The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ... Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012 | 144 | 2012 |
On attacker models and profiles for cyber-physical systems M Rocchetto, NO Tippenhauer Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 119 | 2016 |
CPDY: extending the Dolev-Yao attacker with physical-layer interactions M Rocchetto, NO Tippenhauer Formal Methods and Software Engineering: 18th International Conference on …, 2016 | 57 | 2016 |
Towards formal security analysis of industrial control systems M Rocchetto, NO Tippenhauer Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 48 | 2017 |
Model-based detection of CSRF M Rocchetto, M Ochoa, M Torabi Dashti ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014 | 21 | 2014 |
Challenges and opportunities for model-based security risk assessment of cyber-physical systems M Rocchetto, A Ferrari, V Senni Resilience of Cyber-Physical Systems: From Risk Modelling to Threat …, 2019 | 17 | 2019 |
A topological categorization of agents for the definition of attack states in multi-agent systems K Santacà, M Cristani, M Rocchetto, L Viganò Multi-Agent Systems and Agreement Technologies: 14th European Conference …, 2017 | 7 | 2017 |
Formal analysis of vulnerabilities of web applications based on SQL injection F De Meo, M Rocchetto, L Viganò Security and Trust Management: 12th International Workshop, STM 2016 …, 2016 | 7 | 2016 |
An interpolation-based method for the verification of security protocols M Rocchetto, L Viganò, M Volpe Journal of Computer Security 25 (6), 463-510, 2017 | 4 | 2017 |
Formal analysis of vulnerabilities of web applications based on SQL injection (extended version) F De Meo, M Rocchetto, L Viganò arXiv preprint arXiv:1605.00358, 2016 | 2 | 2016 |
Using interpolation for the verification of security protocols M Rocchetto, L Vigano, M Volpe, GD Vedove International Workshop on Security and Trust Management, 99-114, 2013 | 2 | 2013 |
Formal verification and risk assessment of an implementation of the OPC-UA Protocol E Guerra, M Ceccato, M Rocchetto | 1 | 2022 |
Safety system based on hoistway access detection G Gentile, D Martintoni, E Manes, L Manica, M Rocchetto, V Senni US Patent App. 16/711,573, 2020 | 1 | 2020 |
The Etiology of Cybersecurity M Ambrosi, F Beltramini, F De Meo, O Nardi, M Pacchin, M Rocchetto International Conference on Applied Cryptography and Network Security, 299-319, 2022 | | 2022 |
Elevator car communication system L Manica, T Rizano, M Rocchetto, D Martintoni, E Manes US Patent App. 16/752,152, 2021 | | 2021 |
The Etiology of Cybersecurity F Beltramini, F De Meo, O Nardi, M Pacchin, M Rocchetto https://www.researchgate.net/publication/354765715_The_Etiology_of_Cybersecurity, 2021 | | 2021 |
Smart beamforming for reliable and secure wireless data transmissions L Manica, E Manes, V Senni, M Rocchetto, D Martintoni, G Gentile, ... US Patent App. 16/711,624, 2020 | | 2020 |
Using Interpolation for the Verification of Security Protocols G Dalle Vedove, M Rocchetto, L Vigano, M Volpe FCS 2013 Workshop on Foundations of Computer Security (Informal Proceedings), 51, 2013 | | 2013 |
Methods and tools for design time and runtime formal analysis of security protocols and web applications M Rocchetto University of Verona, 2011 | | 2011 |
Verifica Automatica e Formale di Protocolli di Sicurezza descritti attraverso Modelli UML A Busatto, M Rocchetto | | |