ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Personal Information
Occupation
Offensive Security Advisor | Mobile - ICS - IoT - Embedded Security Researcher | GPEN | GCFA | GRID
Industry
Technology / Software / Internet
Website
About
Graduated with top grades in "Security in Systems and Computer Networks"​ at University of Milan (Italy). After some years as consultant and researcher, I am working as Head of Offensive Security. I am also actively involved in Security R&D, where the main fields are: Radio Networks, Reverse Engineering, Hardware Hacking, Internet of Things and Physical Security. I also love to share my knowledge and present some cool projects at security conferences around the globe: BlackHat, TROOPERS, HackInParis, DEFCON, HackInBo, SAS, OWASP Chapters, Kaspersky ICS Security Conference, OzSecCon, etc.
Contact Details

Presentations(10)Ìý

See all
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
Ìý
Mobile Network Security: a tale of tracking, spoofing and owning mobile phones. Defcon Moscow. OpenBTS & IMSI-catcher.
Mobile Network Security: a tale of tracking, spoofing and owning mobile phones. Defcon Moscow. OpenBTS & IMSI-catcher.Mobile Network Security: a tale of tracking, spoofing and owning mobile phones. Defcon Moscow. OpenBTS & IMSI-catcher.
Mobile Network Security: a tale of tracking, spoofing and owning mobile phones. Defcon Moscow. OpenBTS & IMSI-catcher.
Ìý
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano 2013
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano 2013Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano 2013
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano 2013
Ìý

Documents(1)Ìý

HandPwning Security pitfalls of biometric hand-geometry recognition access control systems
HandPwning Security pitfalls of biometric hand-geometry recognition access control systemsHandPwning Security pitfalls of biometric hand-geometry recognition access control systems
HandPwning Security pitfalls of biometric hand-geometry recognition access control systems
Ìý