Research Output per year
Research Output 2011 2019
CARONTE: crawling adversarial resources over non-trusted, high-profile environments
Campobasso, M., Burda, P. & Allodi, L., 1 Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 433-442 10 p. 8802484Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Characterizing the redundancy of DarkWeb .onion services
Burda, P., Boot, C. & Allodi, L., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. New York: Association for Computing Machinery, Inc, 10 p. 19. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Cognitive triaging of phishing attacks
van der Heijden, A. & Allodi, L., 6 May 2019, Usenix Security 2019. Usenix Association, 19 p. ARXIV 190502162v1Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic
Privacy-conscious threat intelligence using DNSBLoom
van Rijswijk-Deij, R., Rijnders, G., Bomhoff, M. & Allodi, L., 16 May 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 98-106 9 p. 8717908Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Productivity and patterns of activity in bug bounty programs: analysis of hackerone and Google vulnerability research
Luna, D., Allodi, L. & Cremonini, M., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. New York: Association for Computing Machinery, Inc, 10 p. 67Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Unveiling systematic biases in decisional processes: an application to discrimination discovery
Genga, L., Allodi, L. & Zannone, N., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery, Inc, p. 67-72 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
A bug bounty perspective on the disclosure of web vulnerabilities
Ruohonen, J. & Allodi, L., 2018.Research output: Contribution to conference › Paper › Academic
Economic incentives on DNSSEC deployment: time to move from quantity to quality
Le, T., Van Rijswijk-Deij, R., Allodi, L. & Zannone, N., 6 Jul 2018, IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018. Brussels: Institute of Electrical and Electronics Engineers, p. 1-9 9 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
The effect of security education and expertise on security assessments: the case of software vulnerabilities
Allodi, L., Cremonini, M., Massacci, F. & Shim, W., 1 Aug 2018.Research output: Contribution to conference › Paper › Academic
Underground economics for vulnerability risk
Allodi, L., Apr 2018, In : ;login:. 43, 1Research output: Contribution to journal › Article › Academic › peer-review
Attack potential in impact and complexity
Allodi, L. & Massacci, F., 2017, International Conference on Availability, Reliability and Security, ARES 2017, 29 August - 1 September 2017, Reggio Calabria, Italy. New York: Association for Computing Machinery, IncResearch output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Diversity: A poor man's solution to drone takeover
Davanian, A., Massacci, F. & Allodi, L., 1 Jan 2017, PECCS 2017 - Proceedings of the 7th International Joint Conference on Pervasive and Embedded Computing and Communication Systems. s.l.: SCITEPRESS-Science and Technology Publications, Lda., p. 25-34 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Economic factors of vulnerability trade and exploitation
Allodi, L., 2017, CCS'17 : Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security ; Oktober 30 - November 3, 2017, Dallas, TX, USA. Newc York: Association for Computing Machinery, Inc, p. 1483-1499 17 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Estimating the assessment difficulty of CVSS environmental metrics : an experiment
Allodi, L., Biagioni, S., Crispo, B., Labunets, K., Massacci, F. & Santos, W., 2017, Future Data and Security Engineering: 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings. Dang, T. K., Wagner, R., Küng, J., Thoai, N., Takizawa, M. & Neuhold, E. J. (eds.). Berlin: Springer, p. 23-39Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
The work-averse cyber attacker model : theory and evidence from two million attack signatures
Allodi, L., Massacci, F. & Williams, J., Jun 2017. 36 p.Research output: Contribution to conference › Paper › Academic
Towards realistic threat modeling : attack commodification, irrelevant vulnerabilities, and unrealistic assumptions
Allodi, L. & Etalle, S., 2017, SafeConfig '17 Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, p. 23-26Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Then and now: on the maturity of the cybercrime markets the lesson that black-hat marketeers learned
Allodi, L., Corradin, M. & Massacci, F., 1 Jan 2016, In : IEEE Transactions on Emerging Topics in Computing. 4, 1, p. 35-46 12 p., 7044581.Research output: Contribution to journal › Article › Academic › peer-review
The heavy tails of vulnerability exploitation
Allodi, L., 2015, Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015.Proceedings. Piessens, F., Caballero, J. & Bielova, N. (eds.). Dordrecht: Springer, p. 133-148 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8978).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
The work-averse attacker model
Allodi, L. & Massacci, F., 2015, 23rd European Conference on Information Systems, ECIS 2015, 26-29 May 2015, Munster, Germany. Association for Information Systems, 14 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Comparing vulnerability severity and exploits using case-control studies
Allodi, L. & Massacci, F., 2014, In : ACM Transactions on Information and System Security. 17, 1, p. 1-20 1.Research output: Contribution to journal › Article › Academic › peer-review
Self-organizing techniques for knowledge diffusion in dynamic social networks
Allodi, L., Chiodi, L. & Cremonini, M., 2014, Complex Networks V : Proceedings of the 5th Workshop on Complex Networks CompleNet 2014. Contucci, P., Menezes, R. & Omicini, A. (eds.). Cham: Springer, p. 75-86 12 p. (Studies in Computational Intelligence; vol. 549).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Attacker economics for Internet-scale vulnerability risk assessment
Allodi, L., 2013, USENIX LEET. USENIX, 4 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Crime pays if you are just an average hacker
Shim, W., Allodi, L. & Massacci, F., 2013, Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012. p. 62-68 7 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
How CVSS is DOSsing your patching policy (and wasting your money).
Allodi, L. & Massacci, F., 2013, BlackHat USA 2013. 24 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Professional
MalwareLab : experimentation with cybercrime attack tools
Allodi, L., Massacci, F. & Kotov, V., 2013.Research output: Contribution to conference › Paper › Academic
Quantitative assessment of risk reduction with cybercrime black market monitoring
Allodi, L., Shim, W. & Massacci, F., 2013, Proceedings - IEEE CS Security and Privacy Workshops, SPW 2013. Piscataway: Institute of Electrical and Electronics Engineers, p. 165-172 8 p. 6565246Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
A preliminary analysis of vulnerability scores for attacks in wild: The EKITS and SYM datasets
Allodi, L. & Massacci, F., 2012, BADGERS'12 - Proceedings of the Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. p. 17-24 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Modifying trust dynamics through cooperation and defection in evolving social networks
Allodi, L., Chiodi, L. & Cremonini, M., 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. p. 131-145 15 p. (Lecture Notes in Computer Science; vol. 6740).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
The asymmetric diffusion of trust between communities: simulations in dynamic social networks
Allodi, L., Chiodi, L. & Cremonini, M., 2011, Proceedings of the 2011 Winter Simulation Conference. Piscataway: Institute of Electrical and Electronics Engineers, p. 3141-3152 12 p. 6148013Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review