top of page
Teaching

I have been a Professor (in charge) for the following courses at Politecnico di Torino:

​

1. Academic Year 2024/2025:

  • Information Systems Security (in English)

2. Academic Year 2023/2024:

  • Information Systems Security (in English)

​

I have been a Teaching Assistant and Adjunct Professor for the following courses at Politecnico di Torino:

1. Academic Years 2020/2021 and 2021/2022:

  • Cybersecurity (in English)

  • Information Systems Security (in English)

2. Academic Year 2019/2020:

  • Computer system security (in English)

  • Sicurezza dei sistemi informatici (in Italian)

3. Academic Year 2018/2019:

  • Computer system security (in English)

  • Sicurezza dei sistemi informatici (in Italian)

4. Academic Year 2017/2018:

  • Computer system security (in English)

5. Academic Year 2016/2017:

  • Computer system security (in English)

6. Academic Year 2015/2016:

  • Computer system security (in English)

  • Servizi ICT innovativi (in Italian)

7. Academic Year 2014/2015:

  • Computer system security (in English). For this course, Luca Ghio has taken well-detailed lecture notes published here (in Italian and English).

  • Servizi ICT innovativi (in Italian)

8. Academic Year 2013/2014:

  • Computer system security (in English)

  • Servizi ICT innovativi (in Italian)

9Academic Year 2012/2013:

  • Computer system security (in English)

  • Innovative IT services (in English)

10. Academic Year 2011/2012:

  • Computer system security (in English)

11. Academic Year 2010/2011:

  • Computer systems security I (in English)

12. Academic Year 2009/2010:

  • Computer system security (in English)

  • Computer systems security I (in English)

13. Academic Year 2008/2009:

  • Computer system security (in English)

  • Sicurezza dei sistemi informativi I (in Italian)

14. Academic Year 2007/2008:

  • Computer system security (in English)

  • Sicurezza dei sistemi informativi I (in Italian)

15. Academic Year 2006/2007:

  • Computer system security (in English)

  • Sicurezza dei sistemi informativi I (in Italian)

16. Academic Year 2005/2006:

  • Sicurezza dei sistemi informativi I (in Italian)

17. Academic Year 2004/2005:

  • Security and architecture of distributed systems (in English)

Students Advising

Current graduate students 

  • ​La Spada Mariangela, Blockchain based techniques for network forensics

  • Alexandru Onica, Towards a unified and flexible platform for academic services exploiting eIDAS and eduGAIN infrastructures

  • ​Virga Francesco, IoT device identification and trusted computing

  • DE SANTO MARCO, Detecting suspicious, malicious, weak TLS connections with TLS monitoring and verification tools

Past graduate students

  • MAGLIARI ANUAR ELIO (2025), DigitalCertiAnalytics: A tool for collection and analysis of X.509v3 digital certificates

  • VANELLA ALESSANDRO (2025), Evolution of Digital Identity in Europe: Experimenting with the eIDAS 2.0 Framework and the EU Digital Identity Wallet

  • BONANNELLA LORENZO ANTONIO (2024), Protezione dal phishing con VisualPhishNet: integrazione di un modello di phishing detection visuale in un sistema di security orchestration, automation and response

  • FIORILLA RICCARDO (2024), Censorship Detector: using X.509 certificates to detect censorship implemented via DNS manipulation​

  • GJEKA KEVIN (2024), Threat-TLS: An Intrusion Detection and Monitoring Tool for Mitigating TLS Attacks

  • FOIS ANDREA (2023), Analisi di sicurezza e aspetti di certificazione di una piattaforma in ambito Product Lifecycle Management

  • MORABITO GIANLUCA (2023), Integrazione di OAuth 2.0 e OpenID Connect nell'infrastruttura pan-Europea di identità digitale

  • PETRAGLIA GIUSEPPE (2023), TLS-Monitor: An Intrusion Detection-based Monitoring Tool for countering TLS Attacks

  • VERGARI COSMA ALEX (2023), Analysis and development of a personal data storage solution using decentralized and privacy-preserving technologies

  • Saadatmandi Sahar (2023), Enhanced attribute retrieval and provisioning through the eIDAS digital identity infrastructure

  • BRAVI ENRICO (2022), Use of trusted computing techniques to counteract cybersecurity attacks in critical infrastructures

  • GAMINARA ANDREA (2022), Performance and Security Evaluation of TLS, DTLS and QUIC Security Protocols

  • GIANNUZZI STEFANO (2022), Artificial Intelligence for Security Attacks Detection

  • GIROLAMI SILVIO (2022), Continuous Remote Attestation Process in the scenario of the ROOT time precision distribution network

  • PINTALDI LORENZO (2022), Implementation of a Blockchain-based Distributed PKI for IoT using Emercoin NVS and TPM 2.0

  • SIMONE MATTEO (2022), Certificate Validation and TLS Interception

  • Davide Giorda (2021), Attacks to TLS: from theory to practice

  • VECCHIO CORRADO (2021), Certificate Validation and Domain Impersonation

  • Anjum Muhammad Ali (2019), Design and development of Wi-Fi access with eIDAS for cross border authentication

  • Zanchi Mirco (2016), Integrazione di gestori degli attributi nell'architettura di identità digitale Stork 2.0

  • Volpe Marino (2014), Analisi del traffico di rete SSL/TLS

  • Zavettieri Bruno Francesco (2014), Gestione degli attributi nell'infrastruttura Stork 2.0

  • Levra Mauro (2013), Gestione dell'identità digitale nell'architettura federata Stork

  • Russo Pietro (2012), Analisi di raggiungibilità e sicurezza in reti complesse

  • Luca Albertalli (2008), Forward differentiated digital signature: uno schema inovativo per autenticazione e non ripudio in trasmissioni multicast

  • Casalino Matteo Maria (2010), Validazione di certificati a chiave pubblica X.509: TSL e OCSP

  • Corrado Emilia (2010), Gestione federata dell'identità digitale: aspetti progettuali e considerazioni pratiche

  • Mahmood Haroon (2010), Validation issues in federated identity management model

  • Ur Rehman Hafeez (2010), Using the Stork cross-border authentication system for network access control

© Diana Berbecaru. Created with Wix.com

    bottom of page