Personal information

Activities

Employment (2)

University of Southampton: Southampton, GB

Employment
Source: check_circle
University of Southampton

University of Southampton: Southampton, Hampshire, GB

2018-01-01 to present | Lecturer (Electronics and Computer Science)
Employment
Source: Self-asserted source
LEONARDO ANIELLO

Works (47)

ScaNeF-IoT: scalable network fingerprinting for IoT device

ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security
2024-07-30 | Conference paper | Author
SOURCE-WORK-ID:

f808a5ab-51f6-4859-a14e-3da5a7209595

EID:

2-s2.0-85200350590

Part of ISBN: 9798400717185
Contributors: Tadani Alyahya; LEONARDO ANIELLO; Vladimiro Sassone
Source: check_circle
University of Southampton

Designing exception handling using Event-B

ABZ 2024 – 10th International Conference on Rigorous State Based Methods, Bergamo, Italy, 25/06/24
2024-06-25 | Conference paper | Author
SOURCE-WORK-ID:

eafb6c46-9408-4176-8461-ea9f718cd288

Contributors: Asieh Salehi Fathabadi; Colin Snook; Thai Son Hoang; Robert Thorburn; Michael Butler; LEONARDO ANIELLO; Vladimiro Sassone
Source: check_circle
University of Southampton

Blockchain-based DNS: Current Solutions and Challenges to Adoption

6th Distributed Ledger Technologies Workshop, Turin, Italy, 14/05/24
2024-05-15 | Conference paper | Author
SOURCE-WORK-ID:

6012d97e-c76f-451c-910d-a06d48489ad8

Contributors: George Giamouridis; BooJoong Kang; LEONARDO ANIELLO
Source: check_circle
University of Southampton

Security and dependability analysis of blockchain systems in partially synchronous networks with Byzantine faults

International Journal of Parallel, Emergent and Distributed Systems
2023-10-24 | Journal article | Author
SOURCE-WORK-ID:

f10a8576-cee7-42c1-aed2-8060f233afc8

EID:

2-s2.0-85174569545

Contributors: Stefano De Angelis; FEDERICO LOMBARDI; Gilberto Zanfino; LEONARDO ANIELLO; Vladimiro Sassone
Source: check_circle
University of Southampton

A methodology for cybersecurity risk assessment in supply chains

The 4th International Workshop on Cyber-Physical Security for Critical Infrastructures Protecstion, The Hague, Netherlands, 28/09/23
2023-09-28 | Conference paper | Author
SOURCE-WORK-ID:

fdddd5bf-2cbc-4bd8-bf84-8938ad7c2b9f

Contributors: BETUL GOKKAYA; LEONARDO ANIELLO; Erisa Karafili; Basel Halak
Source: check_circle
University of Southampton

A Review of upgradeable smart contract patterns based on OpenZeppelin technique

The Journal of The British Blockchain Association
2023-03-20 | Journal article | Author
SOURCE-WORK-ID:

6fe2adcc-6003-46a7-afe8-8571003a04a2

Contributors: Shaima Al Amri; LEONARDO ANIELLO; Vladimiro Sassone
Source: check_circle
University of Southampton

A lightweight approach to the concurrent use and integration of SysML and formal methods in systems design

International Conference on Model Driven Engineering Languages and Systems, Montreal, Canada, 23/10/22
2022-10-28 | Conference paper | Author
SOURCE-WORK-ID:

9022c4cd-c3cc-4e78-a080-4c2260be0a66

Contributors: Robert Thorburn; Vladimiro Sassone; Asieh Salehi Fathabadi; LEONARDO ANIELLO; Michael Butler; Dana Dghaym; Thai Son Hoang
Source: check_circle
University of Southampton

ASSURE: A hardware-based security protocol for internet of things devices

Authentication of Embedded Devices
2021 | Book chapter | Author
SOURCE-WORK-ID:

227f24a8-f9af-4d85-b15f-45e589d42632

Part of ISBN: 978-3-030-60769-2
Part of ISBN: 978-3-030-60769-2
Part of ISBN: 978-3-030-60768-5
Contributors: Yildiran Yilmaz; LEONARDO ANIELLO; Basel Halak
Source: check_circle
University of Southampton

Securing Hardware Supply Chain Using PUF

Authentication of Embedded Devices
2021 | Book chapter | Author
SOURCE-WORK-ID:

56cf2a66-b1e3-4103-b563-bbf69bb9ee25

Part of ISBN: 978-3-030-60769-2
Contributors: LEONARDO ANIELLO; Basel Halak; Peter Chai; Riddhi Dhall; Mircea Mihalea; Adrian Wilczynski
Source: check_circle
University of Southampton

ASSURE: A hardware-baSed SecUrity pRotocol for resourcE-constrained IoT systems

Journal of Hardware and Systems Security
2021-03-01 | Journal article | Author
SOURCE-WORK-ID:

9d13dd44-6b86-4e4f-bbd2-6b50e3cc79fc

Contributors: Yildiran Yilmaz; LEONARDO ANIELLO; Basel Halak
Source: check_circle
University of Southampton

A methodology to select topology generators for ad hoc mesh network simulations

Journal of Communications
2020-10-01 | Journal article | Author
SOURCE-WORK-ID:

c52cfd57-49b8-41ec-8f38-537892b7e58a

EID:

2-s2.0-85090770102

Contributors: Michael O'Sullivan; LEONARDO ANIELLO; Vladimiro Sassone
Source: check_circle
University of Southampton

Cloud2Edge elastic AI framework for prototyping and deployment of AI inference engines in autonomous vehicles

Sensors (Switzerland)
2020-09-23 | Journal article | Author
SOURCE-WORK-ID:

19796ebf-7560-46a8-b07f-ae4264418db1

EID:

2-s2.0-85091439757

Contributors: Sorin Grigorescu; Tiberiu Cocias; Bogdan Trasnea; Andrea Margheri; FEDERICO LOMBARDI; LEONARDO ANIELLO
Source: check_circle
University of Southampton

Anti-BlUFf: towards counterfeit mitigation in IC supply chains using Blockchain and PUF

International Journal of Information Security
2020-06-25 | Journal article | Author
SOURCE-WORK-ID:

85f257a0-11b4-4223-ba1e-778b27c4ffea

EID:

2-s2.0-85087090269

Contributors: LEONARDO ANIELLO; Basel Halak; Peter Chai; Riddhi Dhall; Mircea Mihalea; Adrian Wilczynski
Source: check_circle
University of Southampton

AndroDFA: android malware classification based on resource consumption

Information (Switzerland)
2020-06-16 | Journal article | Author
SOURCE-WORK-ID:

77160c5c-769c-4b5b-b8cd-06520999c141

EID:

2-s2.0-85087498938

Contributors: Luca Massarelli; LEONARDO ANIELLO; Claudio Ciccotelli; Leonardo Querzoni; Daniele Ucci; Roberto Baldoni
Source: check_circle
University of Southampton

MalFamAware: automatic family identification and malware classification through online clustering

International Journal of Information Security
2020-06-16 | Journal article | Author
SOURCE-WORK-ID:

ed853308-8142-422b-976b-73402fb5f2c7

EID:

2-s2.0-85106998691

Contributors: Gregorio Pitolli; Giuseppe Laurenza; LEONARDO ANIELLO; Leonardo Querzoni; Roberto Baldoni
Source: check_circle
University of Southampton

Towards a semantic modelling for threat analysis of IoT applications: a case study on transactive energy

IET Living in the Internet of Things 2019
2019 | Conference paper | Author
SOURCE-WORK-ID:

4564daf9-2976-42bd-adef-e59fc89b4def

EID:

2-s2.0-85081958560

Contributors: Nawfal Fadhel; FEDERICO LOMBARDI; LEONARDO ANIELLO; Andrea Margheri; Vladimiro Sassone
Source: check_circle
University of Southampton

PASCAL: An architecture for proactive auto-scaling of distributed services

Future Generation Computer Systems
2019-09 | Journal article | Author
SOURCE-WORK-ID:

d102535b-3995-4d37-9034-c1b661c54967

EID:

2-s2.0-85063744271

WOSUID:

000503818800036

Contributors: FEDERICO LOMBARDI; Andrea Muti; LEONARDO ANIELLO; Roberto Baldoni; Silvia Bonomi; Leonardo Querzoni
Source: check_circle
University of Southampton

Survey of machine learning techniques for malware analysis

Computers and Security
2019-03 | Journal article | Author
SOURCE-WORK-ID:

941d9a00-e662-4656-aa50-1e24170d4032

EID:

2-s2.0-85057524930

Contributors: Daniele Ucci; LEONARDO ANIELLO; Roberto Baldoni
Source: check_circle
University of Southampton

PDF malware detection: a survey and taxonomy of current techniques

Cyber Threat Intelligence
2018 | Book chapter | Author
SOURCE-WORK-ID:

e5e0b91c-dc3a-4e78-9e94-ddce03f8ac31

EID:

2-s2.0-85046342145

Contributors: Michele Elingiusti; LEONARDO ANIELLO; Leonardo Querzoni; Roberto Baldoni
Source: check_circle
University of Southampton

Elastic symbiotic scaling of operators and resources in stream processing systems

IEEE Transactions on Parallel and Distributed Systems
2018-03-01 | Journal article | Author
SOURCE-WORK-ID:

e1a24bd9-717b-42f6-9f40-decd97c5447b

EID:

2-s2.0-85042043296

WOSUID:

000425173200007

Contributors: FEDERICO LOMBARDI; LEONARDO ANIELLO; Silvia Bonomi; Leonardo Querzoni
Source: check_circle
University of Southampton

PBFT vs proof-of-authority

Italian Conference on Cyber Security, 6/02/18
2018-01 | Conference paper | Author
SOURCE-WORK-ID:

1bc8c30c-b80e-40c2-9810-a56815582308

EID:

2-s2.0-85042456642

Contributors: Stefano De Angelis; LEONARDO ANIELLO; Roberto Baldoni; FEDERICO LOMBARDI; Andrea Margheri; Vladimiro Sassone
Source: check_circle
University of Southampton

A blockchain-based infrastructure for reliable and cost-effective IoT-aided smart grids

Living in the Internet of Things Conference, London, United Kingdom, 28/03/18
2018-01-15 | Conference paper | Author
SOURCE-WORK-ID:

9a39363f-7920-4b08-9b0a-df3e55b4dfa5

EID:

2-s2.0-85048413856

Contributors: FEDERICO LOMBARDI; LEONARDO ANIELLO; Stefano De Angelis; Andrea Margheri; Vladimiro Sassone
Source: check_circle
University of Southampton

Android malware family classification based on resource consumption over time

2017 12th International Conference on Malicious and Unwanted Software (MALWARE)
2017 | Conference paper | Author
SOURCE-WORK-ID:

ab5ca619-7ec4-406c-92dc-e9e4a51188f5

Contributors: Luca Massarelli; LEONARDO ANIELLO; Claudio Ciccotelli; Leonardo Querzoni; Daniele Ucci; Roberto Baldoni
Source: check_circle
University of Southampton

Malware family identification with BIRCH clustering

2017 International Carnahan Conference on Security Technology (ICCST)
2017 | Book chapter | Author
SOURCE-WORK-ID:

7d25cfeb-08ad-4285-add4-282835c4bca1

EID:

2-s2.0-85042254521

Contributors: Gregorio Pitolli; LEONARDO ANIELLO; Giuseppe Laurenza; Leonardo Querzoni; Roberto Baldoni
Source: check_circle
University of Southampton

Malware triage based on static features and public APT reports

International Conference on Cyber Security Cryptography and Machine Learning
2017 | Conference paper | Author
SOURCE-WORK-ID:

e2ccf777-4a97-44f9-82aa-dc33b08794a3

EID:

2-s2.0-85021712538

Contributors: Giuseppe Laurenza; LEONARDO ANIELLO; Riccardo Lazzeretti; Roberto Baldoni
Source: check_circle
University of Southampton

Share a pie?: Privacy-preserving knowledge base export through count-min sketches

Seventh ACM on Conference on Data and Application Security and Privacy (CODASPY)
2017 | Conference paper | Author
SOURCE-WORK-ID:

99029b36-01d2-4fa7-92f2-529ccd888c84

EID:

2-s2.0-85018472361

Contributors: Daniele Ucci; LEONARDO ANIELLO; Roberto Baldoni
Source: check_circle
University of Southampton

The goods, the bads and the uglies: supporting decisions in malware detection through visual analytics

2017 IEEE Symposium on Visualization for Cyber Security (VizSec)
2017 | Conference paper | Author
SOURCE-WORK-ID:

250d306c-386a-4425-b448-a65fe31b1d38

EID:

2-s2.0-85050793549

Contributors: Marco Angelini; LEONARDO ANIELLO; Simone Lenti; Giuseppe Santucci; Daniele Ucci
Source: check_circle
University of Southampton

A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database

2017 13th European Dependable Computing Conference (EDCC)
2017-12-01 | Conference paper | Author
SOURCE-WORK-ID:

e2dc140d-6c8e-4c28-9947-41b89feebff2

EID:

2-s2.0-85041167594

WOSUID:

000419858700027

Part of ISBN: 978-1-5386-0603-2
Part of ISBN: 978-1-5386-0602-5
Contributors: LEONARDO ANIELLO; Roberto Baldoni; Edoardo Gaetani; FEDERICO LOMBARDI; Andrea Margheri; Vladimiro Sassone
Source: check_circle
University of Southampton

Blockchain-based database to ensure data integrity in cloud computing environments

Italian Conference on Cybersecurity, Venice, Italy, 17/01/17
2017-01 | Conference paper | Author
SOURCE-WORK-ID:

21cb5856-3456-4120-b91b-54cf875ea0c4

EID:

2-s2.0-85017385200

Contributors: Edoardo Gaetani; LEONARDO ANIELLO; Roberto Baldoni; FEDERICO LOMBARDI; Andrea Margheri; Vladimiro Sassone
Source: check_circle
University of Southampton

A blockchain-based solution for enabling log-based resolution of disputes in multi-party transactions

Proceedings of 5th International Conference in Software Engineering for Defence Applications. SEDA 2016
2016 | Conference paper | Author
SOURCE-WORK-ID:

1d8f72ce-97b7-4063-9b5e-83fa84d827cf

EID:

2-s2.0-85041807514

Part of ISBN: 978-3-319-70578-1
Part of ISBN: 978-3-319-70577-4
Contributors: FEDERICO LOMBARDI; Roberto Baldoni; LEONARDO ANIELLO
Source: check_circle
University of Southampton

An architecture for semi-automatic collaborative malware analysis for CIs

International Conference on Dependable Systems and Networks Workshops (DSN-W)
2016 | Conference paper | Author
SOURCE-WORK-ID:

18dd2882-cd80-4826-810e-6f5b5c17b7db

EID:

2-s2.0-84994669262

Contributors: Giuseppe Laurenza; Daniele Ucci; LEONARDO ANIELLO; Roberto Baldoni
Source: check_circle
University of Southampton

Automatic invariant selection for online anomaly detection

Computer Safety, Reliability, and Security. SAFECOMP 2016. Lecture Notes in Computer Science
2016 | Conference paper | Author
SOURCE-WORK-ID:

272b4d0b-f6b1-4284-94c1-7ce596f8887f

EID:

2-s2.0-84988592603

Contributors: LEONARDO ANIELLO; Claudio Ciccotelli; Marcello Cinque; Flavio Frattini; Leonardo Querzoni; Stefano Russo
Source: check_circle
University of Southampton

Towards the usage of invariant-based app behavioral fingerprinting for the detection of obfuscated versions of known malware

2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)
2016 | Conference paper | Author
SOURCE-WORK-ID:

63ee595c-be97-4a47-bf58-4e1bbe32916f

EID:

2-s2.0-85009881940

Contributors: Zigrid Shehu; Claudio Ciccotelli; Daniele Ucci; LEONARDO ANIELLO; Roberto Baldoni
Source: check_circle
University of Southampton

Nirvana: A non-intrusive black-box monitoring framework for rack-level fault detection

2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC)
2015 | Conference paper | Author
SOURCE-WORK-ID:

df3297b1-2821-44e3-8a95-14e64ec10cbc

EID:

2-s2.0-84964316609

Part of ISBN: 978-1-4673-9376-8
Contributors: Claudio Ciccotelli; LEONARDO ANIELLO; FEDERICO LOMBARDI; Luca Montanari; Leonardo Querzoni; Roberto Baldoni
Source: check_circle
University of Southampton

High frequency batch-oriented computations over large sliding time windows

Future Generation Computer Systems
2015-02 | Journal article | Author
SOURCE-WORK-ID:

04d0c621-db68-4bee-8637-aba815d72bef

EID:

2-s2.0-84908298853

WOSUID:

000346212600001

Contributors: LEONARDO ANIELLO; Leonardo Querzoni; Roberto Baldoni
Source: check_circle
University of Southampton

Cloud-based data stream processing

DEBS 2014 - Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems
2014 | Conference paper | Author
SOURCE-WORK-ID:

6c343183-30b4-4d9f-b8ee-4b9d7c6b3bb4

EID:

2-s2.0-84903182255

EID:

2-s2.0-84903182255

Part of ISBN: 9781450327374
Contributors: Thomas Heinze; LEONARDO ANIELLO; Leonardo Querzoni; Zbigniew Jerzak
Source: check_circle
University of Southampton

The overlay scan attack: inferring topologies of distributed pub/sub systems through broker saturation

Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems
2014 | Conference paper | Author
SOURCE-WORK-ID:

bb3411bf-c66a-4bb8-aa16-8ee001257150

EID:

2-s2.0-84903177998

Contributors: LEONARDO ANIELLO; Roberto Baldoni; Claudio Ciccotelli; Giuseppe Antonio Di Luna; Francesco Frontali; Leonardo Querzoni
Source: check_circle
University of Southampton

An architecture for automatic scaling of replicated services

Network Systems NETYS 2014
2014-08-03 | Conference paper | Author
SOURCE-WORK-ID:

ee18a51b-d45c-4ff6-af60-aee1344090b4

EID:

2-s2.0-84905924806

Contributors: LEONARDO ANIELLO; Silvia Bonomi; FEDERICO LOMBARDI; Alessandro Zelli; Roberto Baldoni
Source: check_circle
University of Southampton

An event-based platform for collaborative threats detection and monitoring

Information Systems
2014-01 | Journal article | Author
SOURCE-WORK-ID:

44c479f8-e1a3-49c1-bb7e-8f784761bfa2

EID:

2-s2.0-84884841868

WOSUID:

000329531300008

Contributors: Giorgia Lodi; LEONARDO ANIELLO; Giuseppe A. Di Luna; Roberto Baldoni
Source: check_circle
University of Southampton

Adaptive online scheduling in storm

Proceedings of the 7th ACM international conference on Distributed event-based systems
2013 | Conference paper | Author
SOURCE-WORK-ID:

39a20ab2-b082-4eb8-bd91-2673ce1d9f12

EID:

2-s2.0-84881177989

Contributors: LEONARDO ANIELLO; Roberto Baldoni; Leonardo Querzoni
Source: check_circle
University of Southampton

Assessing data availability of Cassandra in the presence of non-accurate membership

Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing
2013 | Conference paper | Author
SOURCE-WORK-ID:

da9d7dd7-85e9-47cd-8b18-782b88f6d92c

EID:

2-s2.0-84886507098

Contributors: LEONARDO ANIELLO; Silvia Bonomi; Marta Breno; Roberto Baldoni
Source: check_circle
University of Southampton

Input data organization for batch processing in time window based computations

Proceedings of the 28th Annual ACM Symposium on Applied Computing
2013 | Conference paper | Author
SOURCE-WORK-ID:

a4fc514d-7430-40f0-a126-07c336678c66

EID:

2-s2.0-84877966713

Contributors: LEONARDO ANIELLO; Leonardo Querzoni; Roberto Baldoni
Source: check_circle
University of Southampton

Collaborative inter-domain stealthy port scan detection using esper complex event processing

Collaborative Financial Infrastructure Protection
2012 | Book chapter | Author
SOURCE-WORK-ID:

9ea27dbd-8df0-4407-9aa0-985f1a43a6bd

EID:

2-s2.0-84955676503

Contributors: LEONARDO ANIELLO; Giuseppe Antonio Di Luna; Giorgia Lodi; Roberto Baldoni
Source: check_circle
University of Southampton

Cyber attacks on financial critical infrastructures

Collaborative Financial Infrastructure Protection
2012 | Book chapter | Author
SOURCE-WORK-ID:

7a458a58-f300-48e7-8ae7-7bf077ffdcdb

EID:

2-s2.0-84919926514

Contributors: Mirco Marchetti; Michele Colajanni; Michele Messori; LEONARDO ANIELLO; Ymir Vigfusson
Source: check_circle
University of Southampton

Distributed attack detection using agilis

Collaborative Financial Infrastructure Protection
2012 | Book chapter | Author
SOURCE-WORK-ID:

97a02715-3fb9-43bb-8feb-8716ab9eae98

EID:

2-s2.0-84955726089

Contributors: LEONARDO ANIELLO; Roberto Baldoni; Gregory Chockler; Gennady Laventman; Giorgia Lodi; Ymir Vigfusson
Source: check_circle
University of Southampton

A collaborative event processing system for protection of critical infrastructures from cyber attacks

Computer Safety, Reliability, and Security. SAFECOMP 2011. Lecture Notes in Computer Science
2011 | Conference paper | Author
SOURCE-WORK-ID:

b7a41285-5ed9-462d-bd49-a7d0e5925ff2

EID:

2-s2.0-80052991883

Contributors: LEONARDO ANIELLO; Giuseppe Antonio Di Luna; Giorgia Lodi; Roberto Baldoni
Source: check_circle
University of Southampton

Inter-domain stealthy port scan detection through complex event processing

Proceedings of the 13th European Workshop on Dependable Computing
2011 | Conference paper | Author
SOURCE-WORK-ID:

7a7d32a5-75ce-4034-ac3f-9d09737f7d0b

EID:

2-s2.0-79958741784

Part of ISBN: 978-1-4503-0284-5
Contributors: LEONARDO ANIELLO; Giorgia Lodi; Roberto Baldoni
Source: check_circle
University of Southampton