Giancarlo Pellegrino
Giancarlo Pellegrino
Stanford University and CISPA Helmholtz Center for Information Security
Verified email at - Homepage
TitleCited byYear
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti
Computers & Security 33, 41-58, 2013
Toward Black-Box Detection of Logic Flaws in Web Applications
G Pellegrino, D Balzarotti
NDSS Symposium 2014, 2014
Security validation of business processes via model-checking
W Arsac, L Compagna, G Pellegrino, SE Ponta
International Symposium on Engineering Secure Software and Systems, 29-42, 2011
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification
B Stock, G Pellegrino, C Rossow, M Johns, M Backes
25th USENIX Security Symposium, USENIX Security 16, 1015--1032, 2016
From multiple credentials to browser-based single sign-on: Are we more secure?
A Armando, R Carbone, L Compagna, J Cuellar, G Pellegrino, A Sorniotti
IFIP International Information Security Conference, 68-79, 2011
Model-checking driven security testing of web-based applications
A Armando, R Carbone, L Compagna, K Li, G Pellegrino
2010 Third International Conference on Software Testing, Verification, and …, 2010
From model-checking to automated testing of security protocols: Bridging the gap
A Armando, G Pellegrino, R Carbone, A Merlo, D Balzarotti
International Conference on Tests and Proofs, 3-18, 2012
Cashing out the Great Cannon? On Browser-Based DDoS Attacks and Economics
G Pellegrino, C Rossow, FJ Ryba, TC Schmidt, M Wählisch
WOOT '15, 9th USENIX Workshop on Offensive Technologies, 2015
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
G Pellegrino, C Tschürtz, E Bodden, C Rossow
The 18th International Symposium on Research in Attacks, Intrusions and Defenses, 2015
Didn’t you hear me?—towards more successful web vulnerability notifications
B Stock, G Pellegrino, F Li, M Backes, C Rossow
Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals
M Simeonovski, G Pellegrino, C Rossow, M Backes
Proceedings of the 26th International World Wide Web Conference, 2017 (WWW 2017), 2017
Sentinet: Detecting physical attacks against deep learning systems
E Chou, F Tramèr, G Pellegrino, D Boneh
arXiv preprint arXiv:1812.00292, 2018
Deemon: Detecting CSRF with dynamic analysis and property graphs
G Pellegrino, M Johns, S Koch, M Backes, C Rossow
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
In the Compression Hornet’s Nest: A Security Study of Data Compression in Network Services
G Pellegrino, D Balzarotti, S Winter, N Suri
24th USENIX Security Symposium (USENIX Security 15), 2015
Automatic security analysis of SAML-based single sign-on protocols
A Armando, R Carbone, L Compagna, G Pellegrino
Digital Identity and Access Management: Technologies and Frameworks, 168-187, 2012
Uses and Abuses of Server-Side Requests
G Pellegrino, O Catakoglu, D Balzarotti, C Rossow
Research in Attacks, Intrusions and Defenses, 2016
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments
T Vateva-Gurova, J Luna, G Pellegrino, N Suri
SECRYPT 2014, 2014
The rise of the citizen developer: Assessing the security impact of online app generators
M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ...
2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
Q Zhao, C Zuo, G Pellegrino, L Zhiqiang
Annual Network and Distributed System Security symposium, February 2019 …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20