R. Focardi, R. Gorrieri and F. Martinelli. Real-Time
Information Flow Analysis,
IEEE Journal on Selected Areas in Communications. January 2003,
Volume 21, Number 1, pages 20-35. IEEE press.
R. Focardi, R. Gorrieri
and F. Martinelli.
A Comparison of Three Authentication Properties,
Theoretical Computer Science, Volume 291(3), Pages 219-
388, January 2003, Elsevier Science.
C. Braghin, A.
Cortesi, R. Focardi.
Security Boundaries in Mobile Ambients,
Computer Languages, Elsevier Science, vol. 28(1), April
2002.
Antonio Durante, Riccardo
Focardi and Roberto
Gorrieri, A Compiler for Analysing Cryptographic Protocols Using
Non-Interference,
ACM Transactions on Software Engineering and
Methodology, vol. 9(4), pp. 488-528, October 2000.
Riccardo
Focardi, Flaminia
Luccio, and David
Peleg,
Feedback Vertex Set in Hypercubes,
Information Processing Letters (IPL), p. 1-5, 76(1-2),
November 2000.
Riccardo Focardi
and Roberto Gorrieri, The Compositional Security Checker: A Tool for the
Verification of
Information Flow Security Properties ,
IEEE Transactions on Software Engineering , Vol. 23, No. 9,
September 1997. (get here a
preliminary
.ps.gz)
Riccardo Focardi
and Roberto Gorrieri,
A Classification of Security Properties for Process Algebras
,
Journal of Computer Security , 3(1):
5-33, 1995.
Riccardo Focardi and Matteo Maffei.
Types for Security Protocols
In Formal Models and Techniques for Analyzing Security Protocols (Véronique Cortier, Steve Kremer Eds.), pages 143-181, volume 5, chapter 7. Cryptology and Information Security Series, IOS Press, ISBN 978-1-60750-713-0, 2011.
[pdf]
Riccardo Focardi.
Static Analysis of Authentication.
In Foundations
of Security Analysis
and Design III - Tutorial Lectures, (A. Aldini, R. Gorrieri, F. Martinelli Eds.) LNCS Vol. 3655, Springer, 2005.
[ps.gz]
[bibtex]
Riccardo Focardi and Flaminia Luccio
Secure recharge of disposable RFID tickets.
In proceedings of the
8th International Workshop on Formal Aspects of Security & Trust
(FAST2011) Leuven, Belgium, September 15-16, 2011. Springer LNCS 7140.
[pdf]
[slides]
[bibtex]
Riccardo Focardi, Flaminia Luccio
Cracking Bank PINs by Playing Mastermind
In proceedings of the
5th International Conference on Fun with Algorithms (FUN 2010), Ischia, Italy, June 2-4, 2010.
Lecture Notes in Computer Science 6099 Springer 2010, ISBN 978-3-642-13121-9
Note: the proceedings paper contains wrong numerical results. Here you can
download an amended version.
[Mastermind and PIN
cracking page]
[pdf
(amended)]
Riccardo Focardi, Flaminia Luccio
Secure upgrade of hardware security modules in
bank networks
In proceedings of the
Joint Workshop on Automated Reasoning for Security Protocol Analysis
and Issues in the Theory of Security (ARSPA-WITS'10),
Paphos, Cyprus, March 27-28, 2010. Springer LNCS 6186.
[pdf]
[slides]
[bibtex]
Matteo Centenaro, Riccardo Focardi
Match It or Die: Proving Integrity by Equality
In proceedings of the
Joint Workshop on Automated Reasoning for Security Protocol Analysis
and Issues in the Theory of Security (ARSPA-WITS'10),
Paphos, Cyprus, March 27-28, 2010. Springer LNCS 6186.
[pdf]
[bibtex]
Andrea Falcone, Riccardo Focardi
Formal Analysis of Key Integrity in PKCS#11
In proceedings of the
Joint Workshop on Automated Reasoning for Security Protocol Analysis
and Issues in the Theory of Security (ARSPA-WITS'10),
Paphos, Cyprus, March 27-28, 2010. Springer LNCS 6186.
[pdf]
[slides]
[bibtex]
Matteo Centenaro, Riccardo Focardi, Flaminia L. Luccio, Graham Steel
Type-Based Analysis of PIN Processing APIs
In proceedings of the
14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 21-23, 2009. Springer LNCS 5789.
[pdf]
[bibtex]
[full version] with all proofs. TR CS-2009-6, Department of Computer Science, Univ. Venice.
[extended abstract] presented at the
Joint Workshop on
Automated Reasoning for Security Protocol Analysis
and
Issues in the Theory of Security (ARSPA-WITS'09)
York, UK
March 2009
Riccardo Focardi, Flaminia L. Luccio and Graham Steel
Blunting Differential Attacks on PIN Processing APIs
In proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009), Oslo, Norway, 14-16 October 2009. Springer LNCS 5838.
[pdf]
[bibtex]
[extended abstract] presented at the
3rd International Workshop on
Analysis of
Security APIs (ASA-3).
July 10-11 2009, Port Jefferson, New York, USA.
Matteo Bortolozzo, Giovanni Marchetto, Riccardo Focardi and Graham Steel
Secure your PKCS#11 token against API attacks!
In proceedings of the
3rd International Workshop on
Analysis of
Security APIs (ASA-3).
July 10-11 2009, Port Jefferson, New York, USA.
[pdf]
[bibtex]
Michele Bugliesi and Riccardo Focardi
Language Based Secure Communication
In proceedings of the
21st
IEEE Computer Security Foundation Symposium
(CSF'08)
June 2008. IEEE Press.
[pdf]
[bibtex]
Michael Backes, Agostino Cortesi,
Riccardo Focardi and Matteo Maffei
A Calculus of Challenges and Responses.
In proceedings of the
5th ACM Workshop on
Formal Methods in Security Engineering:
From Specifications to Code
(FMSE'07)
November 2007. ACM Press.
[pdf]
[bibtex]
Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld. Bridging
Language-Based
and Process Calculi Security.
In proceedings of
8th International conference on Foundations of Software Science and
Computation Structure (FoSSaCS 2005)
pages 299-315. LNCS 3441. Springer.
[ps.gz]
[bibtex]
Riccardo Focardi, Matteo Maffei, Francesco Placella.
Inferring
Authentication Tags.
In proceedings of 2005 IFIP WG 1.7,
ACM SIGPLAN and GI FoMSESS
Workshop on Issues in the Theory of Security (WITS'05). ACM press.
January 10-11, 2005, Long Beach, California
(co-located with POPL'05).
[pdf]
[bibtex]
Michele Bugliesi, Riccardo Focardi and
Matteo Maffei. Authenticity
by Tagging and Typing,
In proceedings of 2nd ACM Workshop on Formal Methods in Security
Engineering: From Specifications to Code (FMSE 2004), Washington
D.C., U.S.A.,
October 2004, ACM Press.
Michele Bugliesi, Riccardo
Focardi, Matteo Maffei.
Compositional Analysis of Authentication Protocols.
In Proceedings of the European Symposium on
Programming (ESOP 2004), Barcelona, Spain, March 29-April 2,
2004. Springer
LNCS Vol. 2986
A. Bossi, R. Focardi, C. Piazza, and S. Rossi. Refinement
Operators and Information Flow Security.
Proc. of the
International IEEE Conference on Software Engineering and Formal Methods,
SEFM 2003, pag. 44-53, IEEE Computer Society Press, 2003.
Michele Bugliesi, Riccardo Focardi, Matteo Maffei. Principles
for Entity Authentication.
In proceedings of Andrei Ershov
Fifth International Conference PERSPECTIVES OF SYSTEM INFORMATICS
(PSI 2003), Novosibirsk, Siberia, Russia, July 2003, LNCS 2890,
Springer-Verlag, pg 294-307.
C.
Braghin, A.
Cortesi, S. Filippone, R. Focardi, F. L. Luccio and Carla Piazza.
BANANA: A Tool for Boundary Ambients Nesting ANAlysis.
Proc.
of
the
Ninth International Conference on Tools and algorithms for the
Construction
and Analysis of Systems (TACAS' 03), LNCS 2619, Springer-Verlag, 2003.
C.
Braghin, A.
Cortesi,
R. Focardi, F. L. Luccio and Carla Piazza.
Complexity of Nesting Analysis in Mobile Ambients
Proc. of the Fourth
International
Conference on Verication, Model Checking and Abstract Interpretation
(VMCAI 2003), LNCS 2575, pag. 86-101, Springer-Verlag, 2003.
Freshness
Analysis in Security Protocols. Chiara Braghin, Agostino Cortesi,
and Riccardo Focardi. In Proc. of 14th Nordic Workshop on
Programming Theory (NWPT 02), pages 30 33, Tallin, Estonia, 20-22
November
2002.
Transforming processes to ensure and/or check Information Flow
Security,
A.Bossi, R.Focardi, C.Piazza, S.Rossi. In proceedings of 9th
International
Conference on Algebraic Methodology And Software Technology
(AMAST'2002),
LNCS 2422, Springer-Verlag, September 9-13, 2002.
A Proof System for Information Flow Security, A. Bossi, R.
Focardi,
C.
Piazza, S. Rossi In Proceedings of International Workshop on Logic
Based
Program Development and Transformation, (LOPSTR '02), LNCS 2664,
Springer-
Verlag, September 2002.
Information Flow Security in Dynamic Contexts, R. Focardi,
S.
Rossi.
In
proceedings of 15th IEEE Computer Security Foundations Workshop (CSFW
2002), IEEE Computer Society Press, 2002.
Boundary Inference for Enforcing Security Policies in Mobile
Ambients,
Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Steffen van Bakel.
In
proceedings of 2nd IFIP International Conference on Theoretical
Computer
Science (TCS 2002), Kluwer press, 2002.
Control Flow Analysis of Mobile Ambients with Security
Boundaries,
Chiara
Braghin, Agostino Cortesi and Riccardo Focardi. In proceedings of Fifth
International Conference on Formal Methods for Open Object-Based
Distributed Systems (FMOODS'02), Kluwer press, 20-22 March 2002,
University
of Twente.
Proofs Methods for Bisimulation based Information Flow Security,
R.
Focardi, C. Piazza, S. Rossi. In proceedings of Third International
Workshop
on Verification, Model Checking and Abstract Interpretation, (VMCAI
2002),
LNCS 2294, Springer-Verlag, January 2002.
A Security Property for Processes in Dynamic Contexts
Riccardo
Focardi,
Sabina Rossi. In proceedings of 2002 ACM SIGPLAN and IFIP WG 1.7
Workshop on Issues in the Theory of Security (WITS'02) Portland,
Oregon,
USA, January 14-15, 2002.
Authentication Primitives for Refining Protocol Specifications.
Chiara Bodei,
Pierpaolo Degano, Riccardo Focardi, Corrado Priami In proceedings of
2002
ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of
Security (WITS'02) Portland, Oregon, USA, January 14-15, 2002. [.ps.gz]
Control Flow Analysis for information flow security, ,
Chiara Braghin,
Agostino Cortesi and Riccardo
Focardi. In H.R.Nielson (ed.)
Proc. NORDSEC 2001, Sixth Nordic Workshop on Secure IT
Systems, Tech. Rep. IMM-TR-2001-14 TU of Denmark, pp. 85-99, 2001.
Using Non Interference for the Analysis of Security
Protocols , Riccardo Focardi,
Anna Ghelli and Roberto
Gorrieri,
in Proceedings of DIMACS Workshop on Design and Formal
Verification of
Security Protocols (H. Orman and
C. Meadows Ed.)
September 3-5, 1997,
DIMACS Center, CoRE Building, Rutgers University. (you can get a .ps.gz,
see an html
version, or go to
the electronic
proceedings of the workshop).
Non Interference: Past, Present and Future ,
Riccardo Focardi
and Roberto Gorrieri,
in Proceedings of DARPA Workshop on
Foundations for Secure Mobile Code , 26-28 March 1997
Monterey, California, USA.
(get here
the .ps.gz)
Comparing Two Information Flow Security Properties , Riccardo Focardi,
in Proceedings of Ninth IEEE Computer Security Foundations
Workshop
(CSFW'96), (M. Merritt Ed.), IEEE Press, pages 116-122, Kenmare
(Ireland), June 1996.
(get here
the .ps.gz)
Automatic Compositional Verification of Some Security
Properties, Riccardo Focardi and Roberto Gorrieri, in
Proceedings of Second International Workshop on
Tools and Algorithms for the Construction and Analysis of Systems
(TACAS'96), (B. Steffen Ed.), pages 167-186, Passau (Germany),
March 1996. Springer-Verlag, LNCS 1055. (get here
the
.ps.gz)
The Security Checker: a Semantics-based Tool for the
Verification
of
Security Properties , Riccardo Focardi, Roberto Gorrieri and
Villiam Panini, in Proceedings of
Eighth IEEE Computer Security Foundations Workshop (CSFW'95), (Li
Gong Ed.), IEEE Press, pages 60-69, Kenmare (Ireland), June 1995.
A Taxonomy of Trace-based Security Properties for CCS , Riccardo Focardi
and Roberto Gorrieri,
in Proceedings of Seventh IEEE Computer Security Foundations
Workshop (CSFW'94), (Li Gong Ed.), IEEE Press, pages 126-136,
Franconia (NH), June 1994.
An Information Flow Security Property for CCS , Riccardo Focardi
and Roberto Gorrieri,
in Proceedings of Second North American Process Algebra Workshop
(NAPAW'93), (B. Bloom Ed.), TR-93/1369 of Cornell University,
Ithaca
(NY), August 1993.
Editing of Volumes and Journals
Special Issue on CSFW17 of the
Journal of Computer Security (Riccardo Focardi, Ed.), IOS Press, Volume 14, Number 2, 2006
Special Issue on CSFW16 of the
Journal of Computer Security (Riccardo Focardi, Ed.), IOS Press, Volume 13, Number 3, 2005
Proceedings of the 2nd International Workshop on Security
Issues
in
Coordination Models, Languages, and Systems (SecCo
2004) (Riccardo Focardi and Gianluigi Zavattaro, Eds.)
Electr. Notes Theor.
Comput. Sci. 128(5): 1-2 (2005)
Proceedings of 17th IEEE Computer Security Foundations
Workshop (CSFW17),
(Riccardo Focardi, Ed.)
28-30 June, 2004
Asilomar Pacific Grove, CA. IEEE Press.
Proceedings of 1st International Workshop on
Security Issues in Coordination
Models, Languages, and Systems (SecCo'03) (R. Focardi and G.
Zavattaro,
Eds.)
June 28-29, 2003, Eindhoven, the Netherlands. Electronic Notes in
Theoretical
Computer
Science, Volume 85, Number 3, 2003.
Affiliated to ICALP 2003.
Proceedings of 16th IEEE Computer Security Foundations
Workshop (CSFW16),
(Riccardo Focardi, Ed.)
29 June - 3 July, 2003
Asilomar Pacific Grove, CA. IEEE Press.
Special issue on "Computer Languages and Security" of
the journal of
Computer Languages, Systems & Structures (A. Cortesi and R.
Focardi, Eds.), Elsevier Science, vol.
28(1),
April 2002.
Electronic Journals
A. Bossi, R. Focardi, D. Macedonio, C. Piazza and S. Rossi. Unwinding
in Information Flow Security. Electronic Notes in Theoretical
Computer Science,
Elsevier.
Volume 99, Pages 127-154, August 2004.
Proceedings of the MEFISTO Project, Formal Methods for Security and
Time.
Riccardo Focardi and Matteo Maffei.
The ro-spi Calculus at Work: Authentication Case Studies. Electronic Notes in Theoretical
Computer Science,
Elsevier.
Volume 99, Pages 267-293, August 2004.
Proceedings of the MEFISTO Project, Formal Methods for Security and
Time.