Gianpiero Costantino

Orcid: 0000-0002-2900-262X

Affiliations:
  • IIT-CNR


According to our database1, Gianpiero Costantino authored at least 66 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet.
ACM Comput. Surv., June, 2024

2023
Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities.
J. Comput. Virol. Hacking Tech., March, 2023

A Privacy-Preserving Solution for Intelligent Transportation Systems: Private Driver DNA.
IEEE Trans. Intell. Transp. Syst., January, 2023

Electric Vehicle Security and Privacy: A Comparative Analysis of Charging Methods.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Data Collection in Automotive: A Deep Analysis of Carmakers' Mobile App Privacy Policies.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

Vehicle Data Collection: A Privacy Policy Analysis and Comparison.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
In-Depth Exploration of ISO/SAE 21434 and Its Correlations with Existing Standards.
IEEE Commun. Stand. Mag., 2022

Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security.
Comput. Networks, 2022

Full-protocol safety analysis of CINNAMON.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem.
Proceedings of the IEEE International Conference on Trust, 2022

SECPAT: Security Patterns for Resilient Automotive E / E Architectures.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022

A Comparative Analysis of UNECE WP.29 R155 and ISO/SAE 21434.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
Secure Routine: A Routine-Based Algorithm for Drivers Identification.
CoRR, 2021

Towards the COSCA framework for "COnseptualing Secure CArs".
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, Juni 1-2, 2021., 2021

Private Drivers Identification based on users' routine.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

2020
LoSeRO: A Locality Sensitive Routing Protocol in Opportunistic Networks with Contact Profiles.
IEEE Trans. Mob. Comput., 2020

A cloud-edge based data security architecture for sharing and analysing cyber threat information.
Future Gener. Comput. Syst., 2020

EARNEST: A challenge-based intrusion prevention system for CAN messages.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Analysis of Functional Safety in a secure implementation of CAN Protocol.
Proceedings of the 18th IEEE International Conference on Industrial Informatics, 2020

CINNAMON: A Module for AUTOSAR Secure Onboard Communication.
Proceedings of the 16th European Dependable Computing Conference, 2020

2019
Are you secure in your car?: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive Services.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

Demo: CANDY CREAM.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Implementing CAN bus security by TOUCAN.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019

CANDY CREAM - Hacking Infotainment Android Systems to Command Instrument Cluster via Can Data Frame.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

TOUCAN: A proTocol tO secUre Controller Area Network.
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019

2018
CANDY: A Social Engineering Attack to Leak Information from Infotainment System.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Privacy Preserving Distributed Computation of Private Attributes for Collaborative Privacy Aware Usage Control Systems.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Improving Vehicle Safety Through a Fog Collaborative Infrastructure.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

CARS: Context Aware Reputation Systems to Evaluate Vehicles' Behaviour.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

Getmewhere: A Location-Based Privacy-Preserving Information Service.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

2017
Private mobility-cast for opportunistic networks.
Comput. Networks, 2017

Trade-off analysis of safety and security in CAN bus communication.
Proceedings of the 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems, 2017

Privacy-preserving text mining as a service.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Efficient Detection of Conflicts in Data Sharing Agreements.
Proceedings of the Information Systems Security and Privacy, 2017

Analysis of Data Sharing Agreements.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Reputation Systems to Mitigate DoS Attack in Vehicular Network.
Proceedings of the Critical Information Infrastructures Security, 2017

2016
Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

LoSeRO: a locality sensitive routing protocol in opportunistic networks.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Towards a Usage Control Based Video Surveillance Framework.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Exploiting Vehicles' Reputation to Mitigate DoS Attack.
Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn, 2016

A Lifecycle for Data Sharing Agreements: How it Works Out.
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016

Practical Privacy-Preserving Medical Diagnosis Using Homomorphic Encryption.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
A quality model for social networks populated with web services.
Serv. Oriented Comput. Appl., 2015

Design and Development of a Facebook Application to Raise Privacy Awareness.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

Location-Based Routing for Opportunistic Networks.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Privacy-Preserving Energy-Reading for Smart Meter.
Proceedings of the Inclusive Smart Cities and e-Health, 2015

Business Reputation of Social Networks of Web Services.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

2014
Investigating the Privacy versus Forwarding Accuracy Tradeoff in OpportunisticInterest-Casting.
IEEE Trans. Mob. Comput., 2014

Using Incentives to Analyze Social Web Services' Behaviors.
Proceedings of the Web Information Systems Engineering - WISE 2014 Workshops, 2014

Privacy-preserving mobility-casting in opportunistic networks.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Reputation-Based Composition of Social Web Services.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

An Improved Role-Based Access to Android Applications with JCHR.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Privacy-Preserving Interest-Cast for Android Smartphones.
ERCIM News, 2013

Enhancing DSR maintenance with power awareness.
Comput. Stand. Interfaces, 2013

Are photos on Social Networks really private?
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Towards enforcing on-the-fly policies in BYOD environments.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

How to grant less permissions to facebook applications.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

2012
Privacy-preserving interest-casting in opportunistic networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Subjective review-based reputation.
Proceedings of the ACM Symposium on Applied Computing, 2012

An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Priorities-Based Review Computation.
Proceedings of the Intelligent Web Services Meet Social Computing, 2012

2011
Remote Management of Face-to-face Written Authenticated Though Anonymous Exams.
Proceedings of the CSEDU 2011, 2011

2010
WATA - A System for Written Authenticated though Anonymous Exams.
Proceedings of the CSEDU 2010 - Proceedings of the Second International Conference on Computer Supported Education, Valencia, Spain, April 7-10, 2010, 2010

2008
Managing Reputation over MANETs.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008


  Loading...