You are here

Silvio Ranise

Head of Unit
  • Phone: 0461314192
  • FBK Povo
Short bio

Silvio Ranise received his Ms. Eng. in 1997 at the University of Genova (Italy) and his PhD in Computer Engineering from the University of Genova (Italy) and the University H. Poincare ́ (Nancy, France) in 2002 in the context of a joint PhD program between Italy and France. He works at FBK in the S&T Research Unit as Senior Researcher since April 2010. His previous appointments are: assistant professor at the U. H. Poincare ́ in 2001-2002, INRIA researcher at the LORIA computer science laboratory of Nancy in 2002-2008, research associate at the University of Verona (in the context of the EU Project AVANTSSAR) in 2008-2010, visiting professor at the Department of Computer Science of the University of Milano. His research focuses on formal methods for the automatic analysis of security-sensitive applications and he has published more than 65 papers in international conferences and journals on automated analysis of security policies, infinite state model checking, and Satisfiability Modulo Theories (SMT) solving. He has been initiator and co-ordinator of the SMT-Lib initiative, and started the SMT workshop series on SMT techniques. He has also given tutorials on SMT and infinite state model checking techniques at international conferences. In 2010, he received the HVC award for his “pivotal and continuous role in building and promoting the SMT community.” 

  1. Armando, Alessandro; Ranise, Silvio; Traverso, Riccardo; Wrona, Konrad,
    Communications and Network Security (CNS), 2015 IEEE Conference on,
    , pp. 741-
    , (IEEE Conference on Communications and Network Security (CNS) 2015,
    Florence, Italy,
    September 28-30, 2015)
  2. dos Santos, Daniel R.; Ranise, Silvio; Compagna, Luca; Ponta, Serena E.,
    Data and Applications Security and Privacy XXIX,
    Springer International Publishing,
    , pp. 85-
    , (29th Annual IFIP WG 11.3 Working Conference, DBSec 2015,
    Fairfax, VA, USA,
    July 13-15, 2015)
  3. Turkmen, Fatih; den Hartog, Jerry; Ranise, Silvio; Zannone, Nicola,
    Principles of Security and Trust,
    Springer Berlin Heidelberg,
    , pp. 115-
    , (4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015,
    London, UK,
    April 11-18, 2015)
  4. Ranise, Silvio; Truong, Anh; Viganò, Luca,
    Proceedings of the 30th Annual {ACM} Symposium on Applied Computing,
    New York, NY, USA,
    ACM New York, NY, USA ©2015,
    , pp. 2177-
    , (30th Annual {ACM} Symposium on Applied Computing 2015,
    Salamanca, Spain,
    April 13-17, 2015)
  5. Ranise, Silvio; Bertolissi, Clara; Uttha, Worachet,
    SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography,
    , pp. 293-
    , (12th International Conference on Security and Cryptography (SECRYPT 2015),
    Colmar, France,
    20-22 July 2015)
  6. De Masellis, Riccardo; Ghidini, Chiara; Ranise, Silvio,
    Security and Trust Management, 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings,
    Springer International Publishing,
    , pp. 55-
    , (1th International Workshop on Security and Trust Management (STM),
    Vienna, Austria,
    September 21-22, 2015)
  7. Lutz, Carsten; Ranise, Silvio (eds.),
    Springer International Publishing,
  8. Daniel, Ricardo dos Santos; Silvio, Ranise; Serena, Elisa Ponta,
    An established trend in software engineering insists on using components
    (sometimes also called services or packages) to encapsulate a set of related
    functionalities or data. By defining interfaces specifying what functionalities
    they provide or use, components can be combined with others to form more
    complex components. In this way, IT systems can be designed by mostly re-using
    existing components and developing new ones to provide new functionalities. In
    this paper, we introduce a notion of component and a combination mechanism for
    an important class of software artifacts, called security-sensitive workflows.
    These are business processes in which execution constraints on the tasks are
    complemented with authorization constraints (e.g., Separation of Duty) and
    authorization policies (constraining which users can execute which tasks). We
    show how well-known workflow execution patterns can be simulated by our
    combination mechanism and how authorization constraints can also be imposed
    across components. Then, we demonstrate the usefulness of our notion of
    component by showing (i) the scalability of a technique for the synthesis of
    run-time monitors for security-sensitive workflows and (ii) the design of a
    plug-in for the re-use of workflows and related run-time monitors inside an
    editor for security-sensitive workflows.
  9. Bruttomesso R.; Ghilardi S.; Ranise S.,
    vol. 15,
    n. 1,
  10. Alberti F.; Bruttomesso R.; Ghilardi S.; Ranise S.; Sharygina N.,
    vol. 45,
    n. 1,
    , pp. 63 -