Bruno Crispo
Orcid: 0000-0002-1252-8465Affiliations:
- University of Trento, DISI, Povo, Italy
According to our database1,
Bruno Crispo
authored at least 208 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on cs.vu.nl
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
ACM Trans. Internet Things, August, 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
2023
Enterp. Inf. Syst., September, 2023
A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes.
Pattern Recognit., July, 2023
Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
IDeAuth: A novel behavioral biometric-based implicit deauthentication scheme for smartphones.
Pattern Recognit. Lett., 2022
RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis.
J. Inf. Secur. Appl., 2022
Step & turn - A novel bimodal behavioral biometric-based user verification scheme for physical access control.
Comput. Secur., 2022
NemesisGuard: Mitigating interrupt latency side channel attacks with static binary rewriting.
Comput. Networks, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the 4th IEEE Middle East and North Africa COMMunications Conference, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
2021
Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme.
J. Signal Process. Syst., 2021
SWIPEGAN: Swiping Data Augmentation Using Generative Adversarial Networks for Smartphone User Authentication.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021
Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
2020
ACM Trans. Internet Things, 2020
StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications.
J. Syst. Softw., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
μSBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault Observability.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020
Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
SμV - The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2019
AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones.
J. Inf. Secur. Appl., 2019
DriverAuth: Behavioral biometric-based driver authentication mechanism for on-demand ride and ridesharing infrastructure.
ICT Express, 2019
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms.
Comput. Secur., 2019
Comput. Networks, 2019
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019
Towards a standards-compliant pure-software trusted execution environment for resource-constrained embedded devices.
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019
Proceedings of the MobiQuitous 2019, 2019
SmartHandle: A Novel Behavioral Biometric-based Authentication Scheme for Smart Lock Systems.
Proceedings of the 3rd International Conference on Biometric Engineering and Applications, 2019
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Towards Bridging the Gap between Modern and Legacy Automotive ECUs: A Software-Based Security Framework for Legacy ECUs.
Proceedings of the IEEE 2nd Connected and Automated Vehicles Symposium, 2019
2018
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access.
Mob. Inf. Syst., 2018
J. Inf. Secur. Appl., 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier's Perspective).
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018
Polyglot CerberOS: Resource Security, Interoperability and Multi-Tenancy for IoT Services on a Multilingual Platform.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
Veh. Commun., 2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the Symposium on Applied Computing, 2017
S<i>μ</i>V - the security microvisor: a virtualisation-based security middleware for the internet of things.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, Las Vegas, NV, USA, December 11, 2017
Proceedings of the IEEE International Conference on Identity, 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017
2016
IEEE Internet Comput., 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Empirical Analysis on the Use of Dynamic Code Updates in Android and Its Security Implications.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016
2015
IEEE Trans. Parallel Distributed Syst., 2015
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015
Proceedings of the New Trends in Image Analysis and Processing - ICIAP 2015 Workshops, 2015
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
ACM Trans. Internet Techn., 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Dependable Secur. Comput., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IEEE Commun. Surv. Tutorials, 2013
Comput. Secur., 2013
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013
Proceedings of the 8th Workshop on Middleware for Next Generation Internet Computing, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the CCSW'13, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
Design and implementation of a confidentiality and access control solution for publish/subscribe systems.
Comput. Networks, 2012
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Optimal Solutions for Pairing Services on Smartphones: A Strategy to Minimize Energy Consumption.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the POLICY 2011, 2011
Proceedings of the POLICY 2011, 2011
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement.
Proceedings of the Middleware 2011, 2011
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Poster: ESPOON<sub>ERBAC</sub>: enforcing security policies in outsourced environments with encrypted RBAC.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment.
Wirel. Pers. Commun., 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Towards a Service-Based Internet - Third European Conference, 2010
Providing Confidentiality in Content-based Publish/subscribe Systems.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the On the Move to Meaningful Internet Systems, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010
Proceedings of the Open Research Problems in Network Security, 2010
Proceedings of the Service-Oriented Computing - 8th International Conference, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
An implementation of event and filter confidentiality in pub/sub systems and its application to e-health.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the ARES 2010, 2010
2009
J. Supercomput., 2009
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009
An efficient and scalable algorithm for policy compatibility in service virtualization.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009
Proceedings of the ESWC2009 Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009) Heraklion, 2009
Proceedings of the 22nd International Workshop on Description Logics (DL 2009), 2009
2008
Proceedings of the 1st IFIP Wireless Days, 2008
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008
Proceedings of the IEEE 19th International Symposium on Personal, 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008
2007
Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, 2007
Comput. Networks, 2007
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007
Proceedings of the New Approaches for Security, 2007
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems.
Proceedings of the 21th Large Installation System Administration Conference, 2007
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Security Protocols, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
2005
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005
Proceedings of the Security Protocols, 2005
How to incorporate revocation status information into the trust metrics for public-key certification.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005
2004
Proceedings of the Security Protocols, 2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the New Security Paradigms Workshop 2004, 2004
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004
Supporting Multi-Dimensional Trustworthiness for Grid Workflows.
Proceedings of the Digital Library Architectures: Peer-to-Peer, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Security Protocols, 2003
A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003
2002
2001
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
Proceedings of the Security Protocols, 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
1999
1998
ACM Trans. Inf. Syst. Secur., 1998
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998
Proceedings of the Security Protocols, 1998
Proceedings of the Security Protocols, 1998
1997
Proceedings of the Security Protocols, 1997
1996
Proceedings of the Security Protocols, 1996