Ilaria Matteucci

Orcid: 0000-0002-5936-8470

According to our database1, Ilaria Matteucci authored at least 107 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet.
ACM Comput. Surv., June, 2024

A systematic mapping study on security for systems of systems.
Int. J. Inf. Sec., April, 2024

2023
Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities.
J. Comput. Virol. Hacking Tech., March, 2023

A Privacy-Preserving Solution for Intelligent Transportation Systems: Private Driver DNA.
IEEE Trans. Intell. Transp. Syst., January, 2023

Privacy-Preserving Data Sharing for Collaborative Analytics in Multi-Modal Transportation Systems.
ERCIM News, 2023

Electric Vehicle Security and Privacy: A Comparative Analysis of Charging Methods.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Data Collection in Automotive: A Deep Analysis of Carmakers' Mobile App Privacy Policies.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

From Hardware-Functional to Software-Defined Vehicles and their Security Issues.
Proceedings of the 21st IEEE International Conference on Industrial Informatics, 2023

Vehicle Data Collection: A Privacy Policy Analysis and Comparison.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Securing Automotive Ethernet: Design and Implementation of Security Data Link Solutions.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

Application of Secure Two-Party Computation in a Privacy-Preserving Android App.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
A Delphi study to recognize and assess systems of systems vulnerabilities.
Inf. Softw. Technol., 2022

In-Depth Exploration of ISO/SAE 21434 and Its Correlations with Existing Standards.
IEEE Commun. Stand. Mag., 2022

Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security.
Comput. Networks, 2022

Full-protocol safety analysis of CINNAMON.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem.
Proceedings of the IEEE International Conference on Trust, 2022

SECPAT: Security Patterns for Resilient Automotive E / E Architectures.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022

A Comparative Analysis of UNECE WP.29 R155 and ISO/SAE 21434.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
Secure Routine: A Routine-Based Algorithm for Drivers Identification.
CoRR, 2021

Towards the COSCA framework for "COnseptualing Secure CArs".
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, Juni 1-2, 2021., 2021

Private Drivers Identification based on users' routine.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

2020
Digital persona portrayal: Identifying pluridentity vulnerabilities in digital life.
J. Inf. Secur. Appl., 2020

EARNEST: A challenge-based intrusion prevention system for CAN messages.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Analysis of Functional Safety in a secure implementation of CAN Protocol.
Proceedings of the 18th IEEE International Conference on Industrial Informatics, 2020

Presente Digitale: An Online Education System for Teachers.
Proceedings of the Bridges and Mediation in Higher Distance Education, 2020

CINNAMON: A Module for AUTOSAR Secure Onboard Communication.
Proceedings of the 16th European Dependable Computing Conference, 2020

2019
Are you secure in your car?: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive Services.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

Addressing Security Properties in Systems of Systems: Challenges and Ideas.
Proceedings of the Software Engineering for Resilient Systems, 2019

Demo: CANDY CREAM.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Implementing CAN bus security by TOUCAN.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019

Security assessment of systems of systems.
Proceedings of the 7th International Workshop on Software Engineering for Systems-of-Systems and 13th Workshop on Distributed Software Development, 2019

CANDY CREAM - Hacking Infotainment Android Systems to Command Instrument Cluster via Can Data Frame.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

TOUCAN: A proTocol tO secUre Controller Area Network.
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019

2018
A tour of secure software engineering solutions for connected vehicles.
Softw. Qual. J., 2018

Risk analysis of Android applications: A user-centric solution.
Future Gener. Comput. Syst., 2018

Towards a Declarative Approach to Stateful and Stateless Usage Control for Data Protection.
Proceedings of the 14th International Conference on Web Information Systems and Technologies, 2018

A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement.
Proceedings of the Web Information Systems and Technologies, 2018

CANDY: A Social Engineering Attack to Leak Information from Infotainment System.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

Improving Vehicle Safety Through a Fog Collaborative Infrastructure.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

CARS: Context Aware Reputation Systems to Evaluate Vehicles' Behaviour.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018


2017
Concurrent History-based Usage Control Policies.
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017

A Quantitative Partial Model-Checking Function and Its Optimisation.
Proceedings of the LPAR-21, 2017

Efficient Detection of Conflicts in Data Sharing Agreements.
Proceedings of the Information Systems Security and Privacy, 2017

Analysis of Data Sharing Agreements.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Reputation Systems to Mitigate DoS Attack in Vehicular Network.
Proceedings of the Critical Information Infrastructures Security, 2017

2016
A novel security information and event management system for enhancing cyber security in a hydroelectric dam.
Int. J. Crit. Infrastructure Prot., 2016

Data Sharing Agreements: How to Glue Definition, Analysis and Mapping Together.
ERCIM News, 2016

Enforcement of U-XACML History-Based Usage Control Policy.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

A multi-criteria ranking of security countermeasures.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Automated adaptation via quantitative partial model checking.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Exploiting Vehicles' Reputation to Mitigate DoS Attack.
Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn, 2016

A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property.
Proceedings of the Formal Aspects of Component Software - 13th International Conference, 2016

Decomposing Global Quantitative Properties into Local Ones.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Introduction to ReSA4CI 2016.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

A Lifecycle for Data Sharing Agreements: How it Works Out.
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016

2015
Towards safer information sharing in the cloud.
Int. J. Inf. Sec., 2015

Semiring-based Specification Approaches for Quantitative Security.
Proceedings of the Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, 2015

1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and Security (TELERISE 2015).
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

There are Two Sides to Every Question - Controller Versus Attacker.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
On the Synthesis of Secure Services Composition.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Preserving Data Privacy in e-Health.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Automated Synthesis and Ranking of Secure BPMN Orchestrators.
Int. J. Secur. Softw. Eng., 2014

Closing the loop of SIEM analysis to Secure Critical Infrastructures.
CoRR, 2014

On Security Countermeasures Ranking through Threat Analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Introduction to the Safecomp 2014 Workshop: Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI 2014).
Proceedings of the Computer Safety, Reliability, and Security, 2014

Improved Automatic Maturity Assessment of Wikipedia Medical Articles - (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

Enforcing Mobile Application Security Through Probabilistic Contracts.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Introducing Probabilities in Controller Strategies.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Maturity Assessment of Wikipedia Medical Articles.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

An Expertise-Driven Authoring Tool for E-Health Data Policies.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

Definition of Data Sharing Agreements - The Case of Spanish Data Protection Law.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Remote Policy Enforcement for Trusted Application Execution in Mobile Environments.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Quantitative Evaluation of Enforcement Strategies - Position Paper.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Partial Model Checking for the Verification and Synthesis of Secure Service Compositions.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

A prototype for solving conflicts in XACML-based e-Health policies.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

2012
A framework for automatic generation of security controller.
Softw. Test. Verification Reliab., 2012

Gate automata-driven run-time enforcement.
Comput. Math. Appl., 2012

A tool for the synthesis of cryptographic orchestrators.
Proceedings of the Model-Driven Security Workshop, 2012

From Qualitative to Quantitative Enforcement of Security Policy.
Proceedings of the Computer Network Security, 2012

A Multi-criteria-Based Evaluation of Android Applications.
Proceedings of the Trusted Systems, 4th International Conference, 2012

Prioritized Execution of Privacy Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

A Formal Support for Collaborative Data Sharing.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Controlled data sharing in E-health.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

Security and Trust.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011

Elective temporal logic.
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011

Trust-Driven Policy Enforcement through Gate Automata.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Preserving security properties under refinement.
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

A Design Phase for Data Sharing Agreements.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
Security-by-Contract-with-Trust for Mobile Devices.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

CNL4DSA: a controlled natural language for data sharing agreements.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Extending Security-by-Contract with Quantitative Trust on Mobile Devices.
Proceedings of the CISIS 2010, 2010

2009
Idea: Action Refinement for Security Properties Enforcement.
Proceedings of the Engineering Secure Software and Systems, 2009

2008
Towards Information Flow Properties for Distributed Systems.
Proceedings of the 3rd International Workshop on Views On Designing Complex Architectures, 2008

Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008

A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application.
Proceedings of the Leveraging Applications of Formal Methods, 2008

A Uniform Approach to Security and Fault-Tolerance Specification and Analysis.
Proceedings of the Architecting Dependable Systems VI, 2008

Synthesis of Local Controller Programs for Enforcing Global Security Properties.
Proceedings of the The Third International Conference on Availability, 2008

2007
Synthesis of Web Services Orchestrators in a Timed Setting.
Proceedings of the Web Services and Formal Methods, 4th International Workshop, 2007

2006
Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting.
Proceedings of the First Workshop in Information and Computer Security, 2006

Through Modeling to Synthesis of Security Automata.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

An Approach for the Specification, Verification and Synthesis of Secure Systems.
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006

A Tool for the Synthesis of Controller Programs.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006


  Loading...