Cataldo Basile

Orcid: 0000-0002-8016-1490

According to our database1, Cataldo Basile authored at least 47 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Security at the Edge for Resource-Limited IoT Devices.
Sensors, January, 2024

2023
Design, implementation, and automation of a risk management approach for man-at-the-End software protection.
Comput. Secur., September, 2023

A Model for Automated Cybersecurity Threat Remediation and Sharing.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

An expert system for automatic cyber risk assessment and its AI-based improvements.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
Toward Cybersecurity Personalization in Smart Homes.
IEEE Secur. Priv., 2022

Encryption-agnostic classifiers of traffic originators and their application to anomaly detection.
Comput. Electr. Eng., 2022

A model of capabilities of Network Security Functions.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

2020
Empirical assessment of the effort needed to attack programs protected with client/server code splitting.
Empir. Softw. Eng., 2020

Software Protection as a Risk Analysis Process.
CoRR, 2020

2019
Adding Support for Automatic Enforcement of Security Policies in NFV Networks.
IEEE/ACM Trans. Netw., 2019

A meta-model for software protections and reverse engineering attacks.
J. Syst. Softw., 2019

Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge.
Empir. Softw. Eng., 2019

Securing Soft IP Cores in FPGA based Reconfigurable Mobile Heterogeneous Systems.
CoRR, 2019

2018
On the impossibility of effectively using likely-invariants for software attestation purposes.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems.
Proceedings of the IEEE International Conference on Automation, 2018

2017
Classification and Analysis of Communication Protection Policy Anomalies.
IEEE/ACM Trans. Netw., 2017

Assessing network authorization policies via reachability analysis.
Comput. Electr. Eng., 2017

Estimating Software Obfuscation Potency with Artificial Neural Networks.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Towards Optimally Hiding Protected Assets in Software Applications.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

How professional hackers understand protected code while performing attack tasks.
Proceedings of the 25th International Conference on Program Comprehension, 2017

Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
Inter-function anomaly analysis for correct SDN/NFV deployment.
Int. J. Netw. Manag., 2016

Towards Automatic Risk Analysis and Mitigation of Software Applications.
Proceedings of the Information Security Theory and Practice, 2016

A Reference Architecture for Software Protection.
Proceedings of the 13th Working IEEE/IFIP Conference on Software Architecture, 2016

Assessment of Source Code Obfuscation Techniques.
Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, 2016

Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

The ASPIRE Framework for Software Protection.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

2015
Analysis of Application-Layer Filtering Policies With Application to HTTP.
IEEE/ACM Trans. Netw., 2015

Virtualized security at the network edge: a user-centric approach.
IEEE Commun. Mag., 2015

A formal model of network policy analysis.
Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2015

A Formal Model of Policy Reconciliation.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

A novel approach for integrating security policy enforcement with dynamic network virtualization.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Automatic Discovery of Software Attacks via Backward Reasoning.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Towards the Dynamic Provision of Virtualized Security Services.
Proceedings of the Cyber Security and Privacy, 2015

2014
Inter-technology Conflict Analysis for Communication Protection Policies.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
Improved Reachability Analysis for Security Management.
Proceedings of the 21st Euromicro International Conference on Parallel, 2013

Towards a unified software attack model to assess software protections.
Proceedings of the IEEE 21st International Conference on Program Comprehension, 2013

2012
FPGA-Based Remote-Code Integrity Verification of Programs in Distributed Embedded Systems.
IEEE Trans. Syst. Man Cybern. Part C, 2012

Network-Level Access Control Policy Analysis and Transformation.
IEEE/ACM Trans. Netw., 2012

The PoSecCo Security Decision Support System.
Proceedings of the ISSE 2012, 2012

2010
Towards a Network-Independent Policy Specification.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

2009
Ontology-Based Policy Translation.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
Geometric Interpretation of Policy Specification.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Integrating Deployment Techniques with Monitoring: The Proactive Configuration Checker (PCC).
Proceedings of the 16th Euromicro International Conference on Parallel, 2008

2007
POSITIF: A Policy-Based Security Management System.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

2004
Theoretical iusses and architectural design of policy-based security systems.
PhD thesis, 2004


  Loading...