FT
Federico Turrin
19 records found
1
Hyperloop is among the most prominent future transportation systems. It involves novel technologies to allow traveling at a maximum speed of 1220km/h while guaranteeing sustainability. Due to the system's performance requirements and the critical infrastructure it represents, its
...
HoneyEVSE
An Honeypot to Emulate Electric Vehicle Supply Equipments
To fight climate change, new “green” technology are emerging, most of them using electricity as a power source. Among the solutions, Electric Vehicles (EVs) represent a central asset in the future transport system. EVs require a complex infrastructure to enable the so-called Vehi
...
One Class to Test Them All
One-Class Classifier-Based ADS-B Location Spoofing Detection
Automatic Dependent Surveillance-Broadcast (ADS-B) is an integral part of the Next Generation Air Transport System, providing an efficient and safe transport infrastructure by monitoring and managing congested airspace through advanced surveillance. It is designed to replace trad
...
EVScout2.0
Electric Vehicle Profiling through Charging Profile
Electric Vehicles (EVs) represent a green alternative to traditional fuel-powered vehicles. To enforce their widespread use, both the technical development and the security of users shall be guaranteed. Users' privacy represents a possible threat that impairs the adoption of EVs.
...
OpenScope-sec
An ADS-B Simulator to Support the Security Research
Automatic Dependent Surveillance-Broadcast (ADS-B) protocol is employed in air-ground communication systems to replace legacy radar-based air traffic control systems. However, despite being a recent technology, ADS-B communication does not include security measures. This exposes
...
PAID
Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems
Modern Autonomous Vehicles (AVs) leverage road context information collected through sensors (e.g., LiDAR, radar, and camera) to support the automated driving experience. Once such information is collected, a neural network model predicts subsequent actions that the AV executes.
...
Beware of Pickpockets
A Practical Attack against Blocking Cards
Today, we rely on contactless smart cards to perform several critical operations (e.g., payments and accessing buildings). Attacking smart cards can have severe consequences, such as losing money or leaking sensitive information. Although the security protections embedded in smar
...
Plug and Power
Fingerprinting USB Powered Peripherals via Power Side-channel
The literature and the news regularly report cases of exploiting Universal Serial Bus (USB) devices as attack tools for malware injections and private data exfiltration. To protect against such attacks, security researchers proposed different solutions to verify the identity of a
...
ICSpot
A High-Interaction Honeypot for Industrial Control Systems
Honeypots represent one of the most common solutions to study the adversaries' movements and develop ad-hoc protection strategies. An effective honeypot can mimic a real system behavior and can be used to deceive the attacker and collect data related to his actions. However, curr
...
EVExchange
A Relay Attack on Electric Vehicle Charging System
To support the increasing spread of Electric Vehicles (EVs), Charging Stations (CSs) are being installed worldwide. The new generation of CSs employs the Vehicle-To-Grid (V2G) paradigm by implementing novel standards such as the ISO 15118. This standard enables high-level communi
...
SENECAN
Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming
The Control Area Network (CAN) represents the standard bus for intra-vehicular networks communication. Unfortunately, CAN was not designed to be a secure protocol. Communications over CAN do not take advantage of any security feature (e.g., cryptography and authentication), raisi
...
Visible Light Communication (VLC) is one the most promising enabling technology for future 6G networks to over-come Radio-Frequency (RF)-based communication limitations thanks to a broader bandwidth, higher data rate, and greater efficiency. However, from the security perspective
...
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs) open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore, since ICSs are often employed in critical infrastructures (e.g., nuclear plants) and manufacturi
...
Modern Industrial Control Systems (ICSs) allow remote communication through the Internet using industrial protocols that were not designed to work with external networks. To understand security issues related to this practice, prior work usually relies on active scans by research
...
USB powered devices
A survey of side-channel threats and countermeasures
Recent technological innovations lead to the rise of a plethora of portable electronic devices such as smartphones, small household appliances, and other IoT devices. To power or recharge the battery of such devices, manufacturers identified in the ubiquitous Universal Serial Bus
...
MiniV2G
An Electric Vehicle Charging Emulator
The impact of global warming and the imperative to limit climate change have stimulated the need to develop new solutions based on renewable energy sources. One of the emerging trends in this endeavor are Electric Vehicles (EVs), which use electricity instead of traditional fossi
...
ALISI
A lightweight identification system based on Iroha
Given their ubiquity, modern Internet of Things (IoT) devices represent a dangerous attack surface for hackers. These devices are strongly heterogeneous by manufacturer, application field, geographic area of deployment, security requirements, and computational performances. This
...
In recent years, several schemes have been proposed to detect anomalies and attacks on Cyber-Physical Systems (CPSs) such as Industrial Control Systems (ICSs). Based on the analysis of sensor data, unexpected or malicious behavior is detected. Those schemes often rely on (implici
...
The growth of social media and the people interconnection led to the digitalization of communication. Nowadays the most influential politicians or scientific communicators use the media to disseminate news or decisions. However, such communications media can be used maliciously t
...