A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps S Berlato, M Ceccato Journal of Information Security and Applications 52, 102463, 2020 | 29 | 2020 |
Exploring architectures for cryptographic access control enforcement in the cloud for fun and optimization S Berlato, R Carbone, AJ Lee, S Ranise Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 8 | 2020 |
Blockchain based ran data sharing A Heider-Aviet, DR Ollik, S Berlato, S Ranise, R Carbone, N El Ioini, ... 2021 IEEE International Conference on Smart Data Services (SMDS), 152-161, 2021 | 7 | 2021 |
Smart card-based identity management protocols for V2V and V2I communications in CCAM: a systematic literature review S Berlato, M Centenaro, S Ranise IEEE Transactions on Intelligent Transportation Systems 23 (8), 10086-10103, 2021 | 5 | 2021 |
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements M Centenaro, S Berlato, R Carbone, G Burzio, GF Cordella, R Riggio, ... IEEE Vehicular Technology Magazine 16 (4), 78-88, 2021 | 4 | 2021 |
Security considerations on 5G-enabled back-situation awareness for CCAM M Centenaro, S Berlato, R Carbone, G Burzio, GF Cordella, S Ranise, ... 2020 IEEE 3rd 5G World Forum (5GWF), 245-250, 2020 | 4 | 2020 |
End-to-end protection of IoT communications through cryptographic enforcement of access control policies S Berlato, U Morelli, R Carbone, S Ranise IFIP Annual Conference on Data and Applications Security and Privacy, 236-255, 2022 | 3 | 2022 |
Formal modelling and automated trade-off analysis of enforcement architectures for cryptographic access control in the cloud S Berlato, R Carbone, AJ Lee, S Ranise ACM Transactions on Privacy and Security 25 (1), 1-37, 2021 | 3 | 2021 |
Multi-Objective Microservice Orchestration: Balancing Security and Performance in CCAM S Berlato, S Cretti, D Siracusa, S Ranise 2024 27th Conference on Innovation in Clouds, Internet and Networks (ICIN …, 2024 | | 2024 |
Mitigating Debugger-based Attacks to Java Applications with Self-Debugging D Pizzolotto, S Berlato, M Ceccato ACM Transactions on Software Engineering and Methodology, 2024 | | 2024 |
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment. S Berlato, R Carbone, S Ranise SECRYPT, 370-381, 2021 | | 2021 |
Optimizing Security and Quality of Service for End-to-End Cryptographic Access Control in IoT Applications S Berlato, U Morelli, R Carbone, S Ranise Available at SSRN 4749822, 0 | | |