scispace - formally typeset
G

Giancarlo De Maio

Researcher at University of Salerno

Publications -  14
Citations -  237

Giancarlo De Maio is an academic researcher from University of Salerno. The author has contributed to research in topics: Digital forensics & Digital evidence. The author has an hindex of 9, co-authored 14 publications receiving 224 citations.

Papers
More filters
Proceedings ArticleDOI

On the Construction of a False Digital Alibi on the Android OS

TL;DR: Novel techniques to create a false digital alibi on a smart phone equipped with the Android OS are presented, which simulate human interaction with a mobile device using a software automation, with the produced traces being indistinguishable post-mortem from those left by a real user.
Book ChapterDOI

PExy: The Other Side of Exploit Kits

TL;DR: The drive-by download scene has changed dramatically in the last few years and what was a disorganized ad-hoc generation of malicious pages by individuals has evolved into sophisticated, easily extensible frameworks that incorporate multiple exploits at the same time and are highly configurable.
Proceedings ArticleDOI

SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks

TL;DR: Relying on the CSD, SECR3T provides a better QoS with respect to the PSD based solutions for 3G networks, and requires less power consumption as the user is registered once on the Base Station, with the handset not having to implement any heavy keep-alive protocols.
Book ChapterDOI

Automated construction of a false digital alibi

TL;DR: The results of this work demonstrate that court rulings should not be based only on digital evidence, with it always being correlated to additional information provided by the various disciplines of Forensics Sciences.
Proceedings ArticleDOI

Automatic, Selective and Secure Deletion of Digital Evidence

TL;DR: This work introduces a methodology to delete a predetermined data set from a digital device in a secure and fast way, for example, with a single click of the mouse, which is also able to remove traces about its execution and presence on the system.