Riccardo Focardi

According to our database1, Riccardo Focardi authored at least 108 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Gathering of robots in a ring with mobile faults.
Theor. Comput. Sci., 2019

Shaping the Glitch: Optimizing Voltage Fault Injection Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

2018
Surviving the Web: A Journey into Web Session Security.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring.
Proceedings of the 27th USENIX Security Symposium, 2018

Transcompiling Firewalls.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

Mind Your Keys? A Security Evaluation of Java Keystores.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Firewall Management With FireWall Synthesizer.
Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to, 2018

Neural Cryptanalysis of Classical Ciphers.
Proceedings of the 19th Italian Conference on Theoretical Computer Science, 2018

Usable cryptographic QR codes.
Proceedings of the IEEE International Conference on Industrial Technology, 2018

Language-Independent Synthesis of Firewall Policies.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Formal methods for web security.
J. Log. Algebr. Meth. Program., 2017

Run-Time Attack Detection in Cryptographic APIs.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
APDU-Level Attacks in PKCS#11 Devices.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Gathering of Robots in a Ring with Mobile Faults.
Proceedings of the 17th Italian Conference on Theoretical Computer Science, 2016

Micro-policies for Web Session Security.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Localizing Firewall Security Policies.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
CookiExt: Patching the browser against session hijacking attacks.
Journal of Computer Security, 2015

Static Evidences for Attack Reconstruction.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Automatic and Robust Client-Side Protection for Cookie-Based Sessions.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

Provably Sound Browser-Based Enforcement of Web Session Integrity.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Mignis: A Semantic Based Tool for Firewall Configuration.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Type-based analysis of key management in PKCS#11 cryptographic devices.
Journal of Computer Security, 2013

Type-Based Analysis of Generic Key Management APIs (Long Version).
IACR Cryptology ePrint Archive, 2013

Type-Based Analysis of Generic Key Management APIs.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

2012
Guessing Bank PINs by Winning a Mastermind Game.
Theory Comput. Syst., 2012

Analysis of Security APIs (Dagstuhl Seminar 12482).
Dagstuhl Reports, 2012

Type-Based Analysis of PKCS#11 Key Management.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Gran: Model Checking Grsecurity RBAC Policies.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

Efficient Padding Oracle Attacks on Cryptographic Hardware.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Secure Recharge of Disposable RFID Tickets.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

An Introduction to Security API Analysis.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

2010
Channel abstractions for network security.
Mathematical Structures in Computer Science, 2010

Editorial.
Journal of Computer Security, 2010

Secure Upgrade of Hardware Security Modules in Bank Networks.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Formal Analysis of Key Integrity in PKCS#11.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Match It or Die: Proving Integrity by Equality.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Cracking Bank PINs by Playing Mastermind.
Proceedings of the Fun with Algorithms, 5th International Conference, 2010

Attacking and fixing PKCS#11 security tokens.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Security Abstractions and Intruder Models (Extended Abstract).
Electr. Notes Theor. Comput. Sci., 2009

Blunting Differential Attacks on PIN Processing APIs.
Proceedings of the Identity and Privacy in the Internet Age, 2009

Type-Based Analysis of PIN Processing APIs.
Proceedings of the Computer Security, 2009

2008
Information flow security in Boundary Ambients.
Inf. Comput., 2008

Information flow security of multi-threaded distributed programs.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008

Language Based Secure Communication.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2007
Dynamic types for authentication.
Journal of Computer Security, 2007

A calculus of challenges and responses.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007

2006
Guest editor's introduction: Special issue on security issues in coordination models, languages, and systems.
Sci. Comput. Program., 2006

Secure shared data-space coordination languages: A process algebraic survey.
Sci. Comput. Program., 2006

Preface.
Journal of Computer Security, 2006

2005
Guest editor's preface.
Journal of Computer Security, 2005

Authentication primitives for secure protocol specifications.
Future Generation Comp. Syst., 2005

Preface.
Electr. Notes Theor. Comput. Sci., 2005

Inferring authentication tags.
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005

Bridging Language-Based and Process Calculi Security.
Proceedings of the Foundations of Software Science and Computational Structures, 2005

Analysis of Typed Analyses of Authentication Protocols.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
The rho-spi Calculus at Work: Authentication Case Studies.
Electr. Notes Theor. Comput. Sci., 2004

Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients.
Electr. Notes Theor. Comput. Sci., 2004

Unwinding in Information Flow Security.
Electr. Notes Theor. Comput. Sci., 2004

A modular approach to Sprouts.
Discrete Applied Mathematics, 2004

Nesting analysis of mobile ambients.
Computer Languages, Systems & Structures, 2004

Verifying persistent security properties.
Computer Languages, Systems & Structures, 2004

Static Analysis of Authentication.
Proceedings of the Foundations of Security Analysis and Design III, 2004

Compositional Analysis of Authentication Protocols.
Proceedings of the Programming Languages and Systems, 2004

Authenticity by tagging and typing.
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004

2003
A comparison of three authentication properties.
Theor. Comput. Sci., 2003

Real-time information flow analysis.
IEEE Journal on Selected Areas in Communications, 2003

Preface.
Electr. Notes Theor. Comput. Sci., 2003

Information Leakage Detection in Boundary Ambients.
Electr. Notes Theor. Comput. Sci., 2003

Complexity of Nesting Analysis in Mobile Ambients.
Proceedings of the Verification, 2003

Bisimulation and Unwinding for Verifying Possibilistic Security Properties.
Proceedings of the Verification, 2003

BANANA - A Tool for Boundary Ambients Nesting ANAlysis.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2003

Refinement Operators and Information Flow Security.
Proceedings of the 1st International Conference on Software Engineering and Formal Methods (SEFM 2003), 2003

Authentication Primitives for Protocol Specifications.
Proceedings of the Parallel Computing Technologies, 2003

Principles for Entity Authentication.
Proceedings of the Perspectives of Systems Informatics, 2003

2002
Primitives for authentication in process algebras.
Theor. Comput. Sci., 2002

Computer languages and security.
Comput. Lang., 2002

Security boundaries in mobile ambients.
Comput. Lang., 2002

Proofs Methods for Bisimulation Based Information Flow Security.
Proceedings of the Verification, 2002

A Proof System for Information Flow Security.
Proceedings of the Logic Based Program Synthesis and Tranformation, 2002

Boundary Inference for Enforcing Security Policies in Mobile Ambients.
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002

Classification of Security Properties - Part II: Network Security.
Proceedings of the Foundations of Security Analysis and Design II, 2002

A Survey of Name-Passing Calculi and Crypto-Primitives.
Proceedings of the Foundations of Security Analysis and Design II, 2002

Control Flow Analysis of Mobile Ambients with Security Boundaries.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems V, 2002

Information Flow Security in Dynamic Contexts.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

Transforming Processes to Check and Ensure Information Flow Security.
Proceedings of the Algebraic Methodology and Software Technology, 2002

2001
Formal Models of Timing Attacks on Web Privacy.
Electr. Notes Theor. Comput. Sci., 2001

Information Flow Security in Mobile Ambients.
Electr. Notes Theor. Comput. Sci., 2001

Techniques for Security Checking: Non-Interference vs Control Flow Analysis.
Electr. Notes Theor. Comput. Sci., 2001

CVS at Work: A Report on New Failures upon Some Cryptographic Protocols.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

2000
A compiler for analyzing cryptographic protocols using noninterference.
ACM Trans. Softw. Eng. Methodol., 2000

Feedback vertex set in hypercubes.
Inf. Process. Lett., 2000

Secrecy in Security Protocols as Non Interference.
Electr. Notes Theor. Comput. Sci., 2000

Non Interference for the Analysis of Cryptographic Protocols.
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000

Classification of Security Properties (Part I: Information Flow).
Proceedings of the Foundations of Security Analysis and Design, 2000

Information Flow Analysis in a Discrete-Time Process Algebra.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

Message Authentication through Non Interference.
Proceedings of the Algebraic Methodology and Software Technology. 8th International Conference, 2000

1999
A Uniform Approach for the Definition of Security Properties.
Proceedings of the FM'99 - Formal Methods, 1999

CVS: A Compiler for the Analysis of Cryptographic Protocols.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

Authentication via Localized Names.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1998
Panel Introduction: Varieties of Authentication.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties.
IEEE Trans. Software Eng., 1997

1996
Automatic Compositional Verification of Some Security Properties.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1996

Comparing Two Information Flow Security Properties.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996

1995
A Taxonomy of Security Properties for Process Algebras.
Journal of Computer Security, 1995

The security checker: a semantics-based tool for the verification of security properties.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1994
A Taxonomy of Security Properties for CCS.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994


  Loading...