Paolo Gasti, Ph.D.

Associate Professor

School of Engineering and Computing Sciences
New York Institute of Technology
Room 808, Edward Guiliano Global Center
1855 Broadway, New York 10023
pgasti@nyit.edu - Click here to download my PGP key


I am an Associate Professor at the New York Institute of technology, where I am affiliated with the Computer Science Department of the School of Engineering and Computing Sciences (SoECS).

My research focuses on applied cryptography, behavioral authentication, privacy-preserving techniques for sharing sensitive information, and security in future Internet architectures, including Named Data Networking (NDN) and Content-Centric Networking (CCN).

I am a co-director of the Lab for behavioral Authentication, Machine learning, and Privacy (LAMP), at the School of Engineering and Computing Sciences of NYIT.

Before joining NYIT, I was a research scientist at University of California, Irvine. I received a Ph.D. in Computer Science from University of Genoa, Italy, in 2010. During my Ph.D. I was a visiting scholar at the Johns Hopkins University's ISI under the supervision of Prof. Giuseppe Ateniese.

Working with me

Please send me a short email with your CV, a list of 2 references, and 200-300 words summarizing your research interests. Please indicate whether you have funding, and if you already contacted someone at NYIT's School of Engineering and Computing Sciences. I currently have open positions for visiting Ph.D. students and Postdocs.

Recommendation Letters

I will be happy to write you a recommendation letter if you have worked on a project with me. Class assignments do not qualify as projects.

Publications

Qing Yang, Ge Peng, Paolo Gasti, Kiran Balagani, Yantao Li, and Gang Zhou. Meg: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones. In Transactions on Information Forensics and Security (T-IFS), vol. 10 pp. 384--396, 2018

Kasper Rasmussen, and Paolo Gasti. Weak and Strong Deniable Authenticated Encryption: On Their Relationship and Applications. In Sixteenth Annual International Conference on Privacy, Security and Trust (PST), IEEE, 2018

Kiran Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, and Lynn Wu. Silk-tv: Secret Information Leakage from Keystroke Timing Videos. In European Symposium on Research in Computer Security (ESORICS), Springer, Berlin, Heidelberg, 2018

Qing Yang, Paolo Gasti, Kiran Balagani, Yantao Li, and Gang Zhou. Usb Side-channel Attack on Tor. In Elsevier Journal on Computer Networks (COMNET), vol. 141 pp. 57--66, 2018

Paolo Gasti, and Gene Tsudik. Content-centric and Named-data Networking Security: The Good, The Bad and The Rest. In Local and Metropolitan Area Networks (LANMAN), IEEE, 2018

Fatimah Elsayed, Kiran Balagani, Paolo Gasti, Chung Hyuk Park, and Anand Santhanakrishnan. Continuous and Transparent Authentication of Haptic Users. In Proceedings of the IEEE Haptics Symposium, IEEE, 2018

Kiran Balagani, Paolo Gasti, Aaron Elliott, Azriel Richardson, and Mike ONeal. The Impact of Application Context on Privacy and Performance of Keystroke Authentication Systems. In Journal of Computer Security (JCS), pp. 543--556, 2018

Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik, and Christopher Wood. Privacy-aware Caching In Information-centric Networking. In IEEE Transactions on Dependable and Secure Computing (TDPS), 2017

Qing Yang, Paolo Gasti, Gang Zhou, Aydin Farajidavar, and Kiran Balagani. On Inferring Browsing Activity on Smartphones Via Usb Power Analysis Side-channel. In Transactions on Information Forensics and Security (T-IFS), vol. 12 pp. 1056--1066, 2017

Paolo Gasti, Jaroslav Sedenka, Qing Yang, Gang Zhou, and Kiran Balagani. Secure, Fast, and Energy-efficient Outsourced Authentication for Smartphones. In Transactions on Information Forensics and Security (T-IFS), vol. 11 pp. 2556--2571, 2016

Gabriele Costa, Paolo Gasti, Alessio Merlo, and Shunt-Hsi Yu. Flex: A Flexible Code Authentication Framework for Delegating Mobile App Customization. In Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS), pp. 389--400, ACM, 2016

Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, and Kiran Balagani. Hmog: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users. In Transactions on Information Forensics and Security (T-IFS), vol. 11 pp. 877--892, 2016

Jaroslav Sedenka, Sathya Govindarajan, Paolo Gasti, and Kiran Balagani. Secure Outsourced Biometric Authentication with Performance Evaluation on Smartphones. In Transactions on Information Forensics and Security (T-IFS), vol. 10 pp. 384--396, 2015

Paolo Gasti, and Kasper B Rasmussen. Privacy-preserving User Matching. In Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society (WPES), pp. 111--120, ACM, 2015

Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, and Gene Tsudik. Violating Consumer Anonymity: Geo-locating Nodes In Named Data Networking. In International Conference on Applied Cryptography and Network Security (ACNS), pp. 243--262, Springer, 2015. [Best student paper award]

Jeff Burke, Paolo Gasti, Naveen Nathan, and Gene Tsudik. Secure Sensing Over Named Data Networking. In 13th International Symposium on Network Computing and Applications (NCA), pp. 175--180, IEEE, 2014

Jaroslav Sedenka, Kiran Balagani, Vir Phoha, and Paolo Gasti. Privacy-preserving Population-enhanced Biometric Key Generation from Free-text Keystroke Dynamics. In International Joint Conference on Biometrics (IJCB), pp. 1--8, IEEE, 2014

Hilbert Locklear, Sathya Govindarajan, Zdenka Sitova, Adam Goodkind, David Guy Brizan, Andrew Rosenberg, Vir V Phoha, Paolo Gasti, and Kiran Balagani. Continuous Authentication with Cognition-centric Text Production and Revision Features. In International Joint Conference on Biometrics (IJCB), pp. 1--8, IEEE, 2014

Rui Wang, Zdenka Sitova, Xiaoqing Jia, Xiang He, Tobi Abramson, Paolo Gasti, Kiran Balagani, and Aydin Farajidavar. Automatic Identification of Solid-phase Medication Intake Using Wireless Wearable Accelerometers. In 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 4168--4171, IEEE, 2014

Jaroslav Sedenka, and Paolo Gasti. Privacy-preserving Distance Computation and Proximity Testing on Earth, Done Right. In Proceedings of the 9th ACM symposium on Information, computer and communications security (AsiaCCS), pp. 99--110, ACM, 2014

Carlo Blundo, Emiliano De Cristofaro, and Paolo Gasti. Espresso: Efficient Privacy-preserving Evaluation of Sample Set Similarity. In Journal of Computer Security (JCS), vol. 22 pp. 355--381, 2014

Moreno Ambrosin, Mauro Conti, Paolo Gasti, and Gene Tsudik. Covert Ephemeral Communication In Named Data Networking. In Proceedings of the 9th ACM symposium on Information, computer and communications security (AsiaCCS), pp. 15--26, ACM, 2014

Mauro Conti, Paolo Gasti, and Marco Teoli. A Lightweight Mechanism for Detection of Cache Pollution Attacks In Named Data Networking. In Elsevier Journal on Computer Networks (COMNET), vol. 57 pp. 3178--3191, 2013

Michael Holmes, Jerald Liu, Huanying Gu, and Paolo Gasti. Privacy-preserving Symptoms-to-disease Mapping on Smartphones. In Conference on Mobile and information Technologies in Medicine (MobileMed), 2013

Alberto Compagno, Mauro Conti, Paolo Gasti, and Gene Tsudik. Poseidon: Mitigating Interest Flooding Ddos Attacks In Named Data Networking. In 38th Conference on Local Computer Networks (LCN),, pp. 630--638, IEEE, 2013

Sathya Govindarajan, Paolo Gasti, and Kiran Balagani. Secure Privacy-preserving Protocols for Outsourcing Continuous Authentication of Smartphone Users with Touch Data. In Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1--8, IEEE, 2013

Mishari Almishari, Paolo Gasti, Gene Tsudik, and Ekin Oguz. Privacy-preserving Matching of Community-contributed Content. In European Symposium on Research in Computer Security (ESORICS), pp. 443--462, Springer, Berlin, Heidelberg, 2013

Mishari Almishari, Paolo Gasti, Naveen Nathan, and Gene Tsudik. Optimizing Bi-directional Low-latency Communication In Named Data Networking. In ACM SIGCOMM Computer Communication Review, vol. 44 pp. 13--19, 2013

Carlo Blundo, Emiliano De Cristofaro, and Paolo Gasti. Espresso: Efficient Privacy-preserving Evaluation of Sample Set Similarity. In Data Privacy Management and Autonomous Spontaneous Security (DPM), pp. 89--103, 2013

Paolo Gasti, Gene Tsudik, Ersin Uzun, and Lixia Zhang. Dos and Ddos In Named Data Networking. In 22nd International Conference on Computer Communications and Networks (ICCCN), IEEE, 2013

Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, and Gene Tsudik. Cache Privacy In Named-data Networking. In 33rd International Conference on Distributed Computing Systems (ICDCS), pp. 41--51, IEEE, 2013

Jeff Burke, Paolo Gasti, Naveen Nathan, and Gene Tsudik. Securing Instrumented Environments Over Content-centric Networking: the Case of Lighting Control and Ndn. In 2013 IEEE Conference on Computer Communications Workshops (INFOCOM Workshops), pp. 394--398, IEEE, 2013

Emiliano De Cristofaro, Paolo Gasti, and Gene Tsudik. Fast and Private Computation of Cardinality of Set Intersection and Union. In Cryptology and Network Security (CANS), pp. 218--231, 2012

Emiliano De Cristofaro, Sky Faber, Paolo Gasti, and Gene Tsudik. Genodroid: Are Privacy-preserving Genomic Tests Ready for Prime Time?. In Proceedings of the 2012 ACM workshop on Privacy in the electronic society (WPES), pp. 97--108, ACM, 2012

Paolo Gasti, and Kasper Bonne Rasmussen. On the Security of Password Manager Database Formats. In European Symposium on Research in Computer Security (ESORICS), pp. 770--787, 2012

Steve DiBenedetto, Paolo Gasti, Gene Tsudik, and Ersin Uzun. Andana: Anonymous Named Data Networking Application. In 19th Annual Network and Distributed System Security Symposium (NDSS), 2012

Pierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, and Gene Tsudik. Countering Gattaca: Efficient and Secure Testing of Fully-sequenced Human Genomes. In Proceedings of the 18th ACM conference on Computer and communications security (CCS), pp. 691--702, ACM, 2011

Marina Blanton, and Paolo Gasti. Secure and Efficient Protocols for Iris and Fingerprint Identification. In European Symposium on Research in Computer Security (ESORICS), pp. 190--209, Springer, Berlin, Heidelberg, 2011

Paolo Gasti, and Alessio Merlo. On Re-use of Randomness In Broadcast Encryption. In Ninth Annual International Conference on Privacy, Security and Trust (PST), pp. 36--43, IEEE, 2011

Zhenkai Zhu, Jeffery Burke, Lixia Zhang, Paolo Gasti, Yanbin Lu, and Van Jacobson. A New Approach to Securing Audio Conference Tools. In Proceedings of the 7th Asian Internet Engineering Conference, pp. 120--123, ACM, 2011

Paolo Gasti, Giuseppe Ateniese, and Marina Blanton. Deniable Cloud Storage: Sharing Files Via Public-key Deniability. In Proceedings of the 9th annual ACM workshop on Privacy in the electronic society (WPES), pp. 31--42, ACM, 2010

Paolo Gasti, Alessio Merlo, Giuseppe Ciaccio, and Giovanni Chiola. On the Integrity of Network Coding-based Anonymous P2p File Sharing Networks. In 9th IEEE International Symposium on Network Computing and Applications (NCA), pp. 192--197, IEEE, 2010

Paolo Gasti, and Yu Chen. Breaking and Fixing the Self Encryption Scheme for Data Security In Mobile Devices. In Parallel, Distributed and Network-Based Processing (PDP), 2010 18th Euromicro International Conference on, pp. 624--630, IEEE, 2010

Vishwas Patil, Paolo Gasti, Luigi Mancini, and Giovanni Chiola. Resource Management with X. 509 Inter-domain Authorization Certificates (interac). In European Public Key Infrastructure Workshop (EuroPKI), pp. 34--50, Springer, Berlin, Heidelberg, 2009

Giuseppe Ateniese, and Paolo Gasti. Universally Anonymous Ibe Based on the Quadratic Residuosity Assumption. In RSA Conference, Cryptographers' track (CT-RSA), vol. 9 pp. 32--47, 2009

Giovanni Chiola, and Paolo Gasti. Stemcerts-2: Pairs of X. 509 V3 Certificates for Greater Security, Flexibility and Convenience. In 6th IEEE Consumer Communications and Networking Conference (CCNC), pp. 1--7, IEEE, 2009

G Chiola, and P Gasti. Stemcerts: Customizable X. 509 V3 Certificates for Higher Security, Flexibility, and Convenience. In PRISE security workshop, Rome, 2006


Grants and Scholarships

NSF SaTC Award #1814846, October 2018

NSF SaTC Award #1619023, October 2016

DARPA Active Authentication Grant FA8750-13-2-0266, September 2013

CISCO grant #573525, June 2012

Fulbright Scholarship, October 2007 to October 2008


Invited Talks


Recent Activities