About

About banner

My passion for cybersecurity began during my Bachelor's at Universita degli Studi del Sannio, where my thesis research on malware analysis and software supply chain security went beyond detecting overtly malicious code and focused on uncovering hidden behaviours in trusted systems.


That path led me to Politecnico di Torino for an MSc in Cybersecurity Engineering, where I built a broad foundation across cryptography, network security, hardware security, wireless security, kernel security, AI-driven threat detection, and web application security. I have deliberately avoided narrowing down too early, because understanding the full attack surface is what makes a security engineer truly effective.


From there, I moved abroad to Huawei Research in Dusseldorf, where I work on next-generation privacy-preserving technologies and secure authentication systems, applying cryptographic research to challenges that will remain relevant long after today's infrastructure evolves.


Whether the problem is vulnerability research, secure system design, threat analysis, or applied cryptography, I am drawn to work that sits at the intersection of rigorous theory and real-world impact.


I also have a growing interest in new and cutting-edge technologies, especially AI agentic tools and their security and architectural implications: trust boundaries, orchestration risk, model-to-tool attack surfaces, and resilient-by-design deployment patterns.


Outside work, I am a sport enthusiast with a passion for basketball and the outdoors, always drawn to new landscapes and open spaces.

Currently Focused On

Post-Quantum CryptographyAI agentic security interest

Technical Skills

Security Engineering

penetration testingvulnerability research and exploitationkernel security and eBPFbinary analysis (Ghidra, GDB, radare2)malware analysisweb application security (OWASP Top 10)

Threat Detection & Response

MITRE ATT&CK frameworkthreat modelingnetwork intrusion detection (NIDS/IDS)anomaly detectionincident responsethreat intelligencedetection engineering

Cryptography

post-quantum cryptography (lattice-based, hash-based)blind signatureszero-knowledge proofs (ZKP)OPRFs and anonymous tokensPKI and OpenSSLcryptographic protocol design

AI for Cybersecurity

AI-based threat detectionPyTorch and scikit-learnGNN, RNN/LSTM, FFNNtransformers (BERT, UniXcoder)adversarial MLagentic AI security and architecturemodel-to-tool attack surface analysisLLM workflow trust boundaries

Programming

Python (multithreading, automation, ML/AI)C/C++ (systems, cryptographic implementations)Bash and SQLJava and JavaScriptRust (PQC and cryptographic libraries)Assembly (RISC-V, ARM)

Systems & Platforms

Linux (Kali, Ubuntu)Docker and container securityQEMU and virtualization-driven testingGit and development workflowsbpftool, Wireshark, NmapGNS3 and network lab simulation