Sandro Etalle

According to our database1, Sandro Etalle authored at least 150 papers between 1992 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Network intrusion detection systems for in-vehicle network - Technical report.
CoRR, 2019

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions.
CoRR, 2018

Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics.
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2018

Behavior analysis in the medical sector: theory and practice.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems.
Proceedings of the Critical Information Infrastructures Security, 2018

2017
A white-box anomaly-based framework for database leakage detection.
J. Inf. Sec. Appl., 2017

Encryption in ICS networks: A blessing or a curse?
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions.
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 2017

\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems.
Proceedings of the Network and System Security - 11th International Conference, 2017

From Intrusion Detection to Software Design.
Proceedings of the Computer Security - ESORICS 2017, 2017

From System Specification to Anomaly Detection (and back).
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
A Hybrid Framework for Data Loss Prevention and Detection.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Reading between the fields: practical, effective intrusion detection for industrial control systems.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Towards Useful Anomaly Detection for Back Office Networks.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation.
Proceedings of the Critical Information Infrastructures Security, 2016

2015
Experimental Validation of a Risk Assessment Method.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2015

Validating the Raster Risk Assessment Method in Practice.
Proceedings of the 12th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2015

2014
GEM: A distributed goal evaluation algorithm for trust management.
TPLP, 2014

Understanding Computer Security.
Front. ICT, 2014

On Emulation-Based Network Intrusion Detection Systems.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Hunting the Unknown - White-Box Database Leakage Detection.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Hybrid Static-Runtime Information Flow and Declassification Enforcement.
IEEE Trans. Information Forensics and Security, 2013

A Semantic Security Framework for Systems of Systems.
Int. J. Cooperative Inf. Syst., 2013

Database Anomalous Activities - Detection and Quantification.
Proceedings of the SECRYPT 2013, 2013

The POLIPO Security Framework.
Proceedings of the Situation Awareness with Systems of Systems, 2013

2012
A2thOS: availability analysis and optimisation in SLAs.
Int. Journal of Network Management, 2012

GEM: a Distributed Goal Evaluation Algorithm for Trust Management
CoRR, 2012

Linking Unlinkability.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012

N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Design and initial validation ofthe Rastermethod for telecom service availability risk assessment.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

Policy Administration in Tag-Based Authorization.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Challenges and opportunities in securing industrial control systems.
Proceedings of the Complexity in Engineering, 2012

2011
Model-based qualitative risk assessment for availability of IT infrastructures.
Software and Systems Modeling, 2011

Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning".
J. Autom. Reasoning, 2011

A Security Framework for Systems of Systems.
Proceedings of the POLICY 2011, 2011

A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks.
Proceedings of the Past, 2011

MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

Poster: protecting information in systems of systems.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Risk and Business Goal Based Security Requirement and Countermeasure Prioritization.
Proceedings of the Workshops on Business Informatics Research, 2011

2010
A Flexible Architecture for Privacy-Aware Trust Management.
JTAER, 2010

Towards Static Flow-Based Declassification for Legacy and Untrusted Programs.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Towards Data Protection Compliance.
Proceedings of the SECRYPT 2010, 2010

10141 Summary - Distributed Usage Control.
Proceedings of the Distributed Usage Control, 06.04. - 09.04.2010, 2010

10141 Abstracts Collection - Distributed Usage Control.
Proceedings of the Distributed Usage Control, 06.04. - 09.04.2010, 2010

CRAC: Confidentiality risk assessment and IT-infrastructure comparison.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Maintaining control while delegating trust: Integrity constraints in trust management.
ACM Trans. Inf. Syst. Secur., 2009

Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy.
Proceedings of the POLICY 2009, 2009

LP with Flexible Grouping and Aggregates Using Modes.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2009

Extended eTVRA vs. security checklist: Experiences in a value-web.
Proceedings of the 31st International Conference on Software Engineering, 2009

Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
RBAC administration in distributed systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Boosting Web Intrusion Detection Systems by Inferring Positive Signatures.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Trust Management in P2P Systems Using Standard TuLiP.
Proceedings of the Trust Management II, 2008

Know What You Trust.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

IT confidentiality risk assessment for an architecture-based approach.
Proceedings of BDIM 2008, 2008

2007
Timed analysis of security protocols.
Journal of Computer Security, 2007

Audit-based compliance control.
Int. J. Inf. Sec., 2007

Preface.
Electr. Notes Theor. Comput. Sci., 2007

Audit-Based Access Control for Electronic Health Records.
Electr. Notes Theor. Comput. Sci., 2007

The Meaning of Logs.
Proceedings of the Trust, 2007

Refinement for Administrative Policies.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

A posteriori compliance control.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems.
Proceedings of the 21th Large Installation System Administration Conference, 2007

Core TuLiP Logic Programming for Trust Management.
Proceedings of the Logic Programming, 23rd International Conference, 2007

An Introduction to the Role Based Trust Management Framework RT.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Extended privilege inheritance in RBAC.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Model-Based Mitigation of Availability Risks.
Proceedings of BDIM 2007, 2007

Trust and punishment.
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, 2007

Privacy Policies.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems.
TPLP, 2006

Nonmonotonic Trust Management for P2P Applications.
Electr. Notes Theor. Comput. Sci., 2006

APHRODITE: an Anomaly-based Architecture for False Positive Reduction
CoRR, 2006

LicenseScript: a logical language for digital rights management.
Annales des Télécommunications, 2006

A Logic for Constraint-based Security Protocol Analysis.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

2005
Preface.
Electr. Notes Theor. Comput. Sci., 2005

A Trace Logic for Local Security Properties.
Electr. Notes Theor. Comput. Sci., 2005

Analysing Password Protocol Security Against Off-line Dictionary Attacks.
Electr. Notes Theor. Comput. Sci., 2005

Poseidon: a 2-tier Anomaly-based Intrusion Detection System
CoRR, 2005

Nonmonotonic Trust Management for P2P Applications
CoRR, 2005

Integrity Constraints in Trust Management
CoRR, 2005

Timed Analysis of Security Protocols
CoRR, 2005

An Audit Logic for Accountability
CoRR, 2005

StreamTo: Streaming Content using a Tamper-Resistant Token.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Integrity constraints in trust management.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

An Audit Logic for Accountability.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

PS-LTL for Constraint-Based Security Protocol Analysis.
Proceedings of the Logic Programming, 21st International Conference, 2005

Service Brokerage in Prolog.
Proceedings of the ICEIS 2005, 2005

A Formal Security Analysis of an OSA/Parlay Authentication Interface.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2005

2004
Termination of simply moded logic programs with dynamic scheduling.
ACM Trans. Comput. Log., 2004

A Trace Logic for Local Security Properties
CoRR, 2004

License Protection with a Tamper-Resistant Token.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Declarative Semantics of Input Consuming Logic Programs.
Proceedings of the Program Development in Computational Logic: A Decade of Research Advances in Logic-Based Program Development, 2004

A Logic for Auditing Accountability in Decentralized Systems.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

Timed model checking of security protocols.
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004

Modelling Mobility Aspects of Security Policies.
Proceedings of the Construction and Analysis of Safe, 2004

2003
LicenseScript: a novel digital rights language and its semantics.
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003

Assessing Security in Energy-Efficient Sensor Networks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Comparing Logic-Based and XML-Based Rights Expression Languages.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

EYES - Energy Efficient Sensor Networks.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

Approximating Fair Use in LicenseScript.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003

2002
Properties of input-consuming derivations.
TPLP, 2002

On modular termination proofs of general logic programs.
TPLP, 2002

An Improved Constraint-Based System for the Verification of Security Protocols.
Proceedings of the Static Analysis, 9th International Symposium, 2002

Transformation Systems and Nondeclarative Properties.
Proceedings of the Computational Logic: Logic Programming and Beyond, 2002

2001
Transformations of CCP programs.
ACM Trans. Program. Lang. Syst., 2001

Transformations of CCP programs
CoRR, 2001

Properties of Input-Consuming Derivations
CoRR, 2001

Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling
CoRR, 2001

Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols.
Proceedings of the Logic Based Program Synthesis and Transformation, 2001

Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling.
Proceedings of the Programming Languages and Systems, 2001

2000
The (Lazy) Functional Side of Logic Programming
CoRR, 2000

On Modular Termination Proofs of General Logic Programs
CoRR, 2000

Semantics of well-moded input-consuming logic programs.
Comput. Lang., 2000

The lazy functional side of logic programming.
Proceedings of the Extended Abstracts of the 10th International Workshop on Logic-based Program Synthesis and Transformation, 2000

Semantics of Input-Consuming Logic Programs.
Proceedings of the Computational Logic, 2000

1999
Preface - Workshop on Verification of Logic Programs.
Electr. Notes Theor. Comput. Sci., 1999

Properties of Input-Consuming Derivations.
Electr. Notes Theor. Comput. Sci., 1999

Declarative solutions to partitioned-grid problems.
Softw., Pract. Exper., 1999

Layered Modes.
J. Log. Program., 1999

Termination of Well-Moded Programs.
J. Log. Program., 1999

Transformation of Left Terminating Programs.
Proceedings of the Logic Programming Synthesis and Transformation, 1999

The Replacement Operation for CCP Programs.
Proceedings of the Logic Programming Synthesis and Transformation, 1999

Logic Programming with Requests.
Proceedings of the Logic Programming: The 1999 International Conference, Las Cruces, New Mexico, USA, November 29, 1999

1998
A Semantics for Modular General Logic Programs.
Theor. Comput. Sci., 1998

Partial Evaluation of Concurrent Constraint Languages.
ACM Comput. Surv., 1998

Beyond Success and Failure.
Proceedings of the 1998 Joint International Conference and Symposium on Logic Programming, 1998

Unfold/Fold Transformations of CCP Programs.
Proceedings of the CONCUR '98: Concurrency Theory, 1998

1997
A Transformation System for CLP with Dynamic Scheduling and CCP.
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '97), 1997

1996
Transformations of CLP Modules.
Theor. Comput. Sci., 1996

Simultaneous Replacement in Normal Programs.
J. Log. Comput., 1996

Unification-free Prolog programs revisited.
J. Prog. Lang., 1996

On the Correctness of the Replacement Operation for CLP Modules.
Journal of Functional and Logic Programming, 1996

A Compositional Semantics for Normal Open Programs.
Proceedings of the Logic Programming, 1996

Layered Modes.
Proceedings of the 1996 Joint Conf. on Declarative Programming, 1996

1995
The Replacement Operation for CLP Modules.
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, 1995

Transformation of Left Terminating Programs: the Reordering Problem.
Proceedings of the Logic Programming Synthesis and Transformation, 1995

A Transformation System for Modular CLP Programs.
Proceedings of the Logic Programming, 1995

1994
Transforming Acyclic Programs.
ACM Trans. Program. Lang. Syst., 1994

More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting's Semantics.
Proceedings of the Logic Programming Synthesis and Transformation, 1994

Modular Transformations of CLP Programs.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994

1993
On the Unification Free Prolog Programs.
Proceedings of the Mathematical Foundations of Computer Science 1993, 1993

1992
On Safe Folding.
Proceedings of the Programming Language Implementation and Logic Programming, 1992

Transforming Normal Programs by Replacement.
Proceedings of the Meta-Programming in Logic, 3rd International Workshop, 1992


  Loading...