Roberto Carbone

Orcid: 0000-0003-2853-4269

According to our database1, Roberto Carbone authored at least 55 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols.
IEEE Trans. Dependable Secur. Comput., 2024

A Risk-based Approach to Trustworthy AI Systems for Judicial Procedures.
Proceedings of the Ital-IA Intelligenza Artificiale, 2024

CSRFing the SSO Waves: Security Testing of SSO-Based Account Linking Process.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

Work-in-Progress: A Sidecar Proxy for Usable and Performance-Adaptable End-to-End Protection of Communications in Cloud Native Applications.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
SecCo: Automated Services to Secure Containers in the DevOps Paradigm.
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023

Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

Control is Nothing Without Trust a First Look into Digital Identity Wallet Trends.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud.
ACM Trans. Priv. Secur., 2022

Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients.
J. Inf. Secur. Appl., 2022

End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements.
IEEE Veh. Technol. Mag., 2021

Blockchain Based RAN Data Sharing.
Proceedings of the IEEE International Conference on Smart Data Services, 2021

Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Integrating a Pentesting Tool for IdM Protocols in a Continuous Delivery Pipeline.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021

Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2020
Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login.
ACM Trans. Priv. Secur., 2020

A survey on multi-factor authentication for online banking in the wild.
Comput. Secur., 2020

Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020

Micro-Id-Gym: A Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020

The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Security Considerations on 5G-Enabled Back-Situation Awareness for CCAM.
Proceedings of the 3rd IEEE 5G World Forum, 2020

2019
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

2018
Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications - A Workshop Experience Report.
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018

Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

2017
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements.
Comput. Secur., 2017

Strong Authentication for e-Banking: A Survey on European Regulations and Implementations.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

PolEnA: Enforcing Fine-grained Permission Policies in Android.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs.
Int. J. Softw. Tools Technol. Transf., 2016

Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A delegated authorization solution for smart-city mobile applications.
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Security Threat Identification and Testing.
Proceedings of the 8th IEEE International Conference on Software Testing, 2015

Android Permissions Unleashed.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
SATMC: A SAT-Based Model Checker for Security-Critical Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014

Selective Release of Smart Metering Data in Multi-domain Smart Grids.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Attribute based access control for APIs in spring security.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

2013
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations.
Comput. Secur., 2013

Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap.
Proceedings of the Tests and Proofs - 6th International Conference, 2012

The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Formal Analysis of a Privacy-Preserving Billing Protocol.
Proceedings of the Smart Grid Security - First International Workshop, 2012

2011
LTL model-checking for security protocols.
AI Commun., 2011

Automated Analysis of Semantic-Aware Access Control Policies: A Logic-Based Approach.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement.
Proceedings of the Middleware 2011, 2011

Towards Formal Validation of Trust and Security in the Internet of Services.
Proceedings of the Future Internet, 2011

2010
Model-Checking Driven Security Testing of Web-Based Applications.
Proceedings of the Third International Conference on Software Testing, 2010

2009
Verification of S&D Solutions for Network Communications and Devices.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

LTL model checking for security protocols.
J. Appl. Non Class. Logics, 2009

2008
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008


  Loading...