Articles
N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols
Analysis and evaluation of several anomaly-based detection algorithms using variants of n-gram analysis on real-life environments.
RAID 2012
Efficient Padding Oracle Attacks on Cryptographic Hardware
How to exploit the encrypted key import functions of a variety of different crypto-graphic devices to reveal the imported key.
Crypto 2012
Dispensa di teoria dell’informazione
Notes for the course of information theory, written with Daniele Turato.
February 2009
Introduzione ad MPI
A brief introduction to MPI, a message-passing library for parallel computation.
December 2008
Method Invocation in Java
A detailed explanation on how Java chooses the method to invoke at runtime considering overloading and overriding, with pratical examples.
March 2008
Introduzione al funzionamento degli switch in reti Ethernet
A short introduction to Ethernet switches, including the creation of the Spanning Tree, flow control and VLANs.
December 2007
PhpGedView puts your ancestors on the Web
An overview of PhpGedView, a web-based software to create and display genealogy trees on the web.
Published on Linux.com, September 2007
Review: BackTrack 2 security live CD
My review of BackTrack, the popular Linux Distribution useful for penetration testing and forensic analysis.
Published on Linux.com, April 2007
Nine ways to combat spam
An overview of the most common techniques to combat spam.
Published on IT Manager’s Journal, December 2006