If you made any changes in Pure these will be visible here soon.

Research Output 2011 2019

  • 156 Citations
  • 21 Conference contribution
  • 4 Paper
  • 3 Article
  • 1 Chapter
2019

CARONTE: crawling adversarial resources over non-trusted, high-profile environments

Campobasso, M., Burda, P. & Allodi, L., 1 Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 433-442 10 p. 8802484

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Scalability
Servers
Resources
Data collection
Monitoring

Characterizing the redundancy of DarkWeb .onion services

Burda, P., Boot, C. & Allodi, L., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. New York: Association for Computing Machinery, Inc, 10 p. 19. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Redundancy
Law enforcement
Mirrors
9 Downloads (Pure)

Cognitive triaging of phishing attacks

van der Heijden, A. & Allodi, L., 6 May 2019, Usenix Security 2019. Usenix Association, 19 p. ARXIV 190502162v1

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
Electronic mail
Remediation
Learning systems

Privacy-conscious threat intelligence using DNSBLoom

van Rijswijk-Deij, R., Rijnders, G., Bomhoff, M. & Allodi, L., 16 May 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 98-106 9 p. 8717908

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Internet
Monitoring
Privacy
Threat
Malware
2 Downloads (Pure)

Productivity and patterns of activity in bug bounty programs: analysis of hackerone and Google vulnerability research

Luna, D., Allodi, L. & Cremonini, M., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. New York: Association for Computing Machinery, Inc, 10 p. 67

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Productivity
Fruits
Personnel
1 Citation (Scopus)

Unveiling systematic biases in decisional processes: an application to discrimination discovery

Genga, L., Allodi, L. & Zannone, N., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery, Inc, p. 67-72 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Association rules
Regression analysis
Data mining
2018
38 Downloads (Pure)

A bug bounty perspective on the disclosure of web vulnerabilities

Ruohonen, J. & Allodi, L., 2018.

Research output: Contribution to conferencePaperAcademic

Open Access
File
4 Citations (Scopus)

Economic incentives on DNSSEC deployment: time to move from quantity to quality

Le, T., Van Rijswijk-Deij, R., Allodi, L. & Zannone, N., 6 Jul 2018, IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018. Brussels: Institute of Electrical and Electronics Engineers, p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Incentives
Economics
Operator
Recommendations
Discount
8 Downloads (Pure)

The effect of security education and expertise on security assessments: the case of software vulnerabilities

Allodi, L., Cremonini, M., Massacci, F. & Shim, W., 1 Aug 2018.

Research output: Contribution to conferencePaperAcademic

Open Access
File
Education
Information technology
Industry
Chemical analysis
1 Downloads (Pure)

Underground economics for vulnerability risk

Allodi, L., Apr 2018, In : ;login:. 43, 1

Research output: Contribution to journalArticleAcademicpeer-review

Risk vulnerability
Attack
Economics
Risk assessment
Economic risk
2017

Attack potential in impact and complexity

Allodi, L. & Massacci, F., 2017, International Conference on Availability, Reliability and Security, ARES 2017, 29 August - 1 September 2017, Reggio Calabria, Italy. New York: Association for Computing Machinery, Inc

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Computer systems
1 Citation (Scopus)

Diversity: A poor man's solution to drone takeover

Davanian, A., Massacci, F. & Allodi, L., 1 Jan 2017, PECCS 2017 - Proceedings of the 7th International Joint Conference on Pervasive and Embedded Computing and Communication Systems. s.l.: SCITEPRESS-Science and Technology Publications, Lda., p. 25-34 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Energy utilization
Drones
13 Citations (Scopus)

Economic factors of vulnerability trade and exploitation

Allodi, L., 2017, CCS'17 : Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security ; Oktober 30 - November 3, 2017, Dallas, TX, USA. Newc York: Association for Computing Machinery, Inc, p. 1483-1499 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Vulnerability
Economic factors
Exploitation
Attack
Economics
2 Citations (Scopus)

Estimating the assessment difficulty of CVSS environmental metrics : an experiment

Allodi, L., Biagioni, S., Crispo, B., Labunets, K., Massacci, F. & Santos, W., 2017, Future Data and Security Engineering: 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings. Dang, T. K., Wagner, R., Küng, J., Thoai, N., Takizawa, M. & Neuhold, E. J. (eds.). Berlin: Springer, p. 23-39

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Large scale systems
Students
Experiments
Compliance
1036 Downloads (Pure)

The work-averse cyber attacker model : theory and evidence from two million attack signatures

Allodi, L., Massacci, F. & Williams, J., Jun 2017. 36 p.

Research output: Contribution to conferencePaperAcademic

Open Access
File
1 Citation (Scopus)

Towards realistic threat modeling : attack commodification, irrelevant vulnerabilities, and unrealistic assumptions

Allodi, L. & Etalle, S., 2017, SafeConfig '17 Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, p. 23-26

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Game theory
2016
11 Citations (Scopus)
53 Downloads (Pure)

Then and now: on the maturity of the cybercrime markets the lesson that black-hat marketeers learned

Allodi, L., Corradin, M. & Massacci, F., 1 Jan 2016, In : IEEE Transactions on Emerging Topics in Computing. 4, 1, p. 35-46 12 p., 7044581.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
2015
4 Citations (Scopus)

The heavy tails of vulnerability exploitation

Allodi, L., 2015, Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015.Proceedings. Piessens, F., Caballero, J. & Bielova, N. (eds.). Dordrecht: Springer, p. 133-148 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8978).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Heavy Tails
Vulnerability
Exploitation
Internet
Sensors
3 Citations (Scopus)

The work-averse attacker model

Allodi, L. & Massacci, F., 2015, 23rd European Conference on Information Systems, ECIS 2015, 26-29 May 2015, Munster, Germany. Association for Information Systems, 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Mathematical models
Economics
2014
51 Citations (Scopus)

Comparing vulnerability severity and exploits using case-control studies

Allodi, L. & Massacci, F., 2014, In : ACM Transactions on Information and System Security. 17, 1, p. 1-20 1.

Research output: Contribution to journalArticleAcademicpeer-review

Industry

Self-organizing techniques for knowledge diffusion in dynamic social networks

Allodi, L., Chiodi, L. & Cremonini, M., 2014, Complex Networks V : Proceedings of the 5th Workshop on Complex Networks CompleNet 2014. Contucci, P., Menezes, R. & Omicini, A. (eds.). Cham: Springer, p. 75-86 12 p. (Studies in Computational Intelligence; vol. 549).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Dynamical systems
Topology
Polarization
2013
16 Downloads (Pure)

Attacker economics for Internet-scale vulnerability risk assessment

Allodi, L., 2013, USENIX LEET. USENIX, 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Risk assessment
Internet
Economics
1 Citation (Scopus)

Crime pays if you are just an average hacker

Shim, W., Allodi, L. & Massacci, F., 2013, Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012. p. 62-68 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Crime
Steganography
Complex networks
Intrusion detection
Cloud computing
52 Downloads (Pure)

How CVSS is DOSsing your patching policy (and wasting your money).

Allodi, L. & Massacci, F., 2013, BlackHat USA 2013. 24 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionProfessional

Open Access
File
Testing

MalwareLab : experimentation with cybercrime attack tools

Allodi, L., Massacci, F. & Kotov, V., 2013.

Research output: Contribution to conferencePaperAcademic

Marketing
Experiments
Testing
17 Citations (Scopus)

Quantitative assessment of risk reduction with cybercrime black market monitoring

Allodi, L., Shim, W. & Massacci, F., 2013, Proceedings - IEEE CS Security and Privacy Workshops, SPW 2013. Piscataway: Institute of Electrical and Electronics Engineers, p. 165-172 8 p. 6565246

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Monitoring
2012
22 Citations (Scopus)

A preliminary analysis of vulnerability scores for attacks in wild: The EKITS and SYM datasets

Allodi, L. & Massacci, F., 2012, BADGERS'12 - Proceedings of the Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. p. 17-24 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2011
3 Citations (Scopus)

Modifying trust dynamics through cooperation and defection in evolving social networks

Allodi, L., Chiodi, L. & Cremonini, M., 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. p. 131-145 15 p. (Lecture Notes in Computer Science; vol. 6740).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Social Networks
Deception
Emergent Behavior
Configuration
Statistics
3 Citations (Scopus)

The asymmetric diffusion of trust between communities: simulations in dynamic social networks

Allodi, L., Chiodi, L. & Cremonini, M., 2011, Proceedings of the 2011 Winter Simulation Conference. Piscataway: Institute of Electrical and Electronics Engineers, p. 3141-3152 12 p. 6148013

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Dynamic Networks
Social Networks
Simulation
Communication
Fundamental Relation