Daniele Antonioli

Orcid: 0000-0002-9342-3920

According to our database1, Daniele Antonioli authored at least 23 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Entropy-based Thresholds.
Proc. Priv. Enhancing Technol., 2024

2023
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats.
Proceedings of the 43rd IEEE Security and Privacy, 2022

BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy.
ACM Trans. Priv. Secur., 2020

Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

BIAS: Bluetooth Impersonation AttackS.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy.
IACR Cryptol. ePrint Arch., 2019

The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
Proceedings of the 28th USENIX Security Symposium, 2019

Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot.
CoRR, 2018

State-aware anomaly detection for industrial control systems.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

2017
Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3.
CoRR, 2017

Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Legacy-Compliant Data Authentication for Industrial Control System Traffic.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Towards High-Interaction Virtual ICS Honeypots-in-a-Box.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2015
MiniCPS: A Toolkit for Security Research on CPS Networks.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

2013
On-chip lightweight implementation of reduced NIST randomness test suite.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013


  Loading...