Researcher, De Cifris member.
Keen on cloud security and applied cryptography.
Football coach, KH fan, D&D master.
Research Interests
Working on
Will work on
Worked on
I speak
Experience
Research on applied cryptography, security, and access control for cloud native applications
Joint PhD on cryptographic access control in cloud-edge-IoT applications (e.g., Cooperative Connected and Automated Mobility) and design of architectural models for optimal enforcement of cryptographic access control policies
Research activities on access control in the Cloud, mobile and automotive security. Research activities on Cooperative, Connected and Automated Mobility (5G-CARMEN project). Study and design of reverse engineering protections for Java and Android Apps
Internship
2ASPIRE
July 2018 - October 2018
Research and analysis of best practices against malicious Reverse Engineering (RE) to increase the company's knowhow in Android RE antitampering and anti-debugging protections
150 hours working contract under the "Information Systems Management" office, Support the deployment of the Digital University project, a new platform serving as Knowledge HUB within the university itself
Education
PhD in Security, Risk and Vulnerability, Cybersecurity and Reliable Artificial Intelligence curriculum with the thesis "A Security Service for Performance-Aware End-to-End Protection of Sensitive Data in Cloud Native Applications".
Master degree in Computer Science, ICT Innovation - Security&Privacy curriculum (110L) with the thesis "A Pragmatic Approach to Handle "Honest but Curious" Cloud Service Providers: Cryptographic Enforcement of Dynamic Access Control Policies".
Awarded 3rd prize at Thesis Award «Innovating information security» 15th edition - 2019, Clusit.
Teaching
Teaching Assistant for the Computer Science course "Programmazione 1".
Publications
Supervised Theses
Simone Brunello
Cryptographic Access Control for Balancing Trust, Protection, and Performance
Bachelor in Computer Science at the University of Trento (2024)
Ion Andy Ditu
Leveraging Trusted Execution Environment for Efficient Revocation and Security in Cryptographic Access Control
Bachelor in Computer Science at the University of Trento (2023)
Erica Elia
A Key Recovery Protocol based on Threshold Secret Sharing for Cryptographic Access Control in the Cloud: The CryptoAC Use Case
Master in Mathematics at the University of Trento (2023)
Enrico Marconi
Combining Blockchain-as-a-Service and Cryptographic Access Control for Secure Data Sharing Across Multiple Organizations
Bachelor in Computer Science at the University of Trento (2022)
Alessandro Colombo
Attribute Based Encryption for Advanced Data Protection in IoT with MQTT
Bachelor in Computer Science at the University of Trento (2022)
Veronica Cristiano
Key Management for Cryptographic Enforcement of Access Control Policies in the Cloud: The CryptoAC Use Case
Master in Mathematics at the University of Trento (2021)
Chaudhry Muhammad Suleman
Cyber-security Risk Assessment for Cooperative, Connected and Automated Mobility: Application to Cooperative Lane Merging
master in Computer Science at the University of Trento (2021)
Projects
A wrapper allowing to easily use the OpenABE library for Attribute-based Encryption (ABE) from Kotlin multiplatform.
University project for building Joni, a tool meant to help blind and visually impaired people to keep in touch with the world. The project comprised the validation of the business idea through concrete analysis on the field and market research with the goal to make news and podcasts accessible by the blind community.
University project for building an Android app, called Glumo, to help people who suffer from diabetes with features like automatic alarms and emergency SMS. The project comprised the design of monitoring services with direct bluetooth connection with modern glycemic sensors.
University project for building a web application for finding and reviewing restaurants. The project comprised the Agile design and development of the web application with a Java backend, the implementation of the Model-View-Control (MVC) and the DAO pattern for decoupling logic and storage.
Reviewer Activity
2024
IEEE - TIFS · ICIN · WWW · ITASEC
2023
EURASIP - JIS · DBSec · ITASEC · SECRYPT · CODASPY · SACMAT · ICISS · FPS
2022
CODASPY · SECRYPT · DBSec · FedCSIS · ICISSP · FPS
2021
Elsevier - JISA · SECRYPT · DPM · SACMAT · ITASEC · DBSec · FPS
2020
SECRYPT · FPS · ICISS · DPM · DBSec · SACMAT
2019
ICISS