AB
Alessandro Brighente
45 records found
1
EDIT
A data inspection tool for smart contracts temporal behavior modeling and prediction
Modeling and predicting the behavior of nodes and users in blockchains provide opportunities for business strategy optimization. Indeed, the number of interactions of a node is strictly related to its balance and its prediction may be used for analytics purposes and investment st
...
RANGO
A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems
Video surveillance systems provide means to detect the presence of potentially malicious drones in the surroundings of critical infrastructures. In particular, these systems collect images and feed them to a deep-learning classifier able to detect the presence of a drone in the i
...
FaultGuard
A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids
Predicting and classifying faults in electricity networks is crucial for uninterrupted provision and keeping maintenance costs at a minimum. Thanks to the advancements in the field provided by the smart grid, several data-driven approaches have been proposed in the literature to
...
One Class to Test Them All
One-Class Classifier-Based ADS-B Location Spoofing Detection
Automatic Dependent Surveillance-Broadcast (ADS-B) is an integral part of the Next Generation Air Transport System, providing an efficient and safe transport infrastructure by monitoring and managing congested airspace through advanced surveillance. It is designed to replace trad
...
Security and Privacy of Smart Waste Management Systems
A Cyber-Physical System Perspective
Smart waste management systems (SWMSs) represent a fundamental technology to efficiently manage the waste management and disposal process. Indeed, they provide means to efficiently manage the collection process, optimize resources, and foster the adoption of recycling policies. T
...
DynamiQS
Quantum Secure Authentication for Dynamic Charging of Electric Vehicles
Dynamic Wireless Power Transfer (DWPT) is a novel technology that allows charging an electric vehicle while driving thanks to a dedicated road infrastructure. DWPT's capabilities in automatically establishing charging sessions and billing without users' intervention make it prone
...
Securing the Open RAN Infrastructure
Exploring Vulnerabilities in Kubernetes Deployments
In this paper, we investigate the security implications of virtualized and software-based Open Radio Access Network (RAN) systems, specifically focusing on the architecture proposed by the O-RAN ALLIANCE and O-Cloud deployments based on the O-RAN Software Community (OSC) stack an
...
Modern cars' complexity and increased reliance on electronic components have made them a prime target for attackers. In particular, the in-vehicle communication system is one of the major attack surfaces, with the Controller Area Network (CAN) being the most used protocol. CAN co
...
The Ethereum Blockchain
Implementation and Security Aspects
Firstly introduced in 2013, Ethereum revolutionized the concept of blockchain. Compared to the previous generation of blockchains with the main representative the Bitcoin, the Ethereum blockchain extends the applications of this technology to domains such as its transfer of infor
...
Hyperloop is among the most prominent future transportation systems. It involves novel technologies to allow traveling at a maximum speed of 1220km/h while guaranteeing sustainability. Due to the system's performance requirements and the critical infrastructure it represents, its
...
The secure transmission of instructions among vehicles in a platoon is one of the most essential needs for a vehicle platoon. Despite the existence of cryptographic methods to securely share instructions, instruction sharing is still subject to forgery, tampering, and denial-of-s
...
EVScout2.0
Electric Vehicle Profiling through Charging Profile
Electric Vehicles (EVs) represent a green alternative to traditional fuel-powered vehicles. To enforce their widespread use, both the technical development and the security of users shall be guaranteed. Users' privacy represents a possible threat that impairs the adoption of EVs.
...
Work-in-Progress: Crash Course
Can (Under Attack) Autonomous Driving Beat Human Drivers?
Autonomous driving is a research direction that has gained enormous traction in the last few years thanks to advancements in Artificial Intelligence (AI). Depending on the level of independence from the human driver, several studies show that Autonomous Vehicles (AVs) can reduce
...
CANLP
NLP-Based Intrusion Detection System for CAN
The Controller Area Network (CAN) protocol is the most widely used standard for in-vehicle networks. However, the CAN protocol lacks essential security features (e.g., encryption) which makes it vulnerable to exploits by an adversary. In this paper, we develop CANLP, a Natural La
...
Light-YOLOv5
A Lightweight Drone Detector for Resource-Constrained Cameras
Critical infrastructures (CIs), such as military bases and airports, are putting a lot of attention into defending against attacks delivered via drones by deploying drone detection systems. However, the CI area might be very large, with no-fly zones extending to regions where it
...
GAN-GRID
A Novel Generative Attack on Smart Grid Stability Prediction
The smart grid represents a pivotal innovation in modernizing the electricity sector, offering an intelligent, digitalized energy network capable of optimizing energy delivery from source to consumer. It hence represents the backbone of the energy sector of a nation. Due to its c
...
We consider the problem of publicly verifiable privacy-preserving data aggregation in the presence of a malicious aggregator colluding with malicious users. State-of-the-art solutions either split the aggregator into two parties under the assumption that they do not collude, or r
...
Beware of Pickpockets
A Practical Attack against Blocking Cards
Today, we rely on contactless smart cards to perform several critical operations (e.g., payments and accessing buildings). Attacking smart cards can have severe consequences, such as losing money or leaking sensitive information. Although the security protections embedded in smar
...