Skip to main content
European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Restoring Trust in the cyber space: a Systems Security Proposal

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

D4.2 Defences in the IoT - Midterm Report

Activity report for the second year of the project.

D2.3 Dissemination Progress report, year 3

Dissemination and communication activities report for the third year of the PROTASIS project.

D3.1 Cyber Attacks - First Progress Report

Activity report for the rst year of the project.

D2.7 Exploitation Plan

Exploitation Plan for the PROTASIS project.

D3.4 Cyber Attacks - Final Report

Activity report for the fourth year of the project.

D2.1 Dissemination Progress report, year 1

Dissemination and communication activities report for the first year of the PROTASIS project.

D1.1 Website and collaboration tools

The website will be the main channel through which the general public will gain access to PROTASIS results, publications, news and new tools developed in the context of this project. As with all our other projects, we will maintain the website beyond the life of the project. For better dissemination of the information, we will also take advantage of social media such as Twitter and Facebook, as a way to aggregate and reach out to our constituency. Complementary to the website, we will employ mailing lists for communication within the consortium and with our EAB. For collaboration, we will be using SVN to maintain all the important documents and all tools developed by the consortium members.

D2.5 Cyber Security Repository

A repository of cybersecurity-relevant data and metadata collected and/or used during the course of PROTASIS, as well as educational materials. The repository itself will be a publicly-available website, but the content will be accessible under a policy that will be established as part of PROTASIS.

D2.4 Dissemination Progress report, year 4

Dissemination and communication activities report for the fourth year of the PROTASIS project.

D3.2 Cyber Attacks - Midterm Report

Activity report for the second year of the project.

D4.3 Defences in the IoT - Progress report

Activity report for the third year of the project.

D2.6 Dissemination and Communication Plan

Dissemination and Communication Plan for the PROTASIS project.

D4.1 Defences in the IoT - First Progress Report

Activity report for the rst year of the project.

D2.2 Dissemination Progress report, year 2

Dissemination and communication activities report for the second year of the PROTASIS project.

D3.3 Cyber Attacks - Progress report

Activity report for the third year of the project.

Pubblicazioni

No More Chasing Waterfalls - A Measurement Study of the Header Bidding Ad-Ecosystem

Autori: Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis
Pubblicato in: Proceedings of the Internet Measurement Conference, 2019, Pagina/e 280-293, ISBN 9781450369480
Editore: ACM
DOI: 10.1145/3355369.3355582

Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data

Autori: Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis
Pubblicato in: Proceedings 2019 Network and Distributed System Security Symposium, 2019, ISBN 1-891562-55-X
Editore: Internet Society
DOI: 10.14722/ndss.2019.23151

Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask

Autori: Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos Markatos
Pubblicato in: The World Wide Web Conference on - WWW '19, 2019, Pagina/e 1432-1442, ISBN 9781450366748
Editore: ACM Press
DOI: 10.1145/3308558.3313542

REAPER - Real-time App Analysis for Augmenting the Android Permission System

Autori: Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis
Pubblicato in: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019, Pagina/e 37-48, ISBN 9781450360999
Editore: ACM
DOI: 10.1145/3292006.3300027

CCSP: A compressed certificate status protocol

Autori: Antonios A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos
Pubblicato in: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, 2017, Pagina/e 1-9, ISBN 978-1-5090-5336-0
Editore: IEEE
DOI: 10.1109/infocom.2017.8057065

A Large-scale Analysis of Content Modification by Open HTTP Proxies

Autori: Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, Michalis Polychronakis
Pubblicato in: Proceedings 2018 Network and Distributed System Security Symposium, 2018, ISBN 1-891562-49-5
Editore: Internet Society
DOI: 10.14722/ndss.2018.23244

If you are not paying for it, you are the product - how much do advertisers pay to reach you?

Autori: Panagiotis Papadopoulos, Pablo Rodriguez Rodriguez, Nicolas Kourtellis, Nikolaos Laoutaris
Pubblicato in: Proceedings of the 2017 Internet Measurement Conference on - IMC '17, 2017, Pagina/e 142-156, ISBN 9781-450351188
Editore: ACM Press
DOI: 10.1145/3131365.3131397

An Experimental Security Analysis of an Industrial Robot Controller

Autori: Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero
Pubblicato in: 2017 IEEE Symposium on Security and Privacy (SP), 2017, Pagina/e 268-286, ISBN 978-1-5090-5533-3
Editore: IEEE
DOI: 10.1109/sp.2017.20

The Cost of Digital Advertisement - Comparing User and Advertiser Views

Autori: Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos
Pubblicato in: Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18, 2018, Pagina/e 1479-1489, ISBN 9781-450356398
Editore: ACM Press
DOI: 10.1145/3178876.3186060

Exclusive - How the (synced) Cookie Monster breached my encrypted VPN session

Autori: Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos
Pubblicato in: Proceedings of the 11th European Workshop on Systems Security - EuroSec'18, 2018, Pagina/e 1-6, ISBN 9781-450356527
Editore: ACM Press
DOI: 10.1145/3193111.3193117

Where's Wally? - How to Privately Discover your Friends on the Internet

Autori: Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos
Pubblicato in: Proceedings of the 2018 on Asia Conference on Computer and Communications Security - ASIACCS '18, 2018, Pagina/e 425-430, ISBN 9781450355766
Editore: ACM Press
DOI: 10.1145/3196494.3196496

Øpass - Zero-storage Password Management Based on Password Reminders

Autori: Giannis Tzagarakis, Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos
Pubblicato in: Proceedings of the 11th European Workshop on Systems Security - EuroSec'18, 2018, Pagina/e 1-6, ISBN 9781-450356527
Editore: ACM Press
DOI: 10.1145/3193111.3193113

Is Privacy possible without Anonymity? - The case for microblogging services

Autori: Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos
Pubblicato in: Proceedings of the 12th European Workshop on Systems Security - EuroSec '19, 2019, Pagina/e 1-6, ISBN 9781450362740
Editore: ACM Press
DOI: 10.1145/3301417.3312498

ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks

Autori: Radhesh Krishnan Konoth, Marco Oliverio, Andrei Tatar, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi
Pubblicato in: 2018
Editore: USENIX Association

Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables

Autori: Benjamin Kollenda, Enes Goktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, R. K. Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz
Pubblicato in: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Pagina/e 189-200, ISBN 978-1-5386-0542-4
Editore: IEEE
DOI: 10.1109/dsn.2017.58

MineSweeper - An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense

Autori: Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, Giovanni Vigna
Pubblicato in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Pagina/e 1714-1730, ISBN 9781-450356930
Editore: ACM Press
DOI: 10.1145/3243734.3243858

Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure

Autori: Enes Goktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida
Pubblicato in: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Pagina/e 227-242, ISBN 978-1-5386-4228-3
Editore: IEEE
DOI: 10.1109/eurosp.2018.00024

It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains

Autori: Florian Quinkert, Tobias Lauinger, William Robertson, Engin Kirda, Thorsten Holz
Pubblicato in: 2019 IEEE Conference on Communications and Network Security (CNS), 2019, Pagina/e 259-267, ISBN 978-1-5386-7117-7
Editore: IEEE
DOI: 10.1109/cns.2019.8802671

Talon: An Automated Framework for Cross-Device Tracking Detection

Autori: Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis
Pubblicato in: 2019
Editore: USENIX

Beyond content analysis - detecting targeted ads via distributed counting

Autori: Costas Iordanou, Nicolas Kourtellis, Juan Miguel Carrascosa, Claudio Soriente, Ruben Cuevas, Nikolaos Laoutaris
Pubblicato in: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019, Pagina/e 110-122, ISBN 9781-450369985
Editore: ACM
DOI: 10.1145/3359989.3365428

Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots

Autori: Pietro Ferretti, Marcello Pogliani, Stefano Zanero
Pubblicato in: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy - CPS-SPC'19, 2019, Pagina/e 51-61, ISBN 9781-450368315
Editore: ACM Press
DOI: 10.1145/3338499.3357361

There's a Hole in that Bucket! - A Large-scale Analysis of Misconfigured S3 Buckets

Autori: Andrea Continella, Mario Polino, Marcello Pogliani, Stefano Zanero
Pubblicato in: Proceedings of the 34th Annual Computer Security Applications Conference, 2018, Pagina/e 702-711, ISBN 9781450365697
Editore: ACM
DOI: 10.1145/3274694.3274736

CopyCAN - An Error-Handling Protocol based Intrusion Detection System for Controller Area Network

Autori: Stefano Longari, Matteo Penco, Michele Carminati, Stefano Zanero
Pubblicato in: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy - CPS-SPC'19, 2019, Pagina/e 39-50, ISBN 9781-450368315
Editore: ACM Press
DOI: 10.1145/3338499.3357362

SysTaint - Assisting Reversing of Malicious Network Communications

Autori: Gabriele Viglianisi, Michele Carminati, Mario Polino, Andrea Continella, Stefano Zanero
Pubblicato in: Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop on - SSPREW-8, 2018, Pagina/e 1-12, ISBN 9781-450360968
Editore: ACM Press
DOI: 10.1145/3289239.3289245

The Long-Standing Privacy Debate - Mobile Websites vs Mobile Apps

Autori: Elias P. Papadopoulos, Michalis Diamantaris, Panagiotis Papadopoulos, Thanasis Petsas, Sotiris Ioannidis, Evangelos P. Markatos
Pubblicato in: Proceedings of the 26th International Conference on World Wide Web - WWW '17, 2017, Pagina/e 153-162, ISBN 9781-450349130
Editore: ACM Press
DOI: 10.1145/3038912.3052691

Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation

Autori: Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, Giorgos Vasiliadis
Pubblicato in: Proceedings 2019 Network and Distributed System Security Symposium, 2019, ISBN 1-891562-55-X
Editore: Internet Society
DOI: 10.14722/ndss.2019.23070

When Cyber Got Real: Challenges in Securing Cyber-Physical Systems

Autori: Stefano Zanero
Pubblicato in: 2018 IEEE SENSORS, 2018, Pagina/e 1-4, ISBN 978-1-5386-4707-3
Editore: IEEE
DOI: 10.1109/ICSENS.2018.8589798

ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation

Autori: Pietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, Stefano Zanero
Pubblicato in: Detection of Intrusions and Malware, and Vulnerability Assessment, Numero 10885, 2018, Pagina/e 351-371, ISBN 978-3-319-93410-5
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-93411-2_16

Incognitus: Privacy-Preserving User Interests in Online Social Networks

Autori: Alexandros Kornilakis, Panagiotis Papadopoulos, Evangelos Markatos
Pubblicato in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Numero 11398, 2019, Pagina/e 81-95, ISBN 978-3-030-12084-9
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_8

Automated Measurements of Cross-Device Tracking

Autori: Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis
Pubblicato in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Numero 11398, 2019, Pagina/e 73-80, ISBN 978-3-030-12084-9
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_7

Extended Abstract: Toward Systematically Exploring Antivirus Engines

Autori: Davide Quarta, Federico Salvioni, Andrea Continella, Stefano Zanero
Pubblicato in: Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings, Numero 10885, 2018, Pagina/e 393-403, ISBN 978-3-319-93410-5
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-93411-2_18

Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking

Autori: Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos Markatos
Pubblicato in: Information Security - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings, Numero 11723, 2019, Pagina/e 277-296, ISBN 978-3-030-30214-6
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-30215-3_14

Security of controlled manufacturing systems in the connected factory: the case of industrial robots

Autori: Marcello Pogliani, Davide Quarta, Mario Polino, Martino Vittone, Federico Maggi, Stefano Zanero
Pubblicato in: Journal of Computer Virology and Hacking Techniques, Numero 15/3, 2019, Pagina/e 161-175, ISSN 2263-8733
Editore: Journal of Computer Virology and Hacking Techniques
DOI: 10.1007/s11416-019-00329-8

ReCAN – Dataset for reverse engineering of Controller Area Networks

Autori: Mattia Zago, Stefano Longari, Andrea Tricarico, Michele Carminati, Manuel Gil Pérez, Gregorio Martínez Pérez, Stefano Zanero
Pubblicato in: Data in Brief, Numero 29, 2020, Pagina/e 105149, ISSN 2352-3409
Editore: Elsevier BV
DOI: 10.1016/j.dib.2020.105149

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile