Luca Viganò

ORCID: 0000-0001-9916-271X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Logic, Reasoning, and Knowledge
  • Access Control and Trust
  • Formal Methods in Verification
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Logic, programming, and type systems
  • Information and Cyber Security
  • Semantic Web and Ontologies
  • Cryptography and Data Security
  • Advanced Algebra and Logic
  • Business Process Modeling and Analysis
  • Network Security and Intrusion Detection
  • Web Application Security Vulnerabilities
  • Service-Oriented Architecture and Web Services
  • Cryptographic Implementations and Security
  • Distributed systems and fault tolerance
  • Advanced Database Systems and Queries
  • Internet Traffic Analysis and Secure E-voting
  • Constraint Satisfaction and Optimization
  • Modeling and Simulation Systems
  • Dynamics and Control of Mechanical Systems
  • Digital and Cyber Forensics
  • semigroups and automata theory

King's College London
2015-2024

University of Stuttgart
2020-2023

Max Planck Institute for Software Systems
2020-2023

Ca' Foscari University of Venice
2023

Institut national de recherche en informatique et en automatique
2023

University of Zagreb
2023

University of Rijeka
2023

Delft University of Technology
2022

Carnegie Mellon University
1996-2020

Boston University
2020

10.1007/s10207-004-0055-7 article EN International Journal of Information Security 2004-12-21

The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides modular expressive formal language specifying protocols their security properties, integrates different back-ends that implement variety automatic protocol analysis techniques. Experimental results, carried out on large library protocols, indicate state-of-the-art as, to our knowledge, no other exhibits same level scope robustness while enjoying performance scalability.

10.1016/j.entcs.2005.11.052 article EN Electronic Notes in Theoretical Computer Science 2006-05-01

Temporal role based access control models support the specification and enforcement of several temporal constraints on enabling, activation, hierarchies among others. In this paper, we define three mappings that preserve solutions to a class policy problems (they map security analysis in presence static without them) show how they can be used extend capabilities tool for administrative role-based policies reason hierarchies. An experimental evaluation with prototype implementation shows...

10.1145/2695664.2695787 article EN 2015-04-13

We apply formal methods to lay and streamline theoretical foundations reason about Cyber-Physical Systems (CPSs) cyber-physical attacks. focus on integrity DoS attacks sensors actuators of CPSs, the timing aspects these Our contributions are threefold: (1) we define a hybrid process calculus model both CPSs (2) threat provide means assess attack tolerance/vulnerability with respect given attack. (3) formalise how estimate impact successful CPS investigate possible quantifications success...

10.1109/csf.2017.12 article EN 2017-08-01

We apply formal methods to lay and streamline theoretical foundations reason about Cyber-Physical Systems (CPSs) physics-based attacks, i.e., attacks targeting physical devices. focus on a treatment of both integrity denial service sensors actuators CPSs, the timing aspects these attacks. Our contributions are fourfold. (1) define hybrid process calculus model CPSs (2) formalise threat that specifies MITM can manipulate sensor readings or control commands drive CPS into an undesired state;...

10.1145/3373270 article EN ACM Transactions on Privacy and Security 2020-02-05

In 2017, the Defense Advanced Research Projects Agency (DARPA) launched Explainable Artificial Intelligence (XAI) program that aims to create a suite of new AI techniques enable end users understand, appropriately trust, and effectively manage emerging generation systems. this paper, inspired by DARPA's XAI program, we propose paradigm in security research: Security (XSec). We discuss "Six Ws" XSec (Who? What? Where? When? Why? How?) argue has unique complex characteristics: involves several...

10.1109/eurospw51379.2020.00045 article EN 2020-09-01

User identification procedures, essential to the information security of systems, enable system-user interactions by exchanging data through communication links and interfaces validate confirm user authenticity. However, human errors can introduce vulnerabilities that may disrupt intended workflow thus impact system behavior. Therefore, ensuring integrity these procedures requires accounting for such erroneous behaviors. We follow a formal, human-centric approach analyze modeling them as...

10.48550/arxiv.2502.05530 preprint EN arXiv (Cornell University) 2025-02-08

10.1016/j.tcs.2018.09.023 article EN publisher-specific-oa Theoretical Computer Science 2018-11-06

10.1023/a:1005003904639 article EN Studia Logica 1998-01-01

We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation works by eliminating certain kinds of redundancies that arise in the space constraints to represent nd manipulate messages may be sent an active intruder. define general way, independent technical and conceptual details underlying method protocol model. Formally, we prove terminates is correct, under assumption...

10.3233/jcs-2009-0351 article EN Journal of Computer Security 2010-06-01

Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over channel established by another secure provided TLS). This naturally gives rise to compositionality question: given P1 provides certain kind as goal and P2 assumes this channel, can we then derive their vertical P2[P1] is secure? It well known lead attacks even when the individual are all in isolation. In paper, formalize seven easy-to-check static conditions support large class...

10.1145/2590296.2590330 article EN 2014-05-30

We introduce constraint dieren tiation, a new technique for reducing search when modelchecking security protocols. Our is based on eliminating certain kinds of redundancies that arise in the space using symbolic exploration methods, particular methods employ constraints to represent and manipulate possible messages from an active intruder. Formally, we prove tiation terminates correct complete, it preserves set reachable states so all state-based properties holding before reduction (such as...

10.3929/ethz-a-006666073 article EN 2003-01-01

Journal Article Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis Get access Carlos Caleiro, Caleiro Search other works by this author on: Oxford Academic Google Scholar Luca Viganò, Viganò David Basin of the IGPL, Volume 13, Issue 6, November 2005, Pages 637–663, https://doi.org/10.1093/jigpal/jzi048 Published: 01 2005

10.1093/jigpal/jzi048 article EN Logic Journal of IGPL 2005-11-01
Coming Soon ...