Who is Mario?

Mario was born in Imotski, Republic of Croatia, on December 10, 1975. He studied electrical engineering at the University of Split, FESB, and received his B.S. in Electrical Engineering in December, 1998. Afterwards, he worked shortly as a Java software developer.

In 2000 he was granted a pre-doctoral scholarship by Communication System Department at the Swiss Federal Institute of Technology in Lausanne (EPFL). After finishing the pre-doctoral school in 2001, he joined Laboratory for computer Communications and Applications (LCA) at EPFL. Mario defended his thesis titled Thwarting Selfish and Malicious Behavior in Wireless Networks on January 16, 2006, and received the Ph.D. degree in Communication Systems.

In September 2006, Mario joined the University of Split, FESB as an Assistant Professor. In 2010 and 2016 he was promoted to Associate Professor and Full Professor, respectively.

Research interests

Mario's research interests center on computer and network (wired and wireless) security, aplied cryptography, game theory, wireless sensor networks and IoT.


Selected publications

SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists

Wireless Communications and Mobile Computing, Hindawi, 2018

Flashing displays: User-friendly solution for bootstrapping secure associations between multiple constrained wireless devices

Security and Communication Networks, Wiley, 2015

Timing Attacks on Cognitive Authentication Schemes

IEEE Transactions on Information Forensics and Security, 2015

Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User

IEEE Transactions on Mobile Computing, 2012

Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior

The 7th Symposium on Usable Privacy and Security (SOUPS), 2011

Integrity Regions: Authentication Through Presence in Wireless Networks

IEEE Transactions on Mobile Computing, 2010

Efficient MAC in Cognitive Radio Systems: A Game-Theoretic Approach

IEEE Transactions on Wireless Communications, 2009

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping

IEEE Symposium on Security and Privacy, 2008

Integrity Codes: Message Integrity Protection and Authentication Over Insecure Channels

IEEE Transactions on Dependable and Secure Computing, 2008

Secure Location Verification With Hidden and Mobile Base Stations

IEEE Transactions on Mobile Computing, 2008

Non-cooperative Multi-radio Channel Allocation in Wireless Networks


Wormhole-Based Antijamming Techniques in Sensor Networks

IEEE Transactions on Mobile Computing, 2007

Integrity (I) codes: Message Integrity Protection and Authentication over Insecure Channels

IEEE Symposium on Security and Privacy, 2006

Key agreement in peer-to-peer wireless networks

Proceedings of the IEEE (Special Issue on Cryptography and Security), 2006

On Selfish Behavior in CSMA/CA Networks


Energy-efficient Broadcasting in All-wireless Networks

Wireless Networks, Springer Science, 2005

Minimum-energy Broadcast in All-wireless Networks: NP-completeness and Distribution Issues

ACM MobiCom, 2002