


Остановите войну!
for scientists:


default search action
Giampaolo Bella
Person information

- affiliation: University of Catania, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j29]Giampaolo Bella, Cristian Daniele
, Mario Raciti
:
The AILA Methodology for Automated and Intelligent Likelihood Assignment in Risk Assessment. IEEE Access 11: 26170-26183 (2023) - [j28]Giampaolo Bella, Domenico Cantone, Carmelo Fabio Longo, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria:
The ontology for agents, systems and integration of services: OASIS version 2$. Intelligenza Artificiale 17(1): 51-62 (2023) - [j27]Giampaolo Bella
, Pietro Biondi
, Stefano Bognanni
, Sergio Esposito
:
PETIoT: PEnetration Testing the Internet of Things. Internet Things 22: 100707 (2023) - [c90]Gianpietro Castiglione
, Giampaolo Bella
, Daniele Francesco Santamaria
:
Towards Grammatical Tagging for the Legal Language of Cybersecurity. ARES 2023: 82:1-82:9 - [c89]Mario Raciti, Giampaolo Bella:
A Threat Model for Soft Privacy on Smart Cars. EuroS&P Workshops 2023: 1-10 - [c88]Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
Protecting Voice-Controllable Devices Against Self-Issued Voice Commands. EuroS&P 2023: 160-174 - [c87]Marcello Maugeri, Cristian Daniele, Giampaolo Bella, Erik Poll:
Evaluating the Fork-Awareness of Coverage-Guided Fuzzers. ICISSP 2023: 424-429 - [c86]Davide Bonaventura, Sergio Esposito, Giampaolo Bella:
Smart Bulbs Can Be Hacked to Hack into Your Household. SECRYPT 2023: 218-229 - [c85]Mario Raciti
, Giampaolo Bella:
How to Model Privacy Threats in the Automotive Domain. VEHITS 2023: 394-401 - [e6]Giampaolo Bella, Mihai Doinea, Helge Janicke:
Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13809, Springer 2023, ISBN 978-3-031-32635-6 [contents] - [i25]Marcello Maugeri, Cristian Daniele, Giampaolo Bella, Erik Poll:
Evaluating the Fork-Awareness of Coverage-Guided Fuzzers. CoRR abs/2301.05060 (2023) - [i24]Giampaolo Bella, Pietro Biondi, Stefano Bognanni, Sergio Esposito:
PETIoT: PEnetration Testing the Internet of Things. CoRR abs/2302.04900 (2023) - [i23]Mario Raciti, Giampaolo Bella:
How to Model Privacy Threats in the Automotive Domain. CoRR abs/2303.10370 (2023) - [i22]Mario Raciti, Giampaolo Bella:
A Threat Model for Soft Privacy on Smart Cars. CoRR abs/2306.04222 (2023) - [i21]Giampaolo Bella, Domenico Cantone, Carmelo Fabio Longo, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria:
The Ontology for Agents, Systems and Integration of Services: OASIS version 2. CoRR abs/2306.10061 (2023) - [i20]Gianpietro Castiglione, Giampaolo Bella, Daniele Francesco Santamaria:
Towards Grammatical Tagging for the Legal Language of Cybersecurity. CoRR abs/2306.17042 (2023) - [i19]Gianpietro Castiglione, Daniele Francesco Santamaria, Giampaolo Bella:
An ontological approach to compliance verification of the NIS 2 directive. CoRR abs/2306.17494 (2023) - [i18]Giampaolo Bella, Gianpietro Castiglione, Daniele Francesco Santamaria:
A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology. CoRR abs/2306.17514 (2023) - [i17]Giampaolo Bella, Gianpietro Castiglione, Daniele Francesco Santamaria:
An automated method for the ontological representation of security directives. CoRR abs/2307.01211 (2023) - [i16]Davide Bonaventura, Sergio Esposito, Giampaolo Bella:
Smart Bulbs can be Hacked to Hack into your Household. CoRR abs/2308.09019 (2023) - [i15]Mario Raciti, Giampaolo Bella:
Up-to-date Threat Modelling for Soft Privacy on Smart Cars. CoRR abs/2308.11273 (2023) - 2022
- [j26]Giampaolo Bella
, Pietro Biondi
, Gianpiero Costantino
, Ilaria Matteucci
:
Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security. Comput. Networks 218: 109377 (2022) - [j25]Max Eisele
, Marcello Maugeri, Rachna Shriwas, Christopher Huth, Giampaolo Bella:
Embedded fuzzing: a review of challenges, tools, and solutions. Cybersecur. 5(1): 18 (2022) - [j24]Giampaolo Bella
, Pietro Biondi
, Stefano Bognanni:
Multi-service threats: Attacking and protecting network printers and VoIP phones alike. Internet Things 18: 100507 (2022) - [j23]Giampaolo Bella, Rosario Giustolisi, Carsten Schürmann:
Modelling human threats in security ceremonies. J. Comput. Secur. 30(3): 411-433 (2022) - [c84]Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
ALEXA VERSUS ALEXA: Controlling Smart Speakers by Self-Issuing Voice Commands. AsiaCCS 2022: 1064-1078 - [c83]Giampaolo Bella, Cristian Daniele, Mario Raciti
:
The AILA Methodology for Automated and Intelligent Likelihood Assignment. CSP 2022: 119-123 - [c82]Pietro Biondi, Fabrizio Tronci, Giampaolo Bella:
Papyrus-Based Safety Analysis Automatization. ICSRS 2022: 469-474 - [c81]Giampaolo Bella
:
Interactional Freedom and Cybersecurity. SecITC 2022: 1-16 - [c80]Giampaolo Bella, Domenico Cantone, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria:
The ontology for agents, systems and integration of services: recent advancements of OASIS. WOA 2022: 176-193 - [i14]Pietro Biondi, Stefano Bognanni, Giampaolo Bella:
Vulnerability Assessment and Penetration Testing on IP cameras. CoRR abs/2202.06597 (2022) - [i13]Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands. CoRR abs/2202.08619 (2022) - [i12]Giampaolo Bella, Pietro Biondi, Stefano Bognanni:
Attacking and Protecting Network Printers and VoIP Phones alike. CoRR abs/2202.10832 (2022) - 2021
- [c79]Giampaolo Bella, Pietro Biondi, Marco De Vincenzi, Giuseppe Tudisco
:
Privacy and modern cars through a dual lens. EuroS&P Workshops 2021: 136-143 - [c78]Giampaolo Bella, Domenico Cantone, Cristiano Longo, Marianna Nicolosi Asmundo
, Daniele Francesco Santamaria
:
Semantic Representation as a Key Enabler for Blockchain-Based Commerce. GECON 2021: 191-198 - [c77]Giampaolo Bella, Domenico Cantone, Cristiano Longo, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria
:
Blockchains Through Ontologies: The Case Study of the Ethereum ERC721 Standard in oasis. IDC 2021: 249-259 - [c76]Pietro Biondi, Stefano Bognanni, Giampaolo Bella:
Vulnerability Assessment and Penetration Testing on IP camera. IOTSMS 2021: 1-8 - [c75]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci, Mirco Marchetti:
Towards the COSCA framework for "COnseptualing Secure CArs". Open Identity Summit 2021: 37-46 - [c74]Giampaolo Bella, Pietro Biondi, Giuseppe Tudisco
:
Car Drivers' Privacy Concerns and Trust Perceptions. TrustBus 2021: 143-154 - [c73]Francesco Pollicino, Dario Stabili, Giampaolo Bella, Mirco Marchetti
:
SixPack: Abusing ABS to avoid Misbehavior detection in VANETs. VTC Spring 2021: 1-6 - [i11]Giampaolo Bella, Domenico Cantone, Cristiano Longo, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria:
Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version). CoRR abs/2109.02899 (2021) - [i10]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
TOUCAN: A proTocol tO secUre Controller Area Network. CoRR abs/2111.10642 (2021) - [i9]Giampaolo Bella, Pietro Biondi:
You Overtrust Your Printer. CoRR abs/2111.10645 (2021) - [i8]Giampaolo Bella, Pietro Biondi:
Towards an Integrated Penetration Testing Environment for the CAN Protocol. CoRR abs/2111.11732 (2021) - [i7]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
CINNAMON: A Module for AUTOSAR Secure Onboard Communication. CoRR abs/2111.12026 (2021) - [i6]Giampaolo Bella, Pietro Biondi, Marco De Vincenzi, Giuseppe Tudisco:
Privacy and modern cars through a dual lens. CoRR abs/2111.12027 (2021) - [i5]Giampaolo Bella, Pietro Biondi, Giuseppe Tudisco:
Car drivers' privacy concerns and trust perceptions. CoRR abs/2111.15467 (2021) - [i4]Pietro Biondi, Stefano Bognanni, Giampaolo Bella:
VoIP Can Still Be Exploited - Badly. CoRR abs/2111.15468 (2021) - [i3]Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Giuseppe Patanè, Giampaolo Bella:
Secure Routine: A Routine-Based Algorithm for Drivers Identification. CoRR abs/2112.06200 (2021) - [i2]Giampaolo Bella:
Out to Explore the Cybersecurity Planet. CoRR abs/2112.12790 (2021) - 2020
- [c72]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
CINNAMON: A Module for AUTOSAR Secure Onboard Communication. EDCC 2020: 103-110 - [c71]Pietro Biondi, Stefano Bognanni, Giampaolo Bella:
VoIP Can Still Be Exploited - Badly. FMEC 2020: 237-243
2010 – 2019
- 2019
- [c70]Giampaolo Bella
, Pietro Biondi
, Gianpiero Costantino, Ilaria Matteucci:
TOUCAN: A proTocol tO secUre Controller Area Network. AutoSec@CODASPY 2019: 3-8 - [c69]Giampaolo Bella, Karen Renaud, Diego Sempreboni, Luca Viganò:
An Investigation into the "Beautification" of Security Ceremonies. ICETE (2) 2019: 125-136 - [c68]Diego Sempreboni, Giampaolo Bella, Rosario Giustolisi, Luca Viganò:
What Are the Threats? (Charting the Threat Models of Security Ceremonies). ICETE (2) 2019: 161-172 - [c67]Pietro Biondi
, Giampaolo Bella, Gianpiero Costantino, Ilaria Matteucci:
Implementing CAN bus security by TOUCAN. MobiHoc 2019: 399-400 - [c66]Giampaolo Bella, Pietro Biondi
:
You Overtrust Your Printer. SAFECOMP Workshops 2019: 264-274 - [c65]Giampaolo Bella
:
You Already Used Formal Methods but Did Not Know It. FMTea 2019: 228-243 - [c64]Giampaolo Bella
, Pietro Biondi
, Gianpiero Costantino, Ilaria Matteucci:
Are you secure in your car?: poster. WiSec 2019: 308-309 - 2018
- [j22]Rosario Giustolisi, Giampaolo Bella
, Gabriele Lenzini:
Invalid certificates in modern browsers: A socio-technical analysis. J. Comput. Secur. 26(4): 509-541 (2018) - [c63]Giampaolo Bella
, Francesco Marino, Gianpiero Costantino, Fabio Martinelli:
Getmewhere: A Location-Based Privacy-Preserving Information Service. PDP 2018: 529-532 - [c62]Giampaolo Bella
, Pietro Biondi
:
Towards an Integrated Penetration Testing Environment for the CAN Protocol. SAFECOMP Workshops 2018: 344-352 - [e5]Giampaolo Bella, Gabriele Lenzini, Theo Tryfonas, Debi Ashenden:
STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, San Juan, Puerto Rico, USA, December, 2018. ACM 2018, ISBN 978-1-4503-7285-5 [contents] - 2017
- [j21]Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan
:
Trustworthy exams without trusted parties. Comput. Secur. 67: 291-307 (2017) - [c61]Giampaolo Bella
, Rosario Giustolisi:
Idea: A Unifying Theory for Evaluation Systems. ESSoS 2017: 231-239 - [c60]Giampaolo Bella, Denis Butin, Hugo Jonker:
Analysing Privacy Analyses. ITASEC 2017: 19-28 - [e4]Giampaolo Bella, Gabriele Lenzini:
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2017, Orlando, FL, USA, December 5, 2017. ACM 2017, ISBN 978-1-4503-6357-0 [contents] - 2016
- [c59]Giampaolo Bella
, Bruce Christianson, Luca Viganò:
Invisible Security. Security Protocols Workshop 2016: 1-9 - [c58]Giampaolo Bella
:
Invisible Security (Transcript of Discussion). Security Protocols Workshop 2016: 10-18 - [e3]Gabriele Lenzini, Giampaolo Bella, Zinaida Benenson, Carrie E. Gates:
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2016, Los Angeles, CA, USA, December 5, 2016. ACM 2016, ISBN 978-1-4503-4826-3 [contents] - 2015
- [j20]Giampaolo Bella
, Helge Janicke
:
Special issue on the Security Track at the ACM Symposium on Applied Computing 2013. Int. J. Inf. Sec. 14(2): 101-102 (2015) - [j19]Giampaolo Bella
, Paul Curzon
, Gabriele Lenzini
:
Service security and privacy as a socio-technical problem. J. Comput. Secur. 23(5): 563-585 (2015) - [c57]Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini
, Peter Y. A. Ryan
:
A Secure Exam Protocol Without Trusted Parties. SEC 2015: 495-509 - [c56]Giampaolo Bella
, Luca Viganò
:
Security is Beautiful. Security Protocols Workshop 2015: 247-250 - [e2]Giampaolo Bella, Gabriele Lenzini:
2015 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy, July 13, 2015. IEEE Computer Society 2015, ISBN 978-1-5090-0178-1 [contents] - 2014
- [j18]Giampaolo Bella
:
Inductive study of confidentiality: for everyone. Formal Aspects Comput. 26(1): 3-36 (2014) - [c55]Giampaolo Bella
, Pekka Jäppinen, Jussi Laakkonen:
The Challenges behind Independent Living Support Systems. AMT 2014: 464-474 - [c54]Giampaolo Bella
, Paul Curzon
, Rosario Giustolisi, Gabriele Lenzini
:
A Socio-technical Methodology for the Security and Privacy Analysis of Services. COMPSAC Workshops 2014: 401-406 - [c53]Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini:
Secure exams despite malicious management. PST 2014: 274-281 - [e1]Giampaolo Bella, Gabriele Lenzini:
2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7901-1 [contents] - 2013
- [j17]Giampaolo Bella
, Gianpiero Costantino, Jon Crowcroft
, Salvatore Riccobene:
Enhancing DSR maintenance with power awareness. Comput. Stand. Interfaces 35(1): 107-113 (2013) - [c52]Rosario Giustolisi, Gabriele Lenzini, Giampaolo Bella
:
What security for electronic exams? CRiSIS 2013: 1-5 - [c51]Denis Butin
, David Gray, Giampaolo Bella
:
Towards Verifying Voter Privacy through Unlinkability. ESSoS 2013: 91-106 - [c50]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini:
A Socio-technical Understanding of TLS Certificate Validation. IFIPTM 2013: 281-288 - [c49]Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini
:
Socio-technical formal analysis of TLS certificate validation in modern browsers. PST 2013: 309-316 - 2012
- [j16]Giampaolo Bella:
Inductive Study of Confidentiality. Arch. Formal Proofs 2012 (2012) - [c48]Saad Almutairi
, Giampaolo Bella
, Ala Abu-Samaha:
Specifying security requirements of context aware system using UML. ICDIM 2012: 259-265 - [c47]Giampaolo Bella
, Lizzie Coles-Kemp:
Layered Analysis of Security Ceremonies. SEC 2012: 273-286 - [c46]Denis Butin, Giampaolo Bella:
Verifying Privacy by Little Interaction and No Process Equivalence. SECRYPT 2012: 251-256 - [c45]Giampaolo Bella
, Gabriele Lenzini:
Foreword from the Workshop Chairs - STAST 2012. STAST 2012 - 2011
- [j15]Giampaolo Bella
, Rosario Giustolisi, Salvatore Riccobene:
Enforcing privacy in e-commerce by balancing anonymity and trust. Comput. Secur. 30(8): 705-718 (2011) - [j14]Wihem Arsac, Giampaolo Bella
, Xavier Chantry, Luca Compagna:
Multi-Attacker Protocol Validation. J. Autom. Reason. 46(3-4): 353-388 (2011) - [c44]Giampaolo Bella
, Denis Butin
, David Gray
:
Holistic analysis of mix protocols. IAS 2011: 338-343 - [c43]Giampaolo Bella, Gianpiero Costantino, Lizzie Coles-Kemp, Salvatore Riccobene:
Remote Management of Face-to-face Written Authenticated Though Anonymous Exams. CSEDU (2) 2011: 431-437 - [c42]Giampaolo Bella
, Lizzie Coles-Kemp:
Internet Users' Security and Privacy While They Interact with Amazon. TrustCom 2011: 878-883 - 2010
- [j13]Giampaolo Bella
:
The principle of guarantee availability for security protocol analysis. Int. J. Inf. Sec. 9(2): 83-97 (2010) - [c41]Giampaolo Bella, Gianpiero Costantino, Salvatore Riccobene:
WATA - A System for Written Authenticated though Anonymous Exams. CSEDU (2) 2010: 132-137 - [c40]Giampaolo Bella, Peter Y. A. Ryan, Vanessa Teague:
Virtually Perfect Democracy. Security Protocols Workshop 2010: 161-166
2000 – 2009
- 2009
- [j12]Giampaolo Bella
, Peter Y. A. Ryan
:
Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing. J. Comput. Secur. 17(3): 237 (2009) - [c39]Giampaolo Bella
, Pietro Liò:
Formal Analysis of the Genetic Toggle. CMSB 2009: 96-110 - [c38]Wihem Arsac, Giampaolo Bella
, Xavier Chantry, Luca Compagna:
Validating Security Protocols under the General Attacker. ARSPA-WITS 2009: 34-51 - [c37]Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna:
Attacking Each Other. Security Protocols Workshop 2009: 41-47 - 2008
- [j11]Giampaolo Bella:
What is Correctness of Security Protocols? J. Univers. Comput. Sci. 14(12): 2083-2106 (2008) - [c36]Giampaolo Bella
, Francesco Librizzi, Salvatore Riccobene:
Realistic Threats to Self-Enforcing Privacy. IAS 2008: 155-160 - [c35]Giampaolo Bella
, Gianpiero Costantino, Salvatore Riccobene:
Managing Reputation over MANETs. IAS 2008: 255-260 - [c34]Giampaolo Bella
:
Special track on Computer Security: editorial message. SAC 2008: 2095-2096 - [c33]Simon N. Foley
, Giampaolo Bella
, Stefano Bistarelli
:
Security Protocol Deployment Risk. Security Protocols Workshop 2008: 12-20 - 2007
- [b1]Giampaolo Bella:
Formal Correctness of Security Protocols - With 62 Figures and 4 Tables. Information Security and Cryptography, Springer 2007, ISBN 978-3-540-68134-2, pp. 1-234 - 2006
- [j10]Giampaolo Bella
, Fabio Massacci
, Lawrence C. Paulson
:
Verifying the SET Purchase Protocols. J. Autom. Reason. 36(1-2): 5-37 (2006) - [j9]Giampaolo Bella
, Lawrence C. Paulson
:
Accountability protocols: Formalized and verified. ACM Trans. Inf. Syst. Secur. 9(2): 138-161 (2006) - [c32]Giampaolo Bella, Peter Y. A. Ryan:
Editorial message: special track on computer security. SAC 2006: 321-322 - [c31]Giampaolo Bella
, Stefano Bistarelli
, Pamela Peretti, Salvatore Riccobene:
Augmented Risk Analysis. VODCA@FOSAD 2006: 207-220 - 2005
- [j8]Giampaolo Bella
, Stefano Bistarelli
:
Information Assurance for security protocols. Comput. Secur. 24(4): 322-333 (2005) - [j7]Giampaolo Bella
, Fabio Massacci
, Lawrence C. Paulson
:
An overview of the verification of SET. Int. J. Inf. Sec. 4(1-2): 17-28 (2005) - [j6]Giampaolo Bella, Peter Y. A. Ryan:
Guest Editors' preface. J. Comput. Secur. 13(5): 697- (2005) - [c30]Giampaolo Bella, Costantino Pistagna, Salvatore Riccobene:
Locating Mobile Nodes Within Logical Networks. PSC 2005: 54-62 - [c29]Giampaolo Bella
, Peter Y. A. Ryan
:
Special track on computer security. SAC 2005: 304-305 - 2004
- [j5]Giampaolo Bella, Ronaldo Menezes
:
Special Issue: Computer Security. Concurr. Pract. Exp. 16(11): 1061 (2004) - [j4]Giampaolo Bella
, Stefano Bistarelli
:
Soft Constraint Programming to Analysing Security Protocols. Theory Pract. Log. Program. 4(5-6): 545-572 (2004) - [c28]Sebastiano Battiato, Giampaolo Bella, Salvatore Riccobene:
Should We Prove Security Policies Correct? EGCDMAS 2004: 56-65 - [c27]Giampaolo Bella, Peter Y. A. Ryan:
Editoral message: special track on computer security. SAC 2004: 373-374 - [c26]