Torino, Piemonte, Italia
393 follower 382 collegamenti

Iscriviti per visualizzare il profilo

Informazioni

Security Engineer with experience in software and platform security, cryptography…

Esperienza e formazione

  • SUSE

Vedi l’esperienza completa di Filippo

Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.

Licenze e certificazioni

Pubblicazioni

  • Randomization can't stop BPF JIT spray

    11th International Conference on Network and System Security

    The Linux kernel Berkeley Packet Filter (BPF) and its Just-In-Time (JIT) compiler are actively used in various pieces of networking equipment where filtering speed is especially important. In 2012, the Linux BPF/JIT compiler was shown to be vulnerable to a JIT spray attack; fixes were quickly merged into the Linux kernel in order to stop the attack. In this paper we show two modifications of the original attack which still succeed on a modern 4.4 Linux kernel, and demonstrate that JIT spray is…

    The Linux kernel Berkeley Packet Filter (BPF) and its Just-In-Time (JIT) compiler are actively used in various pieces of networking equipment where filtering speed is especially important. In 2012, the Linux BPF/JIT compiler was shown to be vulnerable to a JIT spray attack; fixes were quickly merged into the Linux kernel in order to stop the attack. In this paper we show two modifications of the original attack which still succeed on a modern 4.4 Linux kernel, and demonstrate that JIT spray is still a major problem for the Linux BPF/JIT compiler. This work helped to make the case for further and proper countermeasures to the attack, which have then been merged into the 4.7 Linux kernel.

    Altri autori
    Vedi pubblicazione
  • SELint: An SEAndroid Policy Analysis Tool

    3rd International Conference on Information Systems Security and Privacy

    SEAndroid enforcement is now mandatory for Android devices. In order to provide the desired level of security for their products, Android OEMs need to be able to minimize their mistakes in writing SEAndroid policies. However, existing SEAndroid and SELinux tools are not very useful for this purpose. It has been shown that SEAndroid policies found in commercially available devices for multiple manufacturers contain mistakes and redundancies. In this paper we present a new tool, SELint, which…

    SEAndroid enforcement is now mandatory for Android devices. In order to provide the desired level of security for their products, Android OEMs need to be able to minimize their mistakes in writing SEAndroid policies. However, existing SEAndroid and SELinux tools are not very useful for this purpose. It has been shown that SEAndroid policies found in commercially available devices for multiple manufacturers contain mistakes and redundancies. In this paper we present a new tool, SELint, which aims to help OEMs to produce better SEAndroid policies. SELint is extensible and configurable to suit the needs of different OEMs. It is provided with a default configuration based on the AOSP SEAndroid policy, but can be customized by OEMs.

    Altri autori
    Vedi pubblicazione
  • Randomization can't stop BPF JIT spray

    Black Hat Europe

    Abstract, whitepaper and slides are available on the Black Hat Europe 2016 website.

    Altri autori
    Vedi pubblicazione
  • Characterizing SEAndroid Policies in the Wild

    2nd International Conference on Information Systems Security and Privacy

    Starting from the 5.0 Lollipop release all Android processes must be run inside confined SEAndroid access control domains. As a result, Android device manufacturers were compelled to develop SEAndroid expertise in order to create policies for their device-specific components. In this paper we analyse SEAndroid policies from a number of 5.0 Lollipop devices on the market, and identify patterns of common problems we found. We also suggest some practical tools that can improve policy design and…

    Starting from the 5.0 Lollipop release all Android processes must be run inside confined SEAndroid access control domains. As a result, Android device manufacturers were compelled to develop SEAndroid expertise in order to create policies for their device-specific components. In this paper we analyse SEAndroid policies from a number of 5.0 Lollipop devices on the market, and identify patterns of common problems we found. We also suggest some practical tools that can improve policy design and analysis. We implemented the first of such tools, SEAL.

    Altri autori
    Vedi pubblicazione

Corsi

  • Algoritmi e programmazione

    02MNOOA

  • Analisi matematica I

    16ACFOA

  • Analisi matematica II

    23ACIOA

  • Basi di dati

    04AFQOA

  • Calcolatori elettronici

    12AGAOA

  • Chimica

    15AHMOA

  • Computer Networks II - Advanced Features P

    T-110.5111

  • Controlli automatici

    18AKSOA

  • Cryptography and Data Security

    T-79.4502

  • Cryptology P

    T-79.5501

  • Elettronica applicata e misure

    03MOAOA

  • Elettrotecnica

    01AULOA

  • Fisica I

    17AXOOA

  • Fisica II

    03AXPOA

  • Geometria

    17BCGOA

  • Informatica

    12BHDOA

  • Information Security

    CSE-C3400

  • Laboratory Works in Networking and Security

    T-110.5102

  • Methods and Tools for Network Systems

    CSE-E4430

  • Metodi matematici per l'ingegneria

    05BQXOA

  • Mobile Cloud Computing

    T-110.5121

  • Mobile Systems Security

    CSE-E5480

  • Network Security

    T-110.5241

  • Programmazione ad oggetti

    05CBIOA

  • Reti di calcolatori

    12CDUOA

  • Seminar on Internetworking P

    T-110.5191

  • Sistemi e tecnologie elettroniche

    02NVAOA

  • Sistemi operativi

    05CJCOA

  • Special Assignment in Networking and Security P

    T-110.6101

  • Special Course in Information Security P

    T-110.6220

  • Teoria ed elaborazione dei segnali

    01MOOOA

Riconoscimenti e premi

  • Session Chair

    ICISSP 2017

Lingue

  • Italiano

    Conoscenza madrelingua o bilingue

  • Inglese

    Conoscenza professionale completa

Visualizza il profilo completo di Filippo

  • Scoprire le conoscenze che avete in comune
  • Farti presentare
  • Contattare Filippo direttamente
Iscriviti per visualizzare il profilo completo

Altri profili simili

Altre persone che si chiamano Filippo Bonazzi in Italia

Aggiungi nuove competenze con questi corsi