Articles
N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols
Analysis and evaluation of several anomaly-based detection algorithms using variants of n-gram analysis on real-life environments.
RAID 2012
Efficient Padding Oracle Attacks on Cryptographic Hardware
How to exploit the encrypted key import functions of a variety of different crypto-graphic devices to reveal the imported key.
Crypto 2012
Dispensa di teoria dell’informazione
Notes for the course of information theory, written with Daniele Turato.
February 2009