If you made any changes in Pure these will be visible here soon.

Personal profile

Quote

“The real voyage of discovery consists not in seeking new landscapes but in having new eyes.” - Marcel Proust

Research profile

Luca Allodi is an Assistant Professor in the Security Group of the Eindhoven University of Technology (TU/e). His research focuses on vulnerability laws, with a strong accent on attackers’ behavior and strategies, seeking quantitative answers to the economics of vulnerability exploitation and the management of cyber risk. His research looks for technical, economic, and strategic factors that drive vulnerability exploitation ‘in the wild’. To this aim, he investigates the dynamic optimization problems the attacker solves when engineering a new attack, the underground markets in which the attackers operate, the technology they employ, and the rates at which attacks are delivered to the final users. This research draws from several field, including computer security, economics, risk analysis, and criminology.

Luca is currently working on new ways to integrate security metrics with cyber attacks economics; in particular, he is interested in understanding if analysis of new trends in cybercrime attacks (APTs, black markets, botnet rentals...) can be exploited to improve current metrics for security.

Academic background

Luca Allodi obtained his PhD in 2015 from the University of Trento, Italy, with a thesis entitled: "Risk-based Vulnerability Management. Exploiting the economic nature of the attacker to build sound and measurable vulnerability mitigation strategies". Whilst studying for his MSc, he became interested in Social Network Dynamics, the diffusion of information within networks, and the different roles of nodes. He is also an acknowledged authoring member of the First.org SIG Team for the upcoming CVSS v3 framework (the worldwide standard-de-facto for vulnerability assessment)

Fingerprint Dive into the research topics where Luca Allodi is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Internet Engineering & Materials Science
Social Networks Mathematics
Economics Engineering & Materials Science
Risk assessment Engineering & Materials Science
Computer systems Engineering & Materials Science
Heavy Tails Mathematics
Crime Engineering & Materials Science
Association rules Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2011 2019

  • 156 Citations
  • 21 Conference contribution
  • 4 Paper
  • 3 Article
  • 1 Chapter

CARONTE: crawling adversarial resources over non-trusted, high-profile environments

Campobasso, M., Burda, P. & Allodi, L., 1 Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 433-442 10 p. 8802484

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Scalability
Servers
Resources
Data collection
Monitoring

Characterizing the redundancy of DarkWeb .onion services

Burda, P., Boot, C. & Allodi, L., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. New York: Association for Computing Machinery, Inc, 10 p. 19. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Redundancy
Law enforcement
Mirrors

Cognitive triaging of phishing attacks

van der Heijden, A. & Allodi, L., 6 May 2019, Usenix Security 2019. Usenix Association, 19 p. ARXIV 190502162v1

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
Electronic mail
Remediation
Learning systems

Privacy-conscious threat intelligence using DNSBLoom

van Rijswijk-Deij, R., Rijnders, G., Bomhoff, M. & Allodi, L., 16 May 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 98-106 9 p. 8717908

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Internet
Monitoring
Privacy
Threat
Malware
2 Downloads (Pure)

Productivity and patterns of activity in bug bounty programs: analysis of hackerone and Google vulnerability research

Luna, D., Allodi, L. & Cremonini, M., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. New York: Association for Computing Machinery, Inc, 10 p. 67

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Productivity
Fruits
Personnel

Courses

Cyberattacks Crime and Defenses

1/09/15 → …

Course

Networks and security

1/09/17 → …

Course

Student theses

Boarding a sinking ship: trust mechanisms in the underground in the face of high market platform volatility

Author: Wouters, R., 25 Nov 2019

Supervisor: Allodi, L. (Supervisor 1)

Student thesis: Master

File

Characterization of illegal dark web arms markets

Author: Ubbink, J., 25 Nov 2019

Supervisor: Allodi, L. (Supervisor 1)

Student thesis: Master

File

Cognitive triaging of phishing attacks

Author: van der Heijden, A., 28 Jan 2019

Supervisor: Allodi, L. (Supervisor 1) & Docters van Leeuwen, M. (External person) (External coach)

Student thesis: Master

Darknet markets : competitive strategies in the underground of illicit goods

Author: Evangelista, A., 24 Sep 2018

Supervisor: Allodi, L. (Supervisor 1) & Cremonini, M. (External person) (External coach)

Student thesis: Master

File

DNSSEC policies in the wild

Author: Le, P., 31 Aug 2017

Supervisor: Zannone, N. (Supervisor 1), Allodi, L. (Supervisor 2) & van Rijswijk-Deij, R. (External person) (External coach)

Student thesis: Master

File