Alessandro Armando
Alessandro Armando
University of Genova and Fondazione Bruno Kessler
Verified email at - Homepage
TitleCited byYear
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
A Armando, R Carbone, L Compagna, J Cuellar, L Tobarra
Proceedings of the 6th ACM workshop on Formal methods in security …, 2008
A rewriting approach to satisfiability procedures
A Armando, S Ranise, M Rusinowitch
Information and Computation 183 (2), 140-164, 2003
Bounded model checking of software using SMT solvers instead of SAT solvers
A Armando, J Mantovani, L Platania
International Journal on Software Tools for Technology Transfer 11 (1), 69-83, 2009
SAT-based procedures for temporal reasoning
A Armando, C Castellini, E Giunchiglia
European Conference on Planning, 97-108, 1999
SAT-based model-checking for security protocols analysis
A Armando, L Compagna
International Journal of Information Security 7 (1), 3-32, 2008
Bounded model checking of software using SMT solvers instead of SAT solvers
A Armando, J Mantovani, L Platania
International SPIN Workshop on Model Checking of Software, 146-162, 2006
LTL model checking for security protocols
A Armando, R Carbone, L Compagna
Journal of Applied Non-Classical Logics 19 (4), 403-429, 2009
New results on rewrite-based satisfiability procedures
A Armando, MP Bonacina, S Ranise, S Schulz
ACM Transactions on Computational Logic (TOCL) 10 (1), 4, 2009
SATMC: a SAT-based model checker for security protocols
A Armando, L Compagna
European workshop on logics in artificial intelligence, 730-733, 2004
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
International Conference on Computer Aided Verification, 349-354, 2002
Embedding complex decision procedures inside an interactive theorem prover
A Armando, E Giunchiglia
Annals of Mathematics and Artificial Intelligence 8 (3-4), 475-502, 1993
A SAT-based decision procedure for the boolean combination of difference constraints
A Armando, C Castellini, E Giunchiglia, M Maratea
International Conference on Theory and Applications of Satisfiability …, 2004
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti
Computers & Security 33, 41-58, 2013
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th annual acm symposium on applied computing, 1852-1858, 2013
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
A Armando, A Merlo, M Migliardi, L Verderame
IFIP International Information Security Conference, 13-24, 2012
Model checking of security-sensitive business processes
A Armando, SE Ponta
International Workshop on Formal Aspects in Security and Trust, 66-80, 2009
SAT-based model-checking of security protocols using planning graph analysis
A Armando, L Compagna, P Ganty
International Symposium of Formal Methods Europe, 875-893, 2003
On a rewriting approach to satisfiability procedures: extension, combination of theories and an experimental appraisal
A Armando, MP Bonacina, S Ranise, S Schulz
International Workshop on Frontiers of Combining Systems, 65-80, 2005
The system can't perform the operation now. Try again later.
Articles 1–20