Alessandro Armando
Cited by
Cited by
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
A Armando, R Carbone, L Compagna, J Cuellar, L Tobarra
Proceedings of the 6th ACM workshop on Formal methods in security …, 2008
Bounded model checking of software using SMT solvers instead of SAT solvers
A Armando, J Mantovani, L Platania
International Journal on Software Tools for Technology Transfer 11, 69-83, 2009
A rewriting approach to satisfiability procedures
A Armando, S Ranise, M Rusinowitch
Information and Computation 183 (2), 140-164, 2003
SAT-based procedures for temporal reasoning
A Armando, C Castellini, E Giunchiglia
European Conference on Planning, 97-108, 1999
SAT-based model-checking for security protocols analysis
A Armando, L Compagna
International Journal of Information Security 7, 3-32, 2008
SATMC: a SAT-based model checker for security protocols
A Armando, L Compagna
Logics in Artificial Intelligence: 9th European Conference, JELIA 2004 …, 2004
Bounded model checking of software using SMT solvers instead of SAT solvers
A Armando, J Mantovani, L Platania
Model Checking Software: 13th International SPIN Workshop, Vienna, Austria …, 2006
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
Explaining vulnerabilities of deep learning to adversarial malware binaries
L Demetrio, B Biggio, G Lagorio, F Roli, A Armando
arXiv preprint arXiv:1901.03583, 2019
New results on rewrite-based satisfiability procedures
A Armando, MP Bonacina, S Ranise, S Schulz
ACM Transactions on Computational Logic (TOCL) 10 (1), 1-51, 2009
LTL model checking for security protocols
A Armando, R Carbone, L Compagna
Journal of Applied Non-Classical Logics 19 (4), 403-429, 2009
Functionality-preserving black-box optimization of adversarial windows malware
L Demetrio, B Biggio, G Lagorio, F Roli, A Armando
IEEE Transactions on Information Forensics and Security 16, 3469-3478, 2021
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002
Adversarial exemples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection
L Demetrio, SE Coull, B Biggio, G Lagorio, A Armando, F Roli
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-31, 2021
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti
Computers & Security 33, 41-58, 2013
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th annual acm symposium on applied computing, 1852-1858, 2013
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
A Armando, A Merlo, M Migliardi, L Verderame
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
A SAT-based decision procedure for the boolean combination of difference constraints
A Armando, C Castellini, E Giunchiglia, M Maratea
International Conference on Theory and Applications of Satisfiability …, 2004
Embedding complex decision procedures inside an interactive theorem prover
A Armando, E Giunchiglia
Annals of Mathematics and Artificial Intelligence 8, 475-502, 1993
The system can't perform the operation now. Try again later.
Articles 1–20