Born in 1998, 30 September, I hold the positions of Security Administrator at Fondazione Bruno Kessler and Research Scientist in the organization's Security and Trust unit. I joined the S&T unit to explore and improve TLS analysis and delve into identity management. While safeguarding Fondazione Bruno Kessler from cyber threats, I am looking into new opportunities and technologies and working with Istituto Poligrafico e Zecca dello Stato.
Studying the state of the art and applying my expertise of risk analysis, red teaming, blue teaming, OSINT, and offensive technologies; conducting continuous pentests on the infrastructure and introducing new defenses to safeguard and protect Fondazione Bruno Kessler from cybercriminals.
Junior Research Scientist
Security analysis of the TLS deployments of IPZS projects, TLS Analysis in Android Apps and TLS tool enhancement within the Security & Trust research unit.
Study and improvement of TLS analysis tools within the Security & Trust research unit.
Futuro & Conoscenza S.r.l. (Trento & Rome, Italy)
Junior Research Scientist
Collaboration between Fondazione Bruno Kessler and IPZS to promote the exchange of know-how and competences in the field of security technologies (material and digital) such as identification and and anti-counterfeiting, as well as the creation of a center for the coordination and exploitation of research.
in ACM Symposium on Access Control Models and Technologies, SACMAT
Matteo Rizzi, Salvatore Manfredi, Giada Sciarretta, Silvio Ranise.
in 12th ACM Conference on Data and Application Security and Privacy, CODASPY
Matteo Rizzi, Salvatore Manfredi, Giada Sciarretta, Silvio Ranise.
Placed 3rd, Associazione Italiana per la Sicurezza Informatica 17th Edition
The "Innovare la sicurezza delle Informazioni" award is given to the most innovative university theses in information security to foster cooperation between companies, institutions, and students in Italy. A point of interchange between the productive and scientific worlds, students and the working world, motivated by participants' demands and experiences.
Istituto Tecnico Tecnologico Buonarroti, Trento
Conducted two out of four sessions involving penetration testing of the sensors at Buonarroti High School, with the objective of invalidating data and highlighting the significance of cybersecurity within the industry. The lesson involved the explanation of various techniques employed in cyber attacks, specifically focusing on the Advanced Persistent Threat (APT) and its current methodologies. Real-life examples were provided to illustrate the concepts, such as the Rogue Access Point (Wireless), Man-in-the-Middle (MiTM) attacks, and Web Vulnerability Assessment, all within the context of the school website.
Fondazione Bruno Kessler, Security And Trust Unit
I successfully delivered a lecture on the diverse attacks applicable to TLS in a PhD course, under the guidance of Salvatore Manfredi and Giada Sciarretta. During the lecture, I provided a comprehensive explanation of Oracle Attacks in a cryptographic context, and additionally presented a Proof of Concept showcasing the HeartBleed Vulnerability.
Federica M. and Davide M. in FBK, Security and Trust Unit
Federica M. and Davide M., two talented pupils from Istituto Tecnico Tecnologico Buonarroti Trento, have successfully developed engaging and interactive videos that effectively explain cognitive biases in cybersecurity. Their videos are designed to be easily comprehensible by all viewers, making the complex subject accessible to a wide audience. They were given guidance on the necessary measures they can take to perform and safeguard themselves against threats so that they can better understand these hazards.
Matilde S. and Mattia C. in FBK, Security and Trust Unit
Matilde S. and Mattia C. are two brilliant students hailing from Liceo Steam Rovereto and Istituto Tecnico Tecnologico Buonarroti Trento, respectively, in Italy. They have successfully acquired knowledge in Open Source Intelligence (OSINT) and social media risk assessment. The students successfully acquired the skills necessary to conduct a digital investigation, including the collection of data from online sources. They showed proficiency in analyzing multiple social media platforms and evaluating an individual's "digital footprint" based on the information available.
Andrea B. and Mattia A. in FBK, Security and Trust Unit
Andrea B. and Mattia A. are two outstanding students from Istituto Tecnico Tecnologico Buonarroti (Trento, Italy). They readily comprehended complicated topics like as databases and overflow threats despite just being in their third year. They are working with me and my colleague Salvatore Manfredi on a project that will raise awareness about security postures (e.g. password management, phishing awareness and more).
Federico C. in FBK, Security and Trust Unit
I had the opportunity to oversee Federico C., an undergraduate student at University of Trento, thanks to my colleague Salvatore Manfredi. Federico did an excellent job by collecting information on overall webserver use and, more specifically, Public Administration in Italy. Upon learning that NGINX was competing with APACHE, he included several mitigations into NGINX and developed a parser for TLSAssistant.
The parser can quickly scan an NGINX configuration and automatically repair any TLS vulnerabilities discovered. Federico was finally able to analyze the TLS environment in deep and correct additional flaws he discovered in the tool.
Ivan V. in FBK, Security and Trust Unit
Thanks to my colleague Salvatore Manfredi, I have overseen the internship of an undergraduate student at University of Trento, Ivan V. . Ivan, a talented student, researched the TLS area to see what new threats had emerged. Ivan encountered ALPACA, Racoon, Zombie POODLE, Golden DOODLE, 0-Length OpenSSL, and Sleeping POODLE after researching the literature. Using POODLE variations as a starting point, Ivan investigated the optimal method for integrating these vulnerability checks into TLSAssistant. Ivan progressively included all prior vulnerability assessments (i.e. ALPACA, POODLE variants and Racoon). Not only did he incorporate them into our tool, but he also corrected and made the external tool TLSScanner more efficient by statistically demonstrating it by scanning the Alexa top 50,000 websites.
Ex-Scuole Damiano Chiesa, Rovereto
Child grooming, posting sensitive information online and/or on social media, ransomware that takes control of your data for ransom. All threats that the latest device and constantly updated antivirus can help protect against, but not enough. Human error often opens the floodgates and destroys the best defenses. Thus, cybersecurity begins with culture. Learn the first and most important defense methods to protect your data and family.
Dialogue with Giada Sciarretta and Matteo Rizzi, two experts from the Center for Cyber Security at the Bruno Kessler Foundation who will share their career paths, showing how one can get to play important roles in cybersecurity and digital innovation by following different paths. The discussion was also an opportunity to understand the importance of digital security in public administration and to stimulate students' interest in cybersecurity with real-world examples.
Linux Hardening for Banks
Allitude - Cassa Centrale Banca
Development of comprehensive guidelines for enhancing the security of Linux servers and systems, with a specific focus on fortifying the operating systems and kernels utilized within banking environments.
Ideation of the Multi-CIE function in the CieID App
The CieID App allows users to verify themselves for public services in Italy by using the CIE Card, commonly known as Carta di Identità Elettronica (eID card). Worked as part of a team to develop the best method for storing multiple eID cards in the APP while keeping the highest level of security and determining the optimum balance of security and usability.
PoC script to break Telegram
Simple PoC script that allows you to exploit telegram's "send with timer" feature by saving any media received with this functionality, automatically.
Starting from Version 1.3
Fully-featured tool that combines state-of-the-art TLS analyzers with a report system that suggests appropriate mitigations and shows the full set of viable attacks.
Perceptual hashing library in python
Python library to easily check if two images are similar without machine learning by using Perceptual Hashing (phash and whash combined), with ban and unban image system.
A bot to quickly get information about an IP using threat intelligence.
Conversion in Python 3 and enhancements
Easy implementation and use of the first order model
HelpDesk Telegram bot to support DISI Students in University of Trento
Bachelor of Computer Science
Thesis in TLS Analyzers for Android Apps - State-of-the-art Analysis and Integration in TLSAssistant.
High School Diploma
Final elaborate in psychoanalysis of James Joyce and the artificial intelligences.
CyberWiser - CyberRange And Capacity Building in CyberSecurity
|P-01-M-01||May 19, 2021||Download|
|P-01-M-02||May 20, 2021||Download|
|P-02||May 20, 2021||Download|
|P-03||May 20, 2021||Download|
|P-04||May 25, 2021||Download|
|P-05||June 4, 2021||Download|
|P-06||June 4, 2021||Download|
|Into the Breach||February 07, 2023||Verify|
|Microsoft Azure |
Security Technologies (A)
|March 07, 2023||Download|
Cambridge Assessment English - B2
ECDL / ICDL Certification
I am widely proficient in everything that touches the cybersecurity realm. My areas of expertise include security testing, vulnerability assessment, cyberrisk assessment, network security (e.g. DmZ, firewalls, honeypots), privacy, trust, OSINT, and digital identity. During the Machine Learning course, I worked with advanced deep learning systems (such as a convolutional neural network to identify Covid-19 from radiography, in 2020), achieved the highest gpa in multimedia data security (e.g. invisible and visible watermarking, compression resistant watermarking and classifying differences from video compression applied by Facebook and Youtube). I also earned the highest GPA in the Offensive Technologies course, in which I learned how to perform attack and defense in the cyberspace.
Throughout my career, I have discovered numerous flaws —some of them critical— in the infrastructures used by the Fondazione Bruno Kessler. I was also able to collaborate with the Postal Police while researching new technologies in the field. In addition, I managed to analyze the CIEApp (Carta Identità Elettronica) with the Open Web Application Security Project (OWASP). Threat intelligence is a topic that deeply interests me.
|Python, Java, C (and C++), SQL||Proficient|
|RUST||Basic (willing to improve)|
|JS, PolyML, R, ASM||Basic|
|ISO 23220||Building blocks for identity management via mobile devices||Proficient|
|ISO 18013-5||Mobile Driving License||Proficient|
|ISO 29003||Identity proofing||Proficient|
|ISO 29115||Entity authentication assurance framework||Proficient|
|EUDI Wallet Framework||European Digital Identity Architecture and Reference Framework||Proficient|
|NIST 800-63-3||Digital Identity Guidelines||Intermediate|
|ISO 27001||Information security management systems, Requirements||Basic|
|NIST 800-53||Security and Privacy Controls for Information Systems and Organizations||Basic|
|RFC 3227||Guidelines for Evidence Collection and Archiving||Basic|
What i really want to do in my future
I am passionate about CyberSecurity, Privacy, Forensics and Digital Identity, as well as the solutions that embrace these areas, which include (but are not limited to) Security Protocol Analysis, Access Control, Zero-Trust and Zero-Knowledge methods, Malware Analysis and AI-Powered CyberSecurity. I am particularly intrigued by the idea of developing novel solutions and conducting scientific research in these fields.
Student Representative for DISI
Department Of Information Engineering And Computer Science