Skip to main content

Showing 1–25 of 25 results for author: Sciancalepore, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.19633  [pdf, ps, other

    cs.CR

    Weak-Jamming Detection in IEEE 802.11 Networks: Techniques, Scenarios and Mobility

    Authors: Martijn Hanegraaf, Savio Sciancalepore, Gabriele Oligeri

    Abstract: State-of-the-art solutions detect jamming attacks ex-post, i.e., only when jamming has already disrupted the wireless communication link. In many scenarios, e.g., mobile networks or static deployments distributed over a large geographical area, it is often desired to detect jamming at the early stage, when it affects the communication link enough to be detected but not sufficiently to disrupt it (… ▽ More

    Submitted 26 May, 2025; originally announced May 2025.

    Comments: Under review

  2. arXiv:2501.03977  [pdf, other

    cs.CR

    Cyber Spectrum Intelligence: Security Applications, Challenges and Road Ahead

    Authors: Savio Sciancalepore, Gabriele Oligeri

    Abstract: Cyber Spectrum Intelligence (SpecInt) is emerging as a concept that extends beyond basic {\em spectrum sensing} and {\em signal intelligence} to encompass a broader set of capabilities and technologies aimed at monitoring the use of the radio spectrum and extracting information. SpecInt merges traditional spectrum sensing techniques with Artificial Intelligence (AI) and parallel processing to enha… ▽ More

    Submitted 7 January, 2025; originally announced January 2025.

  3. arXiv:2412.16008  [pdf, other

    cs.CR

    Detection of Aerial Spoofing Attacks to LEO Satellite Systems via Deep Learning

    Authors: Jos Wigchert, Savio Sciancalepore, Gabriele Oligeri

    Abstract: Detecting spoofing attacks to Low-Earth-Orbit (LEO) satellite systems is a cornerstone to assessing the authenticity of the received information and guaranteeing robust service delivery in several application domains. The solutions available today for spoofing detection either rely on additional communication systems, receivers, and antennas, or require mobile deployments. Detection systems workin… ▽ More

    Submitted 22 May, 2025; v1 submitted 20 December, 2024; originally announced December 2024.

    Comments: Accepted for Publication by Elsevier Computer Networks

  4. arXiv:2411.06417  [pdf, other

    cs.CR

    HidePrint: Hiding the Radio Fingerprint via Random Noise

    Authors: Gabriele Oligeri, Savio Sciancalepore

    Abstract: Radio Frequency Fingerprinting (RFF) techniques allow a receiver to authenticate a transmitter by analyzing the physical layer of the radio spectrum. Although the vast majority of scientific contributions focus on improving the performance of RFF considering different parameters and scenarios, in this work, we consider RFF as an attack vector to identify and track a target device. We propose, im… ▽ More

    Submitted 10 November, 2024; originally announced November 2024.

  5. arXiv:2408.09179  [pdf, other

    cs.CR

    On the Reliability of Radio Frequency Fingerprinting

    Authors: Muhammad Irfan, Savio Sciancalepore, Gabriele Oligeri

    Abstract: Radio Frequency Fingerprinting (RFF) offers a unique method for identifying devices at the physical (PHY) layer based on their RF emissions due to intrinsic hardware differences. Nevertheless, RFF techniques depend on the ability to extract information from the PHY layer of the radio spectrum by resorting to Software Defined Radios (SDR). Previous works have highlighted the so-called ``Day-After-T… ▽ More

    Submitted 17 August, 2024; originally announced August 2024.

  6. arXiv:2407.14256  [pdf, other

    cs.CR

    Obfuscated Location Disclosure for Remote ID Enabled Drones

    Authors: Alessandro Brighente, Mauro Conti, Matthijs Schotsman, Savio Sciancalepore

    Abstract: The Remote ID (RID) regulation recently introduced by several aviation authorities worldwide (including the US and EU) forces commercial drones to regularly (max. every second) broadcast plaintext messages on the wireless channel, providing information about the drone identifier and current location, among others. Although these regulations increase the accountability of drone operations and impro… ▽ More

    Submitted 19 July, 2024; originally announced July 2024.

    Comments: 18 pages, 8 figures. Submitted and under review for journal publication

  7. arXiv:2407.08311  [pdf, other

    cs.CR

    Preventing Radio Fingerprinting through Low-Power Jamming

    Authors: Muhammad Irfan, Savio Sciancalepore, Gabriele Oligeri

    Abstract: Radio Frequency fingerprinting enables a passive receiver to recognize and authenticate a transmitter without the need for cryptographic tools. Authentication is achieved by isolating specific features of the transmitted signal that are unique to the transmitter's hardware. Much research has focused on improving the effectiveness and efficiency of radio frequency fingerprinting to maximize its per… ▽ More

    Submitted 2 April, 2025; v1 submitted 11 July, 2024; originally announced July 2024.

    Comments: 13 pages, 15 figures. Accepted to ACM AsiaCCS 2025

  8. arXiv:2310.16406  [pdf, other

    cs.CR cs.AI eess.SP

    Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities

    Authors: Saeif Al-Hazbi, Ahmed Hussain, Savio Sciancalepore, Gabriele Oligeri, Panos Papadimitratos

    Abstract: Radio Frequency Fingerprinting (RFF) techniques promise to authenticate wireless devices at the physical layer based on inherent hardware imperfections introduced during manufacturing. Such RF transmitter imperfections are reflected into over-the-air signals, allowing receivers to accurately identify the RF transmitting source. Recent advances in Machine Learning, particularly in Deep Learning (DL… ▽ More

    Submitted 15 April, 2024; v1 submitted 25 October, 2023; originally announced October 2023.

    Comments: Authors version; Accepted for the 20th International Wireless Communications and Mobile Computing (IWCMC) Security Symposium, 2024

  9. Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram

    Authors: Maurantonio Caprolu, Savio Sciancalepore, Aleksandar Grigorov, Velyan Kolev, Gabriele Oligeri

    Abstract: People Nearby is a service offered by Telegram that allows a user to discover other Telegram users, based only on geographical proximity. Nearby users are reported with a rough estimate of their distance from the position of the reference user, allowing Telegram to claim location privacy In this paper, we systematically analyze the location privacy provided by Telegram to users of the People Nearb… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

    Journal ref: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2024)

  10. arXiv:2306.10912  [pdf, other

    cs.CR

    Jamming Detection in Low-BER Mobile Indoor Scenarios via Deep Learning

    Authors: Savio Sciancalepore, Fabrice Kusters, Nada Khaled Abdelhadi, Gabriele Oligeri

    Abstract: The current state of the art on jamming detection relies on link-layer metrics. A few examples are the bit-error-rate (BER), the packet delivery ratio, the throughput, and the increase in the signal-to-noise ratio (SNR). As a result, these techniques can only detect jamming \emph{ex-post}, i.e., once the attack has already taken down the communication link. These solutions are unfit for mobile dev… ▽ More

    Submitted 12 December, 2023; v1 submitted 19 June, 2023; originally announced June 2023.

    Comments: 16 pages, 16 figures, 3 tables; Submitted and under review

  11. arXiv:2305.05285  [pdf, other

    cs.CR cs.NI

    The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time

    Authors: Saeif Alhazbi, Savio Sciancalepore, Gabriele Oligeri

    Abstract: The performance of Radio Frequency (RF) Fingerprinting (RFF) techniques is negatively impacted when the training data is not temporally close to the testing data. This can limit the practical implementation of physical-layer authentication solutions. To circumvent this problem, current solutions involve collecting training and testing datasets at close time intervals -- this being detrimental to t… ▽ More

    Submitted 17 October, 2023; v1 submitted 9 May, 2023; originally announced May 2023.

  12. $A^2RID$ -- Anonymous Direct Authentication and Remote Identification of Commercial Drones

    Authors: Eva Wisse, Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro

    Abstract: The recent worldwide introduction of RemoteID (RID) regulations forces all Unmanned Aircrafts (UAs), a.k.a. drones, to broadcast in plaintext on the wireless channel their identity and real-time location, for accounting and monitoring purposes. Although improving drones' monitoring and situational awareness, the RID rule also generates significant privacy concerns for UAs' operators, threatened by… ▽ More

    Submitted 1 February, 2023; v1 submitted 21 October, 2022; originally announced October 2022.

  13. arXiv:2205.13808  [pdf, other

    cs.CR

    Hide and Seek -- Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles

    Authors: Alessandro Brighente, Mauro Conti, Savio Sciancalepore

    Abstract: Due to the frequent unauthorized access by commercial drones to Critical Infrastructures (CIs) such as airports and oil refineries, the US-based Federal Avionics Administration (FAA) recently published a new specification, namely RemoteID. The aforementioned rule mandates that all Unmanned Aerial Vehicles (UAVs) have to broadcast information about their identity and location wirelessly to allow fo… ▽ More

    Submitted 27 May, 2022; originally announced May 2022.

  14. Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges

    Authors: Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro

    Abstract: Satellite-based Communication systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech companies and the promising impact they can deliver towards the global connectivity objective tackled by early 6G initiatives. On the one hand, the emergence of new manufacturing processes and radio technologies promises to reduce service costs while… ▽ More

    Submitted 29 July, 2022; v1 submitted 21 December, 2021; originally announced December 2021.

    Comments: 72 pages

  15. arXiv:2010.05470  [pdf, other

    cs.CR cs.AI cs.CY

    PAST-AI: Physical-layer Authentication of Satellite Transmitters via Deep Learning

    Authors: Gabriele Oligeri, Simone Raponi, Savio Sciancalepore, Roberto Di Pietro

    Abstract: Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. However, previous research efforts mainly focused on terrestrial wireless devices while, to the best of our knowledge, none of the previou… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

  16. GNSS Spoofing Detection via Opportunistic IRIDIUM Signals

    Authors: Gabriele Oligeri, Savio Sciancalepore, Roberto Di Pietro

    Abstract: In this paper, we study the privately-own IRIDIUM satellite constellation, to provide a location service that is independent of the GNSS. In particular, we apply our findings to propose a new GNSS spoofing detection solution, exploiting unencrypted IRIDIUM Ring Alert (IRA) messages that are broadcast by IRIDIUM satellites. We firstly reverse-engineer many parameters of the IRIDIUM satellite conste… ▽ More

    Submitted 18 June, 2020; originally announced June 2020.

    Comments: Accepted for the 13th Conference on Security and Privacy in Wireless and Mobile Networks (WISEC), 2020

  17. arXiv:2005.01347  [pdf, other

    eess.AS cs.LG cs.SD eess.SP

    Noise2Weight: On Detecting Payload Weight from Drones Acoustic Emissions

    Authors: Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro

    Abstract: The increasing popularity of autonomous and remotely-piloted drones have paved the way for several use-cases, e.g., merchandise delivery and surveillance. In many scenarios, estimating with zero-touch the weight of the payload carried by a drone before its physical approach could be attractive, e.g., to provide an early tampering detection. In this paper, we investigate the possibility to remote… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

  18. Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges

    Authors: Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro

    Abstract: The recent advancements in hardware miniaturization capabilities have boosted the diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power embedded wireless devices in a sustainable and low-cost fashion. Despite the undeniable management advantages, the intermittent availability of the energy source and the limited power supply has led to challenging system trade-offs… ▽ More

    Submitted 19 August, 2020; v1 submitted 22 April, 2020; originally announced April 2020.

    Comments: This is a personal copy of the authors. Not for redistribution. The final version of the paper is available through the IEEExplore Digital Library, at the link: https://ieeexplore.ieee.org/document/9170604, with the DOI: 10.1109/COMST.2020.3017665

    Journal ref: IEEE Communications Surveys & Tutorials, 2020

  19. Vessels Cybersecurity: Issues, Challenges, and the Road Ahead

    Authors: Maurantonio Caprolu, Roberto Di Pietro, Simone Raponi, Savio Sciancalepore, Pietro Tedeschi

    Abstract: Vessels cybersecurity is recently gaining momentum, as a result of a few recent attacks to vessels at sea. These recent attacks have shacked the maritime domain, which was thought to be relatively immune to cyber threats. The cited belief is now over, as proved by recent mandates issued by the International Maritime Organization (IMO). According to these regulations, all vessels should be the subj… ▽ More

    Submitted 4 March, 2020; originally announced March 2020.

    Journal ref: IEEE Communications Magazine ( Volume: 58 , Issue: 6 , June 2020 )

  20. arXiv:2002.05905  [pdf, other

    cs.CR cs.LG

    MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions

    Authors: Omar Adel Ibrahim, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro

    Abstract: Universal Serial Bus (USB) Flash Drives are nowadays one of the most convenient and diffused means to transfer files, especially when no Internet connection is available. However, USB flash drives are also one of the most common attack vectors used to gain unauthorized access to host devices. For instance, it is possible to replace a USB drive so that when the USB key is connected, it would instal… ▽ More

    Submitted 12 September, 2020; v1 submitted 14 February, 2020; originally announced February 2020.

    Comments: Accepted for publication in ACM Transactions on Embedded Computing Systems (TECS) in September 2020

  21. arXiv:2002.05051  [pdf, other

    cs.CR cs.CY

    Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures

    Authors: Simone Raponi, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro

    Abstract: Assisted-navigation applications have a relevant impact on our daily life. However, technological progress in virtualization technologies and Software-Defined Radios recently enabled new attack vectors, namely, road traffic poisoning. These attacks open up several dreadful scenarios, which are addressed in this contribution by identifying the associated challenges and proposing innovative counterm… ▽ More

    Submitted 5 May, 2021; v1 submitted 12 February, 2020; originally announced February 2020.

  22. arXiv:2001.02877  [pdf, other

    cs.CR cs.SD eess.AS

    Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges

    Authors: Maurantonio Caprolu, Savio Sciancalepore, Roberto Di Pietro

    Abstract: Short-range audio channels have a few distinguishing characteristics: ease of use, low deployment costs, and easy to tune frequencies, to cite a few. Moreover, thanks to their seamless adaptability to the security context, many techniques and tools based on audio signals have been recently proposed. However, while the most promising solutions are turning into valuable commercial products, acoustic… ▽ More

    Submitted 28 January, 2020; v1 submitted 9 January, 2020; originally announced January 2020.

    Comments: IEEE Communications Surveys & Tutorials, Early Access, Jan 2020

    Journal ref: IEEE Communications Surveys & Tutorials ( Volume: 23, Issue: 1, Firstquarter 2021)

  23. arXiv:1910.03895  [pdf, other

    cs.CR

    BrokenStrokes: On the (in)Security of Wireless Keyboards

    Authors: Gabriele Oligeri, Savio Sciancalepore, Simone Raponi, Roberto Di Pietro

    Abstract: Wireless devices resorting to event-triggered communications have been proved to suffer critical privacy issues, due to the intrinsic leakage associated with radio-frequency (RF) emissions. In this paper, we move the attack frontier forward by proposing BrokenStrokes: an inexpensive, easy to implement, efficient, and effective attack able to detect the typing of a pre-defined keyword by only eaves… ▽ More

    Submitted 21 May, 2020; v1 submitted 9 October, 2019; originally announced October 2019.

  24. PiNcH: an Effective, Efficient, and Robust Solution to Drone Detection via Network Traffic Analysis

    Authors: Savio Sciancalepore, Omar Adel Ibrahim, Gabriele Oligeri, Roberto Di Pietro

    Abstract: We propose PiNcH, a methodology to detect the presence of a drone, its current status, and its movements by leveraging just the communication traffic exchanged between the drone and its Remote Controller (RC). PiNcH is built applying standard classification algorithms to the eavesdropped traffic, analyzing features such as packets inter-arrival time and size. PiNcH is fully passive and it requires… ▽ More

    Submitted 7 December, 2019; v1 submitted 11 January, 2019; originally announced January 2019.

    Journal ref: Computer Networks (COMNET), Elsevier, 2020

  25. SOS - Securing Open Skies

    Authors: Savio Sciancalepore, Roberto Di Pietro

    Abstract: Automatic Dependent Surveillance - Broadcast (ADS-B) is the next generation communication technology selected for allowing commercial and military aircraft to deliver flight information to both ground base stations and other airplanes. Today, it is already on-board of 80% of commercial aircraft, and it will become mandatory by the 2020 in the US and the EU. ADS-B has been designed without any secu… ▽ More

    Submitted 27 November, 2018; v1 submitted 24 September, 2018; originally announced September 2018.