Follow
Alessandro Armando
Title
Cited by
Cited by
Year
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
16202005
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
A Armando, R Carbone, L Compagna, J Cuellar, L Tobarra
Proceedings of the 6th ACM workshop on Formal methods in security …, 2008
4032008
Bounded model checking of software using SMT solvers instead of SAT solvers
A Armando, J Mantovani, L Platania
International Journal on Software Tools for Technology Transfer 11, 69-83, 2009
2052009
A rewriting approach to satisfiability procedures
A Armando, S Ranise, M Rusinowitch
Information and Computation 183 (2), 140-164, 2003
1932003
SAT-based procedures for temporal reasoning
A Armando, C Castellini, E Giunchiglia
European Conference on Planning, 97-108, 1999
1731999
Explaining vulnerabilities of deep learning to adversarial malware binaries
L Demetrio, B Biggio, G Lagorio, F Roli, A Armando
arXiv preprint arXiv:1901.03583, 2019
1702019
SATMC: a SAT-based model checker for security protocols
A Armando, L Compagna
Logics in Artificial Intelligence: 9th European Conference, JELIA 2004 …, 2004
1632004
SAT-based model-checking for security protocols analysis
A Armando, L Compagna
International Journal of Information Security 7, 3-32, 2008
1572008
Functionality-preserving black-box optimization of adversarial windows malware
L Demetrio, B Biggio, G Lagorio, F Roli, A Armando
IEEE Transactions on Information Forensics and Security 16, 3469-3478, 2021
1512021
Bounded model checking of software using SMT solvers instead of SAT solvers
A Armando, J Mantovani, L Platania
Model Checking Software: 13th International SPIN Workshop, Vienna, Austria …, 2006
1462006
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1442012
Adversarial exemples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection
L Demetrio, SE Coull, B Biggio, G Lagorio, A Armando, F Roli
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-31, 2021
1392021
LTL model checking for security protocols
A Armando, R Carbone, L Compagna
Journal of Applied Non-Classical Logics 19 (4), 403-429, 2009
1332009
New results on rewrite-based satisfiability procedures
A Armando, MP Bonacina, S Ranise, S Schulz
ACM Transactions on Computational Logic (TOCL) 10 (1), 1-51, 2009
1262009
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002
1062002
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti
Computers & Security 33, 41-58, 2013
992013
Avispa: automated validation of internet security protocols and applications
A Armando, D Basin, J Cuellar, M Rusinowitch, L Viganò
ERCIM News 64 (January), 66-69, 2006
862006
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1852-1858, 2013
792013
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
A Armando, A Merlo, M Migliardi, L Verderame
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
772012
A SAT-based decision procedure for the boolean combination of difference constraints
A Armando, C Castellini, E Giunchiglia, M Maratea
International Conference on Theory and Applications of Satisfiability …, 2004
742004
The system can't perform the operation now. Try again later.
Articles 1–20