Search filters

List of works by Giovanni Agosta

A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software

A Transform-Parametric Approach to Boolean Matching

A Unified Approach to Canonical Form-based Boolean Matching

A code morphing methodology to automate power analysis countermeasures

Array-Aware Matching: Taming the Complexity of Large-Scale Simulation Models

scientific article published on 31 July 2023

Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution

Automated instantiation of side-channel attacks countermeasures for software cipher implementations

Clever DAE

scientific article published on 04 August 2023

Compiler-based side channel vulnerability analysis and optimized countermeasures application

article

Countermeasures Against Branch Target Buffer Attacks

Cyber-security analysis and evaluation for smart home management solutions

Data centres for IoT applications: The M2DC approach (Invited paper)

article

Design of a parallel AES for graphics hardware using the CUDA framework

Design space extension for secure implementation of block ciphers

Differential Fault Analysis for Block Ciphers

Encasing block ciphers to foil key recovery attempts via side channel

Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs

article

Fast Disk Encryption through GPGPU Acceleration

Information leakage chaff

M2DC – Modular Microserver DataCentre with heterogeneous hardware

On Task Assignment in Data Intensive Scalable Computing

OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives

Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications

Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications

Reactive side-channel countermeasures: Applicability and quantitative security evaluation

Record Setting Software Implementation of DES Using CUDA

article

Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project

SeTHet - Sending Tuned numbers over DMA onto Heterogeneous clusters: an automated precision tuning story

scientific article published on 02 July 2024

Securing software cryptographic primitives for embedded systems against side channel attacks

Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology

scholarly article published April 2014

The M2DC Project: Modular Microserver DataCentre

The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks

Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms

Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software

scholarly article by Giovanni Agosta et al published February 2015 in Information Processing Letters

V2I Cooperation for Traffic Management with SafeCop