Articles
N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols Analysis and evaluation of several anomaly-based detection algorithms using variants of n-gram analysis on real-life environments. RAID 2012
Efficient Padding Oracle Attacks on Cryptographic Hardware How to exploit the encrypted key import functions of a variety of different crypto-graphic devices to reveal the imported key. Crypto 2012
Dispensa di teoria dell’informazione Notes for the course of information theory, written with Daniele Turato. February 2009