Organization


ITASEC18 is organized by

With the support of

In collaboration with

About ITASEC18

The Second Italian Conference on Cyber Security (ITASEC18) is an annual event supported by the CINI Cybersecurity National Laboratory that aims at putting together Italian researchers and professionals from academia, industry, and government working in the field of cyber security. The conference will be structured into a main cyber security science and technology (S&T main track), a “fil rouge” track including a sequence of multidisciplinary sessions from economic sciences, political sciences, laws etc on a specific hot topic in cyber security, and a demo track devoted to prototypes developed by industries, research centers and universities. ITASEC18 invites submissions for tutorial proposals on all topics of potential interest to the conference attendees. The conference will also include special sessions on domestic cybersecurity startups and on cybersecurity hacking community. The conference will also feature few selected distinguished keynote speeches and panels. This year, the fil rouge track topic will be "Cyber and Information Conflicts: strategic, tactical, policy and law aspects".

Conference tracks


S&T main track

For the science and technology (S&T) main track we welcome submissions regarding any aspects of cybersecurity including, but not limited to, the following ones: big data analytics, biometrics, critical infrastructure protection, cryptographic algorithms and applications, digital identity, electronic voting, enterprise and software security, forensics, formal methods, hardware trust and security, social engineering, machine learning and artificial intelligence, malware detection and analysis, intelligence, privacy, cyber-physical and industrial control systems, security governance and risk management, secure computation and storage, cyber ranges, surveillance systems (video, audio etc), network and cloud security, e-commerce security, vulnerability assessment, economics of cybersecurity.

Fil rouge track

Every year the conference wants to highlight a “fil rouge” topic to be addressed in a multidisciplinary way by allocating specific targeted IT and non-IT sessions. This year the topic is “Fostering Security Through Web-Based Intelligence: Tools, Opportunities and Inherent Limitations”. Papers addressing the topic in disciplines like: social sciences, economic sciences, (geo-)political sciences, legal sciences and other non-technology areas are encouraged. Non-technological papers will be selected by a specific fil rouge track program committee.

Demos track

Demonstrations present first-hand experience with research prototypes or operational systems in any of the areas identified in the scope of the S&T main track. The authors are expected to prepare a poster and perform a live demonstration. Demonstrations also provide opportunities to exchange ideas gained from implementing cybersecurity systems and to obtain feedback from expert users. A demonstration has to be accompanied by a submission. Demonstration submissions describe in 5 pages, following the format for the conference proceedings, the objectives and findings addressed by the demonstration. Commercial demos will not be accepted.


Submit a paper

Submissions and proceedings


Proceedings

The proceedings of ITASEC18 are published on CEUR.

Papers

We solicit two kinds of submission for all tracks: original, unpublished contributions that will be included in an open-access post-proceeding volume of CEUR Workshop Proceedings; already published or preliminary work that will not be included in the post proceedings volume. We particularly encourage submissions on new and emerging topics. Authors are requested to clearly indicate whether their paper should be included in the proceedings volume or not.

Papers submitted to the S&T and demo track, as well as tutorial proposals must be in English. For the fil rouge track the language can be either English or Italian. Papers have to be submitted in pdf format and should be formatted using the EasyChair style. Papers submitted to S&T and fil rouge tracks must be no longer than 10 pages, including bibliography. Extra material exceeding the page limit can be included in a clearly marked appendix of at most 5 pages. Papers submitted to the demo track must be no longer than 5 pages. A walk-through of the actual demonstration should be provided in a clearly marked appendix of at most 5 pages.

Click here to submit a paper.

Tutorial proposals

The conference will host a one-day (February 6, 2018) tutorial program on cybersecurity and some "embedded tutorials" in the following days. Each tutorial proposal should concisely describe the content and objectives of the tutorial, and include:

  • title
  • abstract
  • outline of the tutorial content
  • intended audience, including possible assumed background of attendees
  • name, affiliation, email address, and brief biography of the speaker(s)
  • duration: 1.5 hours (embedded), 3 hours (half-day)

Tutorial proposals should be submitted as a pdf file through EasyChair.

Click here here to submit a tutorial proposal.

Community session

This year the conference will host a special session dedicated to the Italian hacking community, with a few slots reserved to young authors (< 24 years old). We solicit community submissions on any aspect of Cybersecurity. Notice that papers about new vulnerabilities will only be considered if adhering to responsible disclosure.

Paper submission rules are the same as the fil rouge track above.

Click here to submit a community paper.

Important dates

  • 9 16 October 2017: Paper (all tracks) and demo submission
  • 15 25 November 2017: Tutorial proposal and community paper submission
  • 5 15 December 2017: Notification to authors
  • 6-9 February 2018: Conference

Conference committees


General co-chairs

Stefano Zanero (Politecnico di Milano)

Roberto Baldoni (Università di Roma, Sapienza)

Program co-chairs

Elena Ferrari (Univ. dell’Insubria, S&T)

Marco Baldi (Univ. Politecnica delle Marche, Demos)

Roberto Baldoni (Univ. di Roma Sapienza, Fil-Rouge)

Tutorial co-chair

Sara Foresti (Università degli Studi di Milano)

Startup co-chairs

Gabriele Costa (Università di Genova)

Alvise Biffi (Assolombarda)

Community session co-chair

Yvette Agostini (CSA Italy)

Riccardo Focardi (Università Ca' Foscari, Venezia)

S&T track program committee

Maurizio Aiello (CNR-IEIIT, Genova)

Alessandro Armando (Università di Genova and FBK)

Antonio Barili (Università di Pavia)

Stefano Bistarelli (Università di Perugia)

Nicola Blefari Melazzi (CNIT, Università degli Studi Roma Tor Vergata)

Carlo Blundo (Università di Salerno)

Andrea Bondavalli (Università di Firenze)

Francesco Buccafurri Università di Reggio Calabria)

Michele Carminati (Politecnico di Milano)

Dajana Cassioli (Università dell'Aquila)

Dario Catalano (Università di Catania)

Paolo Ciancarini (Università di Bologna)

Mauro Conti (Università di Padova)

Domenico Cotroneo (Università di Napoli, Federico II)

Bruno Crispo (Università di Trento)

Franco Davoli (CNIT, Università di Genova)

Rocco De Nicola (IMT, Lucca)

Pierpaolo Degano (Università di Pisa)

Felicita Di Giandomenico (ISTI-CNR, Pisa)

Stefano Panzieri (Università Roma Tre)

Gianluca Dini (Università di Pisa)

Susanna Donatelli (Università di Torino)

Riccardo Focardi (Università Ca' Foscari, Venezia)

Giorgio Giacinto (Università di Cagliari)

Roberto Giacobazzi (Università di Verona)

Franco Guida (Fondazione Ugo Bordoni, Roma)

Antonio Lioy (Politecnico di Torino)

Giuseppe Lo Re (Università di Palermo)

Flaminia Luccio (Università Ca' Foscari, Venezia)

Luigi Vincenzo Mancini (Università di Roma, Sapienza)

Alberto Marchetti-Spaccamela (Università di Roma, Sapienza)

Fabio Martinelli (IIT-CNR, Pisa)

Marino Miculan (Università di Udine)

Igor Nai Fovino (JRC, Ispra)

Stefano Panzieri (Università Roma Tre)

Giuseppe Persiano (Università di Salerno)

Silvio Ranise (Fondazione Bruno Kessler, Trento)

Luigi Romano (Università di Napoli, Parthenope)

Domenico Saccà (Università della Calabria)

Massimo Sala (Università degli Studi di Trento)

Pierangela Samarati (Università degli studi di Milano)

Roberto Setola Università Campus Bio-Medico, Roma)

Maurizio Talamo (Università di Roma, Tor Vergata)

Alberto Trombetta (Università dell'Insubria)

Paolo Villoresi (Università di Padova)

Corrado Aaron Visaggio (Università del Sannio)1

Fil rouge track program committee

Luisa Avitabile (University of Roma "La Sapienza")

Claudia Biancotti (Bank of Italy)

Matteo E. Bonfanti (ETH Center for Security Studies)

Francesca Bosco (UNICRI United Nations)

Mario Caligiuri (University of Calabria)

Tommaso Dezan (Istituto Affari Internazionali)

Luisa Franchina (AIIC)

Paola Girdinio (University of Genova)

Umberto Gori (University of Florence)

Luigi Martino (Scuola Superiore Sant'Anna)

Marco Mayer Link (Campus University)

Maurizio Mensi (Legal Service of the EU commission)

Gian Domenico Mosco (LUISS Guido Carli University)

Greta Nasi (Bocconi University)

Ida Claudia Panetta (University of Roma "La Sapienza")

Paolo Prinetto (Politecnico di Torino)

Paolo Spagnoletti (LUISS Guido Carli University)

Demos track Committee

Alessandro Armando (University of Genoa & Fondazione Bruno Kessler)

Marco Balduzzi (Trend Micro)

Roberto Carbone (Security & Trust Unit, FBK)

Fabio Cocurullo (Leonardo)

Emanuele Frontoni (Università Politecnica delle Marche)

Anthony Jeffs (Cisco)

Fabio Lazzini (Sogei)

Rocco Mammoliti (Poste Italiane)

Alessio Merlo (DIBRIS - University of Genoa)

Orillo Narduzzo (ISACA VENICE Chapter)

Gianluigi Pugni (ENEL)

Leonardo Querzoni (Università di Roma, Sapienza)

Gianluca Varisco (Team per la Trasformazione Digitale)

Steering Committee

Alessandro Armando (Univ. di Genova and FBK)

Roberto Baldoni (Università di Roma, Sapienza; CINI)

Nicola Blefari Melazzi (CNIT & Univ. di Roma Tor Vergata)

Carlo Blundo (Univ. di Salerno)

Andrea Bondavalli (Univ. di Firenze)

Marco Conti (CNR)

Bruno Crispo (Univ. di Trento)

Rocco De Nicola (IMT, Lucca)

Pierpaolo Degano (Univ. di Pisa)

Elena Ferrari (Univ. dell’Insubria)

Riccardo Focardi (Univ. Ca’ Foscari, Venezia)

Antonio Lioy (Politecnico di Torino)

Fabio Martinelli (CNR)

Silvio Migliori (ENEA)

Paolo Prinetto (CINI)

Pierangela Samarati (Univ. di Milano)

Stefano Zanero (Politecnico di Milano)

Organizing Committee

Roberto Baldoni (Università di Roma, Sapienza; CINI)

Gabriella Caramagno (Università di Roma, Sapienza, CINI)

Stefano Zanero (Politecnico di Milano)

Angela Miola (CINI)

Paolo Prinetto (Politecnico di Torino, CINI)

Andrea Brancaleoni (Politecnico di Milano)

Community Session Committee

Claudio Bozzato (Cisco Talos)

Marco Squarcina (Università Ca' Foscari, Venezia)

Stefano Zanero (Politecnico di Milano)

Marco Calamari (Hermes Center for Transparency and Digital Human Rights)

Federico Maggi (Trend Micro)

Igor Falcomatà (sikurezza.org)

Mario Anglani

Program


Program at a Glance

Color Semantics
Scientific/Technical Space
(entrance allowed only to "full registrations")
Stakeholder Space
(free entrance, registration required)
February 6th 2018
AULA ROGERS AULA IV AULA III BRettorato - Aula De Donato
270 seats100 seats250 seats250 seats
10.45-11.30REGISTRATION
11.30-13.00TUTORIAL IITUTORIAL I
Security governance and compliance of distributed systems

Claudio Ardagna
(Univ. Milano)

Chair: Silvia Bonomi
(Sapienza Univ. Roma)
Code Analysis Reinvented: boosting software security and privacy

Pietro Ferrara
JuliaSoft

Chair: Davide Maiorca (Univ. Cagliari)
13.00-14.30LUNCHREGISTRATION
14.30-16.00TUTORIAL IVTUTORIAL IIIPRESENTAZIONE DEL LIBRO BIANCO
A Platform for Permissioned Blockchains: Hyperledger Fabric

Federico Lombardi, Andrea Margheri
(University of Southampton)

Chair: Stefano Bistarelli
(Univ. di Perugia)
Dissecting the Droid: Analyzing (and Mangling) Android Applications

Davide Maiorca
(Univ. Cagliari)

Chair: Davide Ariu
(Pluribus One)
Il Futuro della Cybersecurity in Italia:
Ambiti Progettuali Strategici

Modera: Arturo Di Corinto (La Repubblica)

Apertura: Donatella Sciuto (Prorettrice alla Ricerca, Politecnico di Milano)

Presentazione del libro da parte dei curatori

Tavola Rotonda:
Paola Inverardi (Rettrice Univ. L'aquila)
Antonio Samaritani (Direttore Generale AgID)
Alberto Tripi (Delegato Nazionale per la Cybersecurity Confindustria)

Conclusioni: Alessandro Pansa (Direttore Generale, Sistema di informazione per la sicurezza della Repubblica)
16.00-16.30TEA BREAK
16.30-18.00TUTORIAL VITUTORIAL VCOFFEE BREAK
Secure and Usable Mobile Identity Management Solutions: a Methodology for their Design and Assessment

Silvio Ranise, Roberto Carbone, Giada Sciaretta
(Fondazione Bruno Kessler)

Chair: Andrea Margheri
(Univ. of Southampton)
The name of the Rose – What statistical analysis can reveal about the threats hiding behind domain names

Davide Ariu
Pluribus One

Chair: Francesco Buccafurri
(Univ. Reggio Calabria)
17.30-18.30Riunione Direttori dei Nodi Locali del Laboratorio Nazionale Cybersecurity
February 7th 2018
AULA ROGERS AULA IV AULA III BAula GAMMA in Exhibition Room
250 seats100 seats250 seats50 seats
8.00-9.00REGISTRATION
9.00-10.15OPENING SESSION
Stefano Zanero (General Chair ITASEC18, Politecnico di Milano)
Ferruccio Resta (Rettore, Politecnico di Milano)
Paolo Prinetto (Pres. CINI e Laboratorio Nazionale di Cybersecurity)
Luca Del Gobbo (Ass. Regione Lombardia)
Roberta Cocco (Assessore Trasformazione Digitale e Servizi civici, Comune di Milano)
Marco Conti (IIT CNR)
Elena Ferrari (Program Chair ITASEC18, Univ. dell'Insubria)

Modera: Riccardo Luna (Direttore AGI)
live streaming from AULA ROGERS
10.15-10.45KEYNOTE I
Cyberchallenge.IT e la sfida delle nuove generazioni

Camil Demetrescu (Sapienza Univ. Roma)

Chair: Riccardo Luna (Direttore AGI)
live streaming from AULA ROGERS
10.45 - 11.15COFFEE BREAK
11.15-12.15PANEL IINVITED TUTORIAL ITECHNICAL SESSION IVENDOR SESSION I
The economic impact of cybersecurity: Measurement and modeling challenges
(in cooperation with Banca d’Italia – Dipartimento Economia e Statistica)

Modera: Paolo Ciocca (Vice DIrettore Dipartimento Informazioni per la Sicurezza della Repubblica)
Security of Industrial Control Systems

Sandro Etalle
Technical Univ. Eindhoven

Chair: Luigi Romano
(Univ. Napoli Parthenope)
Web and Network Security

Chair: Marino Miculan
(Univ. Udine)
Presentazioni a cura degli sponsor
12.15-13.15PANEL II
Il Futuro della Cybersecurity in Italia I:
Quali gesti concreti dopo il Libro Bianco?


Modera: Michele Pierri (Cyber Affairs)
13.15-14.30LUNCH
14.30-15.30PANEL III
Difesa e resilienza come risposte alla minaccia cyber

Modera: Alessandro Longo (Agendadigitale.eu)
TECHNICAL SESSION IITECHNICAL SESSION IIIVENDOR SESSION II
E-banking and E-voting

Chair: Bruno Crispo
(Univ. Trento)
Access Control and Information Flow

Chair: Pierpalo Degano
(Univ. Pisa)
Presentazioni a cura degli sponsor
15.30-16.00INVITED TALK I
Framework Nazionale per la Cybersecurity v1.1 e sua integrazione con le misure minime AgID

Chair: Marco Baldi
(Univ. Politecnica delle Marche)
16.00-16.30TEA BREAK
16.30-18.10TECHNICAL SESSION IVTECHNICAL SESSION VTECHNICAL SESSION VIVENDOR SESSION III
Blockchain

Chair: Domenico Saccà
(Univ. Calabria)
Security and Risk Analisys

Chair: Andrea Bondavalli
(Univ. Firenze)
Malware

Chair: Alberto Trombetta
(Univ. dell'insubria)
Presentazioni a cura degli sponsor
18.10-20.00ITASEC Steering Committee Meeting (restricted)
February 8th 2018
AULA ROGERS AULA IV AULA III BAula GAMMA in Exhibition Room
250 seats100 seats250 seats50 seats
8.00-8.45REGISTRATION
8.45-9.15INVITED TALK IIINVITED TUTORIAL II

On the security of cryptographic devices

Guido Bertoni
(Security Pattern)

Chair: Domenico Cotroneo
(Univ. di Napoli Federico II)
START-UP SESSION I

Welcome & opening session

Ermes Cyber Security.
Speaker: Stefano Traverso (Ermes Cyber Security)

Attacking proprietary Android vendor customizations.
Speaker: Roberto Natella (Critiware)

Session closure

Chairs: Gabriele Costa (IMT Lucca),
Sistema di informazione per la sicurezza della Repubblica
L'alleanza strategica tra ricerca e intelligence per la sicurezza nazionale

Chair: Camil Demestrescu
(Sapienza Univ. di Roma)
live streaming from AULA ROGERS
9.15-10.15VISION SPEECH I

Agostino Santoni (AD CISCO Italia)
Tino Canegrati (AD HP Italy)
Andrea Biraghi (Managing Director Security & Information Systems Division, Leonardo Company)

Modera: Letizia Tanca (VicePresidente GII, Politecnico di Milano)
live streaming from AULA ROGERS
10.15-10.45KEYNOTE IIlive streaming from AULA ROGERSVENDOR SESSION IV
The Italian Quantum backbone: perspectives and opportunities for cybersecurity

Francesco Saverio Cataliotti (European Laboratory for Nonlinear Spectroscopy - LENS)

Chair: Marco Conti (Comitato Nazionale per la Ricerca in Cybersecurity, CNR)
Presentazioni a cura degli sponsor
10.45 - 11.15COFFEE BREAK
11.15-12.15PANEL IVTECHNICAL SESSION VIITECHNICAL SESSION VIII

Combattere il cybercrime in Italia


Modera: Francesca Bosco (UNICRI)
Privacy and Social Media

Chair: Antonio Barili
(Univ. Pavia)
Attack Prevention

Chair: Giorgio Giacinto
(Univ. Cagliari)
12.15-13.15PANEL V
Il Futuro della Cybersecurity in Italia II:
Quali gesti concreti dopo il libro bianco?
Modera: Mario Dal Co (CorCom)
13.15-14.00LUNCHVENDOR SESSION V
14.00-14.30TECHNICAL SESSION XPresentazioni a cura degli sponsor
14.30-15.30PANEL VITECHNICAL SESSION IXDemo

Chair: Marco Baldi
(Univ. Politecnica delle Marche)
INDUSTRY 4.0

(in cooperazione con Assolombarda)
Chair: Alvise Biffi
(Assolombarda)
Fil Rouge

Chair: Rocco De Nicola
(IMT Lucca)
15.30-16.00KEYNOTE III

Sen. Roberta Pinotti
(Ministro della Difesa)

Introduce: Paolo Prinetto
(Laboratorio Nazionale Cybersecurity,
Presidente CINI)
live streaming from AULA ROGERS
16.00-16.30TEA BREAK
16.30-18.10PANEL VIISPECIAL TUTORIAL SESSION ON TECHNICAL SESSION XIDEMO SESSION
Le minacce del prossimo futuro:
Botnet, APT e RaaS


Modera: Giuseppe Mastronardi
(Presidente AICA)
Post-Quantum Cryptography
organized by
De Componendis Cifris


Chairs:
Massimiliano Sala (Univ. Trento)
Marco Baldi (Univ. Polit. Marche)
Mobile Security

Chair: Corrado Aaron Visaggio
(Univ. Sannio)
Live Demo from Session X

Chair: Marco Balduzzi (Trend Micro)
19.30Social Dinner @ Palazzo Clerici
February 9th 2018
AULA ROGERS AULA IV AULA III BAula GAMMA in Exhibition Room
250 seats100 seats250 seats50 seats
8.00-8.45REGISTRATION
8.45-9.15KEYNOTE IV COMMUNITY SESSION

Chair: Yvette Agostini
(CSA Italy)
START-UP SESSION II


Banksealer. Speaker: Francesco Carbone (Banksealer)

Machines that Learn to Sense Web Threats.Speaker: Davide Ariu (PluribusOne)

Towards the Automated Risk Assessment of Mobile Apps Ecosystems.
Speaker: Luca Verderame (Talos)

Closure and award ceremony


Chairs: Alvise Biffi (Assolombarda)
Data Protection in Emerging Scenarios

Pierangela Samarati
(Univ. Milano)

Chair: Paolo Prinetto
(Laboratorio Nazionale Cybersecurity,
Presidente CINI)
live streaming from AULA ROGERS
9.15-10.15VISION SPEECHES II

Fabio Cappelli
(Cybersecurity Leader area MED, EY)
Francesco teodonno
(Security Unit Leader, IBM Italy)
Antonio Bosio
(Product&Solution Director, Samsung Electronics Italia)

Modera: Paolo Ciancarini
(Presidente GRIN, Univ. Bologna)
live streaming from AULA ROGERS
10.15-10.45INVITED TALK III

Cyber security and Trust:
the European policy landscape


Andrea Servida
(Head of Unit "eGovernment and Trust", DG CONNECT)

Chair: Stefano Zanero
(General Chair ITASEC18, Politecnico di Milano)
live streaming from AULA ROGERS
10.45 - 11.15COFFEE BREAK
11.15-11.45INVITED TALK IVTECHNICAL SESSION XIIINVITED TUTORIAL IIIVENDOR SESSION VI
La protezione dati come
presupposto alla cybersecurity


Antonello Soro
(Presidente dell'Autorità
Garante per la protezione dei dati personali)

Introduce: Elena Ferrari
(Univ. dell'Insubria)
Secure Systems

Chair: Paolo Ciancarini
(Univ. Bologna)
Secure communication on global scale by means of Quantum Key Distribution, on the ground and in Space

Paolo Villoresi (Univ. Padova)

Chair: Sara Foresti (Univ. Milano)
Presentazioni a cura degli sponsor
11.45-13.00PANEL VIII
Il Futuro della Cybersecurity in Italia III:
Quali gesti concreti dopo il libro bianco?

Modera: Luca Tremolada (Il Sole 24 Ore)
13.00-13.30
CLOSING SESSION

Roberto Baldoni
(Vice Direttore generale con delega alla cyber,
Sistema di informazione
per la sicurezza della Repubblica)

Paolo Prinetto
(Laboratorio Nazionale di Cybersecurity,
Presidente CINI)
live streaming from AULA ROGERS
13.30 -14.30LIGTH LUNCH

Detailed Program

Color Semantics
Scientific/Technical Space (entrance allowed only to "full registrations")
Stakeholder Space (free entrance, registration required)
February 6th 2018AULA
10.45-11.30REGISTRATION
11.30-13.00TUTORIAL ICode Analysis Reinvented: boosting software security and privacy
Pietro Ferrara (JuliaSoft)

Chair: Davide Maiorca (Univ. Cagliari)
AULA IV
11.30-13.00TUTORIAL IISecurity governance and compliance of distributed systems
Claudio Ardagna (Univ. Milano)

Chair: Silvia Bonomi
(Sapienza Univ. Roma)
AULA ROGERS
13.00-14.30LUNCH
13.00-14.30REGISTRATIONRETTORATO
14.30-16.30PRESENTAZIONE DEL LIBRO Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici

Modera: Arturo Di Corinto (La Repubblica)

Introduzione: Donatella Sciuto (Prorettrice alla Ricerca, Politecnico di Milano)

Presentazione del libro bianco da parte dei curatori

Tavola Rotonda:
Paola Inverardi (Rettrice Univ. L'Aquila)
Antonio Samaritani (Direttore Generale AgID)
Alberto Tripi (Delegato Nazionale per la Cybersecurity Confindustria)

Conclusioni: Alessandro Pansa (Direttore Generale Sistema di informazione per la sicurezza della Repubblica)
AULA DE DONATO
16.30-17.00COFFEE BREAKAULA DE DONATO
14.30-16.00TUTORIAL IIIDissecting the Droid: Analyzing (and Mangling) Android Applications
Davide Maiorca (Univ. Cagliari)

Chair: Davide Ariu (Pluribus One)
AULA IV
14.30-16.00TUTORIAL IVA Platform for Permissioned Blockchains: Hyperledger Fabric
Federico Lombardi, Andrea Margheri University of Southampton

Chair: Stefano Bistarelli (Univ. Perugia)
AULA ROGERS
16.00-16.30TEA BREAK
16.30-18.00TUTORIAL VThe name of the Rose – What statistical analysis can reveal about the threats hiding behind domain names
Davide Ariu (Pluribus One)

Chair: Francesco Buccafurri (Univ. Reggio Calabria)
AULA IV
16.30-18.00TUTORIAL VISecure and Usable Mobile Identity Management Solutions: a Methodology for their Design and Assessment
Silvio Ranise, Roberto Carbone, Giada Sciaretta (Fondazione Bruno Kessler)

Chair: Andrea Margheri (University of Southampton)
AULA ROGERS
17.30-18.30Riunione Direttori Nodi Locali del Laboratorio Nazionale CybersecurityAULA IV
February 7th 2018AULA
8.00-9.00REGISTRATION
9.00-10.15OPENING SESSIONStefano Zanero (General Chair ITASEC18, Politecnico di Milano)
Ferruccio Resta (Rettore, Politecnico di Milano)
Paolo Prinetto (Pres. CINI e Laboratorio Nazionale di Cybersecurity)
Luca Del Gobbo (Ass. Regione Lombardia)
Roberta Cocco (Assessore Trasformazione Digitale e Servizi civici, Comune di Milano)
Marco Conti (IIT CNR)
Elena Ferrari (Program Chair ITASEC18, Univ. dell'Insubria)

Modera: Arturo Di Corinto (La Repubblica)
AULA ROGERS (live streaming AULA IV)
10.15-10.45KEYNOTE I
Cyberchallenge.IT e la sfida delle nuove generazioni
Camil Demetrescu (Sapienza Univ. Roma)

Chair: Arturo Di Corinto (La Repubblica)
AULA ROGERS (live streaming AULA IV)
10.45-11.15COFFEE BREAK
11.15-12.15PANEL I
The economic impact of cybersecurity: Measurement and modeling challenges

(in cooperation with Banca d’Italia – Dipartimento Economia e Statistica)
Claudia Biancotti (Banca d’Italia – Dipartimento Economia e Statistica)
Antonio Schizzerotto (FBK & Univ. Trento)
Giovanni Vigna (University of California Santa Barbara)

Modera: Claudia Biancotti (Banca d’Italia – Dipartimento Economia e Statistica)
AULA ROGERS (live streaming AULA IV)
12.15-13.15PANEL II
Il Futuro della Cybersecurity in Italia:
Quali gesti concreti dopo il Libro Bianco?
Nunzia Ciardi (CNAIPIC, Polizia di Stato)
Nicola Blefari Melazzi (Comitato Nazionale per la Ricerca in Cybersecurity, Presidente CNIT)
Francesco Morelli (CISO, TERNA)

Modera: Michele Pierri (Cyber Affairs)
AULA ROGERS (live streaming AULA IV)
11.15-13.15INVITED TUTORIAL ISecurity of Industrial Control Systems
Sandro Etalle
(Technical Univ Eindhoven)

Chair: Luigi Romano (Univ. Napoli Parthenope)
AULA IV
11.15-13.15TECHNICAL SESSION I
Web and Network Security
Chair: Marino Miculan (Univ. Udine)

- Riccardo Focardi, Francesco Palmarini, Marco Squarcina, Mauro Tempesta and Graham Steel. Mind Your Keys? A Security Evaluation of Java Keystore.
- Stefano Calzavara, Alvise Rabitti and Michele Bugliesi. Dr Cookie and Mr Token - Web Session Implementations and How to Live with Them.
- Ivan Letteri, Massimo Del Rosso, Pasquale Caianiello and Dajana Cassioli. Performance of Botnet Detection by Neural Networks in Software-Defined Networks.
- Andrea Bernardini. Extending Domain Name Monitoring. Identifying Potential Malicious Domains Using Hash Signatures of DOM Elements.
AULA III B
11.15-14.30VENDOR SESSION IChair: Alessandro Barenghi (PoliMI)

11.15-11.35 Domenico Raguseo, Security Technical Manager, IBM Europe - Francesco Inzirillo, Signalling Product Line Director, MerMec. Migliorare la cybersecurity delle infrastrutture critiche.
11.35-11.55 Rodolfo Mecozzi, Cybersecurity Senior Manager, EY. EY Digital SOC & Cybersecurity Analytics.
11.55-12.15 Massimo Angiulli, Security Engineer, Check Point Software Technologies. Making Real Cyber Security possible in 2018.
12.15-12.35 Antonio Varriale, Managing Director, Blu5 Labs. Next Generation of Cybersecurity, a full disruptive approach.
12.35-12.55 Matteo Arrigoni, Sr System Engineer, Fortinet. Subverting Threats with Intelligent Expert Systems.
12.55-13.15 Paolo Carini, Cisco. Identificare gli attacchi prima che avvengano: utilizzo di modelli predittivi per l’analisi delle relazioni e delle evoluzioni delle infrastrutture delle minacce cyber.
14.10-14.30 Matteo Rigoni, Enterprise Program Manager, Samsung Electronics Italia SpA. Samsung Knox, Secure by Design.
Aula GAMMA in
Exhibition Room
13.15-14.30LUNCH
14.30-15.30PANEL III
Difesa e resilienza come risposte alla minaccia cyber
Antonio Varriale (Managing Director, Blu5 Labs)
David Gubiani (Security Eng. Manager Italy, ‎Check Point Software Technologies)  
Matteo Arrigoni (Sr. Systems Eng., Fortinet)
Carlo Mauceli (CISO, Microsoft)

Modera: Alessandro Longo (Agendadigitale.eu)
AULA ROGERS
15.30-16.00INVITED TALK I
Framework Nazionale per la Cybersecurity v1.1 e sua integrazione con le misure minime AgID
Leonardo Querzoni (CIS Sapienza)
Lorenzo Desidera (Senior Manager Technology Cybersecurity, PwC)

Modera: Marco Baldi (Univ. Politecnica delle Marche)
14.30-16.00TECHNICAL SESSION II
E-banking and E-voting
Chair: Bruno Crispo (Univ. Trento)

- Michele Carminati, Luca Valentini and Stefano Zanero. A Supervised Auto-Tuning Approach for a Banking Fraud Detection System.
- Federico Sinigaglia, Roberto Carbone and Gabriele Costa. Strong Authentication for e-Banking: A Survey on European Regulations and Implementations.
- Vincenzo Iovino and Ivan Visconti. On the (In)Security of Italian University Elections.
AULA IV
14.30-16.00TECHNICAL SESSION III
Access Control and
Information Flow
Chair: Pierpalo Degano (Univ. Pisa)

- Cinzia Bernardeschi, Paolo Masci and Antonella Santone. Data Leakage in Java Applets with Exception Mechanism.
- Andrea Margheri, Rosario Pugliese and Francesco Tiezzi. FACPL: A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies.
- Selvakumar Ramachandran, Andrea Dimitri, Maulahikmah Galinium, Muhammad Tahir, Indirajith Viji Ananth, Christian H. Schunck and Maurizio Talamo. Understanding and Granting Android Permissions: A User Survey.
AULA III B
14.30-16.30VENDOR SESSION IIChair: Davide Quarta (PoliMI)

14.35-14.55
Alessandro Menna, Head of Sales Technical Support, Cyber Security & ICT Solutions LoB, Leonardo SpA. Building Cyber Defence Capabilities for Digital Organizations.
14.55-15.15 Andrea Piazza, Cybersecurity Architect, Microsoft. Secure Privileged Access.
15.15-15.35 Arkadiusz Kotowski, Security Engineer, Academy Program Manager, Palo Alto Networks. L’Academy Palo Alto Networks offre un livello di specializzazione di primo e secondo livello ad Istituzioni accademiche accreditate con certificazioni, training, laboratori – free of charges – per fornire agli studenti i più innovativi tool di next.generation security. Overview del programma e dei Corsi di formazione.
15.35-15.55 Fabio Lorenzo, Direttore, PwC - Giuseppe D'Agostino, Direttore PwC - Salvatore Carrino, SVP ICT Global Cyber Security, Eni.
Aula GAMMA in
Exhibition Room
16.00-16.30TEA BREAK
16.30-18.10TECHNICAL SESSION IV
Blockchain
Chair: Domenico Saccà (Univ. Calabria)

- Nicola Atzei, Massimo Bartoletti, Stefano Lande and Roberto Zunino. A Formal Model of Bitcoin Transactions.
- Stefano De Angelis, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri and Vladimiro Sassone. PBFT Vs Proof-Of-Authority: Applying the CAP Theorem to Permissioned Blockchain.
- Stefano Bistarelli, Francesco Santini, Marco Mantilacci and Paolo Santancini. An End-To-End Voting-System Based on Bitcoin.
AULA ROGERS
16.30-18.10TECHNICAL SESSION V
Security and
Risk Analisys
Chair: Andrea Bondavalli (Univ. Firenze)

- Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin and Stefano Zanero. An Experimental Security Analysis of an Industrial Robot Controller.
- Pericle Perazzo, Carlo Vallati, Antonio Arena, Giuseppe Anastasi and Gianluca Dini. An Implementation and Evaluation of the Security Features of RPL.
- Giancarlo Pellegrino. Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
AULA IV
16.30-18.10TECHNICAL SESSION VI
Malware

Chair: Alberto Trombetta (Univ. dell'insubria)

- Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia and Camil Demetrescu. Assisting Malware Analysis with Symbolic Execution: A Case Study.
- Roberto Jordaney, Kumar Sharad and Lorenzo Cavallaro. Transcend: Detecting Concept Drift in Malware Classification Models.
- Giuseppe Laurenza, Leonardo Aniello, Riccardo Lazzeretti and Roberto Baldoni. Malware Triage based on Static Features and Public APT Reports.
- Alessandra De Paola, Salvatore Favaloro, Salvatore Gaglio, Giuseppe Lo Re and Marco Morana. Malware Detection through Low-Level Features and Stacked Denoising Autoencoders.
AULA III B
16.30-18.10VENDOR SESSION IIIChair: Michele Carminati (PoliMI)

16.30-16.55 Giorgio Mosca, Director Competitive Analysis, Strategy and Technology & Security & Information Systems Division, Leonardo SpA. Security in a cyber-physical perspective: Leonardo’s approach.
16.55-17.15 Francesco Figurelli, Senior Incident Response Specialist, GERT – Kaspersky Lab. Kaspersky CyberSecurity Services: how we do it?
17.15-17.35 Gianluca Zanini, Nicola De Bello, Francesco Belli, Var Group. Blockchain: implicazioni di Cybersecurity.
Aula GAMMA in
Exhibition Room
18.10-20.00ITASEC Steering Committee Meeting (restricted)Sala Consiglio
February 8th 2018AULA
8.00-8.45REGISTRATION
8.45-9.15INVITED TALK II
L'alleanza strategica tra ricerca e intelligence per la sicurezza nazionale
Rappresentante del Sistema di informazione per la sicurezza della Repubblica

Chair: Camil Demetrescu (Sapienza Univ. Roma)
AULA ROGERS (live streaming AULA IV)
9.15-10.15VISION SPEECHES IAgostino Santoni (AD, CISCO Italia)
Tino Canegrati (AD, HP Italy)
Andrea Biraghi (Managing Director Security & Information Systems Division, Leonardo Company)

Modera: Letizia Tanca (VicePresidente GII, Politecnico di Milano)
AULA ROGERS (live streaming AULA IV)
10.15-10.45KEYNOTE II
The Italian Quantum backbone: perspectives and opportunities for cybersecurity
Francesco Saverio Cataliotti (European Laboratory for Nonlinear Spectroscopy - LENS)

Chair: Marco Conti (Comitato Nazionale per la Ricerca in Cybersecurity, CNR)
AULA ROGERS (live streaming AULA IV)
8.45-10.45INVITED TUTORIAL IIOn the security of cryptographic​ devices
Guido Bertoni (Security Pattern)

Chair: Domenico Cotroneo (Univ. di Napoli Federico II)
AULA III B
8.45-10.45START-UP SESSION I
Welcome
Attacking proprietary Android vendor customizations, Roberto Natella (Critiware)
Ermes Cyber Security, Stefano Traverso (Ermes CyberSecurity)
Session closure
Aula GAMMA in
Exhibition Room
Chair: Gabriele Costa (IMT Lucca)
10.15-13.15VENDOR SESSION IVChair: Gerardo Pelosi (PoliMI)

10.15-10.35 David Gubiani, Security Engineering Manager Italy, Check Point Software Technologies. You Can Get Burned when it’s cloudy.
10.35-10.55 Antonio Formato, Technology Solutions Professional, Microsoft. User and Entity Behavior Analytics (UEBA) the new threat detection frontier: Microsoft ATA.
10.55-11.15 Marco Ghini, Cross Domain Technical Engineer VP, Leonardo SpA. Cyber-Physical Convergence in Public Safety Solution.
11.15-11.35 Vincenzo Conti, Security Technical Manager, IBM Italia. Threat investigation automatica attraverso la cognitive security.
11.35-11.55 Fabio Panada, Senior Security Consultant, Cisco. Sharing Threat Intelligence Through Integration.
11.55-12.15 Umberto Pirovano, Sistem Engineer Manager, Palo Alto. L’evoluzione della Next Generation Security Platform di Palo Alto Networks verso un nuovo modello di consumo della Cyber Security.
Introduzione a Magnifier, nuovo componente dell’Application Framework
.
12.15-12.35 Antonio Varriale, Managing Director, Blu5 Labs. Hardware Artificial Intelligence for a Future-Resistant Cybersecurity.1
12.35-12.55 Alessandro Berta, System Engineer, Fortinet. Securing Industrial Control Networks.
12.55-13.15 Mauro Felice, Senior Manager, PwC. Cloud Security Governance mediante soluzione di Cloud Access Security Broker.
10.45-11.15COFFEE BREAK
11.15-12.15PANEL IV
Combattere il cybercrime in Italia
Corrado Federici (Tenente Colonnello Reparto Indagine Telematiche - ROS, Arma dei Carabinieri)
Giovanni Reccia (Comandante Nucleo Speciale Frodi Tecnologiche, Guardia di Finanza)
Giovanni Russo (Procuratore, Direzione Nazionale Antimafia)
Roberto Sgalla (Prefetto, Polizia di Stato)

Modera: Francesca Bosco (UNICRI)
AULA ROGERS
12.15-13.15PANEL V
Il Futuro della Cybersecurity in Italia:
Quali gesti concreti dopo il Libro Bianco?
Rosa Villecco Calipari (Membro del Comitato Parlamentare per la Sicurezza della Repubblica)
Rita Forsi (CERT Nazionale, Ministero dello Sviluppo Economico)
Francesco Vestito (Comando Interforze Operazioni Cibernetiche)
Roberta Lotti (Ministero dell'Economia e delle Finanze)

Modera: Mario Dal Co (CorCom)
AULA ROGERS
11.15-13.15TECHNICAL SESSION VII
Privacy and Social Media
Chair: Antonio Barili (Univ. Pavia)

- Michelangelo Puliga, Guido Caldarelli, Alessandro Chessa and Rocco De Nicola. Understanding the Twitter User Networks of Viruses and Ransomware Attacks.
- Francesco Buccafurri, Denis Migdal, Gianluca Lax, Serena Nicolazzo, Antonino Nocera and Rosenberger Christophe. Contrasting False Identities in Social Networks by Trust Chains and Biometric Reinforcement.
- Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi and Maurizio Tesconi. DNA Fingerprinting: A Nature-Inspired Technique for Spambot Detection.
- Pietro Ferrara and Fausto Spoto. Static Analysis for GDPR Compliance.

AULA IV
11.15-13.15TECHNICAL SESSION VIII
Attack Prevention
Chair: Giorgio Giacinto (Univ. Cagliari)

- Ruggero Lanotte, Massimo Merro, Riccardo Muradore and Luca Viganò. A Formal Approach to Cyber-Physical Attacks.
- Giovanni Bottazzi, Giuseppe F. Italiano and Domenico Spera. Preventing Ransomware Attacks Through File System Filter Drivers.
- Domenico Cotroneo, Andrea Paudice and Antonio Pecchia. Empirical Analysis and Validation of Security Alerts Filtering Techniques.
- Christian Callegari and Michele Pagano. A Novel Bivariate Entropy-based Network Anomaly Detection System.
AULA III B
13.15-14.30LUNCH
13.15-15.30VENDOR SESSION VChair: Pietro Colombo (Univ. Uninsubria)

13.55-14.15
Vladimir Dashchenko, ICS CERT Vulnerability Research Group Manager, Kaspersky Lab. Italy and Europe: cybersecurity industrial landscape.
14.15-14.35 Francesco Alberti, Var Group. Cybersecurity, scelte strategiche per le aziende.
14.35-14.55 Ettore Galluccio, Senior Manager - Cybersecurity Leader Centro-Sud, EY. IoT Ecosystem Protection.
14.55-15.15 Luisa Franchina. Partner Hemres Bays. Social Engineering: Tecniche Predittive.
Aula GAMMA in
Exhibition Room
14.00-15.30TECHNICAL SESSION X
Demo
Chair: Marco Baldi (Univ. Politecnica delle Marche)

- Luca Deri and Arianna Del Soldato. Enforcing Security in IoT and Home Networks.
- Marco Angelini, Simone Lenti and Giuseppe Santucci. Visual Exploration and Analysis of the Italian Cybersecurity Framework.
- Luca Nicoletti, Andrea Margheri, Federico Lombardi, Vladimiro Sassone and Francesco Paolo Schiavo. Cross-Cloud Management of Sensitive Data via Blockchain: a Payslip Calculation Use Case.
- Stefano Bistarelli, Matteo Parroccini and Francesco Santini. Visualizing Bitcoin Flows of Ransomware: WannaCry One Week Later.
- Alfonso Solimeo, Luca Capacci, Stefano Taino and Rebecca Montanari. MAD-IOS: dynamic app vulnerability analysis in non-jailbroken devices.
- Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani and Silvio Ranise. Towards Secure and Efficient Attestation for highly Dynamic Swarms.
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta and Lorenzo Veronese. Firewall Management With FireWall Synthesizer.
AULA III B
14.30-15.30PANEL VI
INDUSTRY 4.0
(in cooperation with Assolombarda)
Eugenio Di Sciascio (Rettore, Politecnico di Bari)
Fabio Cocurullo (CTO LoB Cybersecurity & Information Systems, Leonardo)
Ivan Basso (ICT Manager, Fluid-o-tech)
Alberto Baban (CEO, Maschi Aratri srl)
Benito Mirra (Cyber Security Officer Huawei Enterprise Business Group, Huawei)
Modera: Alvise Biffi (Assolombarda)
AULA ROGERS
14.30-15.30TECHNICAL SESSION IX
Fil Rouge
Chair: Rocco De Nicola (IMT Lucca)

- Claudia Biancotti. Cyber Attacks: Preliminary Evidence from the Bank of Italy's Business Surveys.
- Francesco Di Nocera and Tiziana Catarci. Human Factors in Cybersecurity.
- Matteo E. Bonfanti. Another –INT on the Horizon? Cyber-Intelligence is the New Black.
AULA IV
15.30-16.00KEYNOTE IIISen. Roberta Pinotti (Ministro della Difesa della Repubblica Italiana)

Introduce: Paolo Prinetto (Laboratorio Nazionale Cybersecurity, Presidente CINI)
AULA ROGERS (live streaming AULA IV)
16.00-16.30TEA BREAK
16.30-18.10PANEL VII
Le minacce del prossimo futuro:
Botnet, APT e RaaS
Andrea Brigo (Information Security Project Manager, Axians Italy)
Giampaolo Dedola (Security Resercher GReAT, Kaspersky)
Stefania Iannelli (Systems Engineer & Cyber Range Official Trainer, Palo Alto Networks)
Marco Zanovello (Program Manager. Yarix - Cyber Division Var Group)

Modera: Giuseppe Mastronardi (Presidente AICA)
AULA ROGERS
16.30-18.10
SPECIAL TUTORIAL SESSION ON
Post-Quantum Cryptography
organized by
De Componendis Cifris
Chairs: Massimiliano Sala (Univ. Trento), Marco Baldi (Univ. Polit. Marche)

- Massimiliano Sala. De Componendis Cifris: a national initiative in cryptography.
- Massimo Giulietti. De Cifris: our research lines.
- Franco Chiaraluce. Overview of the NIST Post-Quantum Standardization Initiative.
- Marco Baldi and Alessandro Barenghi. Post-Quantum Cryptosystems Based on Error-Correcting Codes.
- Cecilia Boschini. Post-Quantum Cryptosystems Based on Lattices.
- Federico Pintore. Post-Quantum Cryptosystems Based on Elliptic Curve Isogenies.
AULA IV
16.30-18.10TECHNICAL SESSION XI
Mobile Security
Chair: Corrado Aaron Visaggio (Univ. del Sannio)

- Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Igino Corona, Fabio Roli and Giorgio Giacinto. Securing Machine Learning for Android Malware Detection.
- Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci and Roberto Baldoni. Android Malware Family Classification Based on Resource Consumption over Time.
- Corrado Aaron Visaggio and Gerardo Canfora. DoApp: A Generation-Based Intent Fuzzer for Testing Android Components.
- Valerio Costamagna, Bruno Crispo, Francesco Bergadano and Giovanni Russello. Black-Box App Sandboxing for Stock Android.
AULA III B
16.30-18.10DEMO SESSIONLive Demo from Session IX

Chair: Marco Balduzzi (Trend Micro)
Aula GAMMA in
Exhibition Room
19.30Social Dinner @ Palazzo Clerici
February 9th 2018AULA
8.00-8.45REGISTRATION
8.45-9.15KEYNOTE IV
Data Protection in Emerging Scenarios
Pierangela Samarati (Univ. Milano)

Chair: Paolo Prinetto (Laboratorio Nazionale di Cybersecurity, CINI)
AULA ROGERS (live streaming AULA IV)
9.15-10.15VISION SPEECHES IIFabio Cappelli (Cybersecurity Leader area MED, EY)
Francesco Teodonno (Security Unit Leader, IBM Italy)
Antonio Bosio (Product&Solution Director Samsung Electronics Italia)

Modera: Paolo Ciancarini (Presidente GRIN, Univ. Bologna)
AULA ROGERS (live streaming AULA IV)
10.15-10.45INVITED TALK III
Cyber security and Trust:
the European policy landscape
Andrea Servida (Head of Unit "eGovernment and Trust", DG CONNECT)

Chair: Stefano Zanero (General Chair ITASEC18, Politecnico di Milano)
AULA ROGERS (live streaming AULA IV)
8.45-10.45COMMUNITY SESSIONChair: Yvette Agostini (CSA Italy)

- Gianpiero Costantino, Antonio La Marra, Fabio Martinelli and Ilaria Matteucci. A Social Engineering Attack to Leak Private Information from Android In-Vehicle Infotainment Systems
AULA III B
- Roberto Clapis and Stefano Zanero. Night of the living vulnerabilities: forever-days of IoT
- Riccardo Focardi, Riccardo Francescato and Francesco Palmarini. Find a Pin in the Haystack: Efficient Black-box JTAG Discovery
- Lorenzo Nicolodi and Francesco Perna. Network hacks for smart attacks
8.45-10.45START-UP SESSION II
Chair: Alvise Biffi (Assolombarda)
Banksealer, Francesco Carbone (Banksealer)
Machines that Learn to Sense Web Threats, Davide Ariu (PluribusOne)
Towards the Automated Risk Assessment of Mobile Apps Ecosystems, Luca Verderame (Talos)
Closure and award ceremony


Aula GAMMA in
Exhibition Room
10.45-11.15COFFEE BREAK
11.15-11.45INVITED TALK IV
La protezione dati
come presupposto alla cybersecurity
Antonello Soro (Presidente dell'Autorità Garante per la protezione dei dati personali)

Introduce: Elena Ferrari (Univ. dell'Insubria)
AULA ROGERS
11.45-13.00PANEL VIII
Il Futuro della Cybersecurity in Italia:
Quali gesti concreti dopo il Libro Bianco?
Angelo Tofalo (membro del Comitato Parlamentare per la Sicurezza della Repubblica)
Domenico Laforenza (Direttore IIT, CNR)
Giorgio Mosca (Confindustria Digitale)
Camil Demetrescu (CIS, Sapienza Univ. di Roma)

Modera: Luca Tremolada (Il Sole 24 Ore)
AULA ROGERS
11.15-13.00TECHNICAL SESSION XII
Secure Systems
Chair: Paolo Ciancarini (Univ. Bologna)

- Raffaele Bolla, Paolo Maria Comi and Matteo Repetto. A Distributed Cyber-Security Framework for Heterogeneous Environments.
- Gabriele Costa, Enrico Russo and Alessandro Armando. Automating the Generation of Cyber Range Virtual Scenarios With VSDL.
- Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Gaetano Papale, Luigi Romano and Luigi Sgaglione. Secure Big Data Processing in Untrusted Clouds: The SecureCloud Project.
- Simone Soderi, Lorenzo Mucchi, Matti Hämäläinen, Alessandro Piva and Jari Iinatti. Physical layer security based on spread-spectrum watermarking and jamming receiver.
AULA IV
11.15-13.00INVITED TUTORIAL IIISecure communication on global scale by means of Quantum Key Distribution, on the ground and in Space
Paolo Villoresi (Univ. Padova)

Chair: Sara Foresti (Univ. Milano)
AULA III B
11.15-13.00VENDOR SESSION VIChair: Franco Chiaraluce (Univ. Politecnica delle Marche)

11.15-11.35 Silvano Samarati, Security Solutions Sales, Hp - Gianluca Sicuro, Security Technical Consultant, Hp. Print Security: how to protect devices, data and documents.
11.35-11.55 Andrea Negroni, Security Partner Account Manager, Cisco. Changing the Equation.
11.55-12.15 Ettore Galluccio, Senior Manager-Cybersecurity Leader Centro-Sud, EY - Michael Clemente, DI.GI. International. Integrated Risk Monitoring.
12.15-12.35 Tomasz Slowinsky. Manager of GDPR Business Unit, IBM Italia. L'approccio e le soluzioni IBM in ambito GDPR.
12.35-12.55 Lorenzo Zanfardin. Sales & Marketing Director, Axians.
Aula GAMMA in
Exhibition Room
13.00-13.30CLOSING SESSIONRoberto Baldoni (Vice Direttore generale con delega alla cyber, Sistema di informazione per la sicurezza della Repubblica)

Chair: Paolo Prinetto (Laboratorio Nazionale di Cybersecurity, Presidente CINI)
AULA ROGERS (live streaming AULA IV)
13.30-14.30LIGHT LUNCH

Registration


Registration Link

Registration to ITASEC18 are closed.

Registration is mandatory and the access to the conference place will be granted to registered people, only. Note: At least one author for each accepted paper in one of the conference tracks will have to cover a FULL Conference registration. For authors with multiple accepted papers one FULL Conference registration per accepted paper will be required.

Full Conference Registration

It includes:
  • Full access to ALL the events for the whole Conference, including the Stakeholder Space, the Scientific/Technical Space, the Tutorials, and the Exhibition Space
  • Reserved seat at the launch of the White Book “Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici” on Feb 6th
  • A paper copy of the White Book
  • Conference bag
  • Conference proceedings
  • Lunches
  • Coffee Breaks
  • Social Dinner on Feb 8th at Palazzo Clerici, including a guided tour to the Tiepolo’s frescoes
  • Costs:
    • 300 € : Until Jan 19th
    • 500 € : From Jan 20th to Feb 3rd
    • 700 € : On-site
    • Military & Law Enforcement force and Student Full Conference Registration

      It includes:
      • Full access to ALL the events for the whole Conference, including the Stakeholder Space, the Scientific/Technical Space, the Tutorials, and the Exhibition Space
      • Reserved seat at the launch of the White Book “Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici” on Feb 6th
      • A paper copy of the White Book
      • Conference bag
      • Conference proceedings
      • Lunches
      • Coffee Breaks
      • It does not include:
        • Social Dinner on Feb 8th at Palazzo Clerici
        • Costs:
          • 200 € : Until Jan 19th
          • 300 € : From Jan 20th to Feb 3rd
          • 400 € : On-site
          • One-day Full Conference Registration

            It includes:
            • Full access to ALL the events for the whole Conference, including the Stakeholder Space, the Scientific/Technical Space, the Tutorials, and the Exhibition Space on the chosen day
            • Reserved seat at the launch of the White Book “Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici” on Feb 6th
            • A paper copy of the White Book
            • Conference bag
            • Conference proceedings
            • Lunch on the chosen day
            • Coffee Breaks on the chosen day
            • It does not include:
              • Social Dinner on Feb 8th at Palazzo Clerici
              • Costs:
                • 90 € : Until Jan 19th
                • 110 € : From Jan 20th to Feb 3rd
                • 150 € : On-site
                • One-day Stakeholder Space, only, Registration

                  It includes:
                  • Full access to the events of the Stakeholder Space and of the Exhibition Space, only, on the chosen day
                  • Coffee Breaks
                  • It does not include:
                    • Access to the events of the Scientific/Technical Space
                    • Lunches
                    • Social Dinner on Feb 8th at Palazzo Clerici
                    • Costs:
                      • Free of charge
                      • Press Accreditation

                        please send an email at comunicazione.cybersecurity@consorzio-cini.it

                        Presentazione del Libro Bianco della Cybersecurity


                        Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici

                        Progetti e Azioni per difendere al meglio il Paese dagli attacchi informatici

                        Martedì 6 Febbraio 2018
                        Aula De Donato
                        Politecnico di Milano - Milano Città Studi (Edificio 3)
                        Piazzale Leonardo da Vinci, 32

                        Il libro bianco sulla cybersecurity mette in evidenza il punto di vista della comunità scientifica nazionale riguardo l'importanza di perseguire una politica di gestione della minaccia cyber derivante dal processo di trasformazione digitale. Il libro delinea un insieme di ambiti progettuali e di azioni trasversali che la comunità della ricerca ritiene essenziali perseguire nel settore pubblico e in quello privato per mantenere nel tempo la minaccia all’interno di un rischio residuo accettabile.

                        Il Libro bianco, scritto da oltre 150 docenti universitari e ricercatori provenienti da oltre cinquanta tra Università e Enti di Ricerca, sarà lanciato il 6 Febbraio all'interno di ITASEC2018 presso l'Aula De Donato del Politecnico di Milano (Piazza Leonardo Da Vinci, 32, 20133 Milano).

                        L'evento di presentazione si svolgerà in italiano.

                        Coloro che hanno una registrazione FULL a ITASEC2018 hanno garantita una registrazione automatica all'evento.

                        Venue and Accommodation


                        Venue

                        Conference

                        The conference will take place in the Politecnicodi Milano. Below you can find directions fromMilano Central railway stationand fromMilano Linate airport, respectively.

                        Social Dinner

                        The Social Dinner on Feb 8th will take place in the Palazzo Clerici.

                        Accommodation

                        Following you can find a list of the hotels Politecnico di Milano usually suggests. In order to book the room with these special rates, please contact directly the hotel mentioning your participation in the event organized at Politecnico di Milano.

                        You can find the hotels on the map.

                        Please note that from 1st July 2013 a CITY TOURIST TAX per night per person has to be added to the room price. Note also that in the fairs periods the hotels cannot guarantee the same rates and room availability.

                        Hotel nameSingleDouble single useDouble
                        Hotel Dieci ****95.00 €125.00 €150.00 €
                        Hotel Galles ****145€-165 €
                        IH Hotels Milano Puccini ****85.00 €105.00 €125.00 €
                        Hotel Madison ****79.00- 99.00 € -95.00 - 128.00 €
                        Hotel Mediolanum ****129.00 €-171.00 - 224.00 €
                        Hotel Radisson ****-110.00 - 150.00 €-
                        Hotel Sanpi ****129.00 €140.00 - 210.00 €153.00 - 240.00 €
                        Hotel Albert ***88.00 €110.00 €110.00 €
                        Hotel Gamma ***80.00 €100.00 €120.00 €
                        Oasi Village Hotel ***---
                        Hotel Palazzo Delle Stelline ***110.00€125.00 - 135.00 €155 - 175 €
                        Hotel San Francisco ***65.00 €75.00 €100.00 €
                        Hotel Trentina **50.00 €65.00 €65.00 €
                        IH Hotels60.00 €-70.00 €
                        Suitime Milano118.00 - 164.00 €--

                        Contacts


                        Please download our sponsorship package for details about the available sponsorship plans. Should you have any question, please contact us by email at

                        Platinum Sponsors




                        Gold Sponsors




                        Silver Sponsors

                        Media Partners