Jul 13, 2024 • ai,
cti, dfir
This blog post introduces you to the (Gen)AI4CySec project, which highlights the practical
applications of Generative AI
(GenAI) in cybersecurity.
Sep 02, 2023 • dfir
An introductory exploration of Cryptocurrency Investigation and Forensics, with a demo on a
real-world RaaS case.
Oct 21, 2022 • cryptography,
dfir
An overview about Visual Cryptography and implementations of the main state-of-the-art techniques in
the VCrytpure open source project.
(Click on the cover image to download slides)
アマヤラ (Android Malware Analysis YARA) Lab is a project that provides a ready-to-use Jupyter Lab environment to help out with Android malware analysis using YARA rules. It automatically analyses files with your YARA rules and stores the results in a JSON file. YARA rules are checked against both the APK file itself and its content (recursively). アマヤラ Lab also gathers some information about the file(s) that you want to analyse from the Virus Total and Malware Bazaar APIs, using your own API keys. Eventually, The results include a link to Pithus which is valid only if the file was already uploaded.
AURA (AUtomotive Risk Assessment) is the name of my Master's thesis. In this work we propose a Risk Assessment exercise applied to an automotive scenario, according to the MAGERIT methodology and with the support of the PILAR commercial tool, in order to seek whether both of them may prove to be useful in the automotive field, with specific attention paid to potential threats against personal data en route from/to connected vehicles. Moreover, we also provide a regression analysis study of the algorithm implemented in Pilar for the purposes of reverse engineering, to better understand the values calculated by the tool in the demo.
VCrypture is an online service that allows you to encrypt your secret images safely using visual cryptographic algorithms. VCrypture is composed of two mainly parts: VCrypture-API and VCrypture-Web. The latter is a web server which provides the front-end as well as forwarding users' requests to the API core, whilst the former aims to perform visual cryptographic operations on images. The user can choose between four visual cryptographic algorithms: Naor-Shamir, Taghaddos-Latif, Dhiman-Kasana EVCT(N, N) and Dhiman-Kasana EVCT(K, N).
The Dynamic Source Routing (DSR) protocol is an example of reactive routing protocol for MANET networks. To work properly, DSR requires nodes to collaborate without maliciously inhibiting routing operations. In this scientific paper we present DSR Bad, a modification of the DSR module present in the ns-3 simulator, through which we aim to study and analyze two examples of non-cooperative scenarios that allow us to observe the impact suffered by the protocol and its reaction to situations not normally foreseen.
QueKey is the name of my Bachelor's thesis. The project is a cloud system for IoT Smart Lock devices placed in hotels and B&Bs. Its aim is, on the one hand, to make easy the handling of rooms and builds for the hotel managers and, on the other side, to give to their guests an easy way to lock and unlock rooms. QueKey consts of a main cloud service and of two physical devices: a RaspberryPi 3 (also other little boards are compatible with the system) and a NodeMCU with ESP8266 WiFi module.
FIAR (Four-In-A-Row) is an online multiplayer game, with a vaporwave futuristic design inspired. Developed using NodeJS (Express & Socket.IO with rooms handling) and p5.js library (Processing based). FIAR can be played on Desktops, Tablets and Smartphones, thanks to its responsive design. Indeed the canvas containing the game is created in order to fit most of the display sizes.
Please feel free to contact me
for any questions.
Don't forget to follow me on socials! I actively post cybersecurity news and
resources.