ARMANDO, ALESSANDRO
 Distribuzione geografica
Continente #
EU - Europa 13.550
Totale 13.550
Nazione #
IT - Italia 13.550
Totale 13.550
Città #
Genova 10.763
Rapallo 1.308
Genoa 1.074
Vado Ligure 373
Bordighera 32
Totale 13.550
Nome #
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols 160
Formal modeling and automatic enforcement of Bring Your Own Device policies 155
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) 147
Automatic security verification of mobile app configurations 144
The Control Layer in Open Mechanized Reasoning Systems: Annotations and Tactics 141
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs 139
MRG: Building Planners for Real World Complex Applications 136
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-Based Approach 136
An Empirical Evaluation of the Android Security Framework 133
Rewrite and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation 131
SATMC: a SAT-based Model Checker for Security Protocols 125
Android vs. SEAndroid: An empirical assessment 125
Risk-based privacy-aware access control for threat detection systems 125
SAT-based Model-Checking of Security Protocols using Planning Graph Analysis 123
Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications 123
Automatic Synthesis of Recursive Programs: the Proof-Planning Paradigm 122
NALIG: A CAD system for interior design with high level interaction capabilities 122
Counterexample-guided abstraction refinement for linear programs with arrays 122
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning 121
Automated Analysis of Infinite State Workflows with Access Control Policies 121
SAT-based Model Checking for Security Protocols Analysis 120
The Phase Transition of the Linear Inequalities Problem 120
SAT-Based Decision Procedures for Automated Reasoning: a Unifying Perspective 120
A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints 120
Structured proof procedures 119
Developing a NATO BYOD security policy 119
Trustworthy Opportunistic Access to the Internet of Services 119
TSAT++: an Open Platform for Satisfiability Modulo Theories 119
Trusted host-based card emulation 119
Efficient Symbolic Automated Analysis of Administrative Attribute-based RBAC-Policies 119
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap 117
Formal Modeling and Reasoning about the Android Security Framework 117
From Propositional Deciders to First Order Deciders: a Structured Approach to the Decision Problem 116
Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries 116
LTL Model Checking for Security Protocols 115
Embedding complex decision procedures inside an interactive theorem prover 114
Incorporating Decision Procedures in Implicit Induction 114
The SAT-based Approach to Separation Logic 113
An Authentication Flaw in Browser-based Single Sign-On Protocols: Impact and Remediations 112
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 112
Uniform Derivation of Decision Procedures by Superposition 111
Building SMT-based Software Model Checkers: an Experience Report 111
Android Permissions Unleashed 111
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols 109
SMT-based enforcement and analysis of NATO content-based protection and release policies 109
Security considerations related to the use of mobile devices in the operation of critical infrastructures 108
Attribute Based Access Control for APIs in Spring Security 108
Model Checking of Security-sensitive Business Processes 107
Enabling BYOD through secure meta-market 107
Model checking authorization requirements in business processes 107
On a rewriting approach to satisfiability procedures: extension, combination of theories and an experimental appraisal 106
SAT-Based Procedures for Temporal Reasoning 106
System Description: RDL Rewrite and Decision procedure Laboratory 106
Model Checking Linear Programs with Arrays 106
The Rewriting Approach to Satisfiability Procedures 105
Automatic Synthesis of Recursive Programs: The Proof-Planning Paradigm 105
Computer aided modelling and simulation of complex mechanical systems 105
Navigation by combining reactivity and planning 104
Breaking and fixing the Android Launching Flow 104
Visual Representation of Natural Language Scene Descriptions 104
Abstraction refinement of Linear Programs with Arrays 102
The AVISS Security Protocol Analysis Tool 101
From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure? 101
Special Issue of the Journal of Symbolic Computation onCalculemus-99: Integrating Computation and Deduction - Foreword of the Guest Editors 100
Flexible planning by integrating multilevel reasoning 99
Bounded Model Checking of Software using SMT Solvers instead of SAT Solvers 99
The Eureka Tool for Software Model Checking 99
Building and executing proof strategies in a formal metatheory 98
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving 98
Software Model Checking using Linear Constraints 98
Proving formulas through reduction to decidable classes 97
Selective Release of Smart Metering Data in Multi-domain Smart Grids 97
Towards provably correct system synthesis and extension 97
LTL Model Checking for Security Protocols 96
SATMC: a SAT-based Model Checker for Security-critical Systems 96
Bring your own device, securely 96
Constraint Contextual Rewriting 95
Formal Analysis of a Privacy-Preserving Billing Protocol 95
Abstraction-driven SAT-based Analysis of Security Protocols 95
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations 94
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications 94
Preface to the Special Issue of the Journal of Automated Reasoning on "Automated Reasoning for Security Protocol Analysis" 93
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security 93
Securing the ``Bring Your Own Device'' Paradigm 92
Mobile App Security Analysis with the MAVeriC Static Analysis Module 92
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures 92
Mobile app security assessment with the maveric dynamic analysis module 92
ASASP: Automated Symbolic Analysis of Security Policies 91
Termination of Constraint Contextual Rewriting 90
Automatic Compilation of Protocol Insecurity Problems into Logic Programming 90
Automatic Security Analysis of SAML-Based Single Sign-On Protocols 89
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 89
Content- based information protection and release in NATO operations 88
Attacking (and Defending) the Maritime Radar System 87
Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps 87
Bounded Model Checking of Software Using SMT Solvers Instead of SAT Solvers 87
The Control Component of Open Mechanized Reasoning Systems 87
New results on rewrite-based satisfiability procedures 86
Cooperative Access Control for the Grid 85
A Reconstruction and Extension of Maple's Assume Facility via Constraint Contextual Rewriting. 85
Totale 10.872
Categoria #
all - tutte 40.597
article - articoli 14.820
book - libri 0
conference - conferenze 21.193
curatela - curatele 716
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 3.868
Totale 81.194


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20203.472 0 0 0 263 358 407 555 268 351 641 459 170
2020/20211.127 92 88 133 78 49 104 67 98 97 140 89 92
2021/20221.760 34 169 202 191 62 91 140 414 56 118 113 170
2022/20231.590 158 62 19 122 274 325 15 130 295 13 134 43
2023/2024812 48 133 30 107 60 145 43 54 36 19 34 103
2024/2025401 60 215 68 58 0 0 0 0 0 0 0 0
Totale 13.643