default search action
Cataldo Basile
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Daniele Canavese, Luca Mannella, Leonardo Regano, Cataldo Basile:
Security at the Edge for Resource-Limited IoT Devices. Sensors 24(2): 590 (2024) - [c30]Gabriele Gatti, Marco Civera, Cataldo Basile, Massimiliano Masi, Michele La Manna:
A Threat Analysis of Cooperative Intelligent Transport Systems: C-Roads Scenarios. COMPSAC 2024: 2399-2405 - [c29]Francesco Settanni, Alessandro Zamponi, Cataldo Basile:
Dynamic Security Provisioning for Cloud-Native Networks: An Intent-Based Approach. CSR 2024: 321-328 - [i7]Cataldo Basile, Gabriele Gatti, Francesco Settanni:
A Formal Model of Security Controls' Capabilities and Its Applications to Policy Refinement and Incident Management. CoRR abs/2405.03544 (2024) - 2023
- [j15]Cataldo Basile, Bjorn De Sutter, Daniele Canavese, Leonardo Regano, Bart Coppens:
Design, implementation, and automation of a risk management approach for man-at-the-End software protection. Comput. Secur. 132: 103321 (2023) - [c28]Gabriele Gatti, Cataldo Basile, Guido Perboli:
An expert system for automatic cyber risk assessment and its AI-based improvements. COMPSAC 2023: 1434-1440 - [c27]George Hatzivasilis, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Guillermo Jiménez Prieto, Araceli Rojas Morgan, Miguel Juaniz Lopez, Cataldo Basile, José Francisco Ruiz:
Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain. CSR 2023: 464-469 - [c26]Francesco Settanni, Leonardo Regano, Cataldo Basile, Antonio Lioy:
A Model for Automated Cybersecurity Threat Remediation and Sharing. NetSoft 2023: 492-497 - [i6]Cataldo Basile, Bjorn De Sutter, Daniele Canavese, Leonardo Regano, Bart Coppens:
Design, Implementation, and Automation of a Risk Management Approach for Man-at-the-End Software Protection. CoRR abs/2303.15033 (2023) - 2022
- [j14]Daniele Canavese, Leonardo Regano, Cataldo Basile, Gabriele Ciravegna, Antonio Lioy:
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection. Comput. Electr. Eng. 97: 107621 (2022) - [j13]Daniele Bringhenti, Fulvio Valenza, Cataldo Basile:
Toward Cybersecurity Personalization in Smart Homes. IEEE Secur. Priv. 20(1): 45-53 (2022) - [c25]Cataldo Basile, Daniele Canavese, Leonardo Regano, Ignazio Pedone, Antonio Lioy:
A model of capabilities of Network Security Functions. NetSoft 2022: 474-479 - 2020
- [j12]Alessio Viticchié, Leonardo Regano, Cataldo Basile, Marco Torchiano, Mariano Ceccato, Paolo Tonella:
Empirical assessment of the effort needed to attack programs protected with client/server code splitting. Empir. Softw. Eng. 25(1): 1-48 (2020) - [i5]Daniele Canavese, Leonardo Regano, Cataldo Basile, Bart Coppens, Bjorn De Sutter:
Software Protection as a Risk Analysis Process. CoRR abs/2011.07269 (2020)
2010 – 2019
- 2019
- [j11]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Paolo Falcarin, Marco Torchiano, Bart Coppens, Bjorn De Sutter:
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge. Empir. Softw. Eng. 24(1): 240-286 (2019) - [j10]Cataldo Basile, Daniele Canavese, Leonardo Regano, Paolo Falcarin, Bjorn De Sutter:
A meta-model for software protections and reverse engineering attacks. J. Syst. Softw. 150: 3-21 (2019) - [j9]Cataldo Basile, Fulvio Valenza, Antonio Lioy, Diego R. López, Antonio Pastor Perales:
Adding Support for Automatic Enforcement of Security Policies in NFV Networks. IEEE/ACM Trans. Netw. 27(2): 707-720 (2019) - [i4]Alberto Carelli, Cataldo Basile, Alessandro Savino, Alessandro Vallero, Stefano Di Carlo:
Securing Soft IP Cores in FPGA based Reconfigurable Mobile Heterogeneous Systems. CoRR abs/1912.00696 (2019) - 2018
- [j8]Alessio Viticchié, Cataldo Basile, Fulvio Valenza, Antonio Lioy:
On the impossibility of effectively using likely-invariants for software attestation purposes. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(2): 1-25 (2018) - [c24]Alberto Carelli, Carlo Alberto Cristofanini, Alessandro Vallero, Cataldo Basile, Paolo Prinetto, Stefano Di Carlo:
Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems. AQTR 2018: 1-6 - 2017
- [j7]Cataldo Basile, Daniele Canavese, Christian Pitscheider, Antonio Lioy, Fulvio Valenza:
Assessing network authorization policies via reachability analysis. Comput. Electr. Eng. 64: 110-131 (2017) - [j6]Fulvio Valenza, Cataldo Basile, Daniele Canavese, Antonio Lioy:
Classification and Analysis of Communication Protection Policy Anomalies. IEEE/ACM Trans. Netw. 25(5): 2601-2614 (2017) - [c23]Alessio Viticchié, Cataldo Basile, Antonio Lioy:
Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions. CRiSIS 2017: 66-82 - [c22]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano:
How professional hackers understand protected code while performing attack tasks. ICPC 2017: 154-164 - [c21]Leonardo Regano, Daniele Canavese, Cataldo Basile, Antonio Lioy:
Towards Optimally Hiding Protected Assets in Software Applications. QRS 2017: 374-385 - [c20]Daniele Canavese, Leonardo Regano, Cataldo Basile, Alessio Viticchié:
Estimating Software Obfuscation Potency with Artificial Neural Networks. STM 2017: 193-202 - [i3]Alessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella:
Assessment of Source Code Obfuscation Techniques. CoRR abs/1704.02307 (2017) - [i2]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano:
How Professional Hackers Understand Protected Code while Performing Attack Tasks. CoRR abs/1704.02774 (2017) - [i1]Fulvio Valenza, Cataldo Basile, Daniele Canavese, Antonio Lioy:
Classification and Analysis of Communication Protection Policy Anomalies. CoRR abs/1708.02175 (2017) - 2016
- [j5]Cataldo Basile, Daniele Canavese, Antonio Lioy, Christian Pitscheider, Fulvio Valenza:
Inter-function anomaly analysis for correct SDN/NFV deployment. Int. J. Netw. Manag. 26(1): 25-43 (2016) - [c19]Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart Coppens:
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks. SPRO@CCS 2016: 73-84 - [c18]Bjorn De Sutter, Cataldo Basile, Mariano Ceccato, Paolo Falcarin, Michael Zunke, Brecht Wyseur, Jérôme d'Annoville:
The ASPIRE Framework for Software Protection. SPRO@CCS 2016: 91-92 - [c17]Alessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella:
Assessment of Source Code Obfuscation Techniques. SCAM 2016: 11-20 - [c16]Bjorn De Sutter, Paolo Falcarin, Brecht Wyseur, Cataldo Basile, Mariano Ceccato, Jérôme d'Annoville, Michael Zunke:
A Reference Architecture for Software Protection. WICSA 2016: 291-294 - [c15]Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy:
Towards Automatic Risk Analysis and Mitigation of Software Applications. WISTP 2016: 120-135 - 2015
- [j4]Diego Montero, Marcelo Yannuzzi, Adrian L. Shaw, Ludovic Jacquin, Antonio Pastor, René Serral-Gracià, Antonio Lioy, Fulvio Risso, Cataldo Basile, Roberto Sassu, Mario Nemirovsky, Francesco Ciaccia, Michael Georgiades, Savvas Charalambides, Jarkko Kuusijärvi, Francesca Bosco:
Virtualized security at the network edge: a user-centric approach. IEEE Commun. Mag. 53(4): 176-186 (2015) - [j3]Cataldo Basile, Antonio Lioy:
Analysis of Application-Layer Filtering Policies With Application to HTTP. IEEE/ACM Trans. Netw. 23(1): 28-41 (2015) - [c14]Cataldo Basile, Christian Pitscheider, Fulvio Risso, Fulvio Valenza, Marco Vallini:
Towards the Dynamic Provision of Virtualized Security Services. CSP Forum 2015: 65-76 - [c13]Cataldo Basile, Daniele Canavese, Jérôme d'Annoville, Bjorn De Sutter, Fulvio Valenza:
Automatic Discovery of Software Attacks via Backward Reasoning. SPRO@ICSE 2015: 52-58 - [c12]Cataldo Basile, Antonio Lioy, Christian Pitscheider, Fulvio Valenza, Marco Vallini:
A novel approach for integrating security policy enforcement with dynamic network virtualization. NetSoft 2015: 1-5 - [c11]Cataldo Basile, Antonio Lioy, Christian Pitscheider, Shilong Zhao:
A Formal Model of Policy Reconciliation. PDP 2015: 587-594 - [c10]Fulvio Valenza, Serena Spinoso, Cataldo Basile, Riccardo Sisto, Antonio Lioy:
A formal model of network policy analysis. RTSI 2015: 516-522 - 2014
- [c9]Cataldo Basile, Daniele Canavese, Antonio Lioy, Fulvio Valenza:
Inter-technology Conflict Analysis for Communication Protection Policies. CRiSIS 2014: 148-163 - 2013
- [c8]Cataldo Basile, Mariano Ceccato:
Towards a unified software attack model to assess software protections. ICPC 2013: 219-222 - [c7]Cataldo Basile, Daniele Canavese, Antonio Lioy, Christian Pitscheider:
Improved Reachability Analysis for Security Management. PDP 2013: 534-541 - 2012
- [j2]Cataldo Basile, Alberto Cappadonia, Antonio Lioy:
Network-Level Access Control Policy Analysis and Transformation. IEEE/ACM Trans. Netw. 20(4): 985-998 (2012) - [j1]Cataldo Basile, Stefano Di Carlo, Alberto Scionti:
FPGA-Based Remote-Code Integrity Verification of Programs in Distributed Embedded Systems. IEEE Trans. Syst. Man Cybern. Part C 42(2): 187-200 (2012) - [c6]Cataldo Basile, Antonio Lioy, Stefano Paraboschi:
The PoSecCo Security Decision Support System. ISSE 2012: 64-74 - 2010
- [c5]Cataldo Basile, Antonio Lioy, Marco Vallini:
Towards a Network-Independent Policy Specification. PDP 2010: 649-653
2000 – 2009
- 2009
- [c4]Cataldo Basile, Antonio Lioy, Salvatore Scozzi, Marco Vallini:
Ontology-Based Policy Translation. CISIS 2009: 117-126 - 2008
- [c3]Cataldo Basile, Paolo Carlo Pomi, Piervito Scaglioso:
Integrating Deployment Techniques with Monitoring: The Proactive Configuration Checker (PCC). PDP 2008: 611-615 - [c2]Cataldo Basile, Alberto Cappadonia, Antonio Lioy:
Geometric Interpretation of Policy Specification. POLICY 2008: 78-81 - 2007
- [c1]Cataldo Basile, Antonio Lioy, Gregorio Martínez Pérez, Félix J. García Clemente, Antonio Fernandez Gómez-Skarmeta:
POSITIF: A Policy-Based Security Management System. POLICY 2007: 280 - 2004
- [b1]Cataldo Basile:
Theoretical iusses and architectural design of policy-based security systems. Polytechnic University of Turin, Italy, 2004
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint