Computer and Network Security
Teaching
I have been a Professor (in charge) for the following courses at Politecnico di Torino:
​
1. Academic Year 2024/2025:
-
Information Systems Security (in English)
2. Academic Year 2023/2024:
-
Information Systems Security (in English)
​
I have been a Teaching Assistant and Adjunct Professor for the following courses at Politecnico di Torino:
1. Academic Years 2020/2021 and 2021/2022:
-
Cybersecurity (in English)
-
Information Systems Security (in English)
2. Academic Year 2019/2020:
-
Computer system security (in English)
-
Sicurezza dei sistemi informatici (in Italian)
3. Academic Year 2018/2019:
-
Computer system security (in English)
-
Sicurezza dei sistemi informatici (in Italian)
4. Academic Year 2017/2018:
-
Computer system security (in English)
5. Academic Year 2016/2017:
-
Computer system security (in English)
6. Academic Year 2015/2016:
-
Computer system security (in English)
-
Servizi ICT innovativi (in Italian)
7. Academic Year 2014/2015:
-
Computer system security (in English). For this course, Luca Ghio has taken well-detailed lecture notes published here (in Italian and English).
-
Servizi ICT innovativi (in Italian)
8. Academic Year 2013/2014:
-
Computer system security (in English)
-
Servizi ICT innovativi (in Italian)
9. Academic Year 2012/2013:
-
Computer system security (in English)
-
Innovative IT services (in English)
10. Academic Year 2011/2012:
-
Computer system security (in English)
11. Academic Year 2010/2011:
-
Computer systems security I (in English)
12. Academic Year 2009/2010:
-
Computer system security (in English)
-
Computer systems security I (in English)
13. Academic Year 2008/2009:
-
Computer system security (in English)
-
Sicurezza dei sistemi informativi I (in Italian)
14. Academic Year 2007/2008:
-
Computer system security (in English)
-
Sicurezza dei sistemi informativi I (in Italian)
15. Academic Year 2006/2007:
-
Computer system security (in English)
-
Sicurezza dei sistemi informativi I (in Italian)
16. Academic Year 2005/2006:
-
Sicurezza dei sistemi informativi I (in Italian)
17. Academic Year 2004/2005:
-
Security and architecture of distributed systems (in English)
Students Advising
Current graduate students
-
​La Spada Mariangela, Blockchain based techniques for network forensics
-
Alexandru Onica, Towards a unified and flexible platform for academic services exploiting eIDAS and eduGAIN infrastructures
-
​Virga Francesco, IoT device identification and trusted computing
-
DE SANTO MARCO, Detecting suspicious, malicious, weak TLS connections with TLS monitoring and verification tools
Past graduate students
-
MAGLIARI ANUAR ELIO (2025), DigitalCertiAnalytics: A tool for collection and analysis of X.509v3 digital certificates
-
VANELLA ALESSANDRO (2025), Evolution of Digital Identity in Europe: Experimenting with the eIDAS 2.0 Framework and the EU Digital Identity Wallet
-
BONANNELLA LORENZO ANTONIO (2024), Protezione dal phishing con VisualPhishNet: integrazione di un modello di phishing detection visuale in un sistema di security orchestration, automation and response
-
FIORILLA RICCARDO (2024), Censorship Detector: using X.509 certificates to detect censorship implemented via DNS manipulation​
-
GJEKA KEVIN (2024), Threat-TLS: An Intrusion Detection and Monitoring Tool for Mitigating TLS Attacks
-
FOIS ANDREA (2023), Analisi di sicurezza e aspetti di certificazione di una piattaforma in ambito Product Lifecycle Management
-
MORABITO GIANLUCA (2023), Integrazione di OAuth 2.0 e OpenID Connect nell'infrastruttura pan-Europea di identità digitale
-
PETRAGLIA GIUSEPPE (2023), TLS-Monitor: An Intrusion Detection-based Monitoring Tool for countering TLS Attacks
-
VERGARI COSMA ALEX (2023), Analysis and development of a personal data storage solution using decentralized and privacy-preserving technologies
-
Saadatmandi Sahar (2023), Enhanced attribute retrieval and provisioning through the eIDAS digital identity infrastructure
-
BRAVI ENRICO (2022), Use of trusted computing techniques to counteract cybersecurity attacks in critical infrastructures
-
GAMINARA ANDREA (2022), Performance and Security Evaluation of TLS, DTLS and QUIC Security Protocols
-
GIANNUZZI STEFANO (2022), Artificial Intelligence for Security Attacks Detection
-
GIROLAMI SILVIO (2022), Continuous Remote Attestation Process in the scenario of the ROOT time precision distribution network
-
PINTALDI LORENZO (2022), Implementation of a Blockchain-based Distributed PKI for IoT using Emercoin NVS and TPM 2.0
-
SIMONE MATTEO (2022), Certificate Validation and TLS Interception
-
Davide Giorda (2021), Attacks to TLS: from theory to practice
-
VECCHIO CORRADO (2021), Certificate Validation and Domain Impersonation
-
Anjum Muhammad Ali (2019), Design and development of Wi-Fi access with eIDAS for cross border authentication
-
Zanchi Mirco (2016), Integrazione di gestori degli attributi nell'architettura di identità digitale Stork 2.0
-
Volpe Marino (2014), Analisi del traffico di rete SSL/TLS
-
Zavettieri Bruno Francesco (2014), Gestione degli attributi nell'infrastruttura Stork 2.0
-
Levra Mauro (2013), Gestione dell'identità digitale nell'architettura federata Stork
-
Russo Pietro (2012), Analisi di raggiungibilità e sicurezza in reti complesse
-
Luca Albertalli (2008), Forward differentiated digital signature: uno schema inovativo per autenticazione e non ripudio in trasmissioni multicast
-
Casalino Matteo Maria (2010), Validazione di certificati a chiave pubblica X.509: TSL e OCSP
-
Corrado Emilia (2010), Gestione federata dell'identità digitale: aspetti progettuali e considerazioni pratiche
-
Mahmood Haroon (2010), Validation issues in federated identity management model
-
Ur Rehman Hafeez (2010), Using the Stork cross-border authentication system for network access control