017.

Telerise 2017: 3rd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity.

Secrypt 2017: 14th International Conference on Security and Cryptography.

ARES 2017: The 12th International Conference on Availability, Reliability and Security.

EUSPN-2017: The 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks.

AIMS 2017: 11th International Conference on Autonomous Infrastructure, Management and Security.

EUSPN-2016: The 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks.

Secrypt 2016: 13th International Conference on Security and Cryptography.

ANT 2016: The 7th International Conference on Ambient Systems, Networks and Technologies.

AIMS 2016: 10th International Conference on Autonomous Infrastructure, Management and Security.

Telerise 2016: 2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity.

MOBIMEDIA 2016: 9th EAI International Conference on Mobile Multimedia Communications.

TrustCom 2015: 14th IEEE International Conferenceon Trust, Security and Privacy in Computing and Communications.

Secrypt 2015: 12th International Conference on Security and Cryptography.

Telerise 2015: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity.

AIMS 2015: 9th International Conference on Autonomous Infrastructure, Management and Security.

CSS 2014: The 6th International Symposium on Cyberspace Safety and Security.

SETOP 2014: 7th International Workshop on Autonomous and Spontaneous Security.

Reviewer For

ACM Computing Survey.

Computers & Security - Journal - Elsevier.

Future Generation Computer Systems - Journal - Elsevier.

IEEE Transactions on Mobile Computing.

IEEE Transactions on Network and Service Management.

IEEE Communications Surveys and Tutorials.

Journal of Security and Communication Networks.

Presentations

Guest Lecture: Evolution of Ransomware.
For the Lorenzo Cavallaro's Course Malicious Software. 28 February 2017. pdf

Invited talk: Dissecting Ransomware for Fun and (Cyber-Criminals') Profit.
WSF'15. Catania, Italy. 1 December 2015

Sharing Data Through Confidential Clouds: An Architectural Perspective
The 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity 2015, 18th May 2015. pdf

CheR: Cheating Resilience in the Cloud via Smart Resource Allocation
The Sixth International Symposium on Foundations & Practice of Security (FPS'2013), 22th October 2013. pdf

Invited talk: Secure Applications for Smartphones.
Internet Festival. Pisa, Italy. 11 October 2013.

Classifying Android Malware through Subgraph Mining
The sixth International Workshop on Autonomous and Spontaneous Security, Egham (SETOP), 12th September 2013. pdf

Probabilistic Contract Compliance for Mobile Applications
The Second International Workshop on Security of Mobile Applications (IWSMA 2013), Regensburg, 6th September 2013. pdf

Invited talk: Smartphone Security.
Internet Festival. Pisa, Italy, 5 October 2012.

Invited talk: Security and privacy in Online Social Networks.
Psicologia e sicurezza informatica: l'ultima sfida di Assosecurity. Torino, Italy, 20 October 2011. pdf

A Simulation-Driven Approach for Assessing Risks of Complex Systems.
13th European Workshop on Dependable Computing Pisa, Italy, 11-12 May 2011. pdf

Securing a Community Cloud.
ICDCS Workshop on Security and Privacy in Cloud Computing, Genova (Italy), 2010.

Measuring the Semantic Integrity of a Process Self
PhD Thesis Defense, Pisa, 24th June 2010. pdf

Invited talk: A Survey of Intrusion Detection Systems
Seminar@IIT-CNR, Pisa, 22th March 2010. pdf

An Introduction to Cellular Automata
Bio-inspired Models of Computation Seminar, Pisa, 16th October 2009. pdf

A Sense of Self through Semantic Integrity and Virtual Introspection
PhD Research Seminars, Pisa, 14th September 2009. pdf

Introspection-based Context Agent Injection
IBM AoT (Academy of Technology) Security and Privacy Symposium, Zurich (CH), 2009

Measuring Semantic Integrity for Remote Attestation
Trust International Conference in Oxford (UK), 2009. pdf

Securing Health Information Infrastructures through Overlays
Healthinf Conference in Porto (Portugal), 2009.

Software Verification with BLAST
PhD Seminar on Rigorous Software Development via Model Checking, Pisa, 2008. pdf

Semantics-Driven Introspection in a Virtual Environment
IAS Conference in Napoli, 2008. pdf

Secure Sharing of an ICT Infrastructure through Vinci
AIMS Conference in Bremen (Germany), 2008. pdf

Transparent Monitoring of a Process Self in a Virtual Environment
PhD Lunchtime Seminar in Pisa, 2008. pdf

Protezione del Kernel Tramite Macchine Virtuali
Net&System Security Conference in Pisa, 2007. pdf

Towards High Assurance Networks of Virtual Machines
EC2ND Conference in Heraklion (Greece), 2007. pdf

Security and Integrity of a Distributed File Storage in a Virtual Environment
SISW Workshop in San Diego (USA), 2007. pdf

Building Trustworthy Intrusion Detection through VM Introspection
IAS Conference in Manchester (UK), 2007. pdf

Defining the Semantics of Object-Oriented Languages Using Graph Transformations
PhD Seminar on Rewriting in Pisa, 2007. pdf

SERIT

I've been member of the coordinating committee of SERIT (SEcurity Research in ITaly), the national technological platform on homeland security jointly promoted by CNR and Finmeccanica. SERIT includes SMEs, research institutions, Universities, companies in Italy that focus their researches in the field of Homeland Security. The platform groups more than 250 Italian partners and more than 1000 members.