Follow
Cataldo Basile
Cataldo Basile
Assistant Professor at the Politecnico di Torino
Verified email at polito.it
Title
Cited by
Cited by
Year
Adding Support for Automatic Enforcement of Security Policies in NFV Networks
C Basile, F Valenza, A Lioy, DR Lopez, AP Perales
IEEE/ACM Transactions on Networking 27 (2), 707-720, 2019
652019
Virtualized Security at the Network Edge: A User-centric Approach
D Montero, M Yannuzzi, A Shaw, L Jacquin, A Pastor, R Serral-Gracia, ...
Communications Magazine, IEEE 53 (4), 176 - 186, 2015
652015
A novel approach for integrating security policy enforcement with dynamic network virtualization
C Basile, A Lioy, C Pitscheider, F Valenza, M Vallini
Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015
622015
Assessment of source code obfuscation techniques
A Viticchié, L Regano, M Torchiano, C Basile, M Ceccato, P Tonella, ...
2016 IEEE 16th International Working Conference on Source Code Analysis and …, 2016
602016
Network-Level Access Control Policy Analysis and Transformation
C Basile, A Cappadonia, A Lioy
Networking, IEEE/ACM Transactions on 20 (4), 985-998, 2012
562012
How professional hackers understand protected code while performing attack tasks
M Ceccato, P Tonella, C Basile, B Coppens, B De Sutter, P Falcarin, ...
2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017
452017
How professional hackers understand protected code while performing attack tasks
M Ceccato, P Tonella, C Basile, B Coppens, B De Sutter, P Falcarin, ...
2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017
452017
Classification and analysis of communication protection policy anomalies
F Valenza, C Basile, D Canavese, A Lioy
IEEE/ACM Transactions on Networking 25 (5), 2601-2614, 2017
442017
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
M Ceccato, P Tonella, C Basile, P Falcarin, M Torchiano, B Coppens, ...
Empirical Software Engineering 24, 240-286, 2019
402019
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
362019
FPGA-based remote-code integrity verification of programs in distributed embedded systems
C Basile, S Di Carlo, A Scionti
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012
322012
Ontology-based security policy translation
C Basile, A Lioy, S Scozzi, M Vallini
Journal of Information Assurance and Security 5 (1), 437-445, 2010
312010
Analysis of Application-Layer Filtering Policies With Application to HTTP
C Basile, A Lioy
IEEE-ACM TRANSACTIONS ON NETWORKING 23 (1), 28-41, 2015
292015
POSITIF: a policy-based security management system
C Basile, A Lioy, GM Perez, FJG Clemente, AFG Skarmeta
Policies for Distributed Systems and Networks, 2007. POLICY'07. Eighth IEEE …, 2007
292007
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks
A Viticchié, C Basile, A Avancini, M Ceccato, B Abrath, B Coppens
Proceedings of the 2016 ACM Workshop on Software PROtection, 73-84, 2016
282016
Toward cybersecurity personalization in smart homes
D Bringhenti, F Valenza, C Basile
IEEE Security & Privacy 20 (1), 45-53, 2021
242021
Assessing network authorization policies via reachability analysis
C Basile, D Canavese, C Pitscheider, A Lioy, F Valenza
Computers & Electrical Engineering 64, 110-131, 2017
242017
Towards an algebraic approach to solve policy conflicts
C Basile, A Lioy
FCS 4, 319-338, 2004
242004
A formal model of network policy analysis
F Valenza, S Spinoso, C Basile, R Sisto, A Lioy
2015 IEEE 1st International Forum on Research and Technologies for Society …, 2015
212015
Inter‐function anomaly analysis for correct SDN/NFV deployment
C Basile, D Canavese, A Lioy, C Pitscheider, F Valenza
International Journal of Network Management 26 (1), 25-43, 2016
202016
The system can't perform the operation now. Try again later.
Articles 1–20