I am an Associate Professor in the Semantics, Cybersecurity and Services group of the University of Twente and a member of the International Secure Systems Lab (iSecLab).

Before joining the University of Twente, I was a Postdoctoral Researcher in the Computer Science Department at UC Santa Barbara, working at the SecLab, and I obtained a Ph.D. cum laude in Computer Science and Engineering at Politecnico di Milano in Italy. During my Ph.D., I also took part in two research exchanges, working as a visiting researcher at UCSB and at the School of Computer Science of the University of Sydney.

My research focuses on aspects of computer security traditionally known as systems security. In particular, my main research interests lie in the security of the software that people use in their daily tasks, and revolve around analyzing such software for multiple security purposes, such as malware detection, identification of privacy disclosures, and vulnerability discovery. For example, I have worked on analysis and defense mechanisms against advanced threats such as the infamous ransomware families, on the detection of obfuscated privacy leaks in Android apps, and on the design of novel program analysis techniques to identify and patch vulnerabilities in embedded firmware.

I strongly believe in open, collaborative science, where researchers can easily and quickly access to previous research outcomes to reproduce and analyze results obtained by others.

I also love Capture The Flag (CTF) competitions, which I currently play with Shellphish (usually ending up in Vegas to play DEFCON Finals), and I co-organized several editions of the PoliCTF and iCTF.

Organisaties

Publicaties

2026

RASH: Resource Allocation for Smart Homes Considering Privacy Sensitivity of IoT Applications (2026)Journal of network and systems management, 34(2). Article 54 (E-pub ahead of print/First online). Rezaei, T., Bayhan, S., Continella, A. & van Rijswijk-Deij, R.https://doi.org/10.1007/s10922-025-10022-5

2025

R+R: IoT Device Identification Under Realistic Conditions (2025)[Contribution to conference › Paper] Annual Computer Security Applications Conference, ACSAC 2025. Gupta, C., Peter, A. & Continella, A.https://doi.org/10.1109/ACSAC67867.2025.00071Training-less Anomaly-Based Intrusion Detection in Containerized Microservices (2025)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. El Khairi, A.https://doi.org/10.3990/1.9789036569460GenSIaC: Toward Security-Aware Infrastructure-as-Code Generation with Large Language Models (2025)[Working paper › Preprint]. ArXiv.org. Li, Y., Grella, M., Nahmias, D., Engelberg, G., Klein, D., Guizzardi, G., van Ede, T. & Continella, A.https://doi.org/10.48550/arXiv.2511.12385Evaluation data for "R+R: IoT Device Identification under Realistic Conditions" (2025)[Dataset Types › Dataset]. Zenodo. Gupta, C., Peter, A. & Continella, A.https://doi.org/10.5281/zenodo.17078896WhisperTest: A Voice-Control-based Library for iOS UI Automation (2025)In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2025. Moti, Z., Janssen-Groesbeek, T., Monteiro, S., Continella, A. & Acar, G.ConLock: Reducing Runtime Attack Surface in Containerized Microservices (2025)In Proceedings of the International Workshop on System Security Assurance (SecAssure). El Khairi, A., Peter, A. & Continella, A.LibAFLstar: Fast and State-Aware Protocol Fuzzing (2025)In Proceedings of the European Symposium on Research in Computer Security (ESORICS). Daniele, C., Bethe, T., Maugeri, M., Continella, A. & Poll, E.ProCatch: Detecting Execution-based Anomalies in Single-Instance Microservices (2025)In Proceedings of the IEEE Conference on Communications and Network Security (CNS). El Khairi, A., Peter, A. & Continella, A.Behavior Nets: Context-Aware Behavior Modeling for Code Injection-Based Windows Malware (2025)ACM Transactions on Privacy and Security, 28(3), 1-29. Article 33. Starink, J., Huisman, M., Peter, A. & Continella, A.https://doi.org/10.1145/3729228

Onderzoeksprofielen

Scan de QR-code of
Download vCard