I can break it, I can fix it, I can make the rules, or make the others follow them.
Find out what I can do for you below, or check my blog if you are interested in IT and security topics.
Trust In Your Pockets: On the Security of Mobile Devices through Trusted Computing
Bove, D. (2024). Dissertation.
URL: https://doi.org/10.25593/open-fau-510
A Large-Scale Study on the Prevalence and Usage of TEE-based Features on Android
Bove, D. (2024). In Association for Computing Machinery (Eds.), Proceedings of the 19th International Conference on Availability, Reliability and Security. Vienna, Austria, AT
URL: https://doi.org/10.1145/3664476.3664486
Basic Secure Services for Standard RISC-V Architectures
Bove, D. & Funk, J. (2023). Computers & Security, Volume 133
URL: https://doi.org/10.1016/j.cose.2023.103415
Secure Services for Standard RISC-V Architectures
Bove, D. (2022). In Association for Computing Machinery (Eds.), Proceedings of the 17th International Conference on Availability, Reliability and Security. Vienna, Austria, AT
URL: https://dl.acm.org/doi/10.1145/3538969.3538998
[Mirror]
SoK: The Evolution of Trusted UI on Mobile
Bove, Bove, D. (2022). In Association for Computing Machinery (Eds.), ASIA CCS '22: Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (pp. 616 - 629). Nagasaki, Japan.
URL: https://dl.acm.org/doi/10.1145/3488932.3517417
[Open Access]
Investigating Characteristics of Attacks on Public Cloud Systems
Bove, D. & Müller, T. (2019). In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Paris, France.
URL: https://doi.org/10.1109/CSCloud/EdgeCom.2019.00-13
In pursuit of a secure UI: The cycle of breaking and fixing Android’s UI
Bove, D. & Kalysch, A. (2019). it - Information Technology, Methods and Applications of Informatics and Information Technology.
URL: https://doi.org/10.1515/itit-2018-0023
How Android’s UI Security is Undermined by Accessibility
Kalysch, A., Bove, D., & Müller, T. (2018).
In: Proceedings of the 2nd Reversing and Offensive-oriented Trends Symposium (pp. 2:1--2:10). Vienna, AT: New York, NY, USA: ACM International Conference Proceedings Series (ICPS).
URL: https://dl.acm.org/doi/10.1145/3289595.3289597
[Mirror]
Using Honeypots to Detect and Analyze Attack Patterns on Cloud Infrastructures
Bove, D. (2018). Unpublished master's thesis. Friedrich-Alexander University, Erlangen, Germany.
URL: https://davidebove.com/files/thesis-bove-public.pdf
Email: info@davidebove.com
Email: info@davidebove.com
Public Key: 0x4737E735F1ABAB8E
Fingerprint:
43A7 FFC2 EA90 1317 4905