Search Results for author: Gabriele Oligeri

Found 7 papers, 2 papers with code

Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities

no code implementations25 Oct 2023 Saeif Al-Hazbi, Ahmed Hussain, Savio Sciancalepore, Gabriele Oligeri, Panos Papadimitratos

Radio Frequency Fingerprinting (RFF) techniques promise to authenticate wireless devices at the physical layer based on inherent hardware imperfections introduced during manufacturing.

PAST-AI: Physical-layer Authentication of Satellite Transmitters via Deep Learning

1 code implementation12 Oct 2020 Gabriele Oligeri, Simone Raponi, Savio Sciancalepore, Roberto Di Pietro

Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms.

The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services

1 code implementation16 Sep 2020 Ahmed Mohamed Hussain, Gabriele Oligeri, Thiemo Voigt

We present a new machine learning-based attack that exploits network patterns to detect the presence of smart IoT devices and running services in the WiFi radio spectrum.

Long-Term Noise Characterization of Narrowband Power Line Communications

no code implementations31 Jul 2020 Simone Raponi, Javier Hernandez, Aymen Omri, Gabriele Oligeri

Noise modeling in power line communications has recently drawn the attention of researchers.

Sound of Guns: Digital Forensics of Gun Audio Samples meets Artificial Intelligence

no code implementations15 Apr 2020 Simone Raponi, Isra Ali, Gabriele Oligeri

Classifying a weapon based on its muzzle blast is a challenging task that has significant applications in various security and military fields.

General Classification

MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions

no code implementations14 Feb 2020 Omar Adel Ibrahim, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro

Overall, MAGNETO proves that unintentional magnetic emissions can be considered as a viable and reliable means to fingerprint read-only USB flash drives.

Privacy Preserving

Crypto Mining Makes Noise

no code implementations21 Oct 2019 Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro

A new cybersecurity attack (cryptojacking) is emerging, in both the literature and in the wild, where an adversary illicitly runs Crypto-clients software over the devices of unaware users.

Cryptography and Security Networking and Internet Architecture

Cannot find the paper you are looking for? You can Submit a new open access paper.