Follow
Luca Compagna
Luca Compagna
SAP Security Research
Verified email at sap.com - Homepage
Title
Cited by
Cited by
Year
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
16372005
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
A Armando, R Carbone, L Compagna, J Cuellar, L Tobarra
Proceedings of the 6th ACM workshop on Formal methods in security …, 2008
4042008
A high level protocol specification language for industrial security-sensitive protocols
Y Chevalier, L Compagna, J Cuellar, PH Drielsma, J Mantovani, ...
Workshop on Specification and Automated Processing of Security Requirements …, 2004
2172004
SATMC: a SAT-based model checker for security protocols
A Armando, L Compagna
Logics in Artificial Intelligence: 9th European Conference, JELIA 2004 …, 2004
1652004
SAT-based model-checking for security protocols analysis
A Armando, L Compagna
International Journal of Information Security 7, 3-32, 2008
1582008
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1442012
LTL model checking for security protocols
A Armando, R Carbone, L Compagna
Journal of Applied Non-Classical Logics 19 (4), 403-429, 2009
1332009
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002
1062002
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti
Computers & Security 33, 41-58, 2013
1002013
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
L Compagna, P El Khoury, A Krausová, F Massacci, N Zannone
Artificial Intelligence and Law 17, 1-30, 2009
732009
Large-scale analysis & detection of authentication cross-site request forgeries
A Sudhodanan, R Carbone, L Compagna, N Dolgin, A Armando, ...
2017 IEEE European symposium on security and privacy (EuroS&P), 350-365, 2017
642017
Security validation of business processes via model-checking
W Arsac, L Compagna, G Pellegrino, SE Ponta
International Symposium on Engineering Secure Software and Systems, 29-42, 2011
622011
An optimized intruder model for SAT-based model-checking of security protocols
A Armando, L Compagna
Electronic Notes in Theoretical Computer Science 125 (1), 91-108, 2005
592005
Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications.
A Sudhodanan, A Armando, R Carbone, L Compagna
NDSS, 2016
552016
SATMC: a SAT-based Model Checker for Security-critical Systems
A Armando, R Carbone, L Compagna
Tools and Algorithms for the Construction and Analysis of Systems: 20th …, 2014
542014
SAT-based model-checking of security protocols using planning graph analysis
A Armando, L Compagna, P Ganty
FME 2003: Formal Methods: International Symposium of Formal Methods Europe …, 2003
512003
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
L Compagna, PE Khoury, F Massacci, R Thomas, N Zannone
Proceedings of the 11th international conference on Artificial intelligence …, 2007
492007
Automatic SAT-compilation of protocol insecurity problems via reduction to planning
A Armando, L Compagna
Formal Techniques for Networked and Distributed Sytems—FORTE 2002: 22nd …, 2002
462002
From multiple credentials to browser-based single sign-on: Are we more secure?
A Armando, R Carbone, L Compagna, J Cuellar, G Pellegrino, A Sorniotti
IFIP International Information Security Conference, 68-79, 2011
452011
Model-checking driven security testing of web-based applications
A Armando, R Carbone, L Compagna, K Li, G Pellegrino
2010 Third International Conference on Software Testing, Verification, and …, 2010
422010
The system can't perform the operation now. Try again later.
Articles 1–20