Adversities in abstract interpretation-accommodating robustness by abstract interpretation

R Giacobazzi, I Mastroeni, E Perantoni - ACM Transactions on …, 2024 - dl.acm.org
Robustness is a key and desirable property of any classifying system, in particular, to avoid
the ever-rising threat of adversarial attacks. Informally, a classification system is robust when …

A formally verified configuration for hardware security modules in the cloud

R Focardi, FL Luccio - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Hardware Security Modules (HSMs) are trusted machines that perform sensitive operations
in critical ecosystems. They are usually required by law in financial and government digital …

Types for security protocols

R Focardi, M Maffei - Formal Models and Techniques for …, 2011 - ebooks.iospress.nl
We revise existing type-based analyses of security protocols by devising a core type system
for secrecy, integrity and authentication in the setting of spi-calculus processes. These …

Guessing bank pins by winning a mastermind game

R Focardi, FL Luccio - Theory of Computing Systems, 2012 - Springer
In this paper we formally prove that the problem of cracking, ie, correctly guessing, bank
PINs used for accessing Automated Teller Machines and the problem of solving the …

Information leakage analysis by abstract interpretation

M Zanioli, A Cortesi - International Conference on Current Trends in …, 2011 - Springer
Protecting the confidentiality of information stored in a computer system or transmitted over a
public network is a relevant problem in computer security. The approach of information flow …

An introduction to security API analysis

R Focardi, FL Luccio, G Steel - … School on Foundations of Security Analysis …, 2011 - Springer
A security API is an Application Program Interface that allows untrusted code to access
sensitive resources in a secure way. Examples of security APIs include the interface …

Cracking bank pins by playing mastermind

R Focardi, FL Luccio - Fun with Algorithms: 5th International Conference …, 2010 - Springer
The bank director was pretty upset noticing Joe, the system administrator, spending his
spare time playing Mastermind, an old useless game of the 70ies. He had fought the instinct …

Type-based analysis of generic key management apis

P Adao, R Focardi, FL Luccio - 2013 IEEE 26th Computer …, 2013 - ieeexplore.ieee.org
In the past few years, cryptographic key management APIs have been shown to be subject
to tricky attacks based on the improper use of cryptographic keys. In fact, real APIs provide …

A weakest precondition approach to robustness

M Balliu, I Mastroeni - Transactions on Computational Science X: Special …, 2010 - Springer
With the increasing complexity of information management computer systems, security
becomes a real concern. E-government, web-based financial transactions or military and …

Type-based analysis of protected storage in the TPM

J Shao, D Feng, Y Qin - … 15th International Conference, ICICS 2013, Bei**g …, 2013 - Springer
Abstract The Trusted Platform Module (TPM) is designed to enable trustworthy computation
and communication over open networks. The TPM provides a way to store cryptographic …