Pietro Tedeschi

Pietro Tedeschi

Head of Cyber Electromagnetic Warfare Research

CY4GATE S.p.A

Biography

I am currently Head of Cyber Electromagnetic Warfare Research at Cy4Gate S.p.A.

Prior to this, I worked as a Senior Security Researcher at Technology Innovation Institute, and as Security Researcher at Consorzio Nazionale Interuniversitario per le Telecomunicazioni.

During my Bachelor’s thesis, advised by Prof. Gennaro Boggia, I came up with a lightweight key agreement protocol for constrained IoT devices in IEEE 802.15.4e networks by adopting the Elliptic Curve Diffie Hellman protocol and the implicit certificates ECQV.

During my Master’s thesis, advised by Prof. Luigi Alfredo Grieco, I designed and implemented a security framework for Intelligent Transport Systems in Horizon 2020 BONVOYAGE project by leveraging the Attribute Based Encryption.

My Ph.D, advised by Prof. Roberto Di Pietro, allowed me to design and developing of (i) a dead-reckoning system that leverages the jamming signal to estimate the UAV position; (ii) a privacy-preserving, distributed, and lightweight solution for co-location detection and collision avoidance of autonomous UAVs, and (iii) an anonymous remote identification system for UAVs to allow them to broadcast RemoteID-compliant messages using ephemeral pseudonyms.

My research journey allowed me to publish, 21 journal papers, 11 conference papers, 1 contribution for the Encyclopedia of Cryptography, Security and Privacy, 12 proof-of-concepts, and 3 patents.

Interests
  • Unmanned Aerial Vehicles Security
  • Maritime Security
  • Wireless Security
  • Privacy Preserving Systems
  • Applied Cryptography
  • Internet of Things
  • Cyber-Physical Systems Security
Education
  • Ph.D in Computer Science and Engineering, 2021

    Hamad Bin Khalifa University, Doha, Qatar

  • MSc in Computer Science and Engineering (cum laude), 2017

    Politecnico di Bari, Bari, Italy

  • BSc in Computer Science, and Automation Engineering, 2014

    Politecnico di Bari, Bari, Italy

Skills

Technical
Research & Development
Cybersecurity and Network Security
Programming
Project Management
Soft
Problem Solving
Critical Thinking
Leadership
Teamwork

Experience

 
 
 
 
 
Head of Cyber Electromagnetic Warfare Research
January 2024 – Present Rome, Italy
Research and Development.
 
 
 
 
 
Senior Security Researcher
January 2022 – January 2024 Abu Dhabi, United Arab Emirates
Research and Development of Security and Privacy systems.
 
 
 
 
 
Ph.D
September 2018 – December 2021 Doha, Qatar
Doctor of Philosophy in Computer Science and Engineering, and Computer and Network Security Teaching Assistant.
 
 
 
 
 
Security Researcher
March 2017 – August 2018 Bari, Italy
Design and Development of Security Protocols and Architectures for the EU Horizon 2020 SymbIoTe Project.

Latest News

Head of Cyber Electromagnetic Warfare Research
I got hired as Head of Cyber Electromagnetic Warfare Research at CY4GATE S.p.A, Rome, Italy.
Senior Security Researcher at TII
I got hired as Senior Security Researcher at Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates.
Research Internship
Mirai Malware Analysis and Detection for IoT Devices in Critical Infrastructures.
NATO SeaSec - DroNets for Maritime Border and Port Security
A project grant with Hamad Bin Khalifa University. Leveraging a squads of drones (DroNet) to provide monitoring support for critical scenarios in border and port security applications.
Catching Drones! Detecting Drones via Network Traffic Analysis
Grant of 50.000 QAR to research and develop a system to detect drones via the analysis of encrypted network traffic.
GPS Spoofing detection exploiting crowd-sourced information
Grant of 50.000 QAR to research and develop a cheap and effective solution to GPS spoofing exploiting crowd-sources.
Ph.D Thesis
I completed my Ph.D. with a thesis on the Security and Privacy Issues in Internet of Skies - Advanced Solutions for Drones and UAVs for Critical Infrastructures Protection.

Publications

Quickly discover relevant content by filtering publications.
(2024). Detection of quality of service degradation on multi-tenant containerized services. Elsevier Journal of Network and Computer Applications.

PDF Cite DOI

(2023). Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones. ACSAC 23 - Annual Computer Security Applications Security Conference.

PDF Cite Code DOI

(2023). URANUS: Radio Frequency Tracking, Classification and Identification of Unmanned Aircraft Vehicles. IEEE Open Journal of Vehicular Technology.

PDF Cite Code Dataset DOI

(2023). Federated learning for reliable model updates in network-based intrusion detection. Computers & Security.

PDF Cite DOI

(2023). Chaffing and Winnowing. Encyclopedia of Cryptography, Security and Privacy.

PDF Cite DOI

Patents

(2022). Systems and Methods for Privacy-Preserving Co-Location Detection and Collision Avoidance. Patent Utility.

Cite

(2022). Systems and methods for determining the position of a device. Google Patents.

PDF Cite

(2021). Method and system for jamming localization and supporting navigation system. Google Patents.

PDF Cite

(2020). Spoofing detection device and a spoofing detection method. Google Patents.

PDF Cite

Licenses and Certifications

  • Advanced Remotely Piloted Aircraft System, Sanad Academy
  • Cryptography I, Coursera
  • Introduction to cybersecurity I, Cisco Networking Academy
  • End-User: Social Engineering, Cybrary
  • Cisco CCNA Networking for Home and Small Businesses, Cisco
  • Microsoft IC3 (Internet and Computing Core Certification) - Computing Fundamentals - Key Applications - Living Online - Database Applications, Microsoft

Academic Services

  • Invited Speaker

    • ITASEC ‘23: Security and Privacy Issues in the Age of Drones
    • Apulia CyberSecurity Forum 2022
  • Journal Editor

    • Guest Associate Editor in Security, Privacy and Authentication. Frontiers in Communications and Networks Security, Privacy and Authentication - Security and Privacy for Underwater, Aerial and Ground Vehicles
  • General Chair

    • 1st Workshop on Security and Privacy of Mobile IoT (SP-MIoT) in conj. with ESORICS 2022
  • Technical (Program) Committee

    • 6th International Workshop on Wireless Sensors and Drones in Internet of Things 2024 (Wi-DroIT 2024, co-located with DCOSS 2024)
    • IEEE Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) 2024
    • Annual Computer Security Applications Conference Artifacts Evaluation (ACSAC AE) 2023
    • European Symposium on Research in Computer Security (ESORICS) 2023
    • IEEE GlobeCom 2023 Workshop - CelUAVSatCom
    • 2nd Workshop on Security and Privacy in Connected Embedded Systems (SPICES) in conj. with EWSN 2023
    • 5th International Workshop on Wireless Sensors and Drones in Internet of Things 2023 (Wi-DroIT 2023)
    • International Conference on Mobility, Sensing and Networking (MSN 2022)
    • Unconventional Security for Wireless Communications (USWC) in conj. with EWSN 22
    • SECRYPT 2022
    • ICT for Rural Development (IC-ICTRuDev) 2021
    • Wireless Days 2021 - 12th Wireless Days Conference
  • Reviewer

    • IEEE International Conference on Computer Communications (INFOCOM) 2024
    • IEEE Wireless Communications and Networking Conference (WCNC) 2024
    • Annual Computer Security Applications Conference (ACSAC) 2023
    • European Symposium on Research in Computer Security (ESORICS) 2023
    • IEEE Transactions on Dependable and Secure Computing
    • IEEE Transactions on Mobile Computing
    • IEEE Transactions on Wireless Communications
    • IEEE Transactions on Aerospace and Electronic Systems
    • IEEE Communications Magazine
    • IEEE Internet of Things Journal
    • IEEE Access
    • IEEE International Conference on Intelligent Robots and Systems (IROS)
    • IEEE International Conference on Computer Communication (INFOCOM)
    • IEEE International Conference on Communications (ICC)
    • ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
    • European Symposium on Research in Computer Security (ESORICS) 2022
    • Transactions on Emerging Telecommunications Technologies
    • Elsevier Computer Communications (COMCOM)
    • Elsevier Computer Networks (COMNET)
    • Elsevier Pervasive and Mobile Computing
    • Elsevier Vehicular Communications
    • Pervasive and Mobile Computing
    • International Journal of Information Security
    • Journal of Computer Security
    • IET Information Security
    • Security and Communication Networks
  • Mentor for more than 20 Master and Bachelor students worldwide