Alessandro Armando
Cited by
Cited by
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
A Armando, R Carbone, L Compagna, J Cuellar, L Tobarra
Proceedings of the 6th ACM workshop on Formal methods in security …, 2008
A rewriting approach to satisfiability procedures
A Armando, S Ranise, M Rusinowitch
Information and Computation 183 (2), 140-164, 2003
Bounded model checking of software using SMT solvers instead of SAT solvers
A Armando, J Mantovani, L Platania
International Journal on Software Tools for Technology Transfer 11 (1), 69-83, 2009
SAT-based procedures for temporal reasoning
A Armando, C Castellini, E Giunchiglia
European Conference on Planning, 97-108, 1999
SAT-based model-checking for security protocols analysis
A Armando, L Compagna
International Journal of Information Security 7 (1), 3-32, 2008
SATMC: a SAT-based model checker for security protocols
A Armando, L Compagna
European workshop on logics in artificial intelligence, 730-733, 2004
Bounded model checking of software using SMT solvers instead of SAT solvers
A Armando, J Mantovani, L Platania
International SPIN Workshop on Model Checking of Software, 146-162, 2006
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
New results on rewrite-based satisfiability procedures
A Armando, MP Bonacina, S Ranise, S Schulz
ACM Transactions on Computational Logic (TOCL) 10 (1), 1-51, 2009
LTL model checking for security protocols
A Armando, R Carbone, L Compagna
Journal of Applied Non-Classical Logics 19 (4), 403-429, 2009
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
International Conference on Computer Aided Verification, 349-354, 2002
Explaining vulnerabilities of deep learning to adversarial malware binaries
L Demetrio, B Biggio, G Lagorio, F Roli, A Armando
arXiv preprint arXiv:1901.03583, 2019
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti
Computers & Security 33, 41-58, 2013
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th annual acm symposium on applied computing, 1852-1858, 2013
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
A Armando, A Merlo, M Migliardi, L Verderame
IFIP International Information Security Conference, 13-24, 2012
A SAT-based decision procedure for the boolean combination of difference constraints
A Armando, C Castellini, E Giunchiglia, M Maratea
International Conference on Theory and Applications of Satisfiability …, 2004
Embedding complex decision procedures inside an interactive theorem prover
A Armando, E Giunchiglia
Annals of Mathematics and Artificial Intelligence 8 (3), 475-502, 1993
Model checking of security-sensitive business processes
A Armando, SE Ponta
International Workshop on Formal Aspects in Security and Trust, 66-80, 2009
An optimized intruder model for SAT-based model-checking of security protocols
A Armando, L Compagna
Electronic Notes in Theoretical Computer Science 125 (1), 91-108, 2005
The system can't perform the operation now. Try again later.
Articles 1–20