Locard
Papers list
- Limbasiya, Trupil, Amrita Ghosal, and Mauro Conti. AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks. 23rd International Conference on Distributed Computing and Networking. 2022.
Attachments
- Kumar, Gulshan, Rahul Saha, Chhagan Lal, and Mauro Conti. Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications. Future Generation Computer Systems, 120, 13-25, 2021.
Attachments
- Wafa Ben Jaballah, Mauro Conti, Chhagan Lal. Security and Design Requirements for Software-Defined
VANETs. In (Elsevier) Computer Network, in press, 2020.
Attachments
- Mauro Conti, Chhagan Lal. Context-based Co-presence Detection Techniques: A Survey. In (Elsevier)
Computers & Security, 1-20, 2019. DOI:10.1016/j.cose.2019.101652, ISSN: 0167-4048.
Attachments
- Mauro Conti, Muhammad Hassan, Chhagan Lal. BlockAuth: BlockChain based Distributed Producer
Authentication in ICN. In (Elsevier) Computer Network, in press, 2019.
Attachments
- Mauro Conti, Edlira Dushku, Luigi V. Mancini, Md Masoom Rabbani, Silvio Ranise. Remote Attestation
as a Service for IoT. In Proceedings of the 6th IEEE International Conference on Internet of Things:
Systems, Management and Security. (IOTSMS 2019), in press, Granada, Spain, October 22-25, 2019.
Attachments
- Eduard Marin, Nicola Bucciol, Mauro Conti. An In-depth Look Into SDN Topology Discovery Mechanisms:
Novel Attacks and Practical Countermeasures. In Proceedings of the 26th ACM Conference on Computer
and Communications Security. (ACM CCS 2019), in press, London, UK, November 11-15, 2019.
Attachments
- Mauro Conti, Pallavi Kaliyar, Md Masoom Rabbani, Silvio Ranise. Attestation-enabled Secure and
Scalable Routing protocol for IoT Networks. In (Elsevier) Ad Hoc Networks , in press, 2019.
Attachments
- Mauro Conti, Ankit Gangwal, Michele Todero. Blockchain Trilemma Solver Algorand has Dilemma over
Undecidable Messages. In Proceedings of the 14th International Conference on Availability,
Reliability and Security. (ARES 2019), in press, Canterbury, UK, August 26-29, 2019.
Attachments
- Giuseppe Bernieri, Mauro Conti, Gabriele Pozzan. AMON: an Automaton MONitor for Industrial
Cyber-Physical Security. In Proceedings of the 14th International Workshop on Frontiers in
Availability, Reliability and Security. (ARES 2019 workshop: FARES 2019), in press, Canterbury, UK,
August 26-29, 2019.
Attachments
- Amrita Ghosal, Subir Halder and Mauro Conti. DISC: A Novel Distributed On-Demand Clustering Protocol
for Internet of Multimedia Thing. In Proceedings of the 28th IEEE International Conference on
Computer Communications and Networks. (IEEE ICCCN 2019), in press, Valencia, Spain, July 29 - August
1 2019.
Attachments
- Ankit Gangwal, Mauro Conti. Cryptomining cannot Change its Spots: Detecting Covert Cryptomining
using Magnetic Side-channel. In (IEEE) Transactions on Information Forensics & Security, 1-10, 2019.
DOI: 10.1109/TIFS.2019.2945171, ISSN: 1556-6021.
Attachments
- Md. Hajian Berenjestanaki, Mauro Conti, Ankit Gangwal. On the Exploitation of Online SMS Receiving
Services to Forge ID Verification. In Proceedings of the 14th International Conference on
Availability, Reliability and Security. (ARES 2019), in press, Canterbury, UK, August 26-29, 2019.
Attachments
- Mauro Conti, Giuseppe Bernieri, Federico Turrin. Evaluation of Machine Learning Algorithms for
Anomaly Detection in Industrial Networks. In Proceedings of the IEEE International Symposium on
Measurements & Networking. (IEEE M&N 2019), in press, Catania, Italy, July 8-10, 2019.
Attachments
- Md Masoom Rabbani, Jo Vliegen, Jori Winderickx, Mauro Conti, Nele Mentens. SHeLA: Scalable
Heterogeneous Layered Attestation. In (IEEE) Internet of Things Journal, in press, 2019.
Attachments
- Stefano Cecconello, Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik. Skype & Type: Keyboard
Eavesdropping in Voice-over-IP. In (ACM) Transactions on Privacy & Security, in press, 2019.
Attachments
- Abdelmadjid Benarfa, Muhammad Hassan, Eleonora Losiouk, Alberto Compagno, Mohamed bachir Yagoubi,
Mauro Conti. ChoKIFA+: An Early Detection and Mitigation Approach against Interest Flooding Attacks
in NDN. In International Journal of Information Security , 1-17, in press, 2020. DOI:
10.1007/s10207-020-00500-z, ISSN: 1553-877X.
Attachments
- Meng Li, Donghui Hu, Chhagan Lal, Mauro Conti, Zijian Zhang. Blockchain-enabled Secure Energy
Trading with Verifiable Fairness in Industrial Internet of Things. In IEEE Transaction on Industrial
Informatics, 16(10): 6564-6574, 2020. DOI: 10.1109/TII.2020.2974537, ISSN: 1551-3203.
Attachments
- Mohamed El-Zawawy, Eleonora Losiouk, Mauro Conti. Don't Let Next-Intent Vulnerability Be Your Next
Nightmare: Type System Based Approach to Detect It in Android Apps. In International Journal of
Information Security, in press, 2020.
Attachments
- Muhammad Hassan, Mauro Conti, Chhagan Lal. NC based DAS-NDN: Network Coding for robust Dynamic
Adaptive Streaming over NDN. In (Elsevier) Computer Networks, in press, 2020.
Attachments
- Mauro Conti, Ankit Gangwal, Muhammad Hassan, Chhagan Lal, Eleonora Losiouk. The Road Ahead for
Networking: A Survey on ICN-IP Coexistence Solutions. In (IEEE) Communications Surveys and
Tutorials, in press, 2020. DOI: 10.1109/COMST.2020.2994526, ISSN: 1553-877X.
Attachments
- Pallavi Kaliyar, Wafa Ben Jaballah, Mauro Conti, Chhagan Lal. LiDL: Localization with early
detection of sybil and wormhole attacks in IoT Networks. In (Elsevier) Computers & Security, in
press, 2020.
Attachments
- Mauro Conti, Pallavi Kaliyar, Chhagan Lal. A Robust Multicast Communication Protocol for Low power
and Lossy Networks. In (Elsevier) Journal of Network and Computer Applications, in press, 2020..
Attachments
- Edlira Dushku, Md Masoom Rabbani, Mauro Conti, Luigi V. Mancini, Silvio Ranise. SARA: Secure
Asynchronous Remote Attestation for IoT systems. In (IEEE) Transactions on Information Forensics &
Security, 15(1): 3123-3136, 2020. DOI: 10.1109/TIFS.2020.2983282, ISSN: 1556-6013.
Attachments
- Flavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, Mauro Conti. ScaRR: Scalable
Runtime Remote Attestation for Complex Systems. In 22nd International Symposium on Research in
Attacks, Intrusions and Defenses. (RAID 2019), in press, Beijing, China, September 23-25, 2019.
Attachments
- Subir Halder, Mauro Conti. CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem. In
(IEEE) Transactions on Cloud Computing, in press, 2020.
Attachments
- Meng Li, Chhagan Lal, Mauro Conti, Donghui Hu. LEChain: A blockchain-based lawful evidence management scheme for digital forensics. Future Generation Computer Systems, Volume 115, 2021, Pages
406-420.
Attachments