Speaker

Francesco Abbruzzese

Francesco Abbruzzese

CTO at Mvcct Team

London, United Kingdom

Actions

Francesco Abbruzzese, contributed to the diffusion and evangelization of the Microsoft Web stack and Azure services since the first version of Asp.net MVC with tutorials, articles, tools, consultancies, and courses.

Former MVP he writes about .NET, Asp.net, Azure, and client-side technologies in his blog (http://www.dotnet-programming.com/), and various online magazines/blogs that include https://www.dotnetcurry.com/ and Microsoft MVP Award Program Blog.

In the last years, he wrote also some books, among them, the best seller: Software Architecture with C# 9 and .NET 5 Architecting software solutions using microservices, DevOps, and design patterns for Azure.

Now his company, implements and offers Web applications, micro-services, Artificial Intelligence software, SAS products, tools, and services for Web technologies connected with the Microsoft stack.

His last tool for .Net developers is the Blazor Controls Toolkit.

He and his company help the growth of developer’s teams, help them in the initial architectural design of projects and follow them during the whole project to ensure best practices and modular design are properly applied.

He arrived at the .Net word coming from Artificial Intelligence systems where he implemented one of the first decision support systems for banks and financial institutions, and passing through the Video Games arena where he implemented the Europe top-ten title “Puma Street Soccer”.

Area of Expertise

  • Information & Communications Technology

Topics

  • Blazor
  • ASP.NET Core
  • .NET 5
  • .NET (Core) development
  • microfrontends
  • microservices

Blazor WebAssembly: how to protect dlls downloaded in the browser

Often Blazor Server is being preferred to Blazor WebAssembly for avoiding the exposition of the application dlls in all users’ browsers. The violation of the application dlls not only challenges the software copyrights but enables also an easy implementation of phishing attacks.
In this talk, I will describe techniques for preventing both reverse engineering and the usage in other web applications of the Blazor dlls exposed in the users’ browsers.
The main idea behind the proposed protection techniques is a cryptographic proof of identity of the server that distributes the Blazor WebAssembly application. While it is impossible to enforce security on the client-side when this proof of identity is combined with other tricks like "code obfuscation", "strings encryption", and "hashing" it can decrease the risk at an acceptable level.
All techniques described in the talk have been already used in actual commercial products.

Machine Learning, come funziona e perché

Spesso si identifica l'apprendimento con specifiche tecnologie, linguaggi di programmazione e tool. In questa sessione racconterò i principi su cui si fonda ogni algoritmo di apprendimento e come valutare se i dati di cui si è in possesso sono sufficienti per un dato obiettivo di apprendimento, utilizzando una formalizzazione matematica molto semplice del concetto di semplicità ed del principio del Rasoio di Occam.

Discuterò le principali tipologie di apprendimento con brevi cenni storici e mostrerò come possono essere raggruppate sostanzialmente in 3 tipologie. Accennerò anche come questa classificazione in 3 tipologie discenda da alcuni principi di teoria degli algoritmi, ed in particolare dalla teoria della complessità algoritmica di Gregory Chaitin.

Dopo aver discusso la differenza tra interpolazione ed estrapolazione discuterò l'importanza dell'apprendimento basato su induzione per l'implementazione di agenti intelligenti, e discuterò un esempio di applicazione realmente utilizzato nella progettazione della AI del personaggio di un gioco.

Blazor WebAssembly: tecniche di protezione delle dll esposte nei browser

La necessità di esporre le proprie dll in tutti i browser che si connettono all'applicazione, spesso, spinge molti sviluppatori a preferire la versione server di Blazor a quella WebAssembly .

La violazione delle dll dell'applicazione non solo mette a rischio i copyright del software, ma permette una facile implementazione di attacchi di phishing.

In questa talk esporrò tecniche per ostacolare sia il reverse engineering delle dll, che per impedirne la modifica e il funzionamento in siti diversi da quello dal quale sono state scaricate.

Per quanto sia impossibile garantire la sicurezza lato client, la principale tecnica proposta basata su una prova crittografica di identità del server garantisce un ottimo grado di sicurezza se coadiuvata da altri accorgimenti quali "code obfuscation", "strings encryption", "hashing", ed altre tecniche discusse nella talk.

Tutte le tecniche esposte sono state realmente implementate ed usate in prodotti commerciali.

Advanced State Management in Blazor WebAssembly

It would be great closing a complex Web page and then finding that page in the same state you left it when you return there! I will explain how to retain state while navigating the pages of a Blazor WebAssembly application, and after you close the browser, also when the objects of your application. are tightly coupled.

State management was a central subject since the first RTM of Blazor. Several techniques were proposed to face the problems below:

How to maintain a global application state that persists among page changes.

How to keep state among browser sessions.

How to save the application state in case of crashes, or if the user moves to a different URL / close the browser.

In this talk, after a short review of the various approaches, I propose a new technique based on the usage of a global state dictionary that is accessible globally through DI together with techniques for detecting when the user leaves the application and together with techniques for serializing the application state and saving it in the browser local storage.

Techorama 2021 Spring Edition Sessionize Event

May 2021 Antwerpen, Belgium

A.I. Day 2021 Sessionize Event

March 2021

CodeGen 2021 Sessionize Event

February 2021

Rome .NET Conference 2020 Sessionize Event

December 2020

Francesco Abbruzzese

CTO at Mvcct Team

London, United Kingdom

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top