Letterio Galletta

Orcid: 0000-0003-0351-9169

According to our database1, Letterio Galletta authored at least 70 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Formally verifying security protocols built on watermarking and jamming.
Comput. Secur., May, 2023

A type language for distributed reactive components governed by communication protocols.
J. Log. Algebraic Methods Program., April, 2023

Resilience of Hybrid Casper Under Varying Values of Parameters.
Distributed Ledger Technol. Res. Pract., 2023

Sharpening Ponzi Schemes Detection on Ethereum with Machine Learning.
CoRR, 2023

Stochastic modeling and analysis of the bitcoin protocol in the presence of block communication delays.
Concurr. Comput. Pract. Exp., 2023

A Comparison of Hosting Techniques for Online Cybersecurity Competitions.
Proceedings of the Intelligent Technologies for Interactive Entertainment, 2023

2022
Automatic Fair Exchanges.
CoRR, 2022

IFCIL: An Information Flow Configuration Language for SELinux (Extended Version).
CoRR, 2022

Can my firewall system enforce this policy?
Comput. Secur., 2022

Towards effective preservation of robust safety properties.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

IFCIL: An Information Flow Configuration Language for SELinux.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
Securing Interruptible Enclaved Execution on Small Microprocessors.
ACM Trans. Program. Lang. Syst., 2021

Mechanical incrementalization of typing algorithms.
Sci. Comput. Program., 2021

A theory of transaction parallelism in blockchains.
Log. Methods Comput. Sci., 2021

Modelling and analysing IoT systems.
J. Parallel Distributed Comput., 2021

FWS: Analyzing, maintaining and transcompiling firewalls.
J. Comput. Secur., 2021

Framework, Tools and Good Practices for Cybersecurity Curricula.
IEEE Access, 2021

Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Natural Projection as Partial Model Checking.
J. Autom. Reason., 2020

Private-Yet-Verifiable Contact Tracing.
CoRR, 2020

A type language for message passing component-based systems.
Proceedings of the Proceedings 13th Interaction and Concurrency Experience, 2020

Control-flow Flattening Preserves the Constant-Time Policy (Extended Version).
CoRR, 2020

Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version.
CoRR, 2020

VeriOSS: Using the Blockchain to Foster Bug Bounty Programs.
Proceedings of the 2nd International Conference on Blockchain Economics, 2020

MuAC: Access Control Language for Mutual Benefits.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020

Control-flow Flattening Preserves the Constant-Time Policy.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020

Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

A True Concurrent Model of Smart Contracts Executions.
Proceedings of the Coordination Models and Languages, 2020

Security Metrics at Work on the Things in IoT Systems.
Proceedings of the From Lambda Calculus to Cybersecurity Through Program Analysis, 2020

2019
Programming in a context-aware language.
J. Supercomput., 2019

Measuring security in IoT communications.
Theor. Comput. Sci., 2019

Translation Validation for Security Properties.
CoRR, 2019

Using Standard Typing Algorithms Incrementally.
Proceedings of the NASA Formal Methods - 11th International Symposium, 2019

From Firewalls to Functions and Back.
Proceedings of the Third Italian Conference on Cyber Security, 2019

A Brief Tour of Formally Secure Compilation.
Proceedings of the Third Italian Conference on Cyber Security, 2019

Analysing the Provenance of IoT Data.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Tracking Data Trajectories in IoT.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

A Minimal Core Calculus for Solidity Contracts.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

Are All Firewall Systems Equally Powerful?
Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and Analysis for Security, 2019

Checking the Expressivity of Firewall Languages.
Proceedings of the Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, 2019

Robust Declassification by Incremental Typing.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

Revealing the Trajectories of KLAIM Tuples, Statically.
Proceedings of the Models, Languages, and Tools for Concurrent and Distributed Programming, 2019

2018
From Natural Projection to Partial Model Checking and Back.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2018

Transcompiling Firewalls.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

Firewall Management With FireWall Synthesizer.
Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to, 2018

Language-Independent Synthesis of Firewall Policies.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Tracing where IoT data are collected and aggregated.
Log. Methods Comput. Sci., 2017

Tool Supported Analysis of IoT.
Proceedings of the Proceedings 10th Interaction and Concurrency Experience, 2017

Experimenting with a Context-Aware Language.
Proceedings of the Parallel Computing Technologies, 2017

Tracking Sensitive and Untrustworthy Data in IoT.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

2016
A Two-Component Language for Adaptation: Design, Semantics and Program Analysis.
IEEE Trans. Software Eng., 2016

Context-aware security: Linguistic mechanisms and static analysis.
J. Comput. Secur., 2016

Event-driven Adaptation in COP.
Proceedings of the Ninth workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software, 2016

A Step Towards Checking Security in IoT.
Proceedings of the Proceedings 9th Interaction and Concurrency Experience, 2016

A Semantics for Disciplined Concurrency in COP.
Proceedings of the 17th Italian Conference on Theoretical Computer Science, 2016

The Cost of Securing IoT Communications.
Proceedings of the 17th Italian Conference on Theoretical Computer Science, 2016

Where Do Your IoT Ingredients Come From?
Proceedings of the Coordination Models and Languages, 2016

Last Mile's Resources.
Proceedings of the Semantics, Logics, and Calculi, 2016

2015
A Context-Oriented Extension of F#.
Proceedings of the Proceedings 14th International Workshop on Foundations of Coordination Languages and Self-Adaptive Systems, 2015

Safe Adaptation Through Implicit Effect Coercion.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
Adaptivity: Linguistic Mechanisms and Static Analysis Techniques.
PhD thesis, 2014

An Abstract Interpretation Framework for Type and Effect Systems.
Fundam. Informaticae, 2014

A Two-Phase Static Analysis for Reliable Adaptation.
Proceedings of the Software Engineering and Formal Methods - 12th International Conference, 2014

Linguistic Mechanisms for Context-Aware Security.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2014, 2014

A Two-Component Language for COP.
Proceedings of 6th International Workshop on Context-Oriented Programming, 2014

2013
Security in Pervasive Applications: A Survey.
Eur. J. Law Technol., 2013

2012
Typing Context-Dependent Behavioural Variation
Proceedings of the Proceedings Fifth Workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software, 2012

Types for Coordinating Secure Behavioural Variations.
Proceedings of the Coordination Models and Languages - 14th International Conference, 2012

Formalising Security in Ubiquitous and Cloud Scenarios.
Proceedings of the Computer Information Systems and Industrial Management, 2012

2011
An Abstract Semantics for Inference of Types and Effects in a Multi-Tier Web Language
Proceedings of the Proceedings 7th International Workshop on Automated Specification and Verification of Web Systems, 2011


  Loading...