Ruggero Lanotte

ORCID: 0000-0002-3335-234X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Formal Methods in Verification
  • Petri Nets in System Modeling
  • Security and Verification in Computing
  • Distributed systems and fault tolerance
  • Logic, programming, and type systems
  • semigroups and automata theory
  • Smart Grid Security and Resilience
  • Advanced Malware Detection Techniques
  • Information and Cyber Security
  • Logic, Reasoning, and Knowledge
  • Network Security and Intrusion Detection
  • Embedded Systems Design Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Service-Oriented Architecture and Web Services
  • Advanced Authentication Protocols Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Semantic Web and Ontologies
  • Safety Systems Engineering in Autonomy
  • Modular Robots and Swarm Intelligence
  • Fault Detection and Control Systems
  • Business Process Modeling and Analysis
  • Software Testing and Debugging Techniques
  • Access Control and Trust
  • Machine Learning and Algorithms
  • Security in Wireless Sensor Networks

University of Insubria
2014-2024

University of Pisa
2000-2004

Institute for Research on Population and Social Policies
2004

We apply formal methods to lay and streamline theoretical foundations reason about Cyber-Physical Systems (CPSs) cyber-physical attacks. focus on integrity DoS attacks sensors actuators of CPSs, the timing aspects these Our contributions are threefold: (1) we define a hybrid process calculus model both CPSs (2) threat provide means assess attack tolerance/vulnerability with respect given attack. (3) formalise how estimate impact successful CPS investigate possible quantifications success...

10.1109/csf.2017.12 article EN 2017-08-01

We apply formal methods to lay and streamline theoretical foundations reason about Cyber-Physical Systems (CPSs) physics-based attacks, i.e., attacks targeting physical devices. focus on a treatment of both integrity denial service sensors actuators CPSs, the timing aspects these attacks. Our contributions are fourfold. (1) define hybrid process calculus model CPSs (2) formalise threat that specifies MITM can manipulate sensor readings or control commands drive CPS into an undesired state;...

10.1145/3373270 article EN ACM Transactions on Privacy and Security 2020-02-05

10.1016/j.ic.2018.01.001 article EN publisher-specific-oa Information and Computation 2018-01-08

10.1016/j.ic.2020.104618 article EN Information and Computation 2020-08-07

We propose both an SOS transition rule format for the generative model of probabilistic processes, and reactive processes. Our formats guarantee that bisimulation is a congruence with respect to process algebra operations. Moreover, our algebras guarantees probability moves given process, if there are any, sum up 1, labeled same action, 1. show most operations studied in literature captured by formats, which, therefore, have practical applications.

10.1145/1462179.1462181 article EN ACM Transactions on Computational Logic 2009-02-01

With the explosion of Industry 4.0, industrial facilities and critical infrastructures are transforming into "smart" systems that dynamically adapt to external events. The result is an ecosystem heterogeneous physical cyber components, such as programmable logic controllers, which more exposed cyber-physical attacks, i.e., security breaches in cyberspace adversely affect processes at core control systems. We apply runtime enforcement techniques, based on ad-hoc sub-class Ligatti et al.'s...

10.1109/csf49147.2020.00025 article EN 2020-06-01

With the advent of Industry 4.0 , industrial facilities and critical infrastructures are transforming into an ecosystem heterogeneous physical cyber components, such as programmable logic controllers increasingly interconnected therefore exposed to cyber-physical attacks i.e., security breaches in cyberspace that may adversely affect processes underlying control systems . In this article, we propose a formal approach based on runtime enforcement ensure specification compliance networks...

10.1145/3546579 article EN ACM Transactions on Privacy and Security 2022-07-04

We are interested in describing timed systems that exhibit probabilistic behaviors. To this purpose, we define a model of automata and give concept weak bisimulation together with an algorithm to decide it. use for analyzing non-repudiation protocol setting.

10.1109/sefm.2003.1236205 article EN 2003-01-01

In multilevel systems, it is important to avoid unwanted indirect information flow from higher levels lower levels, namely, the so-called covert channels. Initial studies of analysis were performed by abstracting away time and probability. It already known that systems are proven be secure in a possibilistic framework may turn out insecure when or probability considered. Recently, work has been done order consider also aspects either probability, but not both. this paper, we propose general...

10.1109/tse.2010.4 article EN IEEE Transactions on Software Engineering 2010-01-20

10.1007/s10207-013-0195-8 article EN International Journal of Information Security 2013-03-25

Edit automata have been introduced by J. Ligatti et al. as a model for security enforcement mechanisms which work at run time. In distributed interacting system, they play role of monitor that runs in parallel with target program and transforms its execution sequence into obeys the property. this paper we characterize properties are enforceable finite edit automata, i.e. set states. We prove these sub-class ∞-regular sets. Moreover given an P, one can decide time O(n2) whether P is automaton...

10.1016/j.entcs.2009.06.037 article EN Electronic Notes in Theoretical Computer Science 2009-07-01

10.4230/lipics.mfcs.2017.72 article EN Mathematical Foundations of Computer Science 2017-01-01

Cyber-Physical systems (CPSs) are exposed to cyber- physical attacks, i.e., security breaches in cyberspace that adversely affect the processes of systems.We define two probabilistic metrics estimate impact attacks targeting cyber-physical formalised terms a hybrid extension Hennessy and Regan's Timed Process Language. Our taking into account: (i) severity inflicted damage given amount time, (ii) probability these actually accomplished, according dynamics system under attack. In doing so, we...

10.1109/csf51468.2021.00040 article EN 2021-06-01
Coming Soon ...