I am a passionate developer who loves working on projects that matter. I work as a PhD student at Università degli Studi di Bergamo and my research focuses on computer security, mostly investigating the integration of security features in mobile & cloud systems, policy management and privacy of outsourced data. I love to solve problems and engage with projects that require me to learn new things.
Researcher
UniBG Security Lab is the Computer Security group at Università degli Studi di Bergamo. Research interests include cloud and mobile security, with particular focus on policies and access control.
Teaching Assistant
Teaching assistant for the bachelor's courses: "Informatica (modulo di programmazione)" and "Basi di dati e Web", and the master's courses: "Advanced Data Management" and "Sicurezza dei sistemi informatici". Lectures of these courses are about:
Software Engineering
Software Engineering
Software Engineering
Technical High School
Grenoble INP - Esisar | Engineering school in cybersecure intelligent systems
This competition assesses the top scholarly security research of the year by focusing on research that has a practical impact. The paper NatiSand: Native Code Sandboxing for JavaScript Runtimes, of which I am one of the authors, was selected as one of the top 10 finalists. In short, it presents a mechanism to isolate binary programs and shared libraries in Javascript runtimes (e.g., Node.js, Deno, and Bun).
Grenoble INP - Esisar | Engineering school in cybersecure intelligent systems
This competition assesses the top scholarly security research of the year by focusing on research that has a practical impact. The paper SEApp: Bringing Mandatory Access Control to Android Apps, of which I am the first author, was selected as one of the top 10 finalists. In short, it presents a natural evolution of the Android security model with the goal of improving the security of applications and the privacy of their users.
IEEE International Conference on Pervasive Computing and Communications (PerCom)
The software artifact of the paper Scalable Distributed Data Anonymization was awarded as the best of the entire conference. It protects respondents of a dataset by obfuscating information that can disclose their identities and sensitive information. By leveraging Apache Spark, the algorithm scales to a cluster of worker nodes to guarantee performance even when working on large datasets.
Design and implemention of a SELinux solution to extend the Android's SELinux implementation to support 3rd party app's defined policy. The repository provides a set of changes to the Android Open Source Project.
A Dockerized Apache Spark-based version of Mondrian, a sanitization algorithm to achieve k-anonimity. This version of Mondrian is meant to perform sanitization over large datasets, and it is executed on an Apache Spark cluster with a varying number of executors.
A secure indexing tool enabling query execution over encrypted datasets. It preprocesses the dataset to construct client-side mappings and uses them to wrap the dataset accordingly. It shows their runtime use, by automating the upload of the encrypted dataset to PostgresSQL and Redis, and querying them.
An encrypted virtual filesystem implemented on top of Filesystem in Userspace (FUSE) that persists data using the Mix&Slice all-or-nothing transform.
A policy engine evaluating access requests based on an ODRL-like policy language. It includes a SQL front end to extract the targets needed to perform a given query and therefore automate the target identification on relational databases access requests.
A recommender system to suggest songs a user would likely add to one of her playlists based on: other tracks in the same playlist, other playlists created by the same user and other playlists created by other users.
A simplified implementation of a rule-based expert system in the medical field, with the goal to filter diseases a patient may be suffering based on the symptoms she presents. A chatbot interacts with the patient by generating questions and parsing their answers with regular expressions.
An implementation of Snake for the Windows Command Prompt.
I am passionate about code challenges since high school, when I took part at Olimpiadi Italiane di Informatica, a national event on problem solving with focus on algorithm time and space complexity. More recently I have participated to Google's Code Jam, Hash Code and Kick Start, and Reply Code Challenge.
IEEE International Conference on Communications (ICC)
IEEE International Conference on Cloud Computing Technology and Science (CLOUDCOM)
International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
ACM ASIA Conference on Computer and Communications Security (ASIACCS)
ACM ASIA Conference on Computer and Communications Security (ASIACCS)
Transactions on Big Data (Early Access)
IEEE Global Communications Conference (GLOBECOM)
International Conference on Availability, Reliability and Security (ARES)
USENIX Security Symposium (USENIX Security)
IEEE International Conference on Pervasive Computing and Communications (PerCom)
IEEE International Conference on Pervasive Computing and Communications (PerCom)
available upon request