M.Sc. Tommaso Frassetto

Research Assistant

Mornewegstraße 30
D-64293 Darmstadt
GERMANY

Building:S4|14
Room:4.1.21
Phone:+49 (0)6151 16 - 25340
Email:tommaso.frassetto(a-t)trust.tu-darmstadt.de (PGP key)
Website:https://www.trust.informatik.tu-darmstadt.de/tf

 

Vita

Since 2016

Research Assistant

at CYSEC and Technische Universität Darmstadt, Germany 

2013-2016

M.Sc. Computer Science

at University of Padua, Italy

2010-2013

B.Sc. Computer Science

at University of Padua, Italy

Awards

  • Best Poster Award, ICDCS 2017

    Markus Miettinen, Samuel Marchal, Ibbad Hafeez, Tommaso Frassetto, N. Asokan, Ahmad-Reza Sadeghi and Sasu Tarkoma, "IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT" In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), June 5-8, 2017, Atlanta, Georgia, USA.

Publications

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

Author Markus Miettinen, Samuel Marchal, Ibbad Hafeez, Tommaso Frassetto, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma
Date June 2017
Kind Inproceedings
PublisherIEEE
Book titleProc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017)
Note
LocationAtlanta, GA, USA
DOI10.1109/ICDCS.2017.284
KeyTUD-CS-2017-0095
Research Areas Fachbereich Informatik, CYSEC, ICRI-SC, System Security Lab
Abstract <p style="margin: 0px; ">The emergence of numerous new manufacturers producing devices for the Internet-of-Things (IoT) has given rise to new security concerns. Many IoT devices exhibit security flaws making them vulnerable for attacks and manufacturers have difficulties in providing appropriate security patches to their products in a timely and user-friendly manner. In this paper, we present our implementation of IoT Sentinel, which is a system aimed at protecting the user's network from vulnerable IoT devices. IoT Sentinel automatically identifies vulnerable devices when they are first introduced to the network and enforces appropriate traffic filtering rules to protect other devices from the threats originating from the vulnerable devices.</p> <p style="margin: 0px; "></p>
Full paper (pdf)
[Export this entry to BibTeX]
[Back to List-View]

Important Copyright Notice:

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang