Giancarlo Pellegrino
Giancarlo Pellegrino
CISPA Helmholtz Center for Information Security
Email verificata su cispa.saarland - Home page
TitoloCitata daAnno
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
1072012
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti
Computers & Security 33, 41-58, 2013
692013
Toward Black-Box Detection of Logic Flaws in Web Applications
G Pellegrino, D Balzarotti
NDSS Symposium 2014, 2014
502014
Security validation of business processes via model-checking
W Arsac, L Compagna, G Pellegrino, SE Ponta
International Symposium on Engineering Secure Software and Systems, 29-42, 2011
462011
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification
B Stock, G Pellegrino, C Rossow, M Johns, M Backes
25th USENIX Security Symposium, USENIX Security 16, 1015--1032, 2016
402016
Model-checking driven security testing of web-based applications
A Armando, R Carbone, L Compagna, K Li, G Pellegrino
2010 Third International Conference on Software Testing, Verification, and …, 2010
352010
From multiple credentials to browser-based single sign-on: Are we more secure?
A Armando, R Carbone, L Compagna, J Cuellar, G Pellegrino, A Sorniotti
IFIP International Information Security Conference, 68-79, 2011
332011
From model-checking to automated testing of security protocols: Bridging the gap
A Armando, G Pellegrino, R Carbone, A Merlo, D Balzarotti
International Conference on Tests and Proofs, 3-18, 2012
292012
Cashing out the Great Cannon? On Browser-Based DDoS Attacks and Economics
G Pellegrino, C Rossow, FJ Ryba, TC Schmidt, M Wählisch
WOOT '15, 9th USENIX Workshop on Offensive Technologies, 2015
182015
Didn’t you hear me?—towards more successful web vulnerability notifications
B Stock, G Pellegrino, F Li, M Backes, C Rossow
172018
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
G Pellegrino, C Tschürtz, E Bodden, C Rossow
The 18th International Symposium on Research in Attacks, Intrusions and Defenses, 2015
142015
Sentinet: Detecting physical attacks against deep learning systems
E Chou, F Tramèr, G Pellegrino, D Boneh
arXiv preprint arXiv:1812.00292, 2018
132018
Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals
M Simeonovski, G Pellegrino, C Rossow, M Backes
Proceedings of the 26th International World Wide Web Conference, 2017 (WWW 2017), 2017
122017
Deemon: Detecting CSRF with dynamic analysis and property graphs
G Pellegrino, M Johns, S Koch, M Backes, C Rossow
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
112017
The rise of the citizen developer: Assessing the security impact of online app generators
M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ...
2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018
92018
In the Compression Hornet’s Nest: A Security Study of Data Compression in Network Services
G Pellegrino, D Balzarotti, S Winter, N Suri
24th USENIX Security Symposium (USENIX Security 15), 2015
72015
Uses and Abuses of Server-Side Requests
G Pellegrino, O Catakoglu, D Balzarotti, C Rossow
Research in Attacks, Intrusions and Defenses, 2016
52016
Automatic security analysis of SAML-based single sign-on protocols
A Armando, R Carbone, L Compagna, G Pellegrino
Digital Identity and Access Management: Technologies and Frameworks, 168-187, 2012
52012
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments
T Vateva-Gurova, J Luna, G Pellegrino, N Suri
SECRYPT 2014, 2014
42014
Fidelius: Protecting User Secrets from Compromised Browsers
S Eskandarian, J Cogan, S Birnbaum, PCW Brandon, D Franke, F Fraser, ...
2019 IEEE Symposium on Security and Privacy (SP), 611-627, 2019
32019
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20