NEWS: I am co-organising the First Oresund Security Day. Please consider attending the event. More info: http://www.demtech.dk/osd17/

I am a postdoc at the IT University of Copenhagen and currently involved in the DEMTECH project. My research interests include the modelling and 
formal analysis of secure network protocols, as well as the socio-technical security aspects of real-world systems.

From November 2015 to January 2017, I was a postdoc at SICS RISE and a member of the Security Lab in Lund, Sweden. I mainly worked on group-based authentication mechanisms for future 5G networks.

I received my PhD from the University of Luxembourg where I worked on a formal framework for the security analysis of exam protocols and on the design of various protocols for computer-assisted and Internet-based exams. 

I also worked on the socio-technical security aspects of modern browsers. In particular, I conducted a formal analysis of TLS certificate validation that is not only logically conditioned on the technology but also on user actions.


    
Publications (Authors are normally listed in alphabetical order)

Journal
              • Bella G., Giustolisi R., Lenzini G., Ryan P.Y.A. Trustworthy exams without trusted parties. Computers & Security (Elsevier), in presspaper
              • Bella G., Giustolisi R., Riccobene S. Enforcing Privacy in E-Commerce by Balancing Anonymity and Trust. Computers & Security (Elsevier), 2011. paper


Conference and Workshop with proceedings
2016
              • Giustolisi R., Gehrmann C., Ahlström M., Holmberg S. A Secure Group-Based AKA Protocol for Machine-Type Communications. ICISC (Springer), 2016. paper
              • Giustolisi R., Gehrmann C. Threats to 5G Group-based Authentication. SECRYPT  (SciTePress), 2016paper
              • Giustolisi R., Iovino V., Rønne P. On the Possibility of Non-interactive E-Voting in the Public-Key Setting. Financial Cryptography Workshops (Springer), 2016paper
2015
              • Bella G., Giustolisi R., Lenzini G., Ryan P.Y.A. A Secure Exam Protocol Without Trusted Parties. IFIP SEC (Springer), 2015paper
              • Dreier J., Giustolisi R., Kassem A., Lafourcade P.,  Lenzini G. A Framework for Analyzing Verifiability in Traditional and Electronic Exams. ISPEC (Springer), 2015. paper
              • Dreier J., Giustolisi R., Kassem A., Lafourcade P., Lenzini G., Ryan P.Y.A. Formal Security Analysis of Traditional and Electronic Exams. E-Business and Telecommunications, ICETE 2014, Revised Selected Papers (Springer), 2015paper 
2014
              • Dreier J., Giustolisi R., Kassem A., Lafourcade P., Lenzini G., Ryan P.Y.A. Formal Analysis of Electronic Exams. SECRYPT (SciTePress), 2014paper (Best Paper Award)
              • Bella G., Giustolisi R., Lenzini G. Secure Exams Despite Malicious Managers. PST (IEEE), 2014paper
              • Giustolisi R., Lenzini G., Ryan P.Y.A.  Remark!: A Secure Protocol for Remote ExamsSecurity Protocols Workshop (Springer), 2014paper
              • Bella G., Curzon P., Giustolisi R., Lenzini G. A Socio-technical Methodology for the Security and Privacy Analysis of Services.  COMPSAC Workshops (IEEE), 2014.
2013
              • Bella G., Giustolisi R., Lenzini G. What security for electronic exams? CRiSIS (IEEE), 2013. extended abstract
              • Bella G., Giustolisi R., Lenzini G. Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers. PST (IEEE), 2013. paper
              • Ferreira A., Giustolisi R., Huynen J.-L.,  Koenig V., Lenzini G. Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. TrustID (IEEE), 2013paper
              • Bella G., Giustolisi R.,  Lenzini G. A Socio-Technical Understanding of TLS Certificate Validation. IFIPTM (Springer), 2013short paper


PhD Thesis
              • Giustolisi R. Design and Analysis of Secure Exam Protocols. 2015. (Best CSC PhD thesis award)


Technical report, Conference, and Workshop without proceedings
            • Svensson M., Paladi N. , Giustolisi R. 5G: Towards secure ubiquitous connectivity beyond 2020. Technical Report, 2016.
            • Dreier J., Giustolisi R., Kassem A., Lafourcade P., Lenzini G., Ryan P.Y.A. Formal Analysis of Electronic Exams. SDTA, 2014.
            • Dreier J., Giustolisi R., Kassem A., Lafourcade P.,  Lenzini G. On the Verifiability of (Electronic) Exams. Technical report, 2014.
            • Bella G., Giustolisi R., Lenzini G., Ryan P.Y.A. What security for electronic exams? CryptoForma Workshop, 2013.
            • Ferreira A., Giustolisi R., Huynen J.-L., Lenzini G. On Tools for Socio-Technical Security Analysis. GRSRD, 2013.


Talks (last ten)
              1. A Secure Group-Based AKA Protocol for Machine-Type Communications. Copenhagen, 28 October 2016.
              2. Threats to 5G Group-Based Authentication. Lisbon, 26 July 2016.
              3. Secure 5G Networks for Transportation Services. Stockholm, 26 May 2016.
              4. Design and Formal Analysis of Exams. Gdansk, Poland, 23 September 2015.
              5. A Secure Exam Protocol Without Trusted Parties. Hamburg, Germany. 27 May 2015.
              6. A Framework for Analyzing Verifiability in Traditional and Electronic Exams. Beijing, China, 8 May 2015.
              7. Secure and Reliable Exams and More. Industrial Advisory Board. Luxembourg, 24 October 2014.
              8. Secure Exams Despite Malicious Managers. Toronto, Canada, July 2014.
              9. Remark!: A Secure Protocol for Remote Exams. 22nd Security Protocols Workshop, Cambridge (UK), March 2014. 
              10. What Security for Electronic Exams?  3rd CryptoForma Workshop, Egham (UK),  September 2013. 


                                                                                     




                                             


Contact
email: fgiustol (ait) gmail (dioit) com
skype: yodosan1