Introduction to ICT security
Transcript
Introduction to ICT security
Introduction to ICT security (intro - set'16) Introduction to the security of ICT systems Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Agenda introduction to information security: evolution of ICT systems and the security problem problems and vocabulary of ICT security technological attacks (sniffing, spoofing, …) non-technological attacks (social engineering) © Antonio Lioy - Politecnico di Torino (2005-2016) 1 Introduction to ICT security (intro - set'16) Why security is “hot” today? Traditional paradigms centralised information and processing access to data from “dumb” terminals “unicast” communication over dedicated lines EDP center concentrator terminals © Antonio Lioy - Politecnico di Torino (2005-2016) 2 Introduction to ICT security (intro - set'16) New paradigms distributed information and processing access from distributed intelligent terminals “broadcast” communication and/or shared lines new application paradigms (web, SMS, …) WAN LAN Technology as innovation engine personal devices (PC, tablet, …) communication network INNOVATION security © Antonio Lioy - Politecnico di Torino (2005-2016) 3 Introduction to ICT security (intro - set'16) A definition of ICT security It is the set of products, services, organization rules and individual behaviours that protect the ICT system of a company. It has the duty to protect the resources from undesired access, guarantee the privacy of information, ensure the service operation and availability in case of unpredictable events (C.I.A. = Confidentiality, Integrity, Availability). The objective is to guard the information with the same professionalism and attention as for the jewels and deposit certificates stored in a bank caveau. The ICT system is the safe of our most valuable information; ICT security is the equivalent of the locks, combinations and keys required to protect it. SERVICE Risk estimation ASSET data ICT resources human resources location EVENTS vulnerabilities impact threats event probability RISK ESTIMATION © Antonio Lioy - Politecnico di Torino (2005-2016) 4 Introduction to ICT security (intro - set'16) Terms ASSET = the set of goods, data and people needed for an IT service VULNERABILITY = weakness of an asset e.g. pwd = login; sensible to flooding THREAT = deliberate action / accidental event that can produce the loss of a security property exploiting a vulnerability ATTACK = threat occurrence (deliberate action) (NEGATIVE) EVENT = threat occurrence (accidental event) Analysis and management of security analysis vulnerabilities asset risks select countermeasures threats management implement countermeasures audit © Antonio Lioy - Politecnico di Torino (2005-2016) 5 Introduction to ICT security (intro - set'16) Security in the lifecycle of a system requirements analysis technical options design develop test implement live system risk assessment identify security products design security services integrate security test security set-up security manage security security policy & procedures Relations in the security field threats security control reduce security requirements © Antonio Lioy - Politecnico di Torino (2005-2016) exploit security risks underwrite vulnerabilities devalue assets asset values and potential impacts 6 Introduction to ICT security (intro - set'16) Window of exposure risk vendor informed of vulnerability vendor notifies its customers (sometimes) security tools updated (e.g. IDS signatures) a patch is published new vulnerability discovered patch is widely known vulnerability is made public exploit (!) discovery patch installed publication protection window of exposure t WOE: average value for browser 2008-10 http://www.symantec.com/threatreport/topic.jsp? id=vulnerability_trends&aid=browser_window_of_exposure © Antonio Lioy - Politecnico di Torino (2005-2016) 7 Introduction to ICT security (intro - set'16) WOE: server web (2010) What is security? Security is a process, not a product (Bruce Schneier, Crypto-Gram, May 2005) Computer Security: Will We Ever Learn? If we've learned anything from the past couple of years, it’s that computer security flaws are inevitable. Systems break, vulnerabilities are reported in the press, and still many people put their faith in the next product, or the next upgrade, or the next patch. “This time it’s secure,” they say. So far, it hasn’t been. Security is a process, not a product. Products provide some protection, but the only way to effectively do business in an insecure world is to put processes in place that recognize the inherent insecurity in the products. The trick is to reduce your risk of exposure regardless of the products or patches. © Antonio Lioy - Politecnico di Torino (2005-2016) 8 Introduction to ICT security (intro - set'16) European Central Bank ECB Recommendations for the security of Internet payments (31//12013) application to: payment schemes governance authorities payment service providers (PSP) merchants (optional) main reccomendations: protect the initiation of internet payments, as well as access to sensitive payment data, by strong customer authentication (continue) European Central Bank limit the number of log-in or authentication attempts, define rules for Internet payment services session “time out” and set time limits for the validity of authentication establish transaction monitoring mechanisms designed to prevent, detect and block fraudulent payment transactions implement multiple layers of security defences in order to mitigate identified risks; provide assistance and guidance to customers about best online security practices, set up alerts and provide tools to help customers monitor transactions © Antonio Lioy - Politecnico di Torino (2005-2016) 9 Introduction to ICT security (intro - set'16) (abstract) security properties autenticazione ( semplice / mutua ) authentication ( simple / mutual ) autenticazione della controparte peer authentication autenticazione dei dati data / origin authentication autorizzazione, controllo accessi authorization, access control integrità integrity riservatezza, confidenzialità confidentiality, privacy, secrecy non ripudio non repudiation disponibilità availability tracciabilità accountability Peer authentication Hi, I’m Alice Prove it! Barbara © Antonio Lioy - Politecnico di Torino (2005-2016) 10 Introduction to ICT security (intro - set'16) Mutual peer authentication Hi, I’m Barbara Hi Barbara, nice to meet you! Is that my e-bank? Sure! How can you doubt? Steal & Rob Ltd. Barbara Data authentication Increase by 30% the salary of Prof. Lioy The Dean © Antonio Lioy - Politecnico di Torino (2005-2016) 11 Introduction to ICT security (intro - set'16) Non repudiation formal proof – acceptable by a court of justice – that gives undeniable evidence of the data creator several facets: (sender/author) authentication integrity (sender/author) identification ... Non repudiation - example let’s consider non-repudiation of an electronic signature: syntax (is that your signature?) semantics (did you understand what you were signing?) will (have you signed voluntarily?) identification (was really YOU the signer?) time (when did you sign?) place (where did you sign?) © Antonio Lioy - Politecnico di Torino (2005-2016) 12 Introduction to ICT security (intro - set'16) Authorization (access control) Gimme Alice’s car! Did she authorized you to borrow it? Barbara Pyramid of security $$$ $$$ log log integrity integrity privacy privacy authorization authorization authentication auth. © Antonio Lioy - Politecnico di Torino (2005-2016) 13 Introduction to ICT security (intro - set'16) Privacy (communication) Do you know that Laura is NOT a natural blonde? What a shame! Bloody *?%$#”! Laura Privacy (data, actions, position) www.playboy.com black_money.xls © Antonio Lioy - Politecnico di Torino (2005-2016) Torino, cell 2455 14 Introduction to ICT security (intro - set'16) Integrity (data modification) Pay 1,000 Euro to Antonio Lioy computer network Pay 10,000 Euro to Antonio Lioy Integrity (data filtering) Transfer 2500 Euro from Antonio Lioy’s account to the Rolex’s one computer network © Antonio Lioy - Politecnico di Torino (2005-2016) 15 Introduction to ICT security (intro - set'16) Replay attack Pay 1,000 EURO to Antonio Lioy Pay 1,000 EURO to Antonio Lioy. Pay 1,000 EURO to Antonio Lioy. Pay 1,000 EURO to Antonio Lioy. computer network Where is the enemy? outside our organization boundary / perimeter defence (firewall) outside our organization, with the exception of our partners Extranet protection (VPN) inside our organization LAN / Intranet protection (?!) everywhere! application-level protection data protection © Antonio Lioy - Politecnico di Torino (2005-2016) 16 Introduction to ICT security (intro - set'16) Attack origin (2016) percentage of external / internal attacks: internal 20% external 80% note: biased statistics due to the type of survey, the CSI/FBI one (last published on 2011) had more internal attacks (from Verizon Data Breach Investigation Report 2016) Temporal evolution of the main attacks listed in the annual CSI/FBI survey © Antonio Lioy - Politecnico di Torino (2005-2016) 17 Introduction to ICT security (intro - set'16) Stolen laptop / smartphone not only an economic loss to replace the stolen device … but also the loss of data that become unavailable (backup?) … or the spreading of restricted information Scoop of a Global Post reporter in the town between Pakistan and Afghanistan US PCs sold at the Peshàwar market Computers of the US army with restricted data sold for 650$ along the road where Nato troops are attacked by the talebans. … Still full of classified informations, such as names, sites, and weak points. (corriere.it, 9/2/09) Insecurity: the deep roots (I) “Attack technology is developing in a open-source environment and is evolving rapidly” “Defensive strategies are reactionary” “Thousands - perhaps millions - of system with weak security are connected to the Internet” “The explosion in use of the Internet is straining our scarce technical talent. The average level of system administrators … has decreased dramatically in the last 5 years” © Antonio Lioy - Politecnico di Torino (2005-2016) 18 Introduction to ICT security (intro - set'16) Insecurity: the deep roots (II) “Increasingly complex sw is being written by programmers who have no training in writing secure code” “Attacks and attack tools transcend geography and national boundaries” “The difficulty of criminal investigation of cybercrime coupled with the complexity of international law means that … prosecution of computer crime is unlikely” from “Roadmap for defeating DDOS attacks” (feb. 2000, after Clinton meeting at White House) updates on www.sans.org/dosstep/roadmap.php Basic problems (technological) the networks are insecure: (most) communications are made in clear LANs operate in broadcast geographical connections are NOT made through end-to-end dedicated lines but: through shared lines through third-party routers weak user authentication (normally password-based) there is no server authentication the software contains many bugs! © Antonio Lioy - Politecnico di Torino (2005-2016) 19 Introduction to ICT security (intro - set'16) Some classes of attacks IP spoofing / shadow server someone takes the place of a (legitimate) host packet sniffing passwords and/or sensitive data are read by (unauthorized) third parties connection hijacking / data spoofing data inserted / modified during their transmission denial-of-service (distributed DoS) the functionality of a service is limited or disrupted (e.g. ping bombing) IP spoofing (masquerading) forging the source network address typically the level 3 (IP) address is forged, but it is equally easy to forge the level 2 address (e.g. ETH, TR, ...) a better name would be source address spoofing attacks: data forging (unauthorized) access to systems countermeasures: do NEVER use address-based authentication © Antonio Lioy - Politecnico di Torino (2005-2016) 20 Introduction to ICT security (intro - set'16) Packet sniffing (eavesdropping) reading the packets addressed to another network node easy to do in broadcast networks (e.g. LAN) or at the switching nodes (e.g. router, switch) attacks: allows to intercept anything (password, data, ...) countermeasure: non-broadcast networks (!?) encryption of packet payload 1 00 011010 1001010 Denial-of-service (DoS) keeping a host busy so that it can’t provide its services examples: mail / log saturation ping flooding (“ping bombing”) SYN attack attacks: block the use of a system / service countermeasures: none! monitoring and oversizing can mitigate the effects © Antonio Lioy - Politecnico di Torino (2005-2016) 21 Introduction to ICT security (intro - set'16) Distributed denial-of-service (DDOS) software for DoS installed on many nodes (named daemon, zombie or malbot) to create a Botnet daemons remotely controlled by a master (often via encrypted channels) and have auto-updating feature effect of the base DoS attack multiplied by the number of daemons (and eventually by an amplification factor, if servers are involved) examples of DDoS attack networks: TrinOO TFN (Tribe Flood Network) Stacheldraht (=barbed wire) DDoS attack attacker master daemon daemon master daemon master daemon daemon VICTIM control attack © Antonio Lioy - Politecnico di Torino (2005-2016) 22 Introduction to ICT security (intro - set'16) Feb 8th 2000, 10.30am (PST) @ Yahoo Server Farm “the initial flood of packets, which we later realized was in excess of 1G bits/sec, took down one of our routers …” “… after the router recovered we lost all routing to our upstream ISP …” “… it was somewhat difficult to tell what was going on, but at the very least we noticed lots of ICMP traffic …” “… at 1.30pm we got basic routing back up and then realized that we were under a DDoS attack” http://packetstorm.decepticons.org/distributed/yahoo.txt The lawyer said ... “There is a distinct probability that if your site has been hijacked for a denial of service attack, then you could be liable for damages. I would definitely advise clients they have grounds to sue.” Nick Lockett, e-commerce lawyer at Sidley & Austin “Be Secure or Be Sued” Silicon.com, 16 Nov 2000 http://www.silicon.com/a40900 © Antonio Lioy - Politecnico di Torino (2005-2016) 23 Introduction to ICT security (intro - set'16) Shadow server host that manages to show itself (to victims) as a service provider without having the right to do so requires address spoofing and packet sniffing shadow server must be faster than the real one, or the real one must be unable to respond (due to a failure or because is under attack, e.g. DoS) attacks: issue wrong answers, providing thus a “wrong” service to victims instead of the real one capture victim’s data provided to the wrong service countermeasures: server authentication Connection hijacking / MITM also named data spoofing attacker takes control of a communication channel to insert, delete, or manipulate the traffic logical or physical MITM (Man In The Middle) attacks: reading, insertion of false data and modification of data exchanged between two parties countermeasure: authentication, integrity and serialization of each single network packet © Antonio Lioy - Politecnico di Torino (2005-2016) 24 Introduction to ICT security (intro - set'16) Trojan / MITB Trojan (horse) MITB = man-in-the-browser network channels more protected … … but user terminals less protected Smartphone, smart-TV, … IoT (Internet-of-Things) "ignorant" users classic attack tools (e.g. keylogger as part of a game) and modern ones (e.g. browser extension) Zeus also know as Zbot currently a major malware + botnet discovered (born?) on 2007, sold (?) on 2010 can be used: directly (e.g. MITB for keylogging or form grabbing) indirectly, to load other malware (e.g. the CryptoLocker ransomware) very difficult to discover and remove hides itself with stealth techniques about 3.6 M active copies just in the USA © Antonio Lioy - Politecnico di Torino (2005-2016) 25 Introduction to ICT security (intro - set'16) Software bug even the best software (either off-the-shelf or custom) contains bugs that can be used for various aims easiest exploit: DoS example: WinNT server (3.51, 4.0) telnet to TCP port 135 send 10 random characters, then CR server unavailable! (CPU load at 100% even though no useful work is done) solution: install SP3 ...... Some typical application-level problems buffer overflow allows the execution of arbitrary code injected through a specially crafted input store sensible information in the cookies readable by third parties (in transit o locally on the client) store passwords in clear in a DB readable by third parties (e.g. backup operator) “invent” a protection system risk of inadequate protection © Antonio Lioy - Politecnico di Torino (2005-2016) 26 Introduction to ICT security (intro - set'16) Virus & Co. (malware) virus damages the target and replicates itself propagated by humans (involuntarily) worm damages the target because replicates itself (resource saturation) automatic propagation Trojan (horse) = malware vector backdoor = unauthorized access point rootkit = privileged access tools, hidden (modified program, library, driver, kernel module, hypervisor) and stealth Virus and worm (malware) requires complicity (may be involuntary) from: the user (gratis, free, urgent, important, …) the sys manager (wrong configuration) the producer (automatic execution, trusted, …) countermeasures: user awareness correct configuration / secure sw install antivirus (and keep updated!) © Antonio Lioy - Politecnico di Torino (2005-2016) 27 Introduction to ICT security (intro - set'16) Malware food chain business opportunity (vulnerability) malicious code Hall of fame ... ... vulnerability marketplace malware toolkit market malware distributors (spam, web, …) VICTIM Zeus source: http://en.wikipedia.org/wiki/File:FBI_Fraud_Scheme_Zeus_Trojan.jpg © Antonio Lioy - Politecnico di Torino (2005-2016) 28 Introduction to ICT security (intro - set'16) source: http://en.wikipedia.org/wiki/File:FBI_Fraud_Scheme_Zeus_Trojan.jpg source: http://en.wikipedia.org/wiki/File:FBI_Fraud_Scheme_Zeus_Trojan.jpg © Antonio Lioy - Politecnico di Torino (2005-2016) 29 Introduction to ICT security (intro - set'16) Basic problems (non technological) low problem understanding (awareness) mistakes of human beings (especially when overloaded, stressed, …) human beings have a natural tendency to trust complex interfaces / architectures can mislead the user and originate erroneous behaviours performance decrease due to the application of security measures … Social engineering ask for the (involuntary) user’s participation to the attack action usually naive users are targeted (e.g. “do change immediately your password with the following one, because your PC is under attack”) ... … but experienced users are targeted too (e.g. by copying an authentic mail but changing its attachment or URL) via mail, phone or even paper © Antonio Lioy - Politecnico di Torino (2005-2016) 30 Introduction to ICT security (intro - set'16) Social engineering: examples phishing (~ fishing): “dear Internet banking user, please fill in the attached module and return it to us ASAP according to the privacy law 675 …” psychological pressure: “help me, otherwise I’ll be in troubles …” “do it, or I’ll report it to your boss …” showing acquaintance with the company’s procedures, habits and personnel helps in gaining trust and make the target lower his defences © Antonio Lioy - Politecnico di Torino (2005-2016) 31 Introduction to ICT security (intro - set'16) A mail from CIA … From: [email protected] Date: Tue, 22 Nov 2005 17:51:14 UTC X-Original-Message-ID: <[email protected]> Subject: You_visit_illegal_websites Dear Sir/Madam, we have logged your IP-address on more than 30 illegal Websites. Important: Please answer our questions! The list of questions are attached. Yours faithfully, Steven Allison ++++ ++++ ++++ ++++ ++++ Central Intelligence Agency -CIAOffice of Public Affairs Washington, D.C. 20505 phone: (703) 482-0623 7:00 a.m. to 5:00 p.m., US Eastern time the attachment is the SOBER worm! Phishing using mail or IM to attract a network service user to a fake server (shadow server) for: acquiring her authentication credentials or other personal information persuading her to install a plugin or extension which actually is a virus or a Trojan specialized variants: spear phishing (include several personal data to disguise the fake message as a good one, e.g. mail address, name of Dept/Office, phone no.) whaling (targeted to VIP such as CEO or CIO, e.g. the 20,000 hit on April 08 that then installed a Trojan related to the servers of Piradius) © Antonio Lioy - Politecnico di Torino (2005-2016) 32 Introduction to ICT security (intro - set'16) Pharming term of controversial use set of several techniques to re-direct a user towards a shadow server changing the "hosts" file at the client changing the nameserver pointers at the client changing the nameservers at a DHCP server (e.g. an ADSL / wireless router) poisoning the cache of a nameserver via: direct attack (vulnerability or malconfiguration) indirect attack (virus or worm) Social engineering techniques (74%) solicitation / bribery (44%) pretexting (16%) counterfeiting / forgery (11%) *ing (4%) hoax / scam (4%) influence tactics (3%) extortion / blackmail Note: percentage of use in social engineering attacks according to the Verizon/USSS 2011 survey. © Antonio Lioy - Politecnico di Torino (2005-2016) 33 Introduction to ICT security (intro - set'16) Social engineering channels (78%) in-person (14%) documents (10%) e-mail (6%) web / Internet (5%) phone (4%) SMS / texting Note: percentage of use in social engineering attacks according to the Verizon/USSS 2011 survey new techniques are under development for the future … Report Verizon DBIR 2014 nine main categories: POS (point-of-sale) intrusions web app attacks insider and privilege misuse physical theft and loss miscellaneous errors crimeware payment card skimmers DoS attacks cyber-espionage http://www.verizonenterprise.com/DBIR/2014/ © Antonio Lioy - Politecnico di Torino (2005-2016) 34 Introduction to ICT security (intro - set'16) Report Verizon DBIR2014 incident a security event that compromises the integrity, confidentiality, or availability of an information asset (data) breach an incident that results in the disclosure or potential exposure of data (data) disclosure a breach for which it was confirmed that data was actually disclosed (not just exposed) to an unauthorized party Report Verizon DBIR 2014 (fig.16) © Antonio Lioy - Politecnico di Torino (2005-2016) 35 Introduction to ICT security (intro - set'16) Report Verizon DBIR 201 DDOS attacks (fig.65) year bandwidth (average) packets (average) 2011 4.7 Gbps 0.4 Mpps 2012 7.0 Gbps 2.6 Mpps 2013 10.0 Gbps 7.8 Mpps 2014 15-59 Gbps 3-15 Mpps 2015 5.5 Gbps 1.9 Mpps T.J.Maxx attack (2007) 45 M credit/debit card numbers stolen in a period of 18 months (up to January 2007) a 10 M USD legal class action started by 300 banks (e.g. Massachusetts Bankers Association, Maine and Connecticut Associated Banks) attack succeed due to use of WEP rather than WPA attack performed by 10 people (3 USA, 3 UKR, 2 CHN, 1 BEL, 1 EST + "Delpiero") one ex-cracker hired by the US secret service blog.wired.com/27bstroke6/2008/08/11-charged-in-m.html www.wired.com/politics/law/news/2007/06/secret_service# © Antonio Lioy - Politecnico di Torino (2005-2016) 36 Introduction to ICT security (intro - set'16) Phishing via Transformers3 (apr 2010) Andersen Air Force Base (Guam island) ORE (Operational Readiness Exercise) phishing message “the movie Transformers-3 will be filmed on Guam” “looking for 20 airmen to be part of the movie” application required disclosing sensitive information event leaked on the web because one airman disclosed that on Transformer fans’ blog journalists called to confirm movie location www.networkworld.com/news/2010/043010-us-air-force-phishing-test.html Stuxnet (2010) prototype of a new kind of attack worm + virus for Windows attempt to propagate to other systems attempt to damage the SCADA systems (of a specific manufacturer) attached to the infected nodes malware for cyberphysical systems attack and propagation vectors: 1 known vulnerability (patch available) 1 known vulnerability (no patch) 2 “zero-day” vulnerabilities © Antonio Lioy - Politecnico di Torino (2005-2016) 37 Introduction to ICT security (intro - set'16) Stuxnet: timing and location 17/6/10 first encounter 24/6/10 noted use of a digital signature certificate revoked on 17/7/10 … then a second certificate appears! 14-15-16/7/10 security advisories by CERT and MS gradual release of various patches until October’10 self-stopped its propagation on 24/6/2012 geographic location: 52% Iran 17% Indonesia 11% India Stuxnet: mechanisms distribution and propagation: USB key shared disks (network share) MS-RPC and MS-spool bugs likely first infection vector a USB key of a maintenance technician disguised as a driver with a digital signature validated by Microsoft!!! uses two different certificates access from the infected node to the back-end DB thanks to a shared default pwd on every node © Antonio Lioy - Politecnico di Torino (2005-2016) 38 Introduction to ICT security (intro - set'16) Stuxnet: lessons learnt systems protected with physical separation (air gap) ... but without other standard protections: no anti-virus no patch no firewall unnecessary services active: MS-RPC shared network print queues shared network disks validation list for sw to be installed Stuxnet's brothers same development platform (tilded) Duqu (sep'11) not a worm or virus gathers and send system info for attack preparation (reconnaissance & intelligence) Flame (may'12) system spyware (may record network traffic, audio, video, keyboard) spreads via USB or network, no physical damage backdoor (remote configuration and update) active since two years before its recognition © Antonio Lioy - Politecnico di Torino (2005-2016) 39 Introduction to ICT security (intro - set'16) The three pillars of security 0. Planning (security policy, …) 1. Avoidance (FW, VPN, PKI, …) 3. Investigation (forensic analysis, internal audit, …) 2. Detection (IDS, monitor, …) Hacker & C. hacker cracker script kiddie wannabe lamer © Antonio Lioy - Politecnico di Torino (2005-2016) 40 Introduction to ICT security (intro - set'16) Hacker (I) hacker: /n./ [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating {hack value}. 4. A person who is good at programming quickly. Hacker (II) 5. An expert at a particular program, or one who frequently does work using it or on it; as in “a Unix hacker”. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence “password hacker”, “network hacker”. The correct term for this sense is {cracker}. © Antonio Lioy - Politecnico di Torino (2005-2016) 41 Introduction to ICT security (intro - set'16) Cracker cracker: /n./ One who breaks security on a system. Coined ca. 1985 by hackers in defense against journalistic misuse of {hacker} (q.v., sense 8). An earlier attempt to establish “worm” in this sense around 1981-82 on Usenet was largely a failure. Kevin Siers, NC, USA (cartoon from the Charlotte Observer) © Antonio Lioy - Politecnico di Torino (2005-2016) 42