Alberto Giaretta

Room T2234, Örebro Universitet, Örebro, SE-70281, Sweden.
name dot surname at oru dot se

I am a Postdoc at the Centre for Applied Autonomous Sensor Systems (AASS), Örebro University, Sweden.
I hold a PhD degree in Computer Science from Örebro University, Sweden, as well as a Computer Science MSc and a Computer Science BSc from the University of Padova, Italy.
My main research interests are Computer Security, Internet of Things (IoT), and Bio-Inspired Nanonetworks.


Publications

Journal Papers


[J012] A PLS-HECC-based Device Authentication and Key Agreement Scheme for Smart Home Networks
J. Pirayesh, A. Giaretta, M. Conti, P. Keshavarzi
Computer Networks, 2022, 109077

[J011] Are Smart Homes Adequate for Older Adults with Dementia?
G. Chimamiwa, A. Giaretta, M. Alirezaie, F. Pecora, A. Loutfi
Sensors 2022, 22, 4254

[J010] A Machine Learning-based Approach to Detect Threats in Bio-cyber DNA Storage Systems
F. Tavella, A. Giaretta, M. Conti, S. Balasubramaniam
Computer Communications, 2022, Volume 187, Pages 59-70

[J009] On the People Counting Problem in Smart Homes: Undirected Graphs and Theoretical Lower-Bounds
A. Giaretta, A. Loutfi
Journal of Ambient Intelligence and Humanized Computing (JAIHC), 2021

[J008] S×C4IoT: A Security-by-Contract Framework for Dynamic Evolving IoT Devices
A. Giaretta, N. Dragoni, F. Massacci
ACM Transactions on Sensor Networks, 2021

[J007] IoT Security Configurability with Security-by-Contract
A. Giaretta, N. Dragoni, F. Massacci
Sensors 2019, 19, 4121

[J006] DNA Molecular Storage System: Transferring Digitally Encoded Information Through Bacterial Nanonetworks
F. Tavella, A. Giaretta, T.M. Dooley-Cullinane, M. Conti, L. Coffey, S. Balasubramaniam
IEEE Transactions on Emerging Topics in Computing, 2019

[J005] Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era
M. De Donno, A. Giaretta, N. Dragoni, A. Bucchiarone, M. Mazzara
Future Internet 2019, 11, 127

[J004] BitFlow - Enabling Real-Time Cash-Flow Evaluations through Blockchain
L. Herskind, A. Giaretta, M. De Donno, N. Dragoni
Concurrency and Computation: Practice and Experience, 2019

[J003] Microservices: Migration of a Mission Critical System
M. Mazzara, N. Dragoni, A. Bucchiarone, A. Giaretta, S. T. Larsen, S. Dustdar
IEEE Transactions on Services Computing, 2019

[J002] DDoS-Capable IoT Malwares - Comparative Analysis and Mirai Investigation
M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi
Security and Communication Networks, vol. 2018, Article ID 7178164, 30 pages, 2018

[J001] Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks
A. Giaretta, S. Balasubramaniam, M. Conti
IEEE Transactions on Information Forensics and Security, vol. 11, no. 4, pp. 665-676, April 2016


Conference Papers


[C012] Smart Lamp or Security Camera? Automatic Identification of IoT Devices
M. Thomsen, A. Giaretta, N. Dragoni
12th International Network Conference 2020 (INC2020), 2020

[C011] IoT Device Profiling: From MUD Files to S×C Contracts
G. Matthíasson, A. Giaretta, N. Dragoni
Proceedings of Open Identity Summit (OID2020), 2020

[C010] UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things
A. Giaretta, S. Pepe, N. Dragoni
Proceedings of TOOLS 50+1: Technology of Object-Oriented Languages and Systems (TOOLS 2019), 2019

[C009] Protecting the Internet of Things with Security-by-Contract and Fog Computing
A. Giaretta, N. Dragoni, F. Massacci
Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT 2019), 2019

[C008] Community Targeted Phishing: A Middle Ground Between Massive and Spear Phishing through Natural Language Generation
A. Giaretta, N. Dragoni
Proceedings of the 6th International Conference in Software Engineering for Defense Applications (SEDA’18), 2019

[C007] Vulnerabilities and Security Breaches in Cryptocurrencies
G. Sigurdsson, A. Giaretta, N. Dragoni
Proceedings of the 6th International Conference in Software Engineering for Defense Applications (SEDA’18), 2019

[C006] Adding Salt to Pepper - A Structured Security Assessment over a Humanoid Robot
A. Giaretta, M. De Donno, N. Dragoni
Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES’18), IoT-SECFOR session, 2018, ACM

[C005] Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer
A. Giaretta, N. Dragoni, M. Mazzara
Proceedings of the 5th International Conference in Software Engineering for Defense Applications (SEDA’16), 2018, Springer Advances in Intelligent Systems and Computing (AISC)

[C004] The Internet of Hackable Things
N. Dragoni, A. Giaretta, M. Mazzara
Proceedings of the 5th International Conference in Software Engineering for Defense Applications (SEDA’16), 2018, Springer Advances in Intelligent Systems and Computing (AISC)

[C003] AntibIoTic: Protecting IoT Devices Against DDoS Attacks
M. De Donno, N. Dragoni, A. Giaretta, M. Mazzara
Proceedings of the 5th International Conference in Software Engineering for Defense Applications (SEDA’16), 2018, Springer Advances in Intelligent Systems and Computing (AISC)

[C002] Analysis of DDoS-Capable IoT Malwares
M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi
Proceedings of 1st International Conference on Security, Privacy, and Trust (INSERT), 2017, IEEE

[C001] A Taxonomy of Distributed Denial of Service Attacks
M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi
Proceedings of the International Conference on Information Society (i-Society), 2017, IEEE

Teaching

2021/2022


Computer Security, Second Cycle Course in Computer Science (Code DT508A)

AI and Cybersecurity, Second Cycle Course in Computer Science, SMARTER Initiative (Code DT118U)

2020/2021


Computer Security, Second Cycle Course in Computer Science (Code DT508A)

2019/2020


Computer Security, Second Cycle Course in Computer Science (Code DT508A)

2018/2019


Introduction to IT Security, Second Cycle Course in Informatics (Code IK404A)

Community Service

Reviewer for


IFIP Information Security Conference & Privacy Conference, IFIPSEC 2021

25th Nordic Conference on Secure IT Systems, Nordsec2020

16th International Conference on Information Systems Security, ICISS-2020

12th International Symposium on Foundations & Practice of Security, FPS2019

2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems (co-located with INFOCOM 2019), CryBlock 2019

IFIP Information Security Conference & Privacy Conference, IFIPSEC 2019

IEEE Transactions on Network and Service Management

IEEE Service-Oriented Computing and Applications 2018, SOCA 2018

ACM Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)

IEEE Transactions on Emerging Topics in Computing