Fabrizio Cicala
YOU?
Author Swipe
View article: NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures
NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures Open
The Zero-Trust Architecture (ZTA) security paradigm deploys comprehensive user- and resource-aware defenses both at the network's perimeter and inside the network. However, deploying a ZTA approach requires specifying and managing a large,…
View article: PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols Open
Many proximity-based tracing (PCT) protocols have been proposed and deployed to combat the spreading of COVID-19. In this article, we take a systematic approach to analyze PCT protocols. We identify a list of desired properties of a contac…
View article: Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing Open
The zero trust principle only allows authorized and authenticated actions in a computer network. A network policy satisfies the least privilege principle by minimizing the network permissions to only those needed by users and applications.…
View article: PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols Open
Many proximity-based tracing (PCT) protocols have been proposed and deployed to combat the spreading of COVID-19. In this paper, we take a systematic approach to analyze PCT protocols. We identify a list of desired properties of a contact …
View article: ATFuzzer
ATFuzzer Open
Application processors of modern smartphones use the AT interface for issuing high-level commands (or AT-commands) to the baseband processor for performing cellular network operations (e.g., placing a phone call). Vulnerabilities in this i…
View article: Opening Pandora's box through ATFuzzer
Opening Pandora's box through ATFuzzer Open
This paper focuses on checking the correctness and robustness of the AT command interface exposed by the cellular baseband processor through Bluetooth and USB. A device's application processor uses this interface for issuing high-level com…