Deliverables
No./Title Download
D1.1 - State of the art, project concept and requirements
D1.2 - ASTRID architecture
D2.1 - Programmable Components and Context Models
D2.2 - Access and Privacy Control Architecture and Models
D2.3 - Forensic Architecture
D2.4 - First public release of the secure orchestration components
D3.2 - First report on security algorithms and tools
D3.3 - Public release of the user-oriented GUI (security awareness)
D4.1 - Validation and demonstration scenarios
D4.3 - First public demonstrator of ASTRID framework (software prototype plus running demos)
Research papers
Authors Title Publication Details Download from Zenodo
Stefan Covaci, Riccardo Rapuzzi, Matteo Repetto, Fulvio RissoA New Paradigm to Address Threats for Virtualized ServicesIEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), July, 23rd-27th, Tokyo, Japan, No pages, 978-1-5386-2667-2/0730-3157
Alessandro Carrega, Matteo Repetto, Fulvio Risso, Stefan Covaci, Anastasios Zafeiropoulos, Thanassis Giannetsos and Orazio ToscanoSituational Awareness in Virtual Networks: the ASTRID ApproachIEEE 7th International Conference on Cloud Networking (CloudNet), October, 22nd-24th, Tokyo, Japan, No pages,
Stefan Covaci, Matteo Repetto, and Fulvio RissoTowards Autonomous Security Assurance in 5G InfrastructuresIEICE Transactions on Communications, , Tokyo, Japan, No pages, 0916-8516/1745-1345
R. Bolla, A. Carrega, M. RepettoAn abstraction layer for cybersecurity context2019 International Conference on Computing, Networking and Communications (ICNC), February 18th-21st, 2019, Honolulu, HI, USA, No pages, 978-1-5386-9223-3
Matteo Bertrone, Sebastiano Miano, Fulvio Risso, Massimo TumoloAccelerating Linux Security with eBPF iptablesProceedings of the ACM SIGCOMM 2018 Conference (SIGCOMM 2018), , Budapest, Hungary, No pages,
Matteo Bertrone, Sebastiano Miano, Jianwen Pi, Fulvio Risso, Massimo TumoloToward an eBPF-based clone of iptablesNetdev 0x12, The Technical Conference on Linux Networking, , Montreal, Canada, No pages,
Sebastiano Miano, Matteo Bertrone, Fulvio Risso, Massimo Tumolo, Mauricio Vasquez BernalCreating Complex Network Services with eBPF: Experience and Lessons LearnedIEEE International Conference on High Performance Switching and Routing (HPSR 2018), , Bucarest, Romania, No pages,
N. Koutroumpouchos, C. Ntatogian, S.A. Menesidou, K. Liang, P. Gouvas, C. Xenakis, T. GiannetsosSecure Edge Computing with Lightweight Control-Flow Property-based Attestation1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (co-located with IEEE Conference on Network Softwarization), June 2019, Paris, France, No pages,
T. Giannetsos, I. KrontirisSecuring V2X Communications for the Future - Can PKI Systems offer the answer?1st Location Privacy Workshop held in conjunction with the 14th International Conference on Availability, Reliability and Security, August 2019, UK, No pages,
Constantinos Pouyioukka; Thanassis Giannetsos; Weizhi MengCrowdLED: Towards Crowd-Empowered and Privacy-Preserving Data Sharing Using Smart ContractsIFIP International Conference on Trust Management, , Copenhagen, Denmark, No pages, 978-3-030-33716-2
M. Repetto, A. Carrega, G. LamannaAn architecture to manage security services for cloud applications4th IEEE International Conference on Computing, Communication & Security (ICCCS-2019), October 10th-12th, Rome, Italy, No pages,
M. Repetto, A. Carrega, G. LamannaTowards Novel Security Architectures for Network Functions VirtualizationIEEE Conference on Network Function Virtualization and Software Defined Networks (IEEE NFV-SDN), November 12th-14th, Dallas, Texas, USA, No pages,
M. Repetto, A. Carrega, J. Yusupov, F. Valenza, F. Risso, G. LamannaAutomated Security Management for Virtual ServicesIEEE Conference on Network Function Virtualization and Software Defined Networks (IEEE NFV-SDN), November 12th-14th, Dallas, Texas, USA, No pages,
A. Carrega, M. RepettoData Log Management for Cyber-Security Programmability of Cloud Services and Applications26th ACM Conference on Computer and Communications Security, November 15th, London, UK, No pages,
D. Bringhenti, G. Marchetto, R. Sisto, F. Valenza, J. YusupovTowards a fully automated and optimized network security functions orchestrationIEEE 4th International Conference on Computing, Communications and Security (ICCCS 2019 ), , Rome, Italy, , No pages, 978-1-7281-0875-9
F. Valenza, S. Spinoso, R. SistoFormally specifying and checking policies and anomalies in service function chainingJournal of Network and Computer Applications, 146, USA, No pages,
G. Marchetto, R. Sisto, F. Valenza, J. YusupovA Framework for Verification-Oriented User-Friendly Network Function ModelingIEEE Access, vol. 7, USA, No pages, 2169-3536
S. Miano, R. Doriguzzi-Corin, F. Risso, D. Siracusa, R. SommeseIntroducing SmartNICs in Server-Based Data Plane Processing: The DDoS Mitigation Use Case, vol. 7, USA, No pages, 2169-3536
S. Miano, M. Bertrone, F. Risso, M. VASQUEZ BERNAL, Y. Lu, J. Pi, A. ShaikhA Service-Agnostic Software Framework for Fast and Efficient In-Kernel Network Services15th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS '19), September 2019, Cambridge, UK, No pages,
Whitepapers
Title Download
Beyond the security perimeter model: Shedding light on cloud services
Other
Coming soon...