AV

Alessandro Visintin

4 records found

X-Lock

A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices

The Internet of Things rapid growth poses privacy and security challenges for the traditional key storage methods. Physical Unclonable Functions offer a potential solution but require secure fuzzy extractors to ensure reliable replication. This paper introduces X-Lock, a novel an ...
Mergers and acquisitions are pivotal strategies employed by companies to maintain competitiveness, leading to enhanced production efficiency, scale, and market dominance. Due to their significant financial implications, predicting these operations has become a profitable area of ...

What You See is Not What You Get

A Man-in-the-Middle Attack Applied to Video Channels

People usually think that digital screens are reliable devices. Unfortunately, attackers can exploit this blind trust to persuade a user to perform unintended actions. In this paper, we present a novel type of Man-in-the-Middle attack named Man-in-the-Video. Man-in-the-Video inte ...

HolA

Holistic and Autonomous Attestation for IoT Networks

Collective Remote Attestation (CRA) is a well-established approach where a single Verifier attests the integrity of multiple devices in a single execution of the challenge-response protocol. Current CRA solutions are well-suited for Internet of Things (IoT) networks, where the de ...