Publications
Conferences
- Daniele Perito, Claude Castelluccia, Markus Duermuth Adaptive Password Strength Meters from Markov Models Network and Distributed Systems Security Symposium (NDSS), February 2012[PDF]
- Daniele Perito, Aurelien Francillon, Karim El Defrawy, Gene Tsudik SMART: Secure and Minimal Architecture for a Dynamic Root of Trust Network and Distributed Systems Security Symposium (NDSS), February 2012[PDF]
- Daniele Perito, Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils How Unique and Traceable are Usernames? Privacy Enhancing Technology Symposium (PETS), July 2011(Best Student Paper Award)[PDF]
- Elie Burzstein, Romain Beauxis, Hristo Paskov, Daniele Perito, Celine Fabry and John Mitchell. The Failure of Noise-Based Non-Continuous Audio Captchas Accepted at IEEE Symposium on Security and Privacy (SSP '11), May 2011[PDF]
- Daniele Perito, Gene Tsudik. Secure Code Update for Embedded Devices via Proofs of Secure Erasure. European Symposium on Research in Computer Security (ESORCICS), September 2010 [PDF]
-
Claude Castelluccia, Emiliano De Cristofaro, Daniele Perito.
Private Information Disclosure from Web Searches
Privacy Enhancing Technology Symposium (PETS), July 2010 [PDF]
- Poster accepted at IEEE Security and Privacy Symposium(Oakland)
- Press:[MIT Tech] [Slashdot] [ACM Technews]
- [Project Page]
- Aurelien Francillon, Claudio Soriente, Daniele Perito and Claude Castelluccia On the Difficulty of software based attestation of embedded devices. ACM Conference on Computer and Communications Security (CCS), November 2009 [PDF]
- Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils, Daniele Perito. Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers ACM Internet Measurement Conference (IMC), November 2009 (Best Paper Nomination) [PDF]
- Aurelien Francillon, Daniele Perito and Claude Castelluccia Defending Embedded Systems Against Control Flow Attacks. ACM CCS Workshop on Virtual Machine Security (VMSec), November 2009 [PDF]
-
Daniele Perito, Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils
How Unique and Traceable are Usernames?
[ArXiv]
[Project Page]
- Press:[New Scientist] [CBC] [MIT Techonology Review]
- Aurelien Francillon, Claudio Soriente, Daniele Perito and Claude Castelluccia On the Difficulty of software based attestation of embedded devices (Part 2) [PDF]