Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

portfolio

BibTex

All Your Sessions Are Belong to Us: Investigating Authenticator Leakage Through Backup Channels on Android

BibTex

BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy

BibTex

BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks

BibTex

Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities

BibTex

Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps

BibTex

LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks

BibTex

PaddyFrog: systematically detecting confused deputy vulnerability in Android applications

BibTex

ProFactory: Improving IoT Security via Formalized Protocol Customization

BibTex

Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps

BibTex

TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms

publications

talks

BLESA Demo

A short demo for BLESA against an Oura Ring.

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

, , 1900

Guest lecture

Software Security (Undergraduate level)
Invited by Dr. Antonio Bianchi, 2022