Alberto Giaretta

Alberto Giaretta

Postdoc

AASS Research Center
School of Science and Technology
Örebro University
70182 Örebro, Sweden
Room T2234
Phone +46 (0)19 30 31 46
alberto.giaretta@oru.se

Google Scholar

Alberto Giaretta holds a BSc and a MSc in Computer Science from the University of Padova, Italy, and he has been a PhD student at Örebro University from 2016 to 2021. In 2021, he defended his PhD thesis in Computer Science by the title of "Securing the Internet of Things with Security-by-Contract. Specifically, he investigated how it would be possible to improve IoT devices' security by enriching them with formal descriptions of their relevant security behaviour.

Research

Alberto's research is primarily focused on cyber-security and bio-inspired nanonetworks. He has been author or co-author of different peer-reviewed papers, published on prestigious venues, such as IEEE Transactions on Information Forensics and Security (TIFS), Journal of Ambient Intelligence and Humanized Computing (JAIHC), and IEEE Transactions on Emerging Topics in Computing (TETC-CS). One of his works, which has been covered by the MIT Technology Review magazine , investigates the challenges of storing digital information inside the DNA of bacteria and physically delivering this information to a destination.

Teaching

Alberto has been co-responsible of two courses, the Introduction to IT Security (Code IK404A) and the Computer Security (Code DT508A), for the Second Cycle Course in Informatics and the Second Cycle Course in Computer Science, respectively. In both courses, he developed part of the course materials and labs, and he gave classroom lectures.


Publications

[1] A. Giaretta, N. Dragoni and F. Massacci. S×C4IoT : A Security-by-Contract Framework for Dynamic Evolving IoT Devices.BibTeX | DiVA ]
[2] F. Tavella, A. Giaretta, T. M. Dooley-Cullinane, M. Conti, L. Coffey and S. Balasubramaniam. DNA Molecular Storage System : Transferring Digitally Encoded Information through Bacterial Nanonetworks. IEEE Transactions on Emerging Topics in Computing, 9(3):1566-1580, 2021BibTeX | DiVA ]
[3] M. Mazzara, N. Dragoni, A. Bucchiarone, A. Giaretta, S. T. Larsen and S. Dustdar. Microservices : Migration of a Mission Critical System. IEEE Transactions on Services Computing, 14(5):1464-1477, 2021BibTeX | DiVA ]
[4] A. Giaretta and A. Loutfi. On the people counting problem in smart homes : undirected graphs and theoretical lower-bounds. Journal of Ambient Intelligence and Humanized Computing 2021BibTeX | DiVA | PDF ]
[5] A. Giaretta. Securing the Internet of Things with Security-by-Contract. Örebro University, School of Science and Technology, Ph.D. Thesis, 2021BibTeX | DiVA ]
[6] M. D. Thomsen, A. Giaretta and N. Dragoni. Smart Lamp or Security Camera? Automatic Identification of IoT Devices. In Selected Papers from the 12th International Networking Conference, pages 85-99, 2021BibTeX | DiVA ]
[7] L. Herskind, A. Giaretta, M. De Donno and N. Dragoni. BitFlow : Enabling Real‐time Cash‐flow Evaluations through Blockchain. Concurrency and Computation, 32(12), 2020BibTeX | DiVA ]
[8] G. Matthíasson, A. Giaretta and N. Dragoni. IoT Device Profiling : From MUD Files to S×C Contracts. In Open Identity Summit 2020, pages 143-154, 2020BibTeX | DiVA ]
[9] G. Sigurdsson, A. Giaretta and N. Dragoni. Vulnerabilities and Security Breaches in Cryptocurrencies. In Proceedings of 6th International Conference in Software Engineering for Defence Applications 2020BibTeX | DiVA ]
[10] A. Giaretta, N. Dragoni and F. Massacci. S×C4IoT : A Security-by-contract Framework for Dynamic Evolving IoT Devices. ACM transactions on sensor networks, 18(1):1-51, 2022BibTeX | DiVA | PDF ]
[11] A. Giaretta, N. Dragoni and F. Massacci. IoT Security Configurability with Security-by-Contract. Sensors, 19(19), 2019BibTeX | DiVA ]
[12] A. Giaretta, N. Dragoni and F. Massacci. Protecting the Internet of Things with Security-by-Contract and Fog Computing. In 2019 IEEE 5th World Forum on Internet of Things (WF-IoT) 2019BibTeX | DiVA ]
[13] A. Giaretta, S. Pepe and N. Dragoni. UniquID : A Quest to Reconcile Identity Access Management and the IoT. In Software Technology : Methods and Tools, pages 237-251, 2019BibTeX | DiVA ]
[14] A. Giaretta, M. De Donno and N. Dragoni. Adding Salt to Pepper : A Structured Security Assessment over a Humanoid Robot. In Proceedings of the 13th International Conference on Availability, Reliability and Security 2018BibTeX | DiVA ]
[15] M. De Donno, N. Dragoni, A. Giaretta and M. Mazzara. AntibIoTic : Protecting IoT Devices Against DDoS Attacks. In Proceedings of 5th International Conference in Software Engineering for Defence Applications : SEDA 2016, pages 59-72, 2018BibTeX | DiVA ]
[16] A. Giaretta and N. Dragoni. Community Targeted Phishing : A Middle Ground Between Massive and Spear Phishing through Natural Language Generation. 2018BibTeX | DiVA ]
[17] M. De Donno, N. Dragoni, A. Giaretta and A. Spognardi. DDoS-Capable IoT Malwares : Comparative Analysis and Mirai Investigation. Security and Communication Networks 2018BibTeX | DiVA ]
[18] A. Giaretta, N. Dragoni and M. Mazzara. Joining Jolie to Docker : Orchestration of Microservices on a Containers-as-a-Service Layer. In Proceedings of 5th International Conference in Software Engineering for Defence Applications : SEDA 2016, pages 167-175, 2018BibTeX | DiVA ]
[19] N. Dragoni, A. Giaretta and M. Mazzara. The Internet of Hackable Things. In Proceedings of 5th International Conference in Software Engineering for Defence Applications : SEDA 2016, pages 129-140, 2018BibTeX | DiVA ]
[20] M. De Donno, A. Giaretta, N. Dragoni and A. Spognardi. A Taxonomy of Distributed Denial of Service Attacks. In i-Society 2017 : Proceedings, pages 99-106, 2017BibTeX | DiVA ]
[21] M. De Donno, N. Dragoni, A. Giaretta and A. Spognardi. Analysis of DDoS-Capable IoT Malwares. In Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, pages 807-816, 2017BibTeX | DiVA ]
[22] A. Giaretta, S. Balasubramaniam and M. Conti. Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks. IEEE Transactions on Information Forensics and Security, 11(4):665-676, 2016BibTeX | DiVA ]
[23] M. De Donno, A. Giaretta, N. Dragoni, A. Bucchiarone and M. Mazzara. Cyber-Storms Come from Clouds : Security of Cloud Computing in the IoT Era. Future Internet, 11(6), 2019BibTeX | DiVA ]