Michele Bugliesi

Orcid: 0000-0002-4567-3351

Affiliations:
  • University Ca' Foscari, Venice, Italy


According to our database1, Michele Bugliesi authored at least 100 papers between 1989 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Vulnerability Detection in Ethereum Smart Contracts via Machine Learning: A Qualitative Analysis.
CoRR, 2024

Smart Contract Languages: a comparative analysis.
CoRR, 2024

2023
ALGOMOVE - A Move Embedding for Algorand.
Proceedings of the IEEE International Conference on Blockchain, 2023

Cryptographic Web Applications: from Security Engineering to Formal Analysis.
Proceedings of the Handbook of Formal Analysis and Verification in Cryptography, 2023

2019
Sub-session hijacking on the web: Root causes and prevention.
J. Comput. Secur., 2019

Semantically Sound Analysis of Content Security Policies.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2019

Testing for Integrity Flaws in Web Sessions.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Semantics-Based Analysis of Content Security Policy Deployment.
ACM Trans. Web, 2018

Dr Cookie and Mr Token - Web Session Implementations and How to Live with Them.
Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to, 2018

2017
Formal methods for web security.
J. Log. Algebraic Methods Program., 2017

CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Security protocol specification and verification with AnBx.
J. Inf. Secur. Appl., 2016

Static Detection of Collusion Attacks in ARBAC-Based Workflow Systems.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Messge from the ECPE Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the Wild.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A Supervised Learning Approach to Protect Client Authentication on the Web.
ACM Trans. Web, 2015

Affine Refinement Types for Secure Distributed Programming.
ACM Trans. Program. Lang. Syst., 2015

CookiExt: Patching the browser against session hijacking attacks.
J. Comput. Secur., 2015

Formal Verification of Liferay RBAC.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Fine-Grained Detection of Privilege Escalation Attacks on Browser Extensions.
Proceedings of the Programming Languages and Systems, 2015

Compositional Typed Analysis of ARBAC Policies.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Model checking adaptive service compositions.
Sci. Comput. Program., 2014

Behavioural equivalences and interference metrics for mobile ad-hoc networks.
Perform. Evaluation, 2014

Quite a mess in my cookie jar!: leveraging machine learning to protect web authentication.
Proceedings of the 23rd International World Wide Web Conference, 2014

Client Side Web Session Integrity as a Non-interference Property.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Automatic and Robust Client-Side Protection for Cookie-Based Sessions.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

Provably Sound Browser-Based Enforcement of Web Session Integrity.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Logical Foundations of Secure Resource Management in Protocol Implementations.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Lintent: Towards Security Type-Checking of Android Applications.
Proceedings of the Formal Techniques for Distributed Systems, 2013

2012
Affine Refinement Types for Authentication and Authorization.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012

On Casanova and Databases or the Similarity Between Games and DBs.
Proceedings of the Twentieth Italian Symposium on Advanced Database Systems, 2012

A compilation technique to increase X3D performance and safety.
Proceedings of the ACM Symposium on Applied Computing, 2012

Interference-Sensitive Preorders for MANETs.
Proceedings of the Ninth International Conference on Quantitative Evaluation of Systems, 2012

Writing Real-Time .Net Games in Casanova.
Proceedings of the Entertainment Computing - ICEC 2012 - 11th International Conference, 2012

A formal specification for casanova, a language for computer games.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2012

Gran: Model Checking Grsecurity RBAC Policies.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Typing Legacy COBOL Code.
Proceedings of the Software and Data Technologies - 6th International Conference, 2011

Type-flow Analysis for Legacy COBOL Code.
Proceedings of the ICSOFT 2011, 2011

Resource-Aware Authorization Policies for Statically Typed Cryptographic Protocols.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Designing Casanova: A Language for Games.
Proceedings of the Advances in Computer Games - 13th International Conference, 2011

2010
Channel abstractions for network security.
Math. Struct. Comput. Sci., 2010

AnBx - Security Protocols Design and Verification.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Secrecy and Authenticity Types for Secure Distributed Messaging.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

2009
A type system for Discretionary Access Control.
Math. Struct. Comput. Sci., 2009

Compliance Preorders for Web Services.
Proceedings of the Web Services and Formal Methods, 6th International Workshop, 2009

2008
Security Abstractions and Intruder Models (Extended Abstract).
Proceedings of the 15th Workshop on Expressiveness in Concurrency, 2008

A Theory of Adaptable Contract-Based Service Composition.
Proceedings of the SYNASC 2008, 2008

Language Based Secure Communication.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2007
Space-aware ambients and processes.
Theor. Comput. Sci., 2007

Dynamic types for authentication.
J. Comput. Secur., 2007

Secure implementations of typed channel abstractions.
Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2007

Static vs Dynamic Typing for Access Control in Pi-Calculus.
Proceedings of the Advances in Computer Science, 2007

2005
Non-interference proof techniques for the analysis of cryptographic protocols.
J. Comput. Secur., 2005

Communication and mobility control in boxed ambients.
Inf. Comput., 2005

Typed Processes in Untyped Contexts.
Proceedings of the Trustworthy Global Computing, International Symposium, 2005

Analysis of Typed Analyses of Authentication Protocols.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
Access control for mobile agents: The calculus of boxed ambients.
ACM Trans. Program. Lang. Syst., 2004

Preface.
Proceedings of the Second Workshop on Object Oriented Developments, 2004

Compositional Analysis of Authentication Protocols.
Proceedings of the Programming Languages and Systems, 2004

Type Based Discretionary Access Control.
Proceedings of the CONCUR 2004 - Concurrency Theory, 15th International Conference, London, UK, August 31, 2004

Authenticity by tagging and typing.
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004

2003
First Workshop on Object Oriented Developments - Preface.
Proceedings of the Workshop on Object Oriented Developments, 2003

Secrecy in Untrusted Networks.
Proceedings of the Automata, Languages and Programming, 30th International Colloquium, 2003

Context-Sensitive Equivalences for Non-interference Based Protocol Analysis.
Proceedings of the Fundamentals of Computation Theory, 14th International Symposium, 2003

Principles for Entity Authentication.
Proceedings of the Perspectives of Systems Informatics, 2003

A Calculus of Bounded Capacities.
Proceedings of the Advances in Computing Science, 2003

2002
Typed interpretations of extensible objects.
ACM Trans. Comput. Log., 2002

Type Inference for Variant Object Types.
Inf. Comput., 2002

Information Flow Security for Boxed Ambients.
Proceedings of the Foundations of Wide Area Network Computing, 2002

Behavioural typing for safe ambients.
Comput. Lang. Syst. Struct., 2002

Communication Interference in Mobile Boxed Ambients.
Proceedings of the FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science, 2002

A Survey of Name-Passing Calculi and Crypto-Primitives.
Proceedings of the Foundations of Security Analysis and Design II, 2002

2001
An overview of Boxed Ambients.
Proceedings of the Theory of Concurrency, Higher Order Languages and Types, 2001

Boxed Ambients.
Proceedings of the Theoretical Aspects of Computer Software, 4th International Symposium, 2001

Secure safe ambients.
Proceedings of the Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001

Subtyping and Matching for Mobile Objects.
Proceedings of the Theoretical Computer Science, 7th Italian Conference, 2001

Reasoning about Security in Mobile Ambients.
Proceedings of the CONCUR 2001, 2001

2000
Object calculi in linear logic.
J. Log. Comput., 2000

Typed Mobile Objects.
Proceedings of the CONCUR 2000, 2000

1999
Matching for the lambda Calculus of Objects.
Theor. Comput. Sci., 1999

A Subtyping for Extensible, Incomplete Objects.
Fundam. Informaticae, 1999

Interpretations of Extensible Objects and Types.
Proceedings of the Fundamentals of Computation Theory, 12th International Symposium, 1999

1998
Optimizing Modular Logic Languages.
ACM Comput. Surv., 1998

1997
Matching Constraints for the Lambda Calculus of Objects.
Proceedings of the Typed Lambda Calculi and Applications, 1997

Subtyping Constraints for Incomplete Objects (Extended Abstract).
Proceedings of the TAPSOFT'97: Theory and Practice of Software Development, 1997

1996
Differential Logic Programs: Programming Methodologies and Semantics.
Sci. Comput. Program., 1996

A Lambda Calculus of Incomplete Objects.
Proceedings of the Mathematical Foundations of Computer Science 1996, 1996

A Linear Logic Calculus Objects.
Proceedings of the Logic Programming, 1996

1995
A Stable Model Semantics for Behavioral Inheritance in Deductive Object Oriented Languages.
Proceedings of the Database Theory, 1995

1994
Modularity in Logic Programming.
J. Log. Program., 1994

A Logic for Encapsulation in Object-Oriented Languages.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994

1993
Partial Deduction for Structured Logic Programming.
J. Log. Program., 1993

Differential Logic Programming.
Proceedings of the Conference Record of the Twentieth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1993

SelfLog: Language and Implementation.
Proceedings of the Implementations of Logic Programming Systems: Papers from the ICLP 1993 Workshops: Practical Implementations and Systems Experience in Logic Programming Systems, 1993

A New Fixpoint Semantics for Prolog.
Proceedings of the Logic Programming, 1993

1992
A Declarative View of Inheritance in Logic Programming.
Proceedings of the Logic Programming, 1992

On the Semantics of Inheritance in Logic Programming: Compositionality and Full Abstraction.
Proceedings of the Extensions of Logic Programming, Third International Workshop, 1992

1990
Partial Evaluation for Hierarchies of Logic Theories.
Proceedings of the Logic Programming, Proceedings of the 1990 North American Conference, Austin, Texas, USA, October 29, 1990

Combinatory Forms for Equational Programming: Instances, Unification and Narrowing.
Proceedings of the CAAP '90, 1990

1989
Partial Evaluation in Prolog: Some Improvements about Cut.
Proceedings of the Logic Programming, 1989


  Loading...