Skip to main content

Showing 1–11 of 11 results for author: Pizzonia, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.14610  [pdf, other

    cs.DC cs.PF

    Toward Scalable Docker-Based Emulations of Blockchain Networks for Research and Development

    Authors: Diego Pennino, Maurizio Pizzonia

    Abstract: Blockchain, like any other complex technology, needs a strong testing methodology to support its evolution in both research and development contexts. Setting up meaningful tests for permissionless blockchain technology is a notoriously complex task for several reasons: software is complex, large number of nodes are involved, network is non ideal, etc. Developers usually adopt small virtual laborat… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

  2. arXiv:2212.11700  [pdf, ps, other

    cs.CR cs.DC

    Blockchain Scalability and Security: Communications Among Fast-Changing Committees Made Simple

    Authors: Andrea Mariani, Gianluca Mariani, Diego Pennino, Maurizio Pizzonia

    Abstract: For permissionless blockchains, scalability is paramount. While current technologies still fail to address this problem fully, many research works propose sharding or other techniques that extensively adopt parallel processing of transactions. In these approaches, a potentially large number of committees of nodes independently perform consensus and process new transactions. Hence, in addition to r… ▽ More

    Submitted 22 December, 2022; originally announced December 2022.

  3. Empowering Citizens by a Blockchain-Based Robinson List

    Authors: Albenzio Cirillo, Vito Dalena, Antonio Mauro, Francesco Mogavero, Diego Pennino, Maurizio Pizzonia, Andrea Vitaletti, Marco Zecchini

    Abstract: A Robinson list protects phone subscribers against commercial spam calls. Its least basic functionality is to collect the denial of the subscribers to be contacted by market operators. Nowadays, Robinson lists run as centralised services, which implies that citizens should trust third parties for the management of their choices. In this paper, we show a design that allows us to realise a Robinson… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: This article has been accepted for publication in International Journal of Computers and Applications, published by Taylor & Francis

  4. arXiv:2005.06665  [pdf, other

    cs.DC cs.CR cs.DS

    Scaling Blockchains Without Giving up Decentralization and Security

    Authors: Gianmaria Del Monte, Diego Pennino, Maurizio Pizzonia

    Abstract: Public blockchains should be able to scale with respect to the number of nodes and to the transactions workload. The blockchain scalability trilemma has been informally conjectured. This is related to scalability, security and decentralization, stating that any improvement in one of these aspects should negatively impact on at least one of the other twos. In fact, despite the large research and ex… ▽ More

    Submitted 4 June, 2020; v1 submitted 13 May, 2020; originally announced May 2020.

  5. Binding of Endpoints to Identifiers by On-Chain Proofs

    Authors: Diego Pennino, Maurizio Pizzonia, Andrea Vitaletti, Marco Zecchini

    Abstract: In many applications, identity management (IdM) is used to associate a subject public key with an endpoint at which the subject can be contacted (telephone number, email, etc.). In decentralized applications based on distributed ledger technologies (DLTes), it is desirable for the IdM to be decentralized as well. Currently, endpoints are either verified by who needs it, which is impractical in DLT… ▽ More

    Submitted 2 May, 2020; originally announced May 2020.

  6. Overlay Indexes: Efficiently Supporting Aggregate Range Queries and Authenticated Data Structures in Off-the-Shelf Databases

    Authors: Diego Pennino, Maurizio Pizzonia, Alessio Papi

    Abstract: Commercial off-the-shelf DataBase Management Systems (DBMSes) are highly optimized to process a wide range of queries by means of carefully designed indexing and query planning. However, many aggregate range queries are usually performed by DBMSes using sequential scans, and certain needs, like storing Authenticated Data Structures (ADS), are not supported at all. Theoretically, these needs could… ▽ More

    Submitted 25 October, 2019; originally announced October 2019.

    Journal ref: IEEE Access, Volume 7, pages 175642 - 175670, year 2019

  7. arXiv:1904.01935  [pdf, other

    cs.DC cs.CR

    Blockchains Meet Distributed Hash Tables: Decoupling Validation from State Storage

    Authors: Matteo Bernardini, Diego Pennino, Maurizio Pizzonia

    Abstract: The first obstacle that regular users encounter when setting up a node for a public blockchain is the time taken for downloading all the data needed for the node to start operating correctly. In fact, this may last from hours to weeks for the major networks. Our contribution is twofold. Firstly, we show a design that enables mining and validation of new blocks kee** only a very small state. Seco… ▽ More

    Submitted 7 March, 2019; originally announced April 2019.

    Comments: 13 pages, 3 figures, conference (DLT19)

  8. arXiv:1810.05005  [pdf, other

    cs.CR

    USBCaptchaIn: Preventing (Un)Conventional Attacks from Promiscuously Used USB Devices in Industrial Control Systems

    Authors: Federico Griscioli, Maurizio Pizzonia

    Abstract: Industrial Control Systems (ICS) are sensible targets for high profile attackers and advanced persistent threats, which are known to exploit USB thumb drives as an effective spreading vector. In ICSes, thumb drives are widely used to transfer files among disconnected systems and represent a serious security risks, since, they may be promiscuously used in both critical and regular systems. The thre… ▽ More

    Submitted 16 March, 2019; v1 submitted 11 October, 2018; originally announced October 2018.

  9. arXiv:1701.04293  [pdf, other

    cs.NI

    Leveraging SDN to Monitor Critical Infrastricture Networks in a Smarter Way

    Authors: Roberto di Lallo, Federico Griscioli, Gabriele Lospoto, Habib Mostafaei, Maurizio Pizzonia, Massimo Rimondini

    Abstract: In critical infrastructures, communication networks are used to exchange vital data among elements of Industrial Control Systems (ICSes). Due to the criticality of such systems and the increase of the cybersecurity risks in these contexts, best practices recommend the adoption of Intrusion Detection Systems (IDSes) as monitoring facilities. The choice of the positions of IDSes is crucial to monito… ▽ More

    Submitted 16 January, 2017; originally announced January 2017.

  10. arXiv:1412.4074  [pdf, other

    cs.NI

    Mining Network Events using Traceroute Empathy

    Authors: Marco Di Bartolomeo, Valentino Di Donato, Maurizio Pizzonia, Claudio Squarcella, Massimo Rimondini

    Abstract: In the never-ending quest for tools that enable an ISP to smooth troubleshooting and improve awareness of network behavior, very much effort has been devoted in the collection of data by active and passive measurement at the data plane and at the control plane level. Exploitation of collected data has been mostly focused on anomaly detection and on root-cause analysis. Our objective is somewhat in… ▽ More

    Submitted 8 September, 2015; v1 submitted 12 December, 2014; originally announced December 2014.

    Comments: 8 pages, 7 figures, extended version of Discovering High-Impact Routing Events using Traceroutes, in Proc. 20th International Symposium on Computers and Communications (ISCC 2015)

  11. arXiv:cs/9810009  [pdf, ps, other

    cs.SE cs.CG cs.DS

    Object-Oriented Design of Graph Oriented Data Structures

    Authors: Maurizio Pizzonia, Giuseppe Di Battista

    Abstract: Applied research in graph algorithms and combinatorial structures needs comprehensive and versatile software libraries. However, the design and the implementation of flexible libraries are challenging activities. Among the other problems involved in such a difficult field, a very special role is played by graph classification issues. We propose new techniques devised to help the designer and t… ▽ More

    Submitted 8 October, 1998; originally announced October 1998.

    Comments: 10 pages, 9 figures, code examples, ALENEX (accepted)

    ACM Class: D.2.3; D.2.11; D.2.13; E.1