• Hong S, Kim B and Mannan M. Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural Networks. Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. (5000-5002).

    https://doi.org/10.1145/3658644.3691399

  • Briongos S, Karame G, Soriente C and Wilde A. No Forking Way: Detecting Cloning Attacks on Intel SGX Applications. Proceedings of the 39th Annual Computer Security Applications Conference. (744-758).

    https://doi.org/10.1145/3627106.3627187

  • Berlato S, Morelli U, Carbone R and Ranise S. End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies. Data and Applications Security and Privacy XXXVI. (236-255).

    https://doi.org/10.1007/978-3-031-10684-2_14

  • Berlato S, Carbone R, Lee A and Ranise S. (2021). Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud. ACM Transactions on Privacy and Security. 25:1. (1-37). Online publication date: 28-Feb-2022.

    https://doi.org/10.1145/3474056

  • Nishide T. One-Time Delegation of Unlinkable Signing Rights and Its Application. Provable and Practical Security. (103-123).

    https://doi.org/10.1007/978-3-030-62576-4_6

  • You W and Chen B. Proofs of Ownership on Encrypted Cloud Data via Intel SGX. Applied Cryptography and Network Security Workshops. (400-416).

    https://doi.org/10.1007/978-3-030-61638-0_22