Alessandro Armando
Orcid: 0000-0002-5246-2157Affiliations:
- University of Genoa, Italy
According to our database1,
Alessandro Armando
authored at least 144 papers
between 1992 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on orcid.org
-
on csec.it
On csauthors.net:
Bibliography
2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Proceedings of the 2nd International Workshop on Gamification in Software Development, 2023
2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
2021
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection.
ACM Trans. Priv. Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Int. J. Grid Util. Comput., 2021
Proceedings of the Italian Conference on Cybersecurity, 2021
2020
Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations.
CoRR, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
2019
Proceedings of the Information Security Theory and Practice, 2019
Proceedings of the Third Italian Conference on Cyber Security, 2019
Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative Measures.
Proceedings of the 11th International Conference on Cyber Conflict, 2019
2018
Future Gener. Comput. Syst., 2018
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018
2017
Trans. Large Scale Data Knowl. Centered Syst., 2017
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements.
Comput. Secur., 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
2016
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs.
Int. J. Softw. Tools Technol. Transf., 2016
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the International Conference on Military Communications and Information Systems, 2016
Proceedings of the International Conference on Military Communications and Information Systems, 2016
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016
SMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016
2015
Int. J. Inf. Sec., 2015
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2015
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2015 Conferences, 2015
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Security considerations related to the use of mobile devices in the operation of critical infrastructures.
Int. J. Crit. Infrastructure Prot., 2014
Comput. Secur., 2014
Autom. Softw. Eng., 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Scalable and precise automated analysis of administrative temporal role-based access control.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
2013
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations.
Comput. Secur., 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols.
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Modeling and Reasoning about Business Processes under Authorization Constraints: A Planning-Based Approach.
Proceedings of the Twenty-Third International Conference on Automated Planning and Scheduling, 2013
2012
An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints.
J. Comput. Syst. Sci., 2012
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving.
J. Comput. Secur., 2012
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012
Proceedings of the Tests and Proofs - 6th International Conference, 2012
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Proceedings of the Smart Grid Security - First International Workshop, 2012
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures).
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Automated Analysis of Semantic-Aware Access Control Policies: A Logic-Based Approach.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Efficient symbolic automated analysis of administrative attribute-based RBAC-policies.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011
2010
Proceedings of the Security and Trust Management - 6th International Workshop, 2010
Proceedings of the Third International Conference on Software Testing, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
ACM Trans. Comput. Log., 2009
Int. J. Softw. Tools Technol. Transf., 2009
Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach.
Proceedings of the Trust, 2009
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009
Proceedings of the Frontiers of Combining Systems, 7th International Symposium, 2009
2008
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008
Model Checking: New Challenges and Opportunities for Automated Reasoning (Invited Talk).
Proceedings of the First International Workshop on Practical Aspects of Automated Reasoning, 2008
2007
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2007
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007
2006
2005
A reconstruction and extension of Maple's assume facility via constraint contextual rewriting.
J. Symb. Comput., 2005
Proceedings of the Third Workshop on Pragmatics of Decision Procedures in Automated Reasoning, 2005
Proceedings of the 3rd Workshop on Software Model Checking, 2005
On a Rewriting Approach to Satisfiability Procedures: Extension, Combination of Theories and an Experimental Appraisal.
Proceedings of the Frontiers of Combining Systems, 5th International Workshop, 2005
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005
Rewriting and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation.
Proceedings of the Mechanizing Mathematical Reasoning, 2005
Proceedings of the Mechanizing Mathematical Reasoning, 2005
2004
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
Proceedings of the Selected Papers from the Workshops on Disproving, 2004
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints.
Proceedings of the SAT 2004, 2004
Proceedings of the Logics in Artificial Intelligence, 9th European Conference, 2004
Proceedings of the Logics in Artificial Intelligence, 9th European Conference, 2004
Proceedings of the Formal Methods and Software Engineering, 2004
2003
Proceedings of the Theory and Applications of Satisfiability Testing, 2003
Proceedings of the FME 2003: Formal Methods, 2003
2002
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2002
Proceedings of the Computer Aided Verification, 14th International Conference, 2002
2001
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic.
J. Univers. Comput. Sci., 2001
Special Issue on Calculemus-99: Integrating Computation and Deduction - Foreword of the Guest Editors.
J. Symb. Comput., 2001
J. Symb. Comput., 2001
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001
Proceedings of the Computer Science Logic, 15th International Workshop, 2001
Proceedings of the Principles and Practice of Constraint Programming, 2001
Proceedings of the Automated Reasoning, First International Joint Conference, 2001
2000
Towards Interoperable Mechanized Reasoning Systems: the Logic Broker Architecture.
Proceedings of the WOA 2000: Dagli Oggetti agli Agenti. 1st AI*IA/TABOO Joint Workshop "From Objects to Agents": Evolutive Trends of Software Systems, 2000
Proceedings of the Frontiers of Combining Systems, 2000
1999
Proceedings of the Systems for Integrated Computation and Deduction, 1999
Autom. Softw. Eng., 1999
Proceedings of the Recent Advances in AI Planning, 5th European Conference on Planning, 1999
1998
Ann. Math. Artif. Intell., 1998
Proceedings of the Artificial Intelligence and Symbolic Computation, 1998
Proceedings of the Artificial Intelligence: Methodology, 1998
1996
IEEE Trans. Syst. Man Cybern. Part B, 1996
Future Gener. Comput. Syst., 1996
1995
1994
Appl. Artif. Intell., 1994
1993
Ann. Math. Artif. Intell., 1993
Proceedings of the Fifth International Conference on Tools with Artificial Intelligence, 1993
Proceedings of the Advances in Artificial Intelligence, 1993
Proceedings of the Advances in Artificial Intelligence, 1993
1992
A Knowledge Based System for Automatic 3D Scene.
Proceedings of the Artificial Intelligence V: Methodology, Systems, Applications, 1992