I'm Enrico, I'm a PhD student in Computer Engineering at Politecnico di Torino. I'm have a bachelor's degree in Computer Engineering and a master's degree in Computer Engineering - Cybersecurity. I have been part of the student team PoliTOcean, which develop a submarine ROV (Remote Operated Veicle) for internatinal competitions. I recntly spent 6 months as a PhD Intern at the Huawei Munich Research Center working on enabling integrity verification features for containers.. In my spare time I like doing sports, warching movies, reading and listening to music. I love working on my PC, sperimenting always on something new, in order to learn new skills and make experience. I'm passionate about the Linux kernel and kernel development. I'm learning and starting to contribute to the Linux kernel.
Enrico Bravi
26
Torino
PhD internship at the Huawei research center in Munich working on enabling integrity verification features for containers.
Visiting period inLINKS Foundationresearch center, at the Cybersecurity laboratory working on Trusted Computing and Remote Attestation.
PhD candidate in Computer and Control Enegineering (Cybersecurity) at Politecnico di Torino (DAUIN department)
IT Assistant and Technical support to infrastructures atSmartData@Polito.
Internship atSmartData@Polito. The purpose was the creation of a Cloudera development cluster.
Creation of the site for the organizationUniversità della terza età di Sangano.
Master's degree in Computer Enegineering - Cybersecurity at Politecnico di Torino.110 cum laude
Bachelor's degree in Computer Engineering at Politecnico di Torino.110 cum laude
The Young Talent Project is an educational path of excellence that has beenimplemented by Politecnico di Torino and Fondazione CRT for the Bachelor's degree programmes in Engineering and Architecture. This initiative is intended for studentswho rank in the top 5 percent; it aims to promote a merit-based approach through alearning experience that is complementary to the traditional educational path, thus boosting students' attitudes and inclinations. Students who participate in this Project, besides receiving traditional training in the framework of their Bachelor's degree programme, have a unique opportunity to build a multidisciplinary approach tostudy and the ability to understand reality from an overall point of view.
Nowadays smart contexts (such as smart cities/homes, or Industry 4.0) are rapidly gaining popularity. These new paradigms are enabled by the adoption of smart devices, that allow several programmatically driven actions. The Internet of Things (IoT) is the network built by connecting these smart devices. A critical aspect of these devices is their limited hardware support for security functions. This makes protecting IoT devices very challenging, although very important because they implement critical functions, as in Cyber Physical Systems. In this case, the protection of these systems is of paramount importance because their compromise could cause not only digital but also physical damage. Remote Attestation (RA) is a security process that permits a trusted party to remotely verify devices integrity but this becomes challenging for IoT devices due to their hardware constraints. Swarm Attestation (SA) is a generalization of RA to reduce its overhead for IoT environments. In this way, it becomes possible to attest large IoT networks. This paper introduces SAFEHIVE, a new schema for SA to maximize dynamic swarm configuration and management. This schema permits to manage heterogeneous devices in a dynamic scenario, even in the case of great variability.
Nowadays, there is a growing inclination towards network softwarization, wherein functions once handled by specialized hardware are now executed as software components on general-purpose nodes. This can be achieved with Network Function Virtualization (NFV) and Software-Defined Networking (SDN), offering advantages such as flexibility and reduced equipment costs. However, these paradigms, reliant on software and operating as a distributed system, introduce security challenges, including threats to software integrity through network or physical manipulation. To address these concerns, Remote Attestation techniques can be employed to enable a party to assess the software and configuration integrity of a network node. In complex network environments, different attestation frameworks may be deployed, depending on the type of hardware and software to be attested. To streamline this process, we present an extended design and implementation of our Trust Monitor architecture, implementing the Trust Manager defined by ETSI for NFV environments. This enhances flexibility by supporting the integration of multiple attestation frameworks based on different technologies. We present also how the Trust Monitor integrates into the IETF RATS architecture and how it interacts with its other elements. Through experimental tests, we demonstrate that the proposed implementation is scalable and effective in attesting both physical and virtual entities, such as Kubernetes pods.
Nowadays, critical infrastructures are managed through paradigms such as cloud/fog/edge computing and Network Function Virtualization (NFV), providing advantages as flexibility, availability, and reduced management costs. These paradigms introduce several advantages but-given their nature of physically distributed systems-leave room for various security threats, such as software integrity attacks. To counter these threats, Trusted Computing and Remote Attestation (RA) techniques can be used, to allow a third party (Verifier) to verify the software and configuration integrity of a platform (Attester). In environments composed of different objects, several RA frameworks (hardware-based, software-based, or hybrid) might need to be deployed, depending on the capabilities of the attested elements. To ease this process, we propose a new design and implementation of our Trust Monitor (TM) architecture, which implements the Trust Manager specified by ETSI for NFV environments, making it more flexible and usable in different contexts. In addition, we define a generic model for performing RA in heterogeneous environments by employing various RA technologies. More specifically, the extended TM allows flexible RA in hybrid infrastructures composed of different objects, i.e., physical nodes, virtual machines, containers, pods, and enclaves. Through tests performed in an experimental testbed, we show that the proposed implementation is scalable and usable in heterogeneous contexts.
IoT devices are becoming widely used in several contexts, and nowadays billions of devices are deployed in different scenarios, some of which are very critical to people's privacy and safety. For these reasons, it is very important to provide capabilities for guaranteeing the correct behaviour of the devices. Remote attestation is a technique traditionally used to monitor the integrity status of nodes and to determine if they are behaving as expected. This technique requires that the device is equipped with Roots of Trust, that are the set of hardware and software features that make the platform capable of providing reliable integrity reports even when it has been compromised. This paper proposes a solution that permits to identify and attest devices in a dynamic context, such as Smart Cities or Smart Homes, where unknown devices can connect to the network and perform several actions. The proposed security schema is based on the Device Identity Composition Engine (DICE), which represents a set of specifications designed by the Trusted Computing Group (TCG) to enhance security and privacy of devices with minimal silicon requirements.
Skills: Kernel Development, Patch Management, Linux Development Process.
Badge:link
Skills: Rust Programming Language, Cargo Project.
Badge:link
I providehigh qualityservices. My services that I provide are listed below.Hope you will like them. Lorem ipsum dolor.
Ut aboramus, numquam corpora qui naex. Dolore aliquando id duo, voluptualaboramus quo ad.
Ut aboramus, numquam corpora qui naex. Dolore aliquando id duo, voluptualaboramus quo ad.
Ut aboramus, numquam corpora qui naex. Dolore aliquando id duo, voluptualaboramus quo ad.
Ut aboramus, numquam corpora qui naex. Dolore aliquando id duo, voluptualaboramus quo ad.
Ut aboramus, numquam corpora qui naex. Dolore aliquando id duo, voluptualaboramus quo ad.
Ut aboramus, numquam corpora qui naex. Dolore aliquando id duo, voluptualaboramus quo ad.
Ut aboramus, numquam corpora qui naex. Dolore aliquando id duo, voluptualaboramus quo ad.
Ut aboramus, numquam corpora qui naex. Dolore aliquando id duo, voluptualaboramus quo ad.
How much I charge
Lorem ipsum dolor sit amet is simply a dummy text used by typeset industries.Lorem ipsum dolor.
Lorem ipsum dolor sit amet is simply a dummy text used by typeset industries.Lorem ipsum dolor.
Lorem ipsum dolor sit amet is simply a dummy text used by typeset industries.Lorem ipsum dolor.
Lorem ipsum dolor sit amet is simply a dummy text used by typeset industries.Lorem ipsum dolor.
Check out my works. Lorem ipsum dolor sit amet is simply a dummy text. Lorem ipsumdolor sit amet.
I'm available for discussing collaborations and sharing ideas. If you want something to be built or just to say hi, feel free to shoot me a message.
Email: enricodotbraviatpolitodotit
ebraviatduckdotcom