What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Bruno Crispo
Google Scholar
52
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sec
Certified Secure Updates for IoT Devices.
Alberto Tacchella
Emanuele Beozzo
Bruno Crispo
Marco Roveri
2025
conf/dsn
A Model-based Approach for Cybersecurity Assessment of Off-Road and Defense Vehicles.
Umberto Bellini
Marzieh Kordi
Bruno Crispo
Paolo Lollini
Andrea Bondavalli
Davide Compar
2025
conf/icics
Bridging the Interoperability Gaps Among Trusted Architectures in MCUs.
Sandro Pinto
Luís Cunha
Daniel Oliveira
Michele Grisafi
Emanuele Beozzo
Bruno Crispo
2023
conf/esorics
μIPS: Software-Based Intrusion Prevention for Bare-Metal Embedded Systems.
Luca Degani
Majid Salehi
Fabio Martinelli
Bruno Crispo
2023
conf/esorics
The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse.
Matteo Golinelli
Francesco Bonomi
Bruno Crispo
2023
conf/acsac
OAuth 2.0 Redirect URI Validation Falls Short, Literally.
Tommaso Innocenti
Matteo Golinelli
Kaan Onarlioglu
Seyed Ali Mirheidari
Bruno Crispo
Engin Kirda
2022
journals/compsec
Practical attacks on Login CSRF in OAuth.
Elham Arshad
Michele Benolli
Bruno Crispo
2022
journals/compsec
Step & turn - A novel bimodal behavioral biometric-based user verification scheme for physical access control.
Sandeep Gupta
Mouna Kacimi
Bruno Crispo
2022
journals/istr
RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis.
Sandeep Gupta
Kiran B. Raja
Fabio Martinelli
Bruno Crispo
2022
journals/tifs
MPI: Memory Protection for Intermittent Computing.
Michele Grisafi
Mahmoud Ammar
Kasim Sinan Yildirim
Bruno Crispo
2022
conf/uss
PISTIS: Trusted Computing Architecture for Low-end Embedded Systems.
Michele Grisafi
Mahmoud Ammar
Marco Roveri
Bruno Crispo
2022
conf/uss
Web Cache Deception Escalates!
Seyed Ali Mirheidari
Matteo Golinelli
Kaan Onarlioglu
Engin Kirda
Bruno Crispo
2022
conf/csr2
On the (in)security of Memory Protection Units : A Cautionary Note.
Michele Grisafi
Mahmoud Ammar
Bruno Crispo
2021
conf/sec
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials.
Ali Hariri
Subhajit Bandopadhyay
Athanasios Rizos
Theo Dimitrakos
Bruno Crispo
Muttukrishnan Rajarajan
2021
conf/wisec
SWIPEGAN: Swiping Data Augmentation Using Generative Adversarial Networks for Smartphone User Authentication.
Attaullah Buriro
Francesco Ricci
Bruno Crispo
2021
conf/wisec
Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation.
Mahmoud Ammar
Bruno Crispo
Ivan De Oliveira Nunes
Gene Tsudik
2020
conf/uss
Cached and Confused: Web Cache Deception in the Wild.
Seyed Ali Mirheidari
Sajjad Arshad
Kaan Onarlioglu
Bruno Crispo
Engin Kirda
William Robertson
2020
conf/acsac
Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices.
Mahmoud Ammar
Bruno Crispo
2019
journals/compsec
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms.
Sandeep Gupta
Attaullah Buriro
Bruno Crispo
2019
journals/istr
AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones.
Attaullah Buriro
Bruno Crispo
Mauro Conti
2019
conf/esorics
A Risk-Driven Model to Minimize the Effects of Human Factors on Smart Devices.
Sandeep Gupta
Attaullah Buriro
Bruno Crispo
2018
journals/istr
Internet of Things: A survey on the security of IoT frameworks.
Mahmoud Ammar
Giovanni Russello
Bruno Crispo
2018
conf/esorics
SnapAuth: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme.
Attaullah Buriro
Bruno Crispo
Mojtaba Eskandari
Sandeep Gupta
Athar Mahboob
Rutger Van Acker
2017
journals/popets
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps.
Mojtaba Eskandari
Bruno Kessler
Maqsood Ahmad
Anderson Santana de Oliveira
Bruno Crispo
2017
conf/esorics
DLoc: Distributed Auditing for Data Location Compliance in Cloud.
Mojtaba Eskandari
Bruno Crispo
Anderson Santana de Oliveira
2016
conf/sp
Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication.
Attaullah Buriro
Bruno Crispo
Filippo Del Frari
Konrad S. Wrona
2014
conf/ccs
PIDGIN: privacy-preserving interest and content sharing in opportunistic networks.
Muhammad Rizwan Asghar
Ashish Gehani
Bruno Crispo
Giovanni Russello
2014
conf/acsac
Less is more: cipher-suite negotiation for DNSSEC.
Amir Herzberg
Haya Schulmann
Bruno Crispo
2013
journals/compsec
ESPOON<sub>ERBAC</sub>: Enforcing security policies in outsourced environments.
Muhammad Rizwan Asghar
Mihaela Ion
Giovanni Russello
Bruno Crispo
2013
journals/tifs
Hybrid Static-Runtime Information Flow and Declassification Enforcement.
Bruno P. S. Rocha
Mauro Conti
Sandro Etalle
Bruno Crispo
2013
journals/tifs
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
Earlence Fernandes
Bruno Crispo
Mauro Conti
2013
conf/ccs
Enabling trusted stores for android.
Yury Zhauniarovich
Olga Gadyatskaya
Bruno Crispo
2013
conf/ccs
Supporting complex queries and access policies for multi-user encrypted databases.
Muhammad Rizwan Asghar
Giovanni Russello
Bruno Crispo
Mihaela Ion
2012
journals/tifs
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android.
Mauro Conti
Bruno Crispo
Earlence Fernandes
Yury Zhauniarovich
2012
conf/ccs
Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions.
Cristiano Giuffrida
Stefano Ortolani
Bruno Crispo
2012
conf/ccs
Demonstrating the effectiveness of MOSES for separation of execution modes.
Giovanni Russello
Mauro Conti
Bruno Crispo
Earlence Fernandes
Yury Zhauniarovich
2012
conf/uss
NoisyKey: Tolerating Keyloggers via Keystrokes Hiding.
Stefano Ortolani
Bruno Crispo
2011
conf/ccs
Poster: ESPOON<sub>ERBAC</sub>: enforcing security policies in outsourced environments with encrypted RBAC.
Muhammad Rizwan Asghar
Giovanni Russello
Bruno Crispo
2011
conf/ccs
Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.
Mauro Conti
Irina Zachia-Zlatea
Bruno Crispo
2010
conf/ccs
An implementation of event and filter confidentiality in pub/sub systems and its application to e-health.
Mihaela Ion
Giovanni Russello
Bruno Crispo
2010
conf/icics
Time Warp: How Time Affects Privacy in LBSs.
Luciana Marconi
Roberto Di Pietro
Bruno Crispo
Mauro Conti
2009
conf/sec
Towards a Theory of White-Box Security.
Amir Herzberg
Haya Schulmann
Amitabh Saxena
Bruno Crispo
2007
conf/sec
A Hybrid PKI-IBC Based Ephemerizer System.
Srijith Krishnan Nair
Muhammad Torabi Dashti
Bruno Crispo
Andrew S. Tanenbaum
2007
conf/acsac
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices.
Iulia Ion
Boris Dragovic
Bruno Crispo
2005
conf/acisp
Counting Abuses Using Flexible Off-line Credentials.
Kemal Bicakci
Bruno Crispo
Andrew S. Tanenbaum
2005
conf/acisp
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management.
Melanie R. Rieback
Bruno Crispo
Andrew S. Tanenbaum
2004
conf/acisp
Symmetric Key Authentication Services Revisited.
Bruno Crispo
Bogdan C. Popescu
Andrew S. Tanenbaum
2004
conf/nspw
Support for multi-level security policies in DRM architectures.
Bogdan C. Popescu
Bruno Crispo
Andrew S. Tanenbaum
2002
journals/compsec
Individual Authentication in Multiparty Communications.
Francesco Bergadano
Davide Cavagnino
Bruno Crispo
2001
conf/icics
Reasoning about Accountability within Delegation.
Bruno Crispo
Giancarlo Ruffo
2000
conf/sacrypt
Chained Stream Authentication.
Francesco Bergadano
Davide Cavagnino
Bruno Crispo
1997
conf/ccs
Proactive Password Checking with Decision Trees.
Francesco Bergadano
Bruno Crispo
Giancarlo Ruffo
Coauthors
Alberto Tacchella
(1)
Ali Hariri
(1)
Amir Herzberg
(2)
Amitabh Saxena
(1)
Anderson Santana de Oliveira
(2)
Andrea Bondavalli
(1)
Andrew S. Tanenbaum
(5)
Ashish Gehani
(1)
Athanasios Rizos
(1)
Athar Mahboob
(1)
Attaullah Buriro
(6)
Bogdan C. Popescu
(2)
Boris Dragovic
(1)
Bruno Crispo
(52)
Bruno Kessler
(1)
Bruno P. S. Rocha
(1)
Cristiano Giuffrida
(1)
Daniel Oliveira
(1)
Davide Cavagnino
(2)
Davide Compar
(1)
Earlence Fernandes
(3)
Elham Arshad
(1)
Emanuele Beozzo
(2)
Engin Kirda
(3)
Fabio Martinelli
(2)
Filippo Del Frari
(1)
Francesco Bergadano
(3)
Francesco Bonomi
(1)
Francesco Ricci
(1)
Gene Tsudik
(1)
Giancarlo Ruffo
(2)
Giovanni Russello
(7)
Haya Schulmann
(2)
Irina Zachia-Zlatea
(1)
Iulia Ion
(1)
Ivan De Oliveira Nunes
(1)
Kaan Onarlioglu
(3)
Kasim Sinan Yildirim
(1)
Kemal Bicakci
(1)
Kiran B. Raja
(1)
Konrad S. Wrona
(1)
Luca Degani
(1)
Luciana Marconi
(1)
Luís Cunha
(1)
Mahmoud Ammar
(6)
Majid Salehi
(1)
Maqsood Ahmad
(1)
Marco Roveri
(2)
Marzieh Kordi
(1)
Matteo Golinelli
(3)
Mauro Conti
(7)
Melanie R. Rieback
(1)
Michele Benolli
(1)
Michele Grisafi
(4)
Mihaela Ion
(3)
Mojtaba Eskandari
(3)
Mouna Kacimi
(1)
Muhammad Rizwan Asghar
(4)
Muhammad Torabi Dashti
(1)
Muttukrishnan Rajarajan
(1)
Olga Gadyatskaya
(1)
Paolo Lollini
(1)
Roberto Di Pietro
(1)
Rutger Van Acker
(1)
Sajjad Arshad
(1)
Sandeep Gupta
(5)
Sandro Etalle
(1)
Sandro Pinto
(1)
Seyed Ali Mirheidari
(3)
Srijith Krishnan Nair
(1)
Stefano Ortolani
(2)
Subhajit Bandopadhyay
(1)
Theo Dimitrakos
(1)
Tommaso Innocenti
(1)
Umberto Bellini
(1)
William Robertson
(1)
Yury Zhauniarovich
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to