Follow
Marco Rocchetto
Marco Rocchetto
V-Research
Verified email at v-research.it - Homepage
Title
Cited by
Cited by
Year
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction andá…, 2012
1292012
On attacker models and profiles for cyber-physical systems
M Rocchetto, NO Tippenhauer
European Symposium on Research in Computer Security, 427-449, 2016
822016
CPDY: extending the Dolev-Yao attacker with physical-layer interactions
M Rocchetto, NO Tippenhauer
International Conference on Formal Engineering Methods, 175-192, 2016
462016
Towards formal security analysis of industrial control systems
M Rocchetto, NO Tippenhauer
Proceedings of the 2017 ACM on ASIA conference on computer andá…, 2017
372017
Model-based detection of CSRF
M Rocchetto, M Ochoa, M Torabi Dashti
IFIP International Information Security Conference, 30-43, 2014
192014
Challenges and opportunities for model-based security risk assessment of cyber-physical systems
M Rocchetto, A Ferrari, V Senni
Resilience of Cyber-Physical Systems, 25-47, 2019
92019
Formal analysis of vulnerabilities of web applications based on SQL injection
FD Meo, M Rocchetto, L Vigan˛
International Workshop on Security and Trust Management, 179-195, 2016
62016
A topological categorization of agents for the definition of attack states in multi-agent systems
K SantacÓ, M Cristani, M Rocchetto, L Vigan˛
Multi-Agent Systems and Agreement Technologies, 261-276, 2016
52016
An interpolation-based method for the verification of security protocols
M Rocchetto, L Vigan˛, M Volpe
Journal of Computer Security 25 (6), 463-510, 2017
42017
An interpolation-based method for the verification of security protocols
M Rocchetto, L Vigan˛, M Volpe
Journal of Computer Security 25 (6), 463-510, 2017
42017
Formal analysis of vulnerabilities of web applications based on SQL injection (extended version)
F De Meo, M Rocchetto, L Vigan˛
arXiv preprint arXiv:1605.00358, 2016
22016
Using interpolation for the verification of security protocols
M Rocchetto, L Vigano, M Volpe, GD Vedove
International Workshop on Security and Trust Management, 99-114, 2013
22013
Safety system based on hoistway access detection
G Gentile, D Martintoni, E Manes, L Manica, M Rocchetto, V Senni
US Patent App. 16/711,573, 2020
12020
The Etiology of Cybersecurity
M Ambrosi, F Beltramini, F De Meo, O Nardi, M Pacchin, M Rocchetto
International Conference on Applied Cryptography and Network Security, 299-319, 2022
2022
Elevator car communication system
L Manica, T Rizano, M Rocchetto, D Martintoni, E Manes
US Patent App. 16/752,152, 2021
2021
The Etiology of Cybersecurity
F Beltramini, F De Meo, O Nardi, M Pacchin, M Rocchetto
https://www.researchgate.net/publication/354765715_The_Etiology_of_Cybersecurity, 2021
2021
Smart beamforming for reliable and secure wireless data transmissions
L Manica, E Manes, V Senni, M Rocchetto, D Martintoni, G Gentile, ...
US Patent App. 16/711,624, 2020
2020
Methods and tools for design time and runtime formal analysis of security protocols and web applications
M Rocchetto
University of Verona, 2011
2011
Verifica Automatica e Formale di Protocolli di Sicurezza descritti attraverso Modelli UML
A Busatto, M Rocchetto
Challenges and Opportunities for Model-Based Security Risk Assessment of Cyber-Physical Systems
A Ferrari, M Rocchetto, V Senni
The system can't perform the operation now. Try again later.
Articles 1–20