Deliverables
No./Title Download
D1.1 - State of the art, project concept and requirements
D1.2 - ASTRID architecture
D1.3 - Final ASTRID architecture
D2.1 - Programmable Components and Context Models
D2.2 - Access and Privacy Control Architecture and Models
D2.3 - Forensic Architecture
D2.4 - First public release of the secure orchestration components
D2.5 - Final public release of the secure orchestration components
D2.6 - Data handling: collection, fusion, harmonization
D2.7 - Secure orchestration infrastructure
D3.2 - First report on security algorithms and tools
D3.3 - Public release of the user-oriented GUI (security awareness)
D3.6 - Final report on security algorithms and tools
D4.1 - Validation and demonstration scenarios
D4.3 - First public demonstrator of ASTRID framework (software prototype plus running demos)
D4.4 - Initial assessment of the ASTRID project
D4.6 - Final public demonstrator of ASTRID framework
D4.7 - Final assessment of the ASTRID project
Research papers
Authors Title Publication Details Download from Zenodo
Stefan Covaci, Riccardo Rapuzzi, Matteo Repetto, Fulvio RissoA New Paradigm to Address Threats for Virtualized ServicesIEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), July, 23rd-27th, Tokyo, Japan, No pages, 978-1-5386-2667-2/0730-3157
Alessandro Carrega, Matteo Repetto, Fulvio Risso, Stefan Covaci, Anastasios Zafeiropoulos, Thanassis Giannetsos and Orazio ToscanoSituational Awareness in Virtual Networks: the ASTRID ApproachIEEE 7th International Conference on Cloud Networking (CloudNet), October, 22nd-24th, Tokyo, Japan, No pages,
Stefan Covaci, Matteo Repetto, and Fulvio RissoTowards Autonomous Security Assurance in 5G InfrastructuresIEICE Transactions on Communications, , Tokyo, Japan, No pages, 0916-8516/1745-1345
R. Bolla, A. Carrega, M. RepettoAn abstraction layer for cybersecurity context2019 International Conference on Computing, Networking and Communications (ICNC), February 18th-21st, 2019, Honolulu, HI, USA, No pages, 978-1-5386-9223-3
Matteo Bertrone, Sebastiano Miano, Fulvio Risso, Massimo TumoloAccelerating Linux Security with eBPF iptablesProceedings of the ACM SIGCOMM 2018 Conference (SIGCOMM 2018), , Budapest, Hungary, No pages,
Matteo Bertrone, Sebastiano Miano, Jianwen Pi, Fulvio Risso, Massimo TumoloToward an eBPF-based clone of iptablesNetdev 0x12, The Technical Conference on Linux Networking, , Montreal, Canada, No pages,
Sebastiano Miano, Matteo Bertrone, Fulvio Risso, Massimo Tumolo, Mauricio Vasquez BernalCreating Complex Network Services with eBPF: Experience and Lessons LearnedIEEE International Conference on High Performance Switching and Routing (HPSR 2018), , Bucarest, Romania, No pages,
N. Koutroumpouchos, C. Ntatogian, S.A. Menesidou, K. Liang, P. Gouvas, C. Xenakis, T. GiannetsosSecure Edge Computing with Lightweight Control-Flow Property-based Attestation1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (co-located with IEEE Conference on Network Softwarization), June 2019, Paris, France, No pages,
T. Giannetsos, I. KrontirisSecuring V2X Communications for the Future - Can PKI Systems offer the answer?1st Location Privacy Workshop held in conjunction with the 14th International Conference on Availability, Reliability and Security, August 2019, UK, No pages,
Sebastiano Miano, Matteo Bertrone, Fulvio Risso, Mauricio V?squez Bernal, Yunsong Lu, Jianwen PiSecuring Linux with a Faster and Scalable IptablesACM Computer Communication Review, vol. 49 (3), United States, No pages, 0146-4833
Constantinos Pouyioukka; Thanassis Giannetsos; Weizhi MengCrowdLED: Towards Crowd-Empowered and Privacy-Preserving Data Sharing Using Smart ContractsIFIP International Conference on Trust Management, , Copenhagen, Denmark, No pages, 978-3-030-33716-2
M. Repetto, A. Carrega, G. LamannaAn architecture to manage security services for cloud applications4th IEEE International Conference on Computing, Communication & Security (ICCCS-2019), October 10th-12th, Rome, Italy, No pages,
M. Repetto, A. Carrega, G. LamannaTowards Novel Security Architectures for Network Functions VirtualizationIEEE Conference on Network Function Virtualization and Software Defined Networks (IEEE NFV-SDN), November 12th-14th, Dallas, Texas, USA, No pages,
M. Repetto, A. Carrega, J. Yusupov, F. Valenza, F. Risso, G. LamannaAutomated Security Management for Virtual ServicesIEEE Conference on Network Function Virtualization and Software Defined Networks (IEEE NFV-SDN), November 12th-14th, Dallas, Texas, USA, No pages,
A. Carrega, M. RepettoData Log Management for Cyber-Security Programmability of Cloud Services and Applications26th ACM Conference on Computer and Communications Security, November 15th, London, UK, No pages,
Alessandro Carrega, Luca Caviglione, Matteo Repetto and Marco ZuppelliProgrammable Data Gathering for Detecting StegomalwareIEEE International Conference on Network Softwarization (NetSoft 2020) - 2nd International Workshop on Cyber-Security Threats, Trust and Privacy management in Software-defined and Virtualized Infrastructures , July, 3rd, Ghent, Belgium , No pages,
D. Bringhenti, G. Marchetto, R. Sisto, F. Valenza, J. YusupovTowards a fully automated and optimized network security functions orchestrationIEEE 4th International Conference on Computing, Communications and Security (ICCCS 2019 ), , Rome, Italy, , No pages, 978-1-7281-0875-9
F. Valenza, S. Spinoso, R. SistoFormally specifying and checking policies and anomalies in service function chainingJournal of Network and Computer Applications, 146, USA, No pages,
G. Marchetto, R. Sisto, F. Valenza, J. YusupovA Framework for Verification-Oriented User-Friendly Network Function ModelingIEEE Access, vol. 7, USA, No pages, 2169-3536
S. Miano, R. Doriguzzi-Corin, F. Risso, D. Siracusa, R. SommeseIntroducing SmartNICs in Server-Based Data Plane Processing: The DDoS Mitigation Use Case, vol. 7, USA, No pages, 2169-3536
S. Miano, M. Bertrone, F. Risso, M. VASQUEZ BERNAL, Y. Lu, J. Pi, A. ShaikhA Service-Agnostic Software Framework for Fast and Efficient In-Kernel Network Services15th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS '19), September 2019, Cambridge, UK, No pages,
O. R. Sanchez, M. Repetto, A. Carrega, R. Bolla, and J. F. PajoFeature Selection Evaluation towards a Lightweight Deep Learning DDoS DetectorIEEE International Conference on Communications, June 14th-23rd, 2021, Montreal, Canada, No pages,
M. Repetto, A. Carrega, G. Lamanna, J. Yusupov, O. Toscano, G. Bruno, M. Nuovo, M. CappelliLeveraging the 5G architecture to mitigate amplification attacksIEEE International Conference on Network Softwarization (NetSoft 2021) - 3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), July 2nd, 2021, Tokyo, Japan, No pages,
O. R. Sanchez, M. Repetto, A. Carrega, R. BollaEvaluating ML-based DDoS Detection with Grid Search Hyperparameter OptimizationIEEE International Conference on Network Softwarization (NetSoft 2021) - 3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), July 2nd, 2021, Tokyo, Japan, No pages,
L. Caviglione, M. Zuppelli, W. Mazurczyk, A. Shaffhauser, M. RepettoCode Augmentation for Detecting Covert Channels Targeting the IPv6 Flow LabelIEEE International Conference on Network Softwarization - 3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), July 2nd, 2021, Tokyo, Japan, No pages,
M. Repetto, L. Caviglione, M. Zuppellibccstego: A Framework for Investigating Network Covert ChannelsThe 16th International Conference on Availability, Reliability and Security (ARES 2021) - The 5th International Workshop on Criminal Use of Information Hiding (CUING 2021), August, 16th-20th, 2021, All digital conference, No pages,
F. Valenza, M. Repetto, S. ShiaelesGuest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systemsComputer Networks, Vol. 193, July 2021, Netherlands, No pages, ISSN: 13891286
M. Repetto, A. Carrega, R. RapuzziAn architecture to manage security operations for digital service chainsFuture Generation Computer Systems, Volume 115, February 2021, Netherlands, No pages, ISSN 0167739X
L. Caviglione, W. Mazurczyk, M. Repetto, A. Schaffhauser, M. ZuppelliKernel-level tracing for detecting stegomalware and covert channels in Linux environmentsComputer Networks, Volume 191, May 2021, Netherlands, No pages, ISSN 13891286
M. Repetto, D. Striccoli, G. Piro, A. Carrega, G. Boggia, R. BollaAn autonomous cybersecurity framework for next-generation digital service chainsJournal of Network and Systems Management, Vol. 29, Art. no. 37, May 2021, United States, No pages, ISSN 10647570, 15737705
D. Bringhenti, G. Marchetto,R. Sisto, F. Valenza, J. YusupovIntroducing programmability and automation in the synthesis of virtual firewall rules 6th IEEE Conference on Network Softwarization (NetSoft2020), , Ghent, Belgium, No pages, 978-1-7281-5684-2
D. Bringhenti, G. Marchetto, R. Sisto, F. ValenzaShort Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks Proceedings of the 2nd Workshop on Cyber-Security Arms Race (CYSARM'20), , Virtual Event, No pages,
D. Bringhenti, G. Marchetto, R. Sisto, F. Valenza, J. YusupovAutomated optimal firewall orchestration and configuration in virtualized networks IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), , Budapest, Hungary, No pages, 978-1-7281-4973-8
D. Papamartzivanos, S. Menesidou, P. Gouvas, T. GiannetsosTowards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution TracingIEEE MeditCom 2021, , Greece, No pages,
Heini Bergsson Debes, Thanassis Giannetsos, Ioannis KrontirisBLINDTRUST: Oblivious Remote Attestation for Secure Service Function ChainsDCOSS 2021, , Greece, No pages,
Benjamin Larsen,Thanassis Giannetsos, Ioannis Krontiris, Kenneth GoldmanDirect Anonymous Attestation on the Road: Efficient and Privacy-Preserving Revocation in C-ITSWiSec 2021, , Abu Dhabi, No pages,
Shahzana Liaqat, Adnan Akhunzada, Fatema Sabeen Shaikh, Thanassis Giannetsos, Mian Ahmad JanSDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT)Elsevier, , Elsevier, No pages,
Adnan Akhunzada, Saif ul Islam, Sherali ZeadallySecuring Cyberspace of Future Smart Cities with 5G TechnologiesIEEE Network, , IEEE, No pages,
FaizanMurtaza, Adnan Akhunzada, Saif ulI slam, Jalil Boudjadard, Rajkumar BuyyaQoS-aware service provisioning in fog computingScience Direct, , Science Direct, No pages,
Soneila Khan, Adnan AkhunzadaA hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT)Science Direct, , Science Direct, No pages,
Jahanzaib Malik, Adnan Akhunzada, Iram Bibi, Muhammad Imran, Arslan Musaddiq, Sung Won KimHybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDNIEEE Access, , IEEE, No pages,
Iram Bibi, Adnan Akhunzada, Jahanzaib Malik, Javed Iqbal, Arslan Musaddiq, Sungwon KimA Dynamic DL-Driven Architecture to Combat Sophisticated Android MalwareIEEE Access, , IEEE, No pages,
Whitepapers
Title Download
Beyond the security perimeter model: Shedding light on cloud services
Other