Dipartimento di Informatica » Luigi Catuogno
Projects | Teaching | Conferences | Publications | Contacts

Luigi Catuogno, Ph.D.

Luigi Catuogno is network administrator at the Department of Computer Science of the University of Salerno, where he got his Laurea degree (M.Sc. equivalent) in 1999, his PhD in Computer Science in 2004 (Advisor, Prof. Giuseppe Persiano) and a post-doc fellowship in 2009. He has been visiting student at New York University in 2002 and research assistant at Ruhr University of Bochum (Germany) in 2009, under the supervision of Prof. Ahmad-Reza Sadeghi. His research focuses on system security and privacy enhancing technologies.


Projects:

  • Open Trusted Computing (OpenTC), EU-funded R&D project (IP, FP6)


Teaching:


Conferences:

ICISSP 2017, CSS 2016, IMIS 2016, SCN 2016, CSS 2015, IMIS 2015, SCN 2014, SAGT 2011, INSCRYPT 2010, INSCRYPT 2009, SCN 2008, SCN 2006, DISC 2003


Publications:

2016

Ensuring non-repudiation in human conversations over VoIP communications
(Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, Gianluca Roscigno), In IJCNDS, volume 16, 2016. [bibtex] [pdf] [doi]

Flexible and robust Enterprise Right Management
(Luigi Catuogno, Clemente Galdi, Daniel Riccio), In IEEE Symposium on Computers and Communication, ISCC 2016, Messina, Italy, June 27-30, 2016, 2016. [bibtex] [pdf] [doi]

On the Evaluation of Security Properties of Containerized Systems
(Luigi Catuogno, Clemente Galdi), In 15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, IUCC-CSS 2016, Granada, Spain, December 14-16, 2016, 2016. [bibtex] [pdf] [doi]
2015

Guaranteeing Dependency Enforcement in Software Updates
(Luigi Catuogno, Clemente Galdi, Giuseppe Persiano), In Secure IT Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings, 2015. [bibtex] [pdf] [doi]

The Dark Side of the Interconnection: Security and Privacy in the Web of Things
(Luigi Catuogno, Stefano Turchi), In 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015, Santa Cantarina, Brazil, July 8-10, 2015, 2015. [bibtex] [pdf] [doi]

Ensuring Application Integrity: A Survey on Techniques and Tools
(Luigi Catuogno, Clemente Galdi), In 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015, Santa Cantarina, Brazil, July 8-10, 2015, 2015. [bibtex] [pdf] [doi]

Reliable Voice-Based Transactions over VoIP Communications
(Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, Gianluca Roscigno), In 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015, Santa Cantarina, Brazil, July 8-10, 2015, 2015. [bibtex] [pdf] [doi]

A honeypot system with honeyword-driven fake interactive sessions
(Luigi Catuogno, Aniello Castiglione, Francesco Palmieri), In 2015 International Conference on High Performance Computing & Simulation, HPCS 2015, Amsterdam, Netherlands, July 20-24, 2015, 2015. [bibtex] [pdf] [doi]
2014

A secure file sharing service for distributed computing environments
(Aniello Castiglione, Luigi Catuogno, Aniello Del Sorbo, Ugo Fiore, Francesco Palmieri), In The Journal of Supercomputing, volume 67, 2014. [bibtex] [pdf] [doi]

A trusted versioning file system for passive mobile storage devices
(Luigi Catuogno, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi), In J. Network and Computer Applications, volume 38, 2014. [bibtex] [pdf] [doi]

Achieving interoperability between federated identity management systems: A case of study
(Luigi Catuogno, Clemente Galdi), In J. High Speed Networks, volume 20, 2014. [bibtex] [pdf] [doi]

On user authentication by means of video events recognition
(Luigi Catuogno, Clemente Galdi), In J. Ambient Intelligence and Humanized Computing, volume 5, 2014. [bibtex] [pdf] [doi]

Analysis of a two-factor graphical password scheme
(Luigi Catuogno, Clemente Galdi), In Int. J. Inf. Sec., volume 13, 2014. [bibtex] [pdf] [doi]

Interoperability between Federated Authentication Systems
(Luigi Catuogno, Clemente Galdi), In Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2014, Birmingham, United Kingdom, 2-4 July, 2014, 2014. [bibtex] [pdf] [doi]
2013

SmartK: Smart cards in operating systems at kernel level
(Luigi Catuogno, Roberto Gassirà, Michele Masullo, Ivan Visconti), In Inf. Sec. Techn. Report, volume 17, 2013. [bibtex] [pdf] [doi]

Reliable accounting in grids
(Luigi Catuogno, Pompeo Faruolo, Umberto Ferraro Petrillo, Ivan Visconti), In IJHPCN, volume 7, 2013. [bibtex] [pdf] [doi]

Towards the design of a film-based graphical password scheme
(Luigi Catuogno, Clemente Galdi), In 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, London, United Kingdom, December 9-12, 2013, 2013. [bibtex] [pdf] [doi]
2012

Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education
(Aniello Castiglione, Giuseppe Cattaneo, Luigi Catuogno, Ezio Cerrelli, Carlo Di Giampaolo, Fulvio Marino, Rodolfo Rotondo), In 20th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2012 , Split, Croatia, September 11-13, 2012, 2012. [bibtex] [pdf]
2010

Trusted virtual domains: Color your network
(Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy), In Datenschutz und Datensicherheit, volume 34, 2010. [bibtex] [pdf] [doi]

On the Security of a Two-Factor Authentication Scheme
(Luigi Catuogno, Clemente Galdi), In Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings, 2010. [bibtex] [pdf] [doi]
2009

Transparent Mobile Storage Protection in Trusted Virtual Domains
(Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy), In Proceedings of the 23rd Large Installation System Administration Conference, November 1-6, 2009, Baltimore, MD, USA, 2009. [bibtex] [pdf]

Trusted Virtual Domains - Design, Implementation and Lessons Learned
(Luigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy, Jing Zhan), In Trusted Systems, First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers, 2009. [bibtex] [pdf] [doi]
2008

A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices
(Luigi Catuogno, Clemente Galdi), In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings, 2008. [bibtex] [pdf] [doi]

An internet role-game for the laboratory of network security course
(Luigi Catuogno, Alfredo De Santis), In Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2008, Madrid, Spain, June 30 - July 2, 2008, 2008. [bibtex] [pdf] [doi]

PITO: A Children-Friendly Interface for Security Tools
(Luigi Catuogno), In Learning to Live in the Knowledge Society, IFIP 20th World Computer Congress, IFIP TC 3 ED-L2L Conference, September 7-10, 2008, Milano, Italy, 2008. [bibtex] [pdf] [doi]
2007

iToken: aWireless smart card reader which provides handhelds with desk top equivalent security
(Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, G. Di Matteo, Luigi Romano), In Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, 2007. [bibtex] [pdf] [doi]
2005

Securing Operating System Services Based on Smart Cards
(Luigi Catuogno, Roberto Gassirà, Michele Masullo, Ivan Visconti), In Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, 2005. [bibtex] [pdf] [doi]
2004

An Architecture for Kernel-Level Verification of Executables at Run Time
(Luigi Catuogno, Ivan Visconti), In Comput. J., volume 47, 2004. [bibtex] [pdf] [doi]

Reliable Accounting in Grid Economic Transactions
(Luigi Catuogno, Pompeo Faruolo, Umberto Ferraro Petrillo, Ivan Visconti), In Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, 2004. [bibtex] [pdf] [doi]
2003

A Lightweight Security Model for WBEM
(Giuseppe Cattaneo, Luigi Catuogno, Umberto Ferraro Petrillo, Ivan Visconti), In On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, OTM Confederated International Workshops, HCI-SWWA, IPW, JTRES, WORM, WMS, and WRSM 2003, Catania, Sicily, Italy, November 3-7, 2003, Proceedings, 2003. [bibtex] [pdf] [doi]
2002

A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code
(Luigi Catuogno, Ivan Visconti), In Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, 2002. [bibtex] [pdf] [doi]
2001

The Design and Implementation of a Transparent Cryptographic File System for UNIX
(Giuseppe Cattaneo, Luigi Catuogno, Aniello Del Sorbo, Pino Persiano), In Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, June 25-30, 2001, Boston, Massachusetts, USA, 2001. [bibtex] [pdf]



Contacts:

Luigi Catuogno
Dipartimento di Informatica
Universita' degli Studi di Salerno
Via Giovanni Paolo II,132 84084 Fisciano (SA) Italy
Phone +39 089 969 502
Fax +39 089 969 600
e-mail lui...@dia.unisa.it