CCS 2023 Top Reviewer
Best paper award at VizSec 2023 for the paper E. Coppa, A. Izzillo, R. Lazzeretti, S. lenti "FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns" [C32]
Test of Time Paper Honourable Mention in the category of Multimedia Security and Privacy for the paper M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. D. Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, A. Piva``Privacy-preserving fingercode authentication'' [C6]
IET Biometrics best paper award 2021 for the paper M. Barni, G. Droandi, R. Lazzeretti, T. Pignata: ``SEMBA: secure multi-biometric authentication'' [J8]
IEEE 2023 Best Paper Award from IEEE Security & Privacy for the paper D Cayir, A Acar, R Lazzeretti, M Angelini, M Conti, S Uluagac “Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices” [J15]
[J17] H Oz, DC D’Elia, GS Tuncay, A Acar, R Lazzeretti, S Uluagac "With great power comes great responsibility: Security and privacy issues of modern browser application programming interfaces" in IEEE Security & Privacy 2024
[J16] E Bardhi, M Conti, R Lazzeretti "Is AI a Trick or T(h)reat for Securing Programmable Data Planes?" in IEEE Network 2024
[J15] D Cayir, A Acar, R Lazzeretti, M Angelini, M Conti, S Uluagac "Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices" In IEEE Security and Privacy magazine, 2023
[J14] A Agiollo, E Bardhi, M Conti, N Dal Fabbro, R Lazzeretti "Anonymous Federated Learning via Named-Data Networking" Future Generation Computer Systems, Elsevier, 2023
[J13] E Bardhi, M Conti, R Lazzeretti, E Losiouk "Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey", IEEE Communications Surveys & Tutorials, 2023
[J12] Y Mekdad, A Aris, L Babun, A El Fergougui, M Conti, R Lazzeretti, S. Uluagak "A survey on security and privacy issues of UAVs" Computer Networks 224, 109626, Elsevier 2023
[J11] Y Mekdad, A Aris, A Acar, M Conti, R Lazzeretti, AE Fergougui, S Uluagac "A comprehensive security and performance assessment of UAV authentication schemes" Security and Privacy, Wiley, 2023
[J10] G Laurenza, R Lazzeretti, L Mazzotti "Malware triage for early identification of Advanced Persistent Threat activities" ACM Digital Threats: Research and Practice 1 (3), 1-17, 2020
[J9] M. Ambrosin, M. Conti, R. Lazzeretti, M.M. Rabbani, S. Ranise, "Collective remote attestation at the Internet of Things scale: State-of-the-art and future challenges". In IEEE Communications Surveys & Tutorials, 22(4), 2447-2461, 2020.
[J8] M. Barni, G. Droandi, R. Lazzeretti, T. Pignata. "SEMBA: SEcure Multi-Biometric Authentication" In IET Biometrics 8 (6), 411 - 421
[J7] Y. Luo, S. Cheung, R. Lazzeretti, T. Pignata, and M. Barni. “Anonymous subject identification and privacy information management in video surveillance” In Springer International Journal of Information Security (IJIS) 2018. IF(2017): 1.915
[J6] M. Ambrosin, P. Braca, M. Conti, and R. Lazzeretti. “ODIN: Obfuscation-based privacy preserving consensus algorithm for Decentralized Information fusion in smart device Networks”. ACM Transactions on Internet Technology (TOIT) 2017. IF(2017): 1.489
[J5] P. Braca, R. Lazzeretti, S. Marano, and V. Matta. “Learning with privacy in consensus + obfuscation.” IEEE Signal Processing Letters (SPL) 2016. IF(2015): 1.661
[J4] R. Lazzeretti, T. Pignata, and M. Barni. “Piecewise function approximation with private data”. In IEEE Transactions on Information Forensics and Security (TIFS) 2016. IF(2016): 4.332
[J3] M. Barni, G. Droandi, and R. Lazzeretti. “Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing”. In IEEE Signal Processing Magazine (SPM) 2015. IF(2015): 6.671
[J2] R. Lazzeretti and M. Barni. “Private Computing with Garbled Circuits [Application Corner]”. In IEEE Signal Processing Magazine (SPM) 2013. IF(2013): 4.481
[J1] M. Barni, P. Failla, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider. “Privacy-preserving ECG classification with branching programs and neural networks”. In IEEE Transactions on Information Forensics and Security (TIFS) 2011. IF(2011): 1.340
[C35] D Cayir, RM Aburas, R Lazzeretti, M Angelini, A Acar, M Conti, ZB Celik, S Uluagak "Speak Up, I’m Listening: Extracting Speech from Zero-Permission VR Sensors" in Network and Distributed System Security (NDSS) Symposium 2025
[C34] E Liberati, A Visintin, R Lazzeretti, M Conti, S Uluagac "X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices" in International Conference on Applied Cryptography and Network Security (ACNS) 2024
[C33] L Binosi, P Mazzini, A Sanna, M Carminati, G Giacinto, R Lazzeretti, S Zanero, M Polino, E Coppa, D Maiorca "Do you Trust your Device? Open Challenges in IoT Security Analysis" in International Conference on Security and Cryptography (SECRYPT), 2024
[C32] E. Coppa, A. Izzillo, R. Lazzeretti, S. lenti "FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns" 20th Symposium on Visualization for Cyber Security (VizSec), IEEE 2023
[C31] A Agiollo, E Bardhi, M Conti, R Lazzeretti, E Losiouk, A Omicini "GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks" 8th European Symposium on Security and Privacy (EuroS&P), 615-630, IEEE, 2023
[C30] E Bardhi, M Conti, R Lazzeretti, E Losiouk, A Taffal "Sim2Testbed Transfer: NDN Performance Evaluation" Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES), ACM 2022
[C29] E Bardhi, M Conti, R Lazzeretti, E Losiouk "ICN PATTA: ICN privacy attack through traffic analysis", IEEE 46th Conference on Local Computer Networks (LCN), 2021
[C28] S Frontera, R Lazzeretti "Bloom Filter based Collective Remote Attestation for Dynamic Networks", Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES), ACM 2021
[C27] G. Laurenza, R. Lazzeretti. "dAPTaset: A comprehensive mapping of APT-related data." In Computer Security: ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC. Springer, 2020.
[C26] M. Conti, A. Compagno, R. Lazzeretti, and S. Munari. "GATE and FENCE: Geo-Blocking Protocols for Named Data Networking". In Conference on Local Computer Networks (LCN). IEEE, 2018.
[C25] A. Capossele, M. Conti, A. Gaglione, R. Lazzeretti, Missier P., and M. Nati. "Leveraging blockchain to enable next-generation smart-health applications". In Forum on Research and Technologies for Society and Industry (RTSI). IEEE, 2018.
[C24] M. Ambrosin, M. Conti, R. Lazzeretti, M. Rabbani, and S. Ranise. "Pads: Practical attestation for highly dynamic swarm topologies". In International Workshop on Secure Internet of Things (SIoT), colocated with ESORICS 2018.
[C23] M. Conti, D. Lain, R. Lazzeretti, G. Lovisotto, and W. Quattrociocchi. “It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features”. In IEEE Workshop on Information Forensic and Security (WIFS), Special session on Social networks and user-generated content verification, 2017.
[C22] M. Di Pirro, M. Conti, and R. Lazzeretti. “Ensuring information security by using Haskell advanced type system”. In IEEE International Carnahan Conference on Security Technology (ICCST). 2017.
[C21] G. Laurenza, L. Aniello, R. Lazzeretti, and R. Baldoni. “Malware Triage based on Static Features and Public APT Reports”. In International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2017.
[C20] A. Del Pozzo, S. Bonomi, R. Lazzeretti, and R. Baldoni. “Building regular registers with rational malicious servers and anonymous clients”. In International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2017.
[C19] K. Kallas, B. Tondi, R. Lazzeretti, and M. Barni. “Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach.” In Springer LNCS, Proceedings of Conference on Decision and Game Theory for Security (GameSec) 2016. AR: 0.45.
[C18] G. Droandi. “Non-Interactive Privacy Preserving Protocol for Biometric Recognition Based on Somewhat Homomorphic Encryption”. In European Conference on Cyber Warfare and Security (ECCWS) 2015. Best PhD paper. Tutors: R. Lazzeretti and M. Barni.
[C17] R. Lazzeretti and T. Pignata. “Privacy Preserving Cloud Computing through Piecewise Approximation of Multivariate Functions”. In IEEE Workshop on Security and Privacy in the Cloud, collocated with Computer and Network Security CNS 2015. AR: 0.27.
[C16] G. Droandi and R. Lazzeretti. “SHE based non interactive privacy preserving biometric authentication protocols”. In IEEE International Symposium on Intelligent Signal Processing (WISP) 2015.
[C15] R. Lazzeretti, S. Horn, P. Braca, and P. Willett. “Secure multi-party consensus gossip algorithms”. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2014. AR: 0.48.
[C14] R. Lazzeretti, T. Pignata, and M. Barni. “Secure Evaluation of Private Functions through Piecewise Linear Approximation”. In IEEE International Workshop on Information Forensics and Security (WIFS) 2013. AR: 0.35.
[C13] M. Barni, M. Bernaschi, R. Lazzeretti, T. Pignata, and A. Sabellico. “Efficient implementation of garbled circuits for multi-party computation protocols”. In Workshop on Information Privacy and Security (JIPS) 2013.
[C12] M. Barni, M. Bernaschi, R. Lazzeretti, T. Pignata, and A. Sabellico. “Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting”. In Springer Data Privacy Management and Autonomous Spontaneous Security (DPM), colocated with ESORICS 2013. AR: 0.28.
[C11] T. Pignata, R. Lazzeretti, and M. Barni. “General Function Evaluation in a STPC Setting via Piecewise Linear Approximation”. In IEEE International Workshop on Information Forensics and Security (WIFS), 2012. AR: 0.30.
[C10] R. Lazzeretti, J. Guajardo, and M. Barni. “Privacy Preserving ECG Quality Evaluation”. In ACM Workshop on Multimedia and security (MM&SEC), 2012. AR: 0.48.
[C9] Y. Luo, S.C. Samson, T. Pignata, R. Lazzeretti, and M. Barni. “An Efficient Protocol for Private Iris-Code Matching by Means of Garbled Circuits”. In Special Session on Emerging Topics in Cryptography and Image Processing, International Conference on Image Processing (ICIP), 2012. AR: 0.39.
[C8] R. Lazzeretti and M. Barni. “Division between encrypted integers by means of garbled circuits”. In IEEE International Workshop on Information Forensics and Security (WIFS), 2011. AR: 0.28.
[C7] M. Barni, J. Guajardo, and R. Lazzeretti. “Privacy Preserving Evaluation of Signal Quality With Application to ECG Analysis”. In IEEE International Workshop on Information Forensics and Security (WIFS) 2010. AR: 0.27.
[C6] M. Barni, T. Bianchi, D. Catalano, R. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, and F. Scotti. “Privacy-Preserving Fingercode Authentication”. In ACM Workshop on Multimedia and Security (MM&Sec) 2010.
[C5] M. Barni, T. Bianchi, D. Catalano, R. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, and F. Scotti. “A Privacy-compliant Fingerprint Recognition System Based on Homomorphic Encryption and Fingercode Templates”. In IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) 2010.
[C4] M. Barni, P. Failla, V. Kolesnikov, R. Lazzeretti, A.R. Sadeghi, and T. Schneider. “Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification”. SPEED Workshop co-located with CHES, 2009.
[C3] M. Barni, P. Failla, R. Lazzeretti, A. Paus, A.-R. Sadeghi, T. Schneider, and V. Kolesnikov. “Efficient privacy-preserving classification of ECG signals”. In IEEE International Workshop on Information Forensics and Security (WIFS) 2009. AR: 0.30.
[C2] M. Barni, P. Failla, V. Kolesnikov, R. Lazzeretti, A.R. Sadeghi, and T. Schneider. “Secure evaluation of private linear branching programs with medical applications”. In European Symposium on Research in Computer Security (ESORICS) 2009. AR: 0.19.
[C1] R. Lazzeretti and M. Barni. “Lossless Compression of Encrypted Grey-Level and Color Images” In Special session on Signal Processing in the Encrypted Domain (EUSIPCO) 2008.
[BC2] R. Lazzeretti and M. Barni. “Privacy preserving classification of ECG signals in mobile e-health applications”. Chapter in Aris Gkoulalas Divanis and Grigorios Loukides: Medical Data Privacy Handbook, Springer book. 2015. http://www.springer.com/kr/book/9783319236322.
[BC1] R. Lazzeretti, P. Failla and M. Barni “Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation”. Chapter in P. Campisi. Security and Privacy in Biometrics, Springer book, 2013. http://www.springer.com/us/book/9781447152293.
[P1] M. Ambrosin, M. Conti, R. Lazzeretti, M. Rabbani, and S. Ranise. “Poster: Toward secure and efficient attestation for highly dynamic swarms”. In ACM Conference on Security and Privacy in Wireless and Mobile Network (WiSec). 2017.
Legend:
AR: Acceptance rate
IF(xxxx): JCR Impact Factor of journal in the year xxxx