Luca Viganò

Orcid: 0000-0001-9916-271X

Affiliations:
  • King's College London, UK


According to our database1, Luca Viganò authored at least 155 papers between 1992 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A mutation-based approach for the formal and automated analysis of security ceremonies.
J. Comput. Secur., 2023

Formal Analysis of Security Protocols with Movement.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

Cybersecurity, Nicolas Cage and Peppa Pig.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Special issue on socio-technical aspects in security - editorial.
J. Comput. Secur., 2022

Editorial: 2021 editors' pick: Computer science.
Frontiers Comput. Sci., 2022

Automatic Fair Exchanges.
CoRR, 2022

Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity Show and Tell).
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Privacy as Reachability.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

Formal Methods for Socio-technical Security - (Formal and Automated Analysis of Security Ceremonies).
Proceedings of the Coordination Models and Languages, 2022

2021
Resource Controllability of Business Processes Under Conditional Uncertainty.
J. Data Semant., 2021

Event-Based Time-Stamped Claim Logic.
J. Log. Algebraic Methods Program., 2021

Time-stamped claim logic.
Log. J. IGPL, 2021

Consistency checking of STNs with decisions: Managing temporal and access-control constraints in a seamless way.
Inf. Comput., 2021

Nicolas Cage is the Center of the Cybersecurity Universe.
Proceedings of the Human-Computer Interaction - INTERACT 2021 - 18th IFIP TC 13 International Conference, Bari, Italy, August 30, 2021

2020
Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login.
ACM Trans. Priv. Secur., 2020

A Formal Approach to Physics-based Attacks in Cyber-physical Systems.
ACM Trans. Priv. Secur., 2020

A formal and automated approach to exploiting multi-stage attacks of web applications.
J. Comput. Secur., 2020

Privacy, Security and Trust in the Internet of Neurons.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2020

X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

A Game Of Drones: Extending the Dolev-Yao Attacker Model With Movement.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Explainable Security.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Alpha-Beta Privacy.
ACM Trans. Priv. Secur., 2019

Conditional simple temporal networks with uncertainty and decisions.
Theor. Comput. Sci., 2019

Last man standing: Static, decremental and dynamic resiliency via controller synthesis.
J. Comput. Secur., 2019

Conditional Simple Temporal Networks with Uncertainty and Resources.
J. Artif. Intell. Res., 2019

Explaining Cybersecurity with Films and the Arts (Extended Abstract).
CoRR, 2019

A Formal Approach to Physics-Based Attacks in Cyber-Physical Systems (Extended Version).
CoRR, 2019

It could be worse, it could be raining: reliable automatic meteorological forecasting.
CoRR, 2019

Diagnostics as a Reasoning Process: From Logic Structure to Software Design.
J. Comput. Inf. Technol., 2019

Hybrid SAT-Based Consistency Checking Algorithms for Simple Temporal Networks with Decisions.
Proceedings of the 26th International Symposium on Temporal Representation and Reasoning, 2019

What Are the Threats? (Charting the Threat Models of Security Ceremonies).
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

An Investigation into the "Beautification" of Security Ceremonies.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Resource Controllability of Workflows Under Conditional Uncertainty.
Proceedings of the Business Process Management Workshops, 2019

2018
MobSTer: A model-based security testing framework for web applications.
Softw. Test. Verification Reliab., 2018

Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies.
J. Comput. Secur., 2018

Schrödinger's Man.
CoRR, 2018

Smart Humans... WannaDie?
CoRR, 2018

Gnirut: The Trouble With Being Born Human In An Autonomous World.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

MMM: May I Mine Your Mind.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

Conditional Uncertainty in Constraint Networks.
Proceedings of the Agents and Artificial Intelligence - 10th International Conference, 2018

Constraint Networks Under Conditional Uncertainty.
Proceedings of the 10th International Conference on Agents and Artificial Intelligence, 2018

A Formal Approach to Analyzing Cyber-Forensics Evidence.
Proceedings of the Computer Security, 2018

2017
Compositional Meaning in Logic.
Logica Universalis, 2017

An interpolation-based method for the verification of security protocols.
J. Comput. Secur., 2017

A branching distributed temporal logic for reasoning about entanglement-free quantum state transformations.
Inf. Comput., 2017

A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version).
CoRR, 2017

Access Controlled Temporal Networks.
Proceedings of the 9th International Conference on Agents and Artificial Intelligence, 2017

A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

A Formal Approach to Cyber-Physical Attacks.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Weak, Strong and Dynamic Controllability of Access-Controlled Workflows Under Conditional Uncertainty.
Proceedings of the Business Process Management - 15th International Conference, 2017

2016
Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection (Extended Version).
CoRR, 2016

Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Invisible Security.
Proceedings of the Security Protocols XXIV, 2016

An automated approach for testing the security of web applications against chained attacks.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

A Topological Categorization of Agents for the Definition of Attack States in Multi-agent Systems.
Proceedings of the Multi-Agent Systems and Agreement Technologies, 2016

Security Constraints in Temporal Role-Based Access-Controlled Workflows.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Special issue on security and high performance computing systems.
J. Comput. Secur., 2015

Defending Vulnerable Security Protocols by Means of Attack Interference in Non-Collaborative Scenarios.
Frontiers ICT, 2015

Security Constraints in Temporal Role-Based Access-Controlled Workflows (Extended Version).
CoRR, 2015

Security is Beautiful (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Security is Beautiful.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Automated analysis of RBAC policies with temporal constraints and static role hierarchies.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment.
Proceedings of the Computer Security - ESORICS 2015, 2015

Alice and Bob: Reconciling Formal Models and Implementation.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete.
Theor. Comput. Sci., 2014

Tableau systems for reasoning about risk.
J. Ambient Intell. Humaniz. Comput., 2014

Quantum State Transformations and Branching Distributed Temporal Logic - (Invited Paper).
Proceedings of the Logic, Language, Information, and Computation, 2014

Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version).
Proceedings of the Security Protocols XXII, 2014

Sufficient conditions for vertical composition of security protocols.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
On the Mosaic Method for Many-Dimensional Modal Logics: A Case Study Combining Tense and Modal Operators.
Logica Universalis, 2013

A Labeled Deduction System for the Logic UB.
Proceedings of the 2013 20th International Symposium on Temporal Representation and Reasoning, 2013

Using Interpolation for the Verification of Security Protocols.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Defining Privacy Is Supposed to Be Easy.
Proceedings of the Logic for Programming, Artificial Intelligence, and Reasoning, 2013

The SPaCIoS Project: Secure Provision and Consumption in the Internet of Services.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

A complete tableau procedure for risk analysis.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
Automated Analysis of Scenario-based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities (Extended Version).
CoRR, 2012

Towards the Secure Provision and Consumption in the Internet of Services.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Automated validation of trust and security of service-oriented architectures with the AVANTSSAR platform.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

An environmental paradigm for defending security protocols.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

Towards a Logical Framework for Reasoning about Risk.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Distributed temporal logic for the analysis of security protocol models.
Theor. Comput. Sci., 2011

A declarative two-level framework to specify and verify workflow and authorization policies in service-oriented architectures.
Serv. Oriented Comput. Appl., 2011

Workflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services.
Scalable Comput. Pract. Exp., 2011

Modal Deduction Systems for Quantum State Transformations.
J. Multiple Valued Log. Soft Comput., 2011

Labelled natural deduction for a bundled branching temporal logic.
J. Log. Comput., 2011

Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning".
J. Autom. Reason., 2011

Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis [Extended Version]
CoRR, 2011

Meaning Negotiation as Inference
CoRR, 2011

Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Attack Interference: A Path to Defending Security Protocols.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Blocking Underhand Attacks by Hidden Coalitions.
Proceedings of the ICAART 2011 - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, Volume 2, 2011

Towards Formal Validation of Trust and Security in the Internet of Services.
Proceedings of the Future Internet, 2011

A Hierarchy of Knowledge for the Formal Analysis of Security-Sensitive Business Processes.
Proceedings of the CRiSIS 2011, 2011

Security protocols as environments: A lesson from non-collaboration.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

2010
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols.
J. Comput. Secur., 2010

Back from the future.
J. Appl. Non Class. Logics, 2010

Blocking Underhand Attacks by Hidden Coalitions (Extended Version)
CoRR, 2010

Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC (Extended Version)
CoRR, 2010

Automated Validation of Security-Sensitive Web Services Specified in BPEL and RBAC.
Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2010

WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications.
Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2010

Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA.
Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods, 2010

A Deduction System for Meaning Negotiation.
Proceedings of the Declarative Agent Languages and Technologies VIII, 2010

2009
Labelled Tableaux for Distributed Temporal Logic.
J. Log. Comput., 2009

A History of Until.
Proceedings of the 6th Workshop on Methods for Modalities, 2009

Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures (Full version)
CoRR, 2009

A Labeled Natural Deduction System for a Fragment of CTL*.
Proceedings of the Logical Foundations of Computer Science, International Symposium, 2009

The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols.
Proceedings of the Foundations of Security Analysis and Design V, 2009

Secure Pseudonymous Channels.
Proceedings of the Computer Security, 2009

Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Preface.
Int. J. Inf. Sec., 2008

Joint workshop on foundations of computer security and automated reasoning for security protocol analysis (FCS-ARSPA '06).
Inf. Comput., 2008

Labeled Natural Deduction Systems for a Family of Tense Logics.
Proceedings of the 15th International Symposium on Temporal Representation and Reasoning, 2008

A Labeled Tableaux Systemfor the Distributed Temporal Logic DTL.
Proceedings of the 15th International Symposium on Temporal Representation and Reasoning, 2008

A Qualitative Modal Representation of Quantum Register Transformations.
Proceedings of the 38th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2008), 2008

2006
On the semantics of Alice&Bob specifications of security protocols.
Theor. Comput. Sci., 2006

Automated Reasoning for Security Protocol Analysis.
J. Autom. Reason., 2006

Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
IACR Cryptol. ePrint Arch., 2006

Towards a Quantitative Analysis of Security Protocols.
Proceedings of the 4th International Workshop on Quantitative Aspects of Programming Languages, 2006

Formalizing and Analyzing Sender Invariance.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

2005
OFMC: A symbolic model checker for security protocols.
Int. J. Inf. Sec., 2005

Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis.
Log. J. IGPL, 2005

Automated Security Protocol Analysis With the AVISPA Tool.
Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, 2005

Deconstructing Alice and Bob.
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, 2005

Algebraic Intruder Deductions.
Proceedings of the Logic for Programming, 2005

The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

2004
Modal Sequent Calculi Labelled with Truth Values: Completeness, Duality and Analyticity.
Log. J. IGPL, 2004

Metareasoning about Security Protocols using Distributed Temporal Logic.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

Preface.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

A Formalization of Off-Line Guessing for Security Protocol Analysis.
Proceedings of the Logic for Programming, 2004

2003
Truth-values as Labels: A General Recipe for Labelled Deduction.
J. Appl. Non Class. Logics, 2003

An On-the-Fly Model-Checker for Security Protocol Analysis.
Proceedings of the Computer Security, 2003

CDiff: a new reduction technique for constraint-based analysis of security protocols.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Fibring Labelled Deduction Systems.
J. Log. Comput., 2002

A Formal Analysis of the CORBA Security Service.
Proceedings of the ZB 2002: Formal Specification and Development in Z and B, 2002

Labelled Deduction over Algebras of Truth-Values.
Proceedings of the Frontiers of Combining Systems, 4th International Workshop, 2002

The AVISS Security Protocol Analysis Tool.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2001
Towards an awareness-based semantics for security protocol analysis.
Proceedings of the Logical Aspects of Cryptographic Protocol Verification, 2001

A formal data-model of the CORBA security service.
Proceedings of the 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001, 2001

2000
An O(n log n)-Space Decision Procedure for the Relevance Logic B+.
Stud Logica, 2000

Labelled non-classical logics.
Kluwer, ISBN: 978-0-7923-7749-8, 2000

1998
Natural Deduction for Non-Classical Logics.
Stud Logica, 1998

Labelled Modal Logics: Quantifiers.
J. Log. Lang. Inf., 1998

A Recipe for the Complexity Analysis of Non-Classical Logics.
Proceedings of the Frontiers of Combining Systems, Second International Workshop, 1998

1997
A framework for non-classical logics.
PhD thesis, 1997

Labelled Propositional Modal Logics: Theory and Practice.
J. Log. Comput., 1997

Labelled Quantified Modal Logics.
Proceedings of the KI-97: Advances in Artificial Intelligence, 1997

A New Method for Bounding the Complexity of Modal Logics.
Proceedings of the Computational Logic and Proof Theory, 5th Kurt Gödel Colloquium, 1997

1996
Implementing Modal and Relevance Logics in a Logical Framework.
Proceedings of the Fifth International Conference on Principles of Knowledge Representation and Reasoning (KR'96), 1996

A Topography of Labelled Modal Logics.
Proceedings of the Frontiers of Combining Systems, 1996

1993
Building and Executing Proof Strategies in a Formal Metatheory.
Proceedings of the Advances in Artificial Intelligence, 1993

1992
SEL Compiler & Abstract Analyzers.
Proceedings of the ALPUK92, Proceedings of the 4th UK Conference on Logic Programming, London, 30 March, 1992


  Loading...