Marco Rocchetto
Marco Rocchetto
Verified email at - Homepage
Cited by
Cited by
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
On attacker models and profiles for cyber-physical systems
M Rocchetto, NO Tippenhauer
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
CPDY: extending the Dolev-Yao attacker with physical-layer interactions
M Rocchetto, NO Tippenhauer
Formal Methods and Software Engineering: 18th International Conference on …, 2016
Towards formal security analysis of industrial control systems
M Rocchetto, NO Tippenhauer
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Model-based detection of CSRF
M Rocchetto, M Ochoa, M Torabi Dashti
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
Challenges and opportunities for model-based security risk assessment of cyber-physical systems
M Rocchetto, A Ferrari, V Senni
Resilience of Cyber-Physical Systems: From Risk Modelling to Threat …, 2019
A topological categorization of agents for the definition of attack states in multi-agent systems
K Santacà, M Cristani, M Rocchetto, L Viganò
Multi-Agent Systems and Agreement Technologies: 14th European Conference …, 2017
Formal analysis of vulnerabilities of web applications based on SQL injection
F De Meo, M Rocchetto, L Viganò
Security and Trust Management: 12th International Workshop, STM 2016 …, 2016
An interpolation-based method for the verification of security protocols
M Rocchetto, L Viganò, M Volpe
Journal of Computer Security 25 (6), 463-510, 2017
Formal analysis of vulnerabilities of web applications based on SQL injection (extended version)
F De Meo, M Rocchetto, L Viganò
arXiv preprint arXiv:1605.00358, 2016
Using interpolation for the verification of security protocols
M Rocchetto, L Vigano, M Volpe, GD Vedove
International Workshop on Security and Trust Management, 99-114, 2013
Safety system based on hoistway access detection
G Gentile, D Martintoni, E Manes, L Manica, M Rocchetto, V Senni
US Patent App. 16/711,573, 2020
Formal verification and risk assessment of an implementation of the OPC-UA Protocol
E Guerra, M Ceccato, M Rocchetto
The Etiology of Cybersecurity
M Ambrosi, F Beltramini, F De Meo, O Nardi, M Pacchin, M Rocchetto
International Conference on Applied Cryptography and Network Security, 299-319, 2022
Elevator car communication system
L Manica, T Rizano, M Rocchetto, D Martintoni, E Manes
US Patent App. 16/752,152, 2021
The Etiology of Cybersecurity
F Beltramini, F De Meo, O Nardi, M Pacchin, M Rocchetto, 2021
Smart beamforming for reliable and secure wireless data transmissions
L Manica, E Manes, V Senni, M Rocchetto, D Martintoni, G Gentile, ...
US Patent App. 16/711,624, 2020
Using Interpolation for the Verification of Security Protocols
G Dalle Vedove, M Rocchetto, L Vigano, M Volpe
FCS 2013 Workshop on Foundations of Computer Security (Informal Proceedings), 51, 2013
Methods and tools for design time and runtime formal analysis of security protocols and web applications
M Rocchetto
University of Verona, 2011
Verifica Automatica e Formale di Protocolli di Sicurezza descritti attraverso Modelli UML
A Busatto, M Rocchetto
The system can't perform the operation now. Try again later.
Articles 1–20