Mario Raciti

Mario Raciti
Verified
Mario verified their affiliation via an institutional email.
Verified
Mario verified their affiliation via an institutional email.
IMT School for Advanced Studies Lucca

MSc Computer Science
Research areas: CySec and Privacy Threat Modelling, (Anti-)Digital Forensic, Cyber Threat Intelligence.

About

29
Publications
1,470
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
32
Citations
Introduction
I am a PhD Student of the first National PhD in Cybersecurity at IMT School for Advanced Studies Lucca, assigned at the University of Catania, where I joined the Network and Security Informatics (NaS.Inf) research lab. Currently, I am also a visiting researcher at KU Leuven where I joined the DistriNet research unit. My research interests cover the CySec and Privacy Threat Modelling, (Anti-)Digital Forensic, Cyber Threat Intelligence fields.
Additional affiliations
September 2024 - present
KU Leuven
Position
  • Visiting PhD Researcher
Description
  • Cybersecurity and Privacy Threat Modelling - Threat Modelling Automation with AI and LLMs.
October 2020 - November 2022
National Institute of Astrophysics
Position
  • Research Associate
December 2022 - present
University of Catania
Position
  • PhD Student

Publications

Publications (29)
Article
Full-text available
NEANIAS is a research and innovation action project funded by the European Union under the Horizon 2020 program. The project addresses the challenge of prototyping novel solutions for the underwater, atmospheric and space research communities , creating a collaborative research ecosystem, and contributing to the effective materialization of the Eur...
Technical Report
Nowadays Web technologies have become more common as they improve the work of astronomers by easing, for example, the monitoring and analysing of data. The Django Python framework is one of the most widely used libraries for developing Web applications as it offers several advantages. However, the necessity of continuously deal with data in real ti...
Conference Paper
Risk assessment is core to any institution’s evaluation of risk, no- tably for what concerns people’s privacy. The assessment often re- lies on information stated in a policy shaped as a text document. The risk assessor, or analyst in brief, is called to understand documenta- tion that can be long, unclear or incomplete, hence subjectivity or distr...
Preprint
Full-text available
This paper questions how to approach threat modelling in the automotive domain at both an abstract level that features no domain-specific entities such as the CAN bus and, separately, at a detailed level. It addresses such questions by contributing a systematic method that is currently affected by the analyst's subjectivity because most of its inne...
Article
Full-text available
This article recognises the widespread application of risk assessment in ICT and aims at reducing the influence of human subjectivity and distraction by means of a methodology for the Automated and Intelligent Likelihood Assignment (AILA). The AILA Methodology, with its various components, applies when risk assessment proceeds exclusively upon info...
Preprint
Full-text available
Data and derived information about target victims has always been key for successful attacks, both during historical wars and modern cyber wars. Ours turns out to be an era in which modern cars generate a plethora of data about their drivers, and such data could be extremely attractive for offenders. This paper seeks to assess how well modern cars...
Conference Paper
Criminal investigations are inherently complex as they typically involve interactions among various actors like investigators, prosecutors, and defendants. The pervasive integration of technology in daily life adds an extra layer of complexity, especially in crimes that involve a digital element. The establishment of digital forensics as a foundati...
Conference Paper
Full-text available
Over recent years there has been a growing focus on cyber-enabled crimes within criminal investigations. The rising trend of Ransomware-as-a-Service (RaaS) highlights a pattern where criminal groups explicitly demand cryptocurrency payments from their victims and then distribute these funds to their affiliates. This strategy leverages key-blockchai...
Preprint
Full-text available
Criminal investigations are inherently complex as they typically involve interactions among various actors like investigators, prosecutors, and defendants. The pervasive integration of technology in daily life adds an extra layer of complexity, especially in crimes that involve a digital element. The establishment of digital forensics as a foundati...
Conference Paper
Physical persons playing the role of car drivers consume data that is sourced from the Internet and, at the same time, themselves act as sources of relevant data. It follows that citizens’ privacy is potentially at risk while they drive, hence the need to model privacy threats in this application domain. This paper addresses the privacy threats by...
Conference Paper
The widespread integration of Internet of Things (IoT) devices in households generates extensive digital footprints, notably within Smart Home ecosystems. These IoT devices, brimming with data about residents, inadvertently offer insights into human activities, potentially embodying even criminal acts, such as a murder. As technology advances, so d...
Preprint
Full-text available
The widespread integration of Internet of Things (IoT) devices in households generates extensive digital footprints, notably within Smart Home ecosystems. These IoT devices, brimming with data about residents, inadvertently offer insights into human activities, potentially embodying even criminal acts, such as a murder. As technology advances, so d...
Preprint
Full-text available
Physical persons playing the role of car drivers consume data that is sourced from the Internet and, at the same time, themselves act as sources of relevant data. It follows that citizens' privacy is potentially at risk while they drive, hence the need to model privacy threats in this application domain. This paper addresses the privacy threats by...
Preprint
Full-text available
Modern cars are getting so computerised that ENISA's phrase "smart cars" is a perfect fit. The amount of personal data that they process is very large and, yet, increasing. Hence, the need to address citizens' privacy while they drive and, correspondingly, the importance of privacy threat modelling (in support of a respective risk assessment, such...
Article
Full-text available
In the nearby universe, jets from active galactic nuclei (AGN) are observed to have a dramatic impact on their surrounding extragalactic environment. The effect of jets at high redshift ( z > 1.5) is instead much more poorly constrained. However, studying the jet impact at cosmic noon, the epoch in which both star formation and AGN activity peak, i...
Preprint
In the nearby universe jets from AGN are observed to have a dramatic impact on their surrounding extragalactic environment. Their effect at the `cosmic noon' (z>1.5), the epoch when star formation and AGN activity peak, is instead much less constrained. Here we present a study of the giant (750 kpc) radio galaxy 103025+052430 located at the centre...
Conference Paper
This paper questions how to approach threat modelling in the automotive domain at both an abstract level that features no domain-specific entities such as the CAN bus and, separately, at a detailed level. It addresses such questions by contributing a systematic method that is currently affected by the analyst's subjectivity because most of its inne...
Preprint
Full-text available
The Gaia Astrometric Verification Unit-Global Sphere Reconstruction (AVU-GSR) Parallel Solver aims to find the astrometric parameters for $\sim$10$^8$ stars in the Milky Way, the attitude and the instrumental specifications of the Gaia satellite, and the global parameter $\gamma$ of the post Newtonian formalism. The code iteratively solves a system...
Article
The Gaia Astrometric Verification Unit–Global Sphere Reconstruction (AVU–GSR) Parallel Solver aims to find the astrometric parameters for ∼108 stars in the Milky Way, the attitude and the instrumental specifications of the Gaia satellite, and the global parameter γ of the post Newtonian formalism. The code iteratively solves a system of linear equa...
Preprint
Innovative developments in data processing, archiving, analysis, and visualization are nowadays unavoidable to deal with the data deluge expected in next-generation facilities for radio astronomy, such as the Square Kilometre Array (SKA) and its precursors. In this context, the integration of source extraction and analysis algorithms into data visu...
Article
Innovative developments in data processing, archiving, analysis, and visualization are nowadays unavoidable to deal with the data deluge expected in next-generation facilities for radio astronomy, such as the Square Kilometre Array (SKA) and its precursors. In this context, the integration of source extraction and analysis algorithms into data visu...
Preprint
Full-text available
We present the current development of the Monitoring, Logging and Alarm subsystems in the framework of the Array Control and Data Acquisition System (ACADA) for the Cherenkov Telescope Array (CTA). The Monitoring System (MON) is the subsystem responsible for monitoring and logging the overall array (at each of the CTA sites) through the acquisition...
Chapter
In the original version of the book, the following belated correction has been incorporated: The affiliation of Mario Raciti has been changed from “INAF, Catania Astrophysical Observatory, Catania, Italy” to “Università di Catania, Dipartimento di Matematica e Informatica, Catania, Italy”.
Poster
Full-text available
The European Open Science Cloud (EOSC) initiative is enabling transparent, data-driven Open Science. This work presents the ongoing activities related to the implementation of Visual Analytics (VA) services, integrated in EOSC, towards addressing Astrophysics community needs for data management, mapping and structure detection.
Preprint
The European Open Science Cloud (EOSC) aims to create a federated environment for hosting and processing research data to support science in all disciplines without geographical boundaries, such that data, software, methods and publications can be shared as part of an Open Science community of practice. This work presents the ongoing activities rel...
Chapter
The European Open Science Cloud (EOSC) aims to create a federated environment for hosting and processing research data to support science in all disciplines without geographical boundaries such that data, software, methods and publications can be shared as part of an Open Science community of practice. This work presents the ongoing activities rela...

Network

Cited By