NEWS: I am co-organising the First Oresund Security Day. Please consider attending the event. More info: http://www.demtech.dk/osd17/

I am a postdoc at the IT University of Copenhagen and currently involved in the DEMTECH project. My research interests include the modelling and 
formal analysis of secure network protocols, as well as the socio-technical security aspects of real-world systems.

From November 2015 to January 2017, I was a postdoc at SICS RISE and a member of the Security Lab in Lund, Sweden. I mainly worked on group-based authentication mechanisms for future 5G networks.

I received my PhD from the University of Luxembourg where I worked on a formal framework for the security analysis of exam protocols and on the design of various protocols for computer-assisted and Internet-based exams. 
I also worked on the socio-technical security aspects of modern browsers. In particular, I conducted a formal analysis of TLS certificate validation that is not only logically conditioned on the technology but also on user actions.







Publications (Authors are normally listed in alphabetical order)

Journal
  • Bella G., Giustolisi R., Lenzini G., Ryan P.Y.A. Trustworthy exams without trusted parties. Computers & Security, Elsevier, 2017paper
  • Bella G., Giustolisi R., Riccobene S. Enforcing Privacy in E-Commerce by Balancing Anonymity and Trust. Computers & Security, Elsevier, 2011. paper


Conference and Workshop with proceedings

2017
  • Bella G.., Giustolisi R. IDEA: A Unifying Theory for Evaluation Systems. 9th International Symposium on Engineering Secure Software and Systems (ESSoS), Springer, 2017. paper
  • Giustolisi R., Iovino V., Lenzini G. Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. 14th International Conference on Security and Cryptography (SECRYPT)SciTePress, 2017paper
2016
  • Giustolisi R., Gehrmann C., Ahlström M., Holmberg S. A Secure Group-Based AKA Protocol for Machine-Type Communications. 19th Annual International Conference on Information Security and Cryptology (ICISC), Springer, 2016. paper
  • Giustolisi R., Gehrmann C. Threats to 5G Group-based Authentication13th International Conference on Security and Cryptography (SECRYPT)SciTePress, 2016paper
  • Giustolisi R., Iovino V., Rønne P. On the Possibility of Non-interactive E-Voting in the Public-Key SettingFinancial Cryptography and Data Security Workshop on Advances in Secure Electronic Voting, Springer, 2016paper
2015
  • Bella G., Giustolisi R., Lenzini G., Ryan P.Y.A. A Secure Exam Protocol Without Trusted Parties. 30th IFIP TC 11 Information Security and Privacy Conference (IFIP SEC), Springer, 2015paper
  • Dreier J., Giustolisi R., Kassem A., Lafourcade P.,  Lenzini G. A Framework for Analyzing Verifiability in Traditional and Electronic Exams. 11th International Conference on Information Security Practice and Experience (ISPEC), Springer,2015. paper
  • Dreier J., Giustolisi R., Kassem A., Lafourcade P., Lenzini G., Ryan P.Y.A. Formal Security Analysis of Traditional and Electronic Exams. E-Business and Telecommunications, ICETE 2014, Revised Selected Papers, Springer, 2015paper 
2014
  • Dreier J., Giustolisi R., Kassem A., Lafourcade P., Lenzini G., Ryan P.Y.A. Formal Analysis of Electronic Exams. 11th International Conference on Security and Cryptography (SECRYPT)SciTePress, 2014paper (Best Paper Award)
  • Bella G., Giustolisi R., Lenzini G. Secure Exams Despite Malicious Managers. 12th International Conference on Privacy, Security and Trust (PST), IEEE, 2014paper
  • Giustolisi R., Lenzini G., Ryan P.Y.A.  Remark!: A Secure Protocol for Remote ExamsSecurity Protocols XXII, Springer, 2014paper
  • Bella G., Curzon P., Giustolisi R., Lenzini G. A Socio-technical Methodology for the Security and Privacy Analysis of Services.  38th Annual Computer Software and Applications Confer- ence (COMPSAC) Workshops, IEEE, 2014.
2013
  • Bella G., Giustolisi R., Lenzini G. What security for electronic exams? 8th International Conference on Risk and Security of Internet and Systems (CRiSIS), IEEE, 2013. extended abstract
  • Bella G., Giustolisi R., Lenzini G. Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers. 11th International Conference on Privacy, Security and Trust (PST), IEEE, 2013. paper
  • Ferreira A., Giustolisi R., Huynen J.-L.,  Koenig V., Lenzini G. Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. 3rd IEEE International Sym- posium on Trust and Identity in Mobile Internet, Computing and Communications (TrustID), IEEE, 2013paper
  • Bella G., Giustolisi R.,  Lenzini G. A Socio-Technical Understanding of TLS Certificate Validation. 7th IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Springer, 2013short paper


PhD Thesis
  • Giustolisi R. Design and Analysis of Secure Exam Protocols. 2015. (Best Computer Science and Communications Research Unit PhD thesis award)
Technical report, Conference, and Workshop without proceedings
  • Svensson M., Paladi N. , Giustolisi R. 5G: Towards secure ubiquitous connectivity beyond 2020. Technical Report, 2016.
  • Dreier J., Giustolisi R., Kassem A., Lafourcade P., Lenzini G., Ryan P.Y.A. Formal Analysis of Electronic Exams. SDTA, 2014.
  • Dreier J., Giustolisi R., Kassem A., Lafourcade P.,  Lenzini G. On the Verifiability of (Electronic) Exams. Technical report, 2014.
  • Bella G., Giustolisi R., Lenzini G., Ryan P.Y.A. What security for electronic exams? CryptoForma Workshop, 2013.
  • Ferreira A., Giustolisi R., Huynen J.-L., Lenzini G. On Tools for Socio-Technical Security Analysis. GRSRD, 2013.


Projects  

Current
DCSR DEMTECH (2011 - 2017) 

Old
ICT TNG "Secure 5G Networks for Transportation Services", principal investigator, (2016)
H2020 5G-ENSURE, task lead, (2015 - 2017)



Professional Service 

Journals (Invited reviewer)
  • Computers & Security, 2016, 2017
  • IEEE Transactions on Learning Technologies, 2016
  • Formal Aspects of Computing, 2016
  • IEEE Security & Privacy, 2015
  • International Journal of Information Security (IJIS), 2014
  • IEEE Transactions on Parallel and Distributed Systems (TPDS), 2013

Conferences (PC member)
  • The Computer Security track at the ACM Symposium on Applied Computing (SEC@SAC), 2016, 2017, 2018

    Conferences (Sub-reviewer)
    • European Symposium on Research in Computer Security (ESORICS), 2013 - 2017
    • 21st IEEE Symposium on Computers and Communications (ISCC), 2016
    • The Computer Security track at the ACM Symposium on Applied Computing (SEC@SAC), 2012, 2013, 2015
    • 39th Symposium on Mathematical Foundations of Computer Science (MFCS), 2014
                                                                                           




                                                   


      Contact
      email: fgiustol (ait) gmail (dioit) com
      skype: yodosan1