Posts by Collection

portfolio

BibTex

All Your Sessions Are Belong to Us: Investigating Authenticator Leakage Through Backup Channels on Android

BibTex

BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy

BibTex

BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks

BibTex

Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities

BibTex

Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps

BibTex

LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks

BibTex

PaddyFrog: systematically detecting confused deputy vulnerability in Android applications

BibTex

ProFactory: Improving IoT Security via Formalized Protocol Customization

BibTex

Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps

BibTex

TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms

publications

talks

BLESA Demo

A short demo for BLESA against an Oura Ring.

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

, , 1900

Guest lecture

Software Security (Undergraduate level)
Invited by Dr. Antonio Bianchi, 2022