Alessandro Armando

Orcid: 0000-0002-5246-2157

Affiliations:
  • University of Genoa, Italy


According to our database1, Alessandro Armando authored at least 144 papers between 1992 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Attacking (and Defending) the Maritime Radar System.
IEEE Trans. Inf. Forensics Secur., 2023

LiDiTE: A Full-Fledged and Featherweight Digital Twin Framework.
IEEE Trans. Dependable Secur. Comput., 2023

Electronic Attacks as a Cyber False Flag against Maritime Radars Systems.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Cyber Range and Cyber Defense Exercises: Gamification Meets University Students.
Proceedings of the 2nd International Workshop on Gamification in Software Development, 2023

2022
Automating the Generation of Cyber Range Virtual Scenarios with VSDL.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Training the Maritime Security Operations Centre Teams.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection.
ACM Trans. Priv. Secur., 2021

Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware.
IEEE Trans. Inf. Forensics Secur., 2021

DIOXIN: runtime security policy enforcement of fog applications.
Int. J. Grid Util. Comput., 2021

Capture the Flag competitions for Higher Education.
Proceedings of the Italian Conference on Cybersecurity, 2021

2020
Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations.
CoRR, 2020

Building next generation Cyber Ranges with CRACK.
Comput. Secur., 2020

AQUA: An Efficient Solver for the User Authorization Query Problem.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Benchmarking UAQ Solvers.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

2019
Automated Security Analysis of IoT Software Updates.
Proceedings of the Information Security Theory and Practice, 2019

Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries.
Proceedings of the Third Italian Conference on Cyber Security, 2019

Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative Measures.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

2018
Automatic security verification of mobile app configurations.
Future Gener. Comput. Syst., 2018

Scenario Design and Validation for Next Generation Cyber Ranges.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

2017
Risk-Based Privacy-Aware Access Control for Threat Detection Systems.
Trans. Large Scale Data Knowl. Centered Syst., 2017

Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements.
Comput. Secur., 2017

Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs.
Int. J. Softw. Tools Technol. Transf., 2016

Android vs. SEAndroid: An empirical assessment.
Pervasive Mob. Comput., 2016

Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Assisted content-based labelling and classification of documents.
Proceedings of the International Conference on Military Communications and Information Systems, 2016

Developing a NATO BYOD security policy.
Proceedings of the International Conference on Military Communications and Information Systems, 2016

Trust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems.
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016

SMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

2015
Risk-Based Privacy-Aware Information Disclosure.
Int. J. Secur. Softw. Eng., 2015

Formal modeling and automatic enforcement of Bring Your Own Device policies.
Int. J. Inf. Sec., 2015

SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2015

A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Balancing Trust and Risk in Access Control.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2015 Conferences, 2015

Trusted host-based card emulation.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Security Monitoring for Industrial Control Systems.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

Android Permissions Unleashed.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Compiling NATO authorization policies for enforcement in the cloud and SDNs.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
Mobile App Security Analysis with the MAVeriC Static Analysis Module.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Security considerations related to the use of mobile devices in the operation of critical infrastructures.
Int. J. Crit. Infrastructure Prot., 2014

Securing the "Bring Your Own Device" Paradigm.
Computer, 2014

Model checking authorization requirements in business processes.
Comput. Secur., 2014

Counterexample-guided abstraction refinement for linear programs with arrays.
Autom. Softw. Eng., 2014

Enabling BYOD through secure meta-market.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

SATMC: A SAT-Based Model Checker for Security-Critical Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014

Selective Release of Smart Metering Data in Multi-domain Smart Grids.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Scalable and precise automated analysis of administrative temporal role-based access control.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Attribute based access control for APIs in spring security.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Risk-Aware Information Disclosure.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

2013
Breaking and fixing the Android Launching Flow.
Comput. Secur., 2013

An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations.
Comput. Secur., 2013

An Empirical Evaluation of the Android Security Framework.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Content-based information protection and release in NATO operations.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Bring your own device, securely.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols.
Proceedings of the Network and System Security - 7th International Conference, 2013

Trustworthy Opportunistic Access to the Internet of Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Modeling and Reasoning about Business Processes under Authorization Constraints: A Planning-Based Approach.
Proceedings of the Twenty-Third International Conference on Automated Planning and Scheduling, 2013

2012
Securing the "Bring Your Own Device" Policy.
J. Internet Serv. Inf. Secur., 2012

An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints.
J. Comput. Syst. Sci., 2012

Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving.
J. Comput. Secur., 2012

Preface.
J. Comput. Secur., 2012

Security Issues in the Android Cross-Layer Architecture
CoRR, 2012

Formal Modeling and Reasoning about the Android Security Framework.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012

From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap.
Proceedings of the Tests and Proofs - 6th International Conference, 2012

The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Boosting Model Checking to Analyse Large ARBAC Policies.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Formal Analysis of a Privacy-Preserving Billing Protocol.
Proceedings of the Smart Grid Security - First International Workshop, 2012

Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures).
Proceedings of the Information Security and Privacy Research, 2012

On the Automated Analysis of Safety in Usage Control: A New Decidability Result.
Proceedings of the Network and System Security - 6th International Conference, 2012

Automated and Efficient Analysis of Role-Based Access Control with Attributes.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Efficient run-time solving of RBAC user authorization queries: pushing the envelope.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Automated Analysis of Infinite State Workflows with Access Control Policies.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Automated Analysis of Semantic-Aware Access Control Policies: A Logic-Based Approach.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Efficient symbolic automated analysis of administrative attribute-based RBAC-policies.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

ASASP: Automated Symbolic Analysis of Security Policies.
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011

2010
Preface.
J. Autom. Reason., 2010

Automated Symbolic Analysis of ARBAC-Policies.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Model-Checking Driven Security Testing of Web-Based Applications.
Proceedings of the Third International Conference on Software Testing, 2010

Cooperative access control for the Grid.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
New results on rewrite-based satisfiability procedures.
ACM Trans. Comput. Log., 2009

Bounded model checking of software using SMT solvers instead of SAT solvers.
Int. J. Softw. Tools Technol. Transf., 2009

LTL model checking for security protocols.
J. Appl. Non Class. Logics, 2009

Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach.
Proceedings of the Trust, 2009

Model Checking of Security-Sensitive Business Processes.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

Building SMT-Based Software Model Checkers: An Experience Report.
Proceedings of the Frontiers of Combining Systems, 7th International Symposium, 2009

2008
SAT-based model-checking for security protocols analysis.
Int. J. Inf. Sec., 2008

Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

Model Checking: New Challenges and Opportunities for Automated Reasoning (Invited Talk).
Proceedings of the First International Workshop on Practical Aspects of Automated Reasoning, 2008

2007
Abstraction Refinement of Linear Programs with Arrays.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2007

The eureka tool for software model checking.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

2006
Automated Reasoning for Security Protocol Analysis.
J. Autom. Reason., 2006

Special issue on combining logical systems.
Inf. Comput., 2006

2005
A reconstruction and extension of Maple's assume facility via constraint contextual rewriting.
J. Symb. Comput., 2005

The SAT-based Approach to Separation Logic.
J. Autom. Reason., 2005

Preface.
Proceedings of the Third Workshop on Pragmatics of Decision Procedures in Automated Reasoning, 2005

Model Checking Linear Programs with Arrays.
Proceedings of the 3rd Workshop on Software Model Checking, 2005

On a Rewriting Approach to Satisfiability Procedures: Extension, Combination of Theories and an Experimental Appraisal.
Proceedings of the Frontiers of Combining Systems, 5th International Workshop, 2005

The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

Rewriting and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation.
Proceedings of the Mechanizing Mathematical Reasoning, 2005

SAT-Based Decision Procedures for Automated Reasoning: A Unifying Perspective.
Proceedings of the Mechanizing Mathematical Reasoning, 2005

2004
Preface.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

TSAT++: an Open Platform for Satisfiability Modulo Theories.
Proceedings of the Selected Papers from the Workshops on Disproving, 2004

An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints.
Proceedings of the SAT 2004, 2004

Automatic Compilation of Protocol Insecurity Problems into Logic Programming.
Proceedings of the Logics in Artificial Intelligence, 9th European Conference, 2004

SATMC: A SAT-Based Model Checker for Security Protocols.
Proceedings of the Logics in Artificial Intelligence, 9th European Conference, 2004

Software Model Checking Using Linear Constraints.
Proceedings of the Formal Methods and Software Engineering, 2004

2003
Constraint contextual rewriting.
J. Symb. Comput., 2003

A rewriting approach to satisfiability procedures.
Inf. Comput., 2003

Abstraction-Driven SAT-based Analysis of Security Protocols.
Proceedings of the Theory and Applications of Satisfiability Testing, 2003

SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis.
Proceedings of the FME 2003: Formal Methods, 2003

2002
Incorporating Decision Procedures in Implicit Induction.
J. Symb. Comput., 2002

Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2002

The AVISS Security Protocol Analysis Tool.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2001
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic.
J. Univers. Comput. Sci., 2001

Special Issue on Calculemus-99: Integrating Computation and Deduction - Foreword of the Guest Editors.
J. Symb. Comput., 2001

The Control Layer in Open Mechanized Reasoning Systems: Annotations and Tactics.
J. Symb. Comput., 2001

Maple's evaluation process as constraint contextual rewriting.
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001

Uniform Derivation of Decision Procedures by Superposition.
Proceedings of the Computer Science Logic, 15th International Workshop, 2001

The Phase Transition of the Linear Inequalities Problem.
Proceedings of the Principles and Practice of Constraint Programming, 2001

System Description: RDL : Rewrite and Decision Procedure Laboratory.
Proceedings of the Automated Reasoning, First International Joint Conference, 2001

2000
Towards Interoperable Mechanized Reasoning Systems: the Logic Broker Architecture.
Proceedings of the WOA 2000: Dagli Oggetti agli Agenti. 1st AI*IA/TABOO Joint Workshop "From Objects to Agents": Evolutive Trends of Software Systems, 2000

Termination of Constraint Contextual Rewriting.
Proceedings of the Frontiers of Combining Systems, 2000

1999
Preface.
Proceedings of the Systems for Integrated Computation and Deduction, 1999

The control component of open mechanized reasoning systems.
Proceedings of the Systems for Integrated Computation and Deduction, 1999

Automatic Synthesis of Recursive Programs: The Proof-Planning Paradigm.
Autom. Softw. Eng., 1999

SAT-Based Procedures for Temporal Reasoning.
Proceedings of the Recent Advances in AI Planning, 5th European Conference on Planning, 1999

1998
Automating the Synthesis of Decision Procedures in a Constructive Metatheory.
Ann. Math. Artif. Intell., 1998

From Integrated Reasoning Specialists to "Plug-and-Play" Reasoning Components.
Proceedings of the Artificial Intelligence and Symbolic Computation, 1998

Constraint Solving in Logic Programming and in Automated Deduction: A Comparison.
Proceedings of the Artificial Intelligence: Methodology, 1998

1996
Visual representation of natural language scene descriptions.
IEEE Trans. Syst. Man Cybern. Part B, 1996

Towards provably correct system synthesis and extension.
Future Gener. Comput. Syst., 1996

1995
Structured Proof Procedures.
Ann. Math. Artif. Intell., 1995

1994
MRG: Building planers for real-world complex applications.
Appl. Artif. Intell., 1994

1993
Embedding Complex Decision Procedures Inside an Interactive Theorem Prover.
Ann. Math. Artif. Intell., 1993

NALIG: A CAD System for Interior Design with High Level Interaction Capabilities.
Proceedings of the Fifth International Conference on Tools with Artificial Intelligence, 1993

Proving Formulas through Reduction to Decidable Classes.
Proceedings of the Advances in Artificial Intelligence, 1993

Building and Executing Proof Strategies in a Formal Metatheory.
Proceedings of the Advances in Artificial Intelligence, 1993

1992
A Knowledge Based System for Automatic 3D Scene.
Proceedings of the Artificial Intelligence V: Methodology, Systems, Applications, 1992


  Loading...