If you made any changes in Pure these will be visible here soon.

Personal profile

Quote

“The real voyage of discovery consists not in seeking new landscapes but in having new eyes.” - Marcel Proust

Research profile

Luca Allodi is an Assistant Professor in the Security Group of the Eindhoven University of Technology (TU/e). His research focuses on vulnerability laws, with a strong accent on attackers’ behavior and strategies, seeking quantitative answers to the economics of vulnerability exploitation and the management of cyber risk. His research looks for technical, economic, and strategic factors that drive vulnerability exploitation ‘in the wild’. To this aim, he investigates the dynamic optimization problems the attacker solves when engineering a new attack, the underground markets in which the attackers operate, the technology they employ, and the rates at which attacks are delivered to the final users. This research draws from several field, including computer security, economics, risk analysis, and criminology.

Luca is currently working on new ways to integrate security metrics with cyber attacks economics; in particular, he is interested in understanding if analysis of new trends in cybercrime attacks (APTs, black markets, botnet rentals...) can be exploited to improve current metrics for security.

Academic background

Luca Allodi obtained his PhD in 2015 from the University of Trento, Italy, with a thesis entitled: "Risk-based Vulnerability Management. Exploiting the economic nature of the attacker to build sound and measurable vulnerability mitigation strategies". Whilst studying for his MSc, he became interested in Social Network Dynamics, the diffusion of information within networks, and the different roles of nodes. He is also an acknowledged authoring member of the First.org SIG Team for the upcoming CVSS v3 framework (the worldwide standard-de-facto for vulnerability assessment)

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Social Networks Mathematics
Internet Engineering & Materials Science
Economics Engineering & Materials Science
Risk assessment Engineering & Materials Science
Computer systems Engineering & Materials Science
Heavy Tails Mathematics
Crime Engineering & Materials Science
Dynamic Networks Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2011 2019

  • 113 Citations
  • 18 Conference contribution
  • 4 Paper
  • 3 Article
  • 1 Chapter

CARONTE: crawling adversarial resources over non-trusted, high-profile environments

Campobasso, M., Burda, P. & Allodi, L., 2019, (Accepted/In press) Workshop on Attackers and Cyber-Crime Operations (WACCO). Institute of Electrical and Electronics Engineers (IEEE)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Scalability
Servers
Monitoring
Costs

Cognitive triaging of phishing attacks

Heijden, A. V. D. & Allodi, L., 6 May 2019, (Accepted/In press) Usenix Security 2019. Usenix Association

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
Electronic mail
Remediation
Learning systems

Unveiling systematic biases in decisional processes: an application to discrimination discovery

Genga, L., Allodi, L. & Zannone, N., 2019, (Accepted/In press) 14th ACM ASIA Conference on Computer and Communications Security. Association for Computing Machinery, Inc

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Discrimination
Association rule mining
Regression analysis
Econometrics
Model selection

A bug bounty perspective on the disclosure of web vulnerabilities

Ruohonen, J. & Allodi, L., 2018

Research output: Contribution to conferencePaperAcademic

Open Access
File
1 Citation (Scopus)

Economic incentives on DNSSEC deployment: time to move from quantity to quality

Le, T., Van Rijswijk-Deij, R., Allodi, L. & Zannone, N., 6 Jul 2018, IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018. Brussels: Institute of Electrical and Electronics Engineers (IEEE), p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Incentives
Economics
Operator
Recommendations
Discount

Courses

Cyberattacks Crime and Defenses

1/09/15 → …

Course

Networks and security

1/09/17 → …

Course

Student theses

Cognitive triaging of phishing attacks

Author: van der Heijden, A., 28 Jan 2019

Supervisor: Allodi, L. (Supervisor 1) & Docters van Leeuwen, M. (External person) (External coach)

Student thesis: Master

Darknet markets : competitive strategies in the underground of illicit goods

Author: Evangelista, A., 24 Sep 2018

Supervisor: Allodi, L. (Supervisor 1) & Cremonini, M. (External person) (External coach)

Student thesis: Master

File

DNSSEC policies in the wild

Author: Le, P., 31 Aug 2017

Supervisor: Zannone, N. (Supervisor 1), Allodi, L. (Supervisor 2) & van Rijswijk-Deij, R. (External person) (External coach)

Student thesis: Master

File

Network based ransomware detection on the Samba protocol

Author: Mülders, D., 27 Mar 2017

Supervisor: den Hartog, J. (Supervisor 1), Allodi, L. (Supervisor 2), Ozcelebi, T. (Supervisor 2) & Yüksel, O. (Supervisor 2)

Student thesis: Master

File

Privacy-friendly threat detection using DNS

Author: Rijnders, G., 31 Aug 2018

Supervisor: Allodi, L. (Supervisor 1) & van Rijswijk-Deij, R. (External person) (External coach)

Student thesis: Master

File