Gabriele Costa

Orcid: 0000-0002-9385-3998

Affiliations:
  • Institute for Advanced Studies (IMT), Lucca, Italy


According to our database1, Gabriele Costa authored at least 66 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward dynamic epistemic verification of zero-knowledge protocols.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

Supporting Criminal Investigations on the Blockchain: A Temporal Logic-based Approach.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

Systems Security Modeling and Analysis at IMT Lucca.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. REoCAS Colloquium in Honor of Rocco De Nicola, 2024

Automating Penetration Testing with MeTeOr.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
Formally verifying security protocols built on watermarking and jamming.
Comput. Secur., May, 2023

LiDiTE: A Full-Fledged and Featherweight Digital Twin Framework.
IEEE Trans. Dependable Secur. Comput., 2023

NIF: Reactive Injection Attack via Nmap Piggybacking.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

Why Mary Can Hack: Effectively Introducing High School Girls to Cybersecurity.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Designing a Serious Game for Cybersecurity Education.
Proceedings of the Software Engineering for Games in Serious Contexts, 2023

2022
Automating the Generation of Cyber Range Virtual Scenarios with VSDL.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

HArMoNICS: High-Assurance Microgrid Network Infrastructure Case Study.
IEEE Access, 2022

Turning Federated Learning Systems Into Covert Channels.
IEEE Access, 2022

2021
A Protocol for Emotions.
CoRR, 2021

Covert Channel Attack to Federated Learning Systems.
CoRR, 2021

Enhancing Malware Classification with Symbolic Features.
Proceedings of the Italian Conference on Cybersecurity, 2021

Damn Vulnerable Application Scanner.
Proceedings of the Italian Conference on Cybersecurity, 2021

2020
WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs.
SoftwareX, 2020

Natural Projection as Partial Model Checking.
J. Autom. Reason., 2020

Why Charles Can Pen-test: an Evolutionary Approach to Vulnerability Testing.
CoRR, 2020

Private-Yet-Verifiable Contact Tracing.
CoRR, 2020

A survey on multi-factor authentication for online banking in the wild.
Comput. Secur., 2020

Building next generation Cyber Ranges with CRACK.
Comput. Secur., 2020

VeriOSS: Using the Blockchain to Foster Bug Bounty Programs.
Proceedings of the 2nd International Conference on Blockchain Economics, 2020

A NERD DOGMA: Introducing CTF to Non-expert Audience.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

WAF-A-MoLE: evading web application firewalls through adversarial machine learning.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

2019
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

2018
Automatic security verification of mobile app configurations.
Future Gener. Comput. Syst., 2018

From Natural Projection to Partial Model Checking and Back.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2018

Scenario Design and Validation for Next Generation Cyber Ranges.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

2017
Strong Authentication for e-Banking: A Survey on European Regulations and Implementations.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

PolEnA: Enforcing Fine-grained Permission Policies in Android.
Proceedings of the Computer Safety, Reliability, and Security, 2017

2016
Android vs. SEAndroid: An empirical assessment.
Pervasive Mob. Comput., 2016

Developing a NATO BYOD security policy.
Proceedings of the International Conference on Military Communications and Information Systems, 2016

FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Formal modeling and automatic enforcement of Bring Your Own Device policies.
Int. J. Inf. Sec., 2015

SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2015

Android Permissions Unleashed.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Securing Android with Local Policies.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
Mobile App Security Analysis with the MAVeriC Static Analysis Module.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Securing the "Bring Your Own Device" Paradigm.
Computer, 2014

Enabling BYOD through secure meta-market.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

2013
Market-Based Security for Mobile Devices.
ERCIM News, 2013

Bring your own device, securely.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Trustworthy Opportunistic Access to the Internet of Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Multi-dimensional Secure Service Orchestration.
Proceedings of the Business Process Management Workshops, 2013

2012
Securing the "Bring Your Own Device" Policy.
J. Internet Serv. Inf. Secur., 2012

Modular plans for secure service composition.
J. Comput. Secur., 2012

Metric-Aware Secure Service Orchestration
Proceedings of the Proceedings Fifth Interaction and Concurrency Experience, 2012

Gate automata-driven run-time enforcement.
Comput. Math. Appl., 2012

Formal Modeling and Reasoning about the Android Security Framework.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012

Lazy Security Controllers.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Lazy Monitoring for Distributed Computing Environments.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
On the Security of Software Systems and Services.
PhD thesis, 2011

Secure service orchestration in open networks.
J. Syst. Archit., 2011

Security and Trust.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011

Elective temporal logic.
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011

Trust-Driven Policy Enforcement through Gate Automata.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
Security-by-Contract-with-Trust for Mobile Devices.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Parental Control for Mobile Devices.
ERCIM News, 2010

Runtime monitoring for next generation Java ME platform.
Comput. Secur., 2010

Extending Security-by-Contract with Quantitative Trust on Mobile Devices.
Proceedings of the CISIS 2010, 2010

2009
Securing Java with Local Policies.
J. Object Technol., 2009

Jalapa: Securing Java with Local Policies: Tool Demonstration.
Proceedings of the Fourth Workshop on Bytecode Semantics, 2009

Detection of images with adult content for parental control on mobile devices?
Proceedings of the 6th International Conference on Mobile Technology, 2009


  Loading...