Follow
Alessandro Armando
Title
Cited by
Cited by
Year
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
14232005
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
A Armando, R Carbone, L Compagna, J Cuellar, L Tobarra
Proceedings of the 6th ACM workshop on Formal methods in security …, 2008
3712008
Bounded model checking of software using SMT solvers instead of SAT solvers
A Armando, J Mantovani, L Platania
International Journal on Software Tools for Technology Transfer 11, 69-83, 2009
1942009
A rewriting approach to satisfiability procedures
A Armando, S Ranise, M Rusinowitch
Information and Computation 183 (2), 140-164, 2003
1892003
SAT-based procedures for temporal reasoning
A Armando, C Castellini, E Giunchiglia
Recent Advances in AI Planning: 5th European Conference on Planning, ECP’99 …, 2000
1622000
SAT-based model-checking for security protocols analysis
A Armando, L Compagna
International Journal of Information Security 7, 3-32, 2008
1532008
SATMC: a SAT-based model checker for security protocols
A Armando, L Compagna
Logics in Artificial Intelligence: 9th European Conference, JELIA 2004 …, 2004
1472004
Bounded model checking of software using SMT solvers instead of SAT solvers
A Armando, J Mantovani, L Platania
SPIN 3925, 146-162, 2006
1402006
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1312012
New results on rewrite-based satisfiability procedures
A Armando, MP Bonacina, S Ranise, S Schulz
ACM Transactions on Computational Logic (TOCL) 10 (1), 1-51, 2009
1272009
LTL model checking for security protocols
A Armando, R Carbone, L Compagna
Journal of Applied Non-Classical Logics 19 (4), 403-429, 2009
1262009
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002
1042002
Explaining vulnerabilities of deep learning to adversarial malware binaries
L Demetrio, B Biggio, G Lagorio, F Roli, A Armando
arXiv preprint arXiv:1901.03583, 2019
1002019
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti
Computers & Security 33, 41-58, 2013
872013
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th annual acm symposium on applied computing, 1852-1858, 2013
752013
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
A Armando, A Merlo, M Migliardi, L Verderame
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
732012
A SAT-based decision procedure for the boolean combination of difference constraints
A Armando, C Castellini, E Giunchiglia, M Maratea
Theory and Applications of Satisfiability Testing: 7th International …, 2005
702005
Embedding complex decision procedures inside an interactive theorem prover
A Armando, E Giunchiglia
Annals of Mathematics and Artificial Intelligence 8, 475-502, 1993
661993
Model checking of security-sensitive business processes
A Armando, SE Ponta
Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009 …, 2010
632010
Functionality-preserving black-box optimization of adversarial windows malware
L Demetrio, B Biggio, G Lagorio, F Roli, A Armando
IEEE Transactions on Information Forensics and Security 16, 3469-3478, 2021
602021
The system can't perform the operation now. Try again later.
Articles 1–20