oru.sePublications
Change search
Link to record
Permanent link

Direct link
BETA
Publications (10 of 29) Show all publications
Sigurdsson, G., Giaretta, A. & Dragoni, N. (2020). Vulnerabilities and Security Breaches in Cryptocurrencies. In: Ciancarini, P.; Mazzara, M.; Messina, A.; Sillitti, A.; Succi, G. (Ed.), Proceedings of 6th International Conference in Software Engineering for Defence Applications: . Paper presented at 6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Rome, Italy, June 7-8, 2018. Springer
Open this publication in new window or tab >>Vulnerabilities and Security Breaches in Cryptocurrencies
2020 (English)In: Proceedings of 6th International Conference in Software Engineering for Defence Applications / [ed] Ciancarini, P.; Mazzara, M.; Messina, A.; Sillitti, A.; Succi, G., Springer, 2020Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Springer, 2020
Series
Advances in Intelligent Systems and Computing, ISSN 2194-5357 ; 925
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:oru:diva-71864 (URN)978-3-030-14686-3 (ISBN)978-3-030-14687-0 (ISBN)
Conference
6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Rome, Italy, June 7-8, 2018
Available from: 2019-01-28 Created: 2019-01-28 Last updated: 2019-02-01Bibliographically approved
Giaretta, A., De Donno, M. & Dragoni, N. (2018). Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. In: Proceedings of the 13th International Conference on Availability, Reliability and Security: . Paper presented at 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018. ACM, Article ID 22.
Open this publication in new window or tab >>Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot
2018 (English)In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ACM , 2018, article id 22Conference paper, Published paper (Refereed)
Abstract [en]

The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development. During this technological and societal revolution, security has been persistently neglected, yet a hacked robot can act as an insider threat in organizations, industries, public spaces, and private homes. In this paper, we perform a structured security assessment of Pepper, a commercial humanoid robot. Our analysis, composed by an automated and a manual part, points out a relevant number of security flaws that can be used to take over and command the robot. Furthermore, we suggest how these issues could be fixed, thus, avoided in the future. The very final aim of this work is to push the rise of the security level of IoT products before they are sold on the public market.

Place, publisher, year, edition, pages
ACM, 2018
Series
ACM International Conference Proceeding Series
Keywords
Internet of Things (IoT), Penetration Testing, Pepper, Robot, Security
National Category
Computer and Information Sciences Robotics
Identifiers
urn:nbn:se:oru:diva-71106 (URN)10.1145/3230833.3232807 (DOI)2-s2.0-85055287152 (Scopus ID)978-1-4503-6448-5 (ISBN)
Conference
13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018
Available from: 2019-01-04 Created: 2019-01-04 Last updated: 2019-01-08Bibliographically approved
Argyriou, M., Dragoni, N. & Spognardi, A. (2018). Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications. Security and Communication Networks, Article ID UNSP 4672072.
Open this publication in new window or tab >>Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications
2018 (English)In: Security and Communication Networks, ISSN 1939-0114, E-ISSN 1939-0122, article id UNSP 4672072Article in journal (Refereed) Published
Abstract [en]

Android smartphones have become a vital component of the daily routine of millions of people, running a plethora of applications available in the official and alternative marketplaces. Although there are many security mechanisms to scan and filter malicious applications, malware is still able to reach the devices of many end-users. In this paper, we introduce the SafeDroid v2.0 framework, that is a flexible, robust, and versatile open-source solution for statically analysing Android applications, based on machine learning techniques. The main goal of our work, besides the automated production of fully sufficient prediction and classification models in terms of maximum accuracy scores and minimum negative errors, is to offer an out-of-the-box framework that can be employed by the Android security researchers to efficiently experiment to find effective solutions: the SafeDroid v2.0 framework makes it possible to test many different combinations of machine learning classifiers, with a high degree of freedom and flexibility in the choice of features to consider, such as dataset balance and dataset selection. The framework also provides a server, for generating experiment reports, and an Android application, for the verification of the produced models in real-life scenarios. An extensive campaign of experiments is also presented to show how it is possible to efficiently find competitive solutions: the results of our experiments confirm that SafeDroid v2.0 can reach very good performances, even with highly unbalanced dataset inputs and always with a very limited overhead.

Place, publisher, year, edition, pages
John Wiley & Sons, 2018
National Category
Computer Sciences
Identifiers
urn:nbn:se:oru:diva-69259 (URN)10.1155/2018/4672072 (DOI)000444877600001 ()2-s2.0-85053706618 (Scopus ID)
Available from: 2018-10-04 Created: 2018-10-04 Last updated: 2018-10-04Bibliographically approved
De Donno, M., Dragoni, N., Giaretta, A. & Mazzara, M. (2018). AntibIoTic: Protecting IoT Devices Against DDoS Attacks. In: Ciancarini, P.; Litvinov, S.; Messina, A.; Sillitti, A.; Succi, G. (Ed.), Proceedings of 5th International Conference in Software Engineering for Defence Applications: SEDA 2016. Paper presented at 5th International Conference in Software Engineering for Defence Applications, Rome, Italy, May 10, 2016 (pp. 59-72). Cham: Springer
Open this publication in new window or tab >>AntibIoTic: Protecting IoT Devices Against DDoS Attacks
2018 (English)In: Proceedings of 5th International Conference in Software Engineering for Defence Applications: SEDA 2016 / [ed] Ciancarini, P.; Litvinov, S.; Messina, A.; Sillitti, A.; Succi, G., Cham: Springer, 2018, p. 59-72Conference paper, Published paper (Refereed)
Abstract [en]

The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices.

Place, publisher, year, edition, pages
Cham: Springer, 2018
Series
Advances in Intelligent Systems and Computing (AISC), ISSN 2194-5357, E-ISSN 2194-5365 ; 717
National Category
Computer Sciences
Identifiers
urn:nbn:se:oru:diva-64665 (URN)10.1007/978-3-319-70578-1_7 (DOI)000434086000007 ()2-s2.0-85041797799 (Scopus ID)978-3-319-70577-4 (ISBN)978-3-319-70578-1 (ISBN)
Conference
5th International Conference in Software Engineering for Defence Applications, Rome, Italy, May 10, 2016
Available from: 2018-01-30 Created: 2018-01-30 Last updated: 2018-06-20Bibliographically approved
Giaretta, A. & Dragoni, N. (2018). Community Targeted Phishing: A Middle Ground Between Massive and Spear Phishing through Natural Language Generation. In: : . Paper presented at 6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Rome, Italy, June 7-8, 2018.
Open this publication in new window or tab >>Community Targeted Phishing: A Middle Ground Between Massive and Spear Phishing through Natural Language Generation
2018 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Looking at today spam and phishing panorama, we are able to identify two diametrically opposed approaches. On the one hand we have general spam, which targets as much as people as possible with generic and pre-formed texts; on the other hand we have very specific emails, handcrafted to target high-value targets. While nowadays these two worlds don't intersect at all, we envision a future where Natural Language Generation (NLG) techniques will enable attackers to target populous communities with machine-tailored emails. In this paper, we introduce what we call Community Targeted Spam (CTS), alongside with some workflows that exhibit how this all could be implemented. Furthermore, we suggest some preliminary directions that scientific community should consider to take, in order to address our concerns.

National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:oru:diva-71862 (URN)
Conference
6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Rome, Italy, June 7-8, 2018
Available from: 2019-01-28 Created: 2019-01-28 Last updated: 2019-02-01Bibliographically approved
De Donno, M., Dragoni, N., Giaretta, A. & Spognardi, A. (2018). DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Security and Communication Networks, Article ID 7178164.
Open this publication in new window or tab >>DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation
2018 (English)In: Security and Communication Networks, ISSN 1939-0114, E-ISSN 1939-0122, article id 7178164Article in journal (Refereed) Published
Abstract [en]

The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.

Place, publisher, year, edition, pages
Hindawi Publishing Corporation, 2018
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:oru:diva-65665 (URN)10.1155/2018/7178164 (DOI)000426639800001 ()2-s2.0-85043390832 (Scopus ID)
Available from: 2018-03-12 Created: 2018-03-12 Last updated: 2018-03-27Bibliographically approved
Bucchiarone, A., Dragoni, N., Dustdar, S., Larsen, S. T. & Mazzara, M. (2018). From Monolithic to Microservices An Experience Report from the Banking Domain. IEEE Software, 35(3), 50-55
Open this publication in new window or tab >>From Monolithic to Microservices An Experience Report from the Banking Domain
Show others...
2018 (English)In: IEEE Software, ISSN 0740-7459, E-ISSN 1937-4194, Vol. 35, no 3, p. 50-55Article in journal (Refereed) Published
Abstract [en]

Microservices have seen their popularity blossoming with an explosion of concrete applications in real-life software. Several companies are currently involved in a major refactoring of their back-end systems in order to improve scalability. This article presents an experience report of a real-world case study, from the banking domain, in order to demonstrate how scalability is positively affected by reimplementing a monolithic architecture into microservices. The case study is based on the FX Core system for converting from one currency to another. FX Core is a mission-critical system of Danske Bank, the largest bank in Denmark and one of the leading financial institutions in Northern Europe.

Place, publisher, year, edition, pages
IEEE Computer Society, 2018
Keywords
microservices, software architecture, scalability, software development, software engineering, Danske Bank, FX Core
National Category
Computer Sciences
Identifiers
urn:nbn:se:oru:diva-67081 (URN)10.1109/MS.2018.2141026 (DOI)000431692500009 ()2-s2.0-85046855472 (Scopus ID)
Available from: 2018-05-24 Created: 2018-05-24 Last updated: 2018-08-31Bibliographically approved
Giaretta, A., Dragoni, N. & Mazzara, M. (2018). Joining Jolie to Docker: Orchestration of Microservices on a Containers-as-a-Service Layer. In: Ciancarini, P.; Litvinov, S.; Messina, A.; Sillitti, A.; Succi, G. (Ed.), Proceedings of 5th International Conference in Software Engineering for Defence Applications: SEDA 2016. Paper presented at 5th International Conference in Software Engineering for Defence Applications, Rome, Italy, May 10, 2016 (pp. 167-175). Cham: Springer
Open this publication in new window or tab >>Joining Jolie to Docker: Orchestration of Microservices on a Containers-as-a-Service Layer
2018 (English)In: Proceedings of 5th International Conference in Software Engineering for Defence Applications: SEDA 2016 / [ed] Ciancarini, P.; Litvinov, S.; Messina, A.; Sillitti, A.; Succi, G., Cham: Springer, 2018, p. 167-175Conference paper, Published paper (Refereed)
Abstract [en]

Cloud computing is steadily growing and, as IaaS vendors have started to offer pay-as-you-go billing policies, it is fundamental to achieve as much elasticity as possible, avoiding over-provisioning that would imply higher costs. In this paper, we briefly analyse the orchestration characteristics of PaaSSOA, a proposed architecture already implemented for Jolie microservices, and Kubernetes, one of the various orchestration plugins for Docker; then, we outline similarities and differences of the two approaches, with respect to their own domain of application. Furthermore, we investigate some ideas to achieve a federation of the two technologies, proposing an architectural composition of Jolie microservices on Docker Container-as-a-Service layer.

Place, publisher, year, edition, pages
Cham: Springer, 2018
Series
Advances in Intelligent Systems and Computing (AISC), ISSN 2194-5357, E-ISSN 2194-5365 ; 717
National Category
Computer Sciences
Identifiers
urn:nbn:se:oru:diva-64667 (URN)10.1007/978-3-319-70578-1_16 (DOI)000434086000016 ()2-s2.0-85041811300 (Scopus ID)978-3-319-70577-4 (ISBN)978-3-319-70578-1 (ISBN)
Conference
5th International Conference in Software Engineering for Defence Applications, Rome, Italy, May 10, 2016
Available from: 2018-01-30 Created: 2018-01-30 Last updated: 2018-06-20Bibliographically approved
Dragoni, N., Lanese, I., Thordal Larsen, S., Mazzara, M., Mustafin, R. & Safina, L. (2018). Microservices: How To Make Your Application Scale. In: Alexander K. Petrenko, Andrei Voronkov (Ed.), Perspectives of System Informatics: 11th International Andrei P. Ershov Informatics Conference, PSI 2017, Moscow, Russia, June 27-29, 2017, Revised Selected Papers. Paper presented at 11th International Andrei Ershov Memorial Conference on Perspectives of System Informatics (PSI 2017), Moscow, Russian Federation, June 27-29, 2017 (pp. 95-104). Springer, 10742
Open this publication in new window or tab >>Microservices: How To Make Your Application Scale
Show others...
2018 (English)In: Perspectives of System Informatics: 11th International Andrei P. Ershov Informatics Conference, PSI 2017, Moscow, Russia, June 27-29, 2017, Revised Selected Papers / [ed] Alexander K. Petrenko, Andrei Voronkov, Springer, 2018, Vol. 10742, p. 95-104Conference paper, Published paper (Refereed)
Abstract [en]

The microservice architecture is a style inspired by service-oriented computing that has recently started gaining popularity and that promises to change the way in which software is perceived, conceived and designed. In this paper, we describe the main features of microservices and highlight how these features improve scalability.

Place, publisher, year, edition, pages
Springer, 2018
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 10742
National Category
Computer Sciences
Identifiers
urn:nbn:se:oru:diva-62793 (URN)10.1007/978-3-319-74313-4_8 (DOI)000456072600008 ()2-s2.0-85041714438 (Scopus ID)978-3-319-74312-7 (ISBN)978-3-319-74313-4 (ISBN)
Conference
11th International Andrei Ershov Memorial Conference on Perspectives of System Informatics (PSI 2017), Moscow, Russian Federation, June 27-29, 2017
Available from: 2017-11-23 Created: 2017-11-23 Last updated: 2019-02-05Bibliographically approved
Mazzara, M., Dragoni, N., Bucchiarone, A., Giaretta, A., Larsen, S. T. & Dustdar, S. (2018). Microservices: Migration of a Mission Critical System. IEEE Transactions on Services Computing, 1-1
Open this publication in new window or tab >>Microservices: Migration of a Mission Critical System
Show others...
2018 (English)In: IEEE Transactions on Services Computing, ISSN 1939-1374, E-ISSN 1939-1374, p. 1-1Article in journal (Refereed) Epub ahead of print
Abstract [en]

An increasing interest is growing around the idea of microservices and the promise of improving scalability when compared to monolithic systems. Several companies are evaluating pros and cons of a complex migration. In particular, financial institutions are positioned in a difficult situation due to the economic climate and the appearance of agile competitors that can navigate in a more flexible legal framework and started their business since day one with more agile architectures and without being bounded to outdated technological standard. In this paper, we present a real world case study in order to demonstrate how scalability is positively affected by re-implementing a monolithic architecture (MA) into a microservices architecture (MSA). The case study is based on the FX Core system, a mission critical system of Danske Bank, the largest bank in Denmark and one of the leading financial institutions in Northern Europe. The technical problem that has been addressed and solved in this paper is the identification of a repeatable migration process that can be used to convert a real world Monolithic architecture into a Microservices architecture in the specific setting of financial domain, typically characterized by legacy systems and batch-based processing on heterogeneous data sources.

Place, publisher, year, edition, pages
IEEE Press, 2018
Keywords
Scalability, Computer architecture, Service-oriented architecture, Tools, Mission critical systems, Automation, Service Computing, Software Architecture, Scalability, Microservices
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:oru:diva-71108 (URN)10.1109/TSC.2018.2889087 (DOI)
Available from: 2019-01-26 Created: 2019-01-26 Last updated: 2019-01-29Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-9575-2990

Search in DiVA

Show all publications