You are here

Publications

  1. F. Alberti; R. Bruttomesso; S. Ghilardi; S. Ranise; N. Sharygina,
    SAFARI: SMT-Based Abstraction for Arrays with Interpolants,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    n. 7358,
    2012
    , (Computer Aided Verification - 24th International Conference, CAV 2012,
    Berkeley, CA, USA,
    07/07/2012 a 07/13/2012)
  2. S. Ranise; A. Armando,
    On the Automated Analysis of Safety in Usage Control: A New Decidability Result,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    n. 7645,
    2012
    , (6th International Conference on Network and System Security, NSS'2012,
    Wu Yi Shan, Fujian, China,
    11/21/2012 a 11/23/2012)
  3. M. Barletta; S. Ranise; L. Vigano,
    Automated Analysis of Scenario-based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities,
    2012
    , (Security and Trust Management-STM'2012,
    Pisa, Italy,
    09/13/2012 a 09/14/2012)
  4. A. Armando; W. Arsac; T. Avanesov; M. Barletta; A. Calvi; A. Cappai; R. Carbone; Y. Chevalier; L. Compagna; J. Cuéllar; G. Erzse; S. Frau; M. Minea; S. Mödersheim; D. von Oheimb; G. Pellegrino; S. E. Ponta; M. Rocchetto; M. Rusinowitch; M. Torabi Dashti; M. Turuani; L. Viganò,
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS,
    Springer,
    vol.7214,
    2012
    , pp. 267-
    282
    , (TACAS 2012,
    Talling, Estonia,
    da 03/24/2012 a 04/01/2012)
  5. A. Armando; G. Costa; A. Merlo,
    Formal Modeling and Verification of the Android Security Framework,
    2012
    , (7th International Symposium on Trustworthy Global Computing (TGC 2012),
    Newcastle upon Tyne, UK,
    09/07/2012 a 09/08/2012)
  6. A. Armando; A. Contento; D. Costa; M. Maratea,
    Minimum Disclosure as Boolean Optimization: New Results,
    2012
    , (19th RCRA International Workshop on "Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion" (RCRA 2012),
    Rome, Italy,
    06/14/2012 a 06/16/2012)
  7. A. Armando; A. Merlo; M. Migliardi; L. Verderame,
    Would You Mind Forking This Process? A Denial of Service attack on Android (and Some Countermeasures),
    2012
    , (27th IFIP International Information Security and Privacy Conference (SEC 2012),
    Heraklion, Crete, Greece,
    06/04/2012 a 06/06/2012)
  8. A. Armando; R. Carbone; A. Merlo,
    Formal Analysis of a Privacy-Preserving Billing Protocol,
    2012
    , (1st EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec 2012),
    Berlin, Germnay,
    12/03/2012 a 12/03/2012)
  9. Delzanno G.; Sangnier A.; Traverso R.; Zavattaro G.,
    On the Complexity of Parameterized Reachability in Reconfigurable Broadcast Networks,
    IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2012),
    Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik,
    vol.18,
    2012
    , pp. 289-
    300
    2012)
  10. Delzanno G.; Traverso R.,
    A Formal Model of Asynchronous Broadcast Communication,
    Italian Conference on Theoretical Computer Science,
    2012
    2012)

Pages