<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Proceedings of the First Italian Conference on Cybersecurity ITASEC17</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Alessandro Armando</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Università Ca' Foscari</institution>
          ,
          <addr-line>Venezia</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Università di Genova and FBK</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Università di Roma</institution>
          ,
          <addr-line>Sapienza</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>ITASEC17 is the first edition of the Italian Conference on Cybersecurity, a new annual event supported by the Cybersecurity National Laboratory that aims at putting together Italian researchers and professionals from academia, industry, and government working in the field of cybersecurity.</title>
    </sec>
    <sec id="sec-2">
      <title>ITASEC17 was held on January 17-20, 2017 in Venice and featured a Stakeholder Space and a</title>
      <p>Scientific/Technical Space, both spanning through the whole conference. The Stakeholder Space
included selected distinguished keynotes speeches, invited talks, vision speeches, panels and the
tutorial “Framework nazionale per la cybersecurity”, in Italian. The Scientific/Technical Space
included three main tracks: a Scientific Track on Cybersecurity science and technology, a Fil Rouge
Track with a sequence of multidisciplinary sessions on a specific hot topic in Cybersecurity, and a
Demo Track devoted to prototypes developed by industries, research centers, and universities. The Fil
Rouge track focused on “Fostering Security Through Web-Based Intelligence: Tools, Opportunities,
and Inherent Limitations”.</p>
      <p>The conference solicited two kind of submissions: unpublished contributions and presentation
only ones, e.g., already published work, preliminary work and position papers. There were 87
submissions: 48 in the unpublished category and 39 in the presentation only one. Each submission
was reviewed by an average of 3 program committee members. The committee decided to accept 25
papers out of the 48 submitted for publication, which are included in this proceedings volume. The
program also featured 34 presentations not included in this volume. The peer reviewing process has
been dealt with through EasyChair.</p>
    </sec>
    <sec id="sec-3">
      <title>ITASEC17 has required a huge effort by many people. We would like to thank the program</title>
      <p>committee members and all the external reviewers, the authors of all submitted papers, the staff from
CINI for their immense effort and devotion to the conference administration and organization,
Fondazione Università Ca' Foscari for the extremely professional local organization and all the
volunteer students from Ca' Foscari University.</p>
    </sec>
    <sec id="sec-4">
      <title>Finally, ITASEC17 would not have been possible without the support of our sponsors. Our</title>
      <p>immense gratitude goes to the Platinum Sponsors: CISCO, IBM, Leonardo, Microsoft, PaloAlto
Networks, Trend Micro; the Gold Sponsors: Blu5 Labs, Business-e, Check Point, IntheCyber, RSA,</p>
    </sec>
    <sec id="sec-5">
      <title>SAIV Group; and the Silver Sponsor: Var Group.</title>
    </sec>
    <sec id="sec-6">
      <title>The ITASEC17 Program co-chairs,</title>
    </sec>
    <sec id="sec-7">
      <title>Alessandro Armando, Roberto Baldoni and Riccardo Focardi</title>
      <p>Technical Program</p>
    </sec>
    <sec id="sec-8">
      <title>We report below the ITASEC17 Technical Sessions grouped by conference tracks. We point out</title>
      <p>the 25 proceeding papers in bold font. All the remaining 34 papers belong to the presentation only
category: they have been presented at the conference but are not included in this proceedings volume.
2.1</p>
      <sec id="sec-8-1">
        <title>Science and Technology track</title>
        <sec id="sec-8-1-1">
          <title>Technical Session 1.1 - Cryptography</title>
          <p>(chair: Marco Baldi)
• Angelo Massimo Perillo, Giuseppe Persiano, Alberto Trombetta. Secure Queries on an</p>
          <p>Encrypted Multi-Writer Table
• Saikrishna Badrinarayanan, Dakshita Khurana, Rafail Ostrovsky and Ivan</p>
          <p>Visconti. Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs
• Flaminia L. Luccio and Heider A. M. Wahsheh. Towards Cryptographically Secure QR</p>
          <p>Codes
• Alessandro Barenghi and Gerardo Pelosi. An Enhanced Dataflow Analysis to</p>
          <p>Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers
• Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo and Antonino Nocera. Range Query</p>
          <p>Integrity in Cloud Data Streams with Efficient Insertion</p>
        </sec>
        <sec id="sec-8-1-2">
          <title>Technical Session 1.2 - Privacy</title>
          <p>(chair: Antonio Lioy)
• Mauro Conti, Fabio De Gaspari and Luigi V. Mancini.Anonymity in an electronic society
• Giampaolo Bella, Denis Butin and Hugo Jonker.Analysing Privacy Analyses
• Mojtaba Eskandari, Maqsood Ahmad, Anderson Santana De Oliveira and Bruno</p>
          <p>Crispo. Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps
• Daniele Ucci, Leonardo Aniello and Roberto Baldoni.Share a pie? Privacy-Preserving</p>
          <p>Knowledge Base Export through Count-min Sketches
• Domenico Amelino, Mario Barbareschi and Alessandro Cilardo. A proposal for the
secure activation and licensing of FPGA IP cores</p>
        </sec>
        <sec id="sec-8-1-3">
          <title>Technical Session 1.3 - Internet of things</title>
          <p>(chair: Pierpaolo Degano)
• Luigi Romano, Luigi Coppolino, Salvatore D'Antonio and Luigi Sgaglione. My Smart Home
is Under Attack
• Pericle Perazzo, Carlo Vallati, Giuseppe Anastasi and Gianluca Dini. A Security Analysis of</p>
          <p>RPL Routing Protocol for the Internet of Things
• Chiara Bodei and Letterio Galletta. Tracking sensitive and untrustworthy data in IoT
• Vittorio Bagini, Franco Guida, Carlo Majorani, Renato Menicocci, Massimiliano Orazi and
Alessandro Riccardi. Derivation of security requirements for a smart grid Demand Response
case study</p>
        </sec>
        <sec id="sec-8-1-4">
          <title>Technical Session 1.4 - Authentication and security policies</title>
          <p>(chair: Francesco Buccafurri)
• Enrico Schiavone, Andrea Ceccarelli and Andrea Bondavalli. Risk Assessment of a</p>
          <p>Biometric Continuous Authentication Protocol for Internet Services
• Luca Ghiani, Valerio Mura, Pierluigi Tuveri and Gian Luca Marcialis. On the
interoperability of capture devices in fingerprint presentation attacks detection
• Giada Sciarretta, Alessandro Armando, Roberto Carbone and Silvio Ranise. An
OAuthbased Single Sign-On Solution for Mobile Applications
• Stefano Calzavara, Alvise Rabitti and Michele Bugliesi.Content Security Policy: A Broken</p>
          <p>Promise?</p>
        </sec>
        <sec id="sec-8-1-5">
          <title>Technical Session 2.1 - Social and economics</title>
          <p>(chair: Giorgio Giacinto)
• Gianluigi Folino and Francesco Sergio Pisani. A Software Architecture for Classifying</p>
          <p>Users in E-payment Systems
• Fabio Del Vigna, Andrea Cimino, Felice Dell'Orletta, Marinella Petrocchi and</p>
          <p>Maurizio Tesconi. Hate me, hate me not: Hate speech detection on Facebook
• Stanislav Dashevskyi, Achim D. Brucker and Fabio Massacci. On the Security Cost of Using
a Free and Open Source Component in a Proprietary Product
• Vincenzo Agate, Alessandra De Paola, Giuseppe Lo Re and Marco Morana. Vulnerability</p>
          <p>Evaluation of Distributed Reputation Management Systems</p>
        </sec>
        <sec id="sec-8-1-6">
          <title>Technical Session 2.2 - Malware and Software Analysis</title>
          <p>(chair: Stefano Calzavara)
• Davide Maiorca, Paolo Russu, Igino Corona, Battista Biggio and Giorgio
Giacinto. Detection of Malicious Scripting Code through Discriminant and
AdversaryAware API Analysis
• Santanu Kumar Dash, Guillermo Suarez-Tangil, Salahuddin Khan, Kimberly Tam, Mansour</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>Ahmadi, Johannes Kinder and Lorenzo Cavallaro. DroidScribe: Classifying Android</title>
      <p>Malware Based on Runtime Behavior
• Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu and Irene</p>
      <p>Finocchi. Securing Software Applications through Symbolic Execution: an Overview</p>
      <sec id="sec-9-1">
        <title>Technical Session 2.3 - Attack detection</title>
        <p>(chair: Corrado Aaron Visaggio)
• Christian Callegari, Michele Pagano, Stefano Giordano and Fabrizio Berizzi. Entropy-based</p>
        <p>Network Anomaly Detection
• Luca Boero, Mario Marchese and Sandro Zappatore.ADENOIDS: softwAre DEfined</p>
        <p>NetwOrking-based Intrusion Detection System
• Marco Angelini, Silvia Bonomi, Emanuele Borzi, Antonella Del Pozzo, Simone Lenti and</p>
        <p>Giuseppe Santucci. An On-line Multi-step Attack Detector for Complex Distributed Systems
• Ambra Demontis, Battista Biggio, Giorgio Fumera, Giorgio Giacinto and Fabio
Roli. Infinity-norm Support Vector Machines against Adversarial Label Contamination</p>
      </sec>
      <sec id="sec-9-2">
        <title>Technical Session 3.1 - Industrial Control Systems and critical infrastructures</title>
        <p>(chair: Luigi Romano)
• Elisa Costante, Sandro Etalle, Jerry Den Hartog, Davide Fauri and Emmanuele</p>
        <p>Zambon. Towards Practical Integrity Monitoring of Industrial Control Systems
• Giorgio Sinibaldi. PREventivE Methodology and Tools to protect utilitIEs
• Giuseppe Bernieri, Federica Pascucci and Javier Lopez. Network Anomaly Detection in</p>
        <p>Critical Infrastructure Based on Mininet Network Simulator
• Giuseppe Giulio Rutigliano, Silvello Betti and Pierluigi Perrone. Critical Infrastructures</p>
        <p>Protection through Physical Layer Optical Communication Security
• Andrea Bondavalli, Andrea Ceccarelli, Felicita Di Giandomenico, Fabio Martinelli, Ilaria</p>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>Matteucci, Nicola Nostro and Francesco Santini. Synthesis and Multi-Criteria Ranking of</title>
      <p>Security Countermeasures via Threat Analysis</p>
      <sec id="sec-10-1">
        <title>Technical Session 3.2 - Secure Systems and Forensics</title>
        <p>(chair: Antonio Barili)
• Giovanni Bottazzi, Giuseppe Francesco Italiano and Giuseppe Giulio Rutigliano. An
operational framework for incident handling
• Salvatore D'Antonio, Luigi Coppolino, Luigi Romano and Mariacarla Staffa. KONFIDO
Project: a secure infrastructure increasing interoperability on a systemic level among
eHealth services across Europe
• Marc Richter and Konrad Wrona. Devil in the details: Assessing automated
confidentiality classifiers of NATO documents
• Dario Lanterna. Forensic Analysis of Deduplicated File Systems</p>
      </sec>
      <sec id="sec-10-2">
        <title>Technical Session 3.3 - Blockchain and cryptocurrencies</title>
        <p>(chair: Marino Miculan)
• Edoardo Gaetani, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea
Margheri and Vladimiro Sassone. Blockchain-based Database to Ensure Data Integrity
in Cloud Computing Environments
• Nicola Atzei, Massimo Bartoletti and Tiziana Cimoli. A survey of attacks on Ethereum
smart contracts
• Marco Baldi, Franco Chiaraluce, Emanuele Frontoni, Giuseppe Gottardi, Daniele
Sciarroni and Luca Spalazzi. Certificate Validation through Public Ledgers and
Blockchains
• Aniket Kate, Matteo Maffei, Giulio Malavolta and Pedro Moreno-Sanchez SilentWhispers:
Enforcing Security and Privacy in Decentralized Credit Networks
2.2</p>
        <sec id="sec-10-2-1">
          <title>Fil Rouge track</title>
        </sec>
      </sec>
      <sec id="sec-10-3">
        <title>Fil Rouge 1 - Cybercrime and Banking</title>
        <p>(chairs: Marco Mayer and Gian Domenico Mosco )</p>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>Marco Mayer (Introduction)</title>
      <p>• Andrea Monti. Rules of (digital) evidence and prosecution's actual needs. When the law
falls behind technology
• Maria Cristina Arcuri, Marina Brogi and Gino Gandolfi. How does cyber crime affect
firms? The effect of information security breaches on stock return
• Mario Dal Co. La ristrutturazione delle banche italiane e la sicurezza</p>
    </sec>
    <sec id="sec-12">
      <title>Gian Domenico Mosco (Conclusion)</title>
      <sec id="sec-12-1">
        <title>FilRouge 2 - Social and web intelligence</title>
        <p>(chairs: Umberto Gori and Mario Caligiuri)</p>
      </sec>
    </sec>
    <sec id="sec-13">
      <title>Umberto Gori (Intoduction)</title>
      <p>• Matteo E. Bonfanti. Social Media Intelligence a Salvaguardia dell’Interesse Nazionale:</p>
      <p>Limiti e Opportunità di una Pratica da Sviluppare
• Giampiero Bonfiglio, Ludovica Coletta, Alessandra Teresa Coscarella, Martina
Limonta and Panfilo Ventresca. La Web-based Intelligence nei modelli adattativi di
sicurezza e gli aspetti multidisciplinari di attivazione ed analisi
• Luigi Martino. La minaccia terroristica nel cyberspazio: Virtual Human Intelligence e</p>
      <p>Sicurezza Nazionale
• Filippo Pierozzi. IL CASO HACKING TEAM: QUIS CUSTODIET IPSOS CUSTODES?
Problematiche e sfide per una più efficiente partnership tra settore privato e agenzie
d’intelligence nella cybersecurity</p>
    </sec>
    <sec id="sec-14">
      <title>Mario Caligiuri (Conclusion)</title>
      <p>2.3</p>
      <sec id="sec-14-1">
        <title>Demos track</title>
        <p>Demo Session 1.1 - Cyber Intelligence
(chair: Fabio Cocurullo)
• Maurizio Mencarini and Gianluca Sensidoni. Detecting and analysing terrorist-related
online contents and financing activities – live demo of DANTE, an EU funded research
project
• Mike Spradbery. Security Intelligence, Cognitive Insight and Incident Response – where is it
heading?
• Mauro Brignoli and Luisa Franchina. Progetto di Piattaforma di Intelligence con
strumenti OSINT e tecnologie Open Source</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>Demo Session 2</source>
          .
          <fpage>1</fpage>
          - Automated Security Assessment
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>Demo Session 3</source>
          .
          <fpage>1</fpage>
          - Protection of Critical Infrastructures
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>