I am a post-doctoral researcher at the Swedish Institute of Computer Science (SICS) and member of the Security Lab in Lund, Sweden. My research interests include the modelling and formal analysis of secure network protocols, as well as the socio-technical security aspects of real-world systems.

At the Security Lab, I am currently involved in the 5G-ENSURE project.

I received my PhD from University of Luxembourg, where I worked on a formal framework for the security analysis of exam protocols and on the design of various protocols for computer-assisted and Internet-based exams. 

I also worked on the socio-technical security aspects of modern browsers. In particular, I conducted a formal analysis of TLS certificate validation that is not only logically conditioned on the technology but also on user actions.


    
Publications (Authors are normally listed in alphabetical order)

Journal
              • Bella G., Giustolisi R., Riccobene S. Enforcing Privacy in E-Commerce by Balancing Anonymity and Trust. Computers & Security (Elsevier), 2011. paper

Conference and Workshop with proceedings
2016
              • Giustolisi R., Gehrmann C., Ahlström M., Holmberg S. A Secure Group-Based AKA Protocol for Machine-Type Communications. ICISC (Springer), 2016. paper
              • Giustolisi R., Gehrmann C. Threats to 5G Group-based Authentication. SECRYPT  (SciTePress), 2016paper
              • Giustolisi R., Iovino V., Rønne P. On the Possibility of Non-interactive E-Voting in the Public-Key Setting. Financial Cryptography Workshops (Springer), 2016paper
2015
              • Bella G., Giustolisi R., Lenzini G., Ryan P.Y.A. A Secure Exam Protocol Without Trusted Parties. IFIP SEC (Springer), 2015paper
              • Dreier J., Giustolisi R., Kassem A., Lafourcade P.,  Lenzini G. A Framework for Analyzing Verifiability in Traditional and Electronic Exams. ISPEC (Springer), 2015. paper
              • Dreier J., Giustolisi R., Kassem A., Lafourcade P., Lenzini G., Ryan P.Y.A. Formal Security Analysis of Traditional and Electronic Exams. E-Business and Telecommunications, ICETE 2014, Revised Selected Papers (Springer), 2015paper 
2014
              • Dreier J., Giustolisi R., Kassem A., Lafourcade P., Lenzini G., Ryan P.Y.A. Formal Analysis of Electronic Exams. SECRYPT (SciTePress), 2014paper (Best Paper Award)
              • Bella G., Giustolisi R., Lenzini G. Secure Exams Despite Malicious Managers. PST (IEEE), 2014paper
              • Giustolisi R., Lenzini G., Ryan P.Y.A.  Remark!: A Secure Protocol for Remote ExamsSecurity Protocols Workshop (Springer), 2014paper
              • Bella G., Curzon P., Giustolisi R., Lenzini G. A Socio-technical Methodology for the Security and Privacy Analysis of Services.  COMPSAC Workshops (IEEE), 2014.
2013
              • Bella G., Giustolisi R., Lenzini G. What security for electronic exams? CRiSIS (IEEE), 2013. extended abstract
              • Bella G., Giustolisi R., Lenzini G. Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers. PST (IEEE), 2013. paper
              • Ferreira A., Giustolisi R., Huynen J.-L.,  Koenig V., Lenzini G. Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. TrustID (IEEE), 2013paper
              • Bella G., Giustolisi R.,  Lenzini G. A Socio-Technical Understanding of TLS Certificate Validation. IFIPTM (Springer), 2013short paper


PhD Thesis
              • Giustolisi R. Design and Analysis of Secure Exam Protocols. manuscript, 2015.


Technical report, Conference, and Workshop without proceedings
            • Svensson M., Paladi N. , Giustolisi R. 5G: Towards secure ubiquitous connectivity beyond 2020. Technical Report, 2016.
            • Dreier J., Giustolisi R., Kassem A., Lafourcade P., Lenzini G., Ryan P.Y.A. Formal Analysis of Electronic Exams. SDTA, 2014.
            • Dreier J., Giustolisi R., Kassem A., Lafourcade P.,  Lenzini G. On the Verifiability of (Electronic) Exams. Technical report, 2014.
            • Bella G., Giustolisi R., Lenzini G., Ryan P.Y.A. What security for electronic exams? CryptoForma Workshop, 2013.
            • Ferreira A., Giustolisi R., Huynen J.-L., Lenzini G. On Tools for Socio-Technical Security Analysis. GRSRD, 2013.


Talks (last ten)
              1. Threats to 5G Group-Based Authentication. Lisbon, 26 July 2016.
              2. Secure 5G Networks for Transportation Services. Stockholm, 26 May 2016.
              3. Design and Formal Analysis of Exams. Gdansk, Poland, 23 September 2015.
              4. A Secure Exam Protocol Without Trusted Parties. Hamburg, Germany. 27 May 2015.
              5. A Framework for Analyzing Verifiability in Traditional and Electronic Exams. Beijing, China, 8 May 2015.
              6. Secure and Reliable Exams and More. Industrial Advisory Board. Luxembourg, 24 October 2014.
              7. Secure Exams Despite Malicious Managers. Toronto, Canada, July 2014.
              8. Remark!: A Secure Protocol for Remote Exams. 22nd Security Protocols Workshop, Cambridge (UK), March 2014. 
              9. What Security for Electronic Exams?  3rd CryptoForma Workshop, Egham (UK),  September 2013. 
              10. Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers, Tarragona, Spain, July 2013. 


                                                                                     




                                             


Contact
email: fgiustol (ait) gmail (dioit) com
skype: yodosan1