default search action
Luca Compagna
Person information
- affiliation: University of Genoa, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Soumaya Boussaha, Lukas Hock, Miguel Bermejo, Rubén Cuevas Rumín, Ángel Cuevas Rumín, David Klein, Martin Johns, Luca Compagna, Daniele Antonioli, Thomas Barber:
FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Entropy-based Thresholds. Proc. Priv. Enhancing Technol. 2024(3): 540-560 (2024) - [c39]Andrea Bisegna, Matteo Bitussi, Roberto Carbone, Luca Compagna, Silvio Ranise, Avinash Sudhodanan:
CSRFing the SSO Waves: Security Testing of SSO-Based Account Linking Process. EuroS&P 2024: 139-154 - [i4]Christian Scano, Giuseppe Floris, Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio:
ModSec-Learn: Boosting ModSecurity with Machine Learning. CoRR abs/2406.13547 (2024) - 2023
- [c38]Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio:
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors. AISec@CCS 2023: 233-244 - [c37]Feras Al Kassar, Luca Compagna, Davide Balzarotti:
WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate. USENIX Security Symposium 2023: 6079-6096 - [i3]Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio:
Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning. CoRR abs/2308.04964 (2023) - [i2]Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio:
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors. CoRR abs/2310.03166 (2023) - 2022
- [c36]Alessandro Mantovani, Luca Compagna, Yan Shoshitaishvili, Davide Balzarotti:
The Convergence of Source Code and Binary Vulnerability Discovery - A Case Study. AsiaCCS 2022: 602-615 - [c35]Feras Al Kassar, Giulia Clerici, Luca Compagna, Davide Balzarotti, Fabian Yamaguchi:
Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications. NDSS 2022 - 2021
- [c34]Luca Compagna, Hugo Jonker, Johannes Krochewski, Benjamin Krumnow, Merve Sahin:
A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence. EuroS&P Workshops 2021: 49-59 - [i1]Lorenzo Veronese, Stefano Calzavara, Luca Compagna:
Bulwark: Holistic and Verified Security Monitoring of Web Protocols. CoRR abs/2101.06043 (2021) - 2020
- [c33]Lorenzo Veronese, Stefano Calzavara, Luca Compagna:
Bulwark: Holistic and Verified Security Monitoring of Web Protocols. ESORICS (1) 2020: 23-41
2010 – 2019
- 2017
- [j8]Daniel Ricardo dos Santos, Silvio Ranise, Luca Compagna, Serena Elisa Ponta:
Automatically finding execution scenarios to deploy security-sensitive workflows. J. Comput. Secur. 25(3): 255-282 (2017) - [c32]Luca Compagna, Daniel Ricardo dos Santos, Serena Elisa Ponta, Silvio Ranise:
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications. CODASPY 2017: 321-328 - [c31]Avinash Sudhodanan, Roberto Carbone, Luca Compagna, Nicolas Dolgin, Alessandro Armando, Umberto Morelli:
Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries. EuroS&P 2017: 350-365 - 2016
- [j7]Alessandro Armando, Roberto Carbone, Luca Compagna:
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs. Int. J. Softw. Tools Technol. Transf. 18(2): 187-204 (2016) - [c30]Avinash Sudhodanan, Alessandro Armando, Roberto Carbone, Luca Compagna:
Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications. NDSS 2016 - [c29]Luca Compagna, Daniel Ricardo dos Santos, Serena Elisa Ponta, Silvio Ranise:
Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes. TACAS 2016: 567-572 - 2015
- [c28]Daniel Ricardo dos Santos, Silvio Ranise, Luca Compagna, Serena Elisa Ponta:
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios. DBSec 2015: 85-100 - [c27]Roberto Carbone, Luca Compagna, Annibale Panichella, Serena Elisa Ponta:
Security Threat Identification and Testing. ICST 2015: 1-8 - 2014
- [c26]Michele Bezzi, Frances Cleary, Luca Compagna:
From Research Results to Strategy: A Mapping Exercise. ISSE 2014: 256-264 - [c25]Alessandro Armando, Roberto Carbone, Luca Compagna:
SATMC: A SAT-Based Model Checker for Security-Critical Systems. TACAS 2014: 31-45 - [p3]Achim D. Brucker, Luca Compagna, Pierre Guilleminot:
Compliance Validation of Secure Service Compositions. Secure and Trustworthy Service Composition 2014: 136-149 - 2013
- [j6]Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuéllar, Giancarlo Pellegrino, Alessandro Sorniotti:
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations. Comput. Secur. 33: 41-58 (2013) - [c24]Luca Compagna, Pierre Guilleminot, Achim D. Brucker:
Business Process Compliance via Security Validation as a Service. ICST 2013: 455-462 - [c23]Giancarlo Pellegrino, Luca Compagna, Thomas Morreggia:
A Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols. ICTSS 2013: 277-282 - 2012
- [c22]Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Gabriel Erzse, Simone Frau, Marius Minea, Sebastian Mödersheim, David von Oheimb, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rocchetto, Michaël Rusinowitch, Mohammad Torabi Dashti, Mathieu Turuani, Luca Viganò:
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. TACAS 2012: 267-282 - 2011
- [j5]Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna:
Multi-Attacker Protocol Validation. J. Autom. Reason. 46(3-4): 353-388 (2011) - [c21]Wihem Arsac, Luca Compagna, Giancarlo Pellegrino, Serena Elisa Ponta:
Security Validation of Business Processes via Model-Checking. ESSoS 2011: 29-42 - [c20]Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta:
Security validation tool for business processes. SACMAT 2011: 143-144 - [c19]Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuéllar, Giancarlo Pellegrino, Alessandro Sorniotti:
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? SEC 2011: 68-79 - 2010
- [j4]Luca Compagna, Paul El Khoury, Fabio Massacci, Ayda Saïdane:
A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application. Trans. Comput. Sci. 10: 1-24 (2010) - [c18]Alessandro Armando, Roberto Carbone, Luca Compagna, Keqin Li, Giancarlo Pellegrino:
Model-Checking Driven Security Testing of Web-Based Applications. ICST Workshops 2010: 361-370
2000 – 2009
- 2009
- [j3]Luca Compagna, Paul El Khoury, Alzbeta Krausová, Fabio Massacci, Nicola Zannone:
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law 17(1): 1-30 (2009) - [j2]Alessandro Armando, Roberto Carbone, Luca Compagna:
LTL model checking for security protocols. J. Appl. Non Class. Logics 19(4): 403-429 (2009) - [c17]Luca Compagna, Ulrich Flegel, Volkmar Lotz:
Towards Validating Security Protocol Deployment in the Wild. COMPSAC (2) 2009: 434-438 - [c16]Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna:
Validating Security Protocols under the General Attacker. ARSPA-WITS 2009: 34-51 - [c15]Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna:
Attacking Each Other. Security Protocols Workshop 2009: 41-47 - [p2]Carsten Rudolph, Luca Compagna, Roberto Carbone, Antonio Muñoz, Jürgen Repp:
Verification of S&D Solutions for Network Communications and Devices. Security and Dependability for Ambient Intelligence 2009: 143-163 - 2008
- [j1]Alessandro Armando, Luca Compagna:
SAT-based model-checking for security protocols analysis. Int. J. Inf. Sec. 7(1): 3-32 (2008) - [c14]Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuéllar, Llanos Tobarra:
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. FMSE 2008: 1-10 - [p1]Volkmar Lotz, Luca Compagna, Konrad S. Wrona:
Towards Adaptive Security for Ubiquitous Computing Systems. Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises 2008: 574-584 - [e1]Luca Compagna, Volkmar Lotz, Fabio Massacci:
Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007. Electronic Notes in Theoretical Computer Science 197(2), Elsevier 2008 [contents] - 2007
- [c13]Alessandro Armando, Roberto Carbone, Luca Compagna:
LTL Model Checking for Security Protocols. CSF 2007: 385-396 - [c12]Luca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone:
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL 2007: 149-153 - [c11]Luca Compagna, Volkmar Lotz, Fabio Massacci:
Preface. STM@ESORICS 2007: 1-2 - 2005
- [c10]Alessandro Armando, Luca Compagna, Silvio Ranise:
Rewriting and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation. Mechanizing Mathematical Reasoning 2005: 30-45 - [c9]Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. CAV 2005: 281-285 - 2004
- [c8]Alessandro Armando, Luca Compagna, Yuliya Lierler:
Automatic Compilation of Protocol Insecurity Problems into Logic Programming. JELIA 2004: 617-627 - [c7]Alessandro Armando, Luca Compagna:
SATMC: A SAT-Based Model Checker for Security Protocols. JELIA 2004: 730-733 - [c6]Alessandro Armando, Luca Compagna:
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols. ARSPA@IJCAR 2004: 91-108 - 2003
- [c5]Alessandro Armando, Luca Compagna, Pierre Ganty:
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis. FME 2003: 875-893 - [c4]Alessandro Armando, Luca Compagna:
Abstraction-Driven SAT-based Analysis of Security Protocols. SAT 2003: 257-271 - 2002
- [c3]Alessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISS Security Protocol Analysis Tool. CAV 2002: 349-353 - [c2]Alessandro Armando, Luca Compagna:
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning. FORTE 2002: 210-225 - 2001
- [c1]Alessandro Armando, Luca Compagna, Silvio Ranise:
System Description: RDL : Rewrite and Decision Procedure Laboratory. IJCAR 2001: 663-669
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint