Riccardo Focardi
YOU?
Author Swipe
View article: Strands Rocq: Why is a Security Protocol Correct, Mechanically?
Strands Rocq: Why is a Security Protocol Correct, Mechanically? Open
Strand spaces are a formal framework for symbolic protocol verification that allows for pen-and-paper proofs of security. While extremely insightful, pen-and-paper proofs are error-prone, and it is hard to gain confidence on their correctn…
View article: Bridging the Gap: Automated Analysis of Sancus
Bridging the Gap: Automated Analysis of Sancus Open
Techniques for verifying or invalidating the security of computer systems have come a long way in recent years. Extremely sophisticated tools are available to specify and formally verify the behavior of a system and, at the same time, atta…
View article: A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs
A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs Open
Time/memory tradeoffs are general techniques used in cryptanalysis that aim at reducing the computational effort in exchange for a higher memory usage. Among these techniques, one of the most modern algorithms is the fuzzy-rainbow tradeoff…
View article: Language-Based Web Session Integrity
Language-Based Web Session Integrity Open
Session management is a fundamental component of web applications: despite the apparent simplicity, correctly implementing web sessions is extremely tricky, as witnessed by the large number of existing attacks. This motivated the design of…
View article: Table of Contents
Table of Contents Open
Security & Privacy's Editorial Board devotes one special issue each year to highlight selected papers from a conference.The papers in this issue are from the European conference held in Stockholm, Sweden, in 2019.The topics cover many diff…
View article: Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities Open
Cross-Site Request Forgery (CSRF) is one of the oldest and simplest attacks on the Web, yet it is still effective on many websites and it can lead to severe consequences, such as economic losses and account takeovers. Unfortunately, tools …
View article: Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem
Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem Open
HTTPS aims at securing communication over the Web by providing a cryptographic protection layer that ensures the confidentiality and integrity of communication and enables client/server authentication. However, HTTPS is based on the SSL/TL…
View article: Shaping the Glitch: Optimizing Voltage Fault Injection Attacks
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks Open
Voltage fault injection is a powerful active side channel attack that modifies the execution-flow of a device by creating disturbances on the power supply line. The attack typically aims at skipping security checks or generating side-chann…
View article: Shaping the Glitch: Optimizing Voltage Fault Injection Attacks
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks Open
Voltage fault injection is a powerful active side channel attack that modifies the execution-flow of a device by creating disturbances on the power supply line. The attack typically aims at skipping security checks or generating side-chann…
View article: WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring Open
We present WPSE, a browser-side security monitor for web protocols designed to ensure compliance with the intended protocol flow, as well as confidentiality and integrity properties of messages. We formally prove that WPSE is expressive en…
View article: WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring Open
We present WPSE, a browser-side security monitor for web protocols designed to ensure compliance with the intended protocol flow, as well as confidentiality and integrity properties of messages. We formally prove that WPSE is expressive en…
View article: Language-Independent Synthesis of Firewall Policies
Language-Independent Synthesis of Firewall Policies Open
Configuring and maintaining a firewall configuration is notoriously hard. Policies are written in low-level, platform-specific languages where firewall rules are inspected and enforced along non trivial control flow paths. Further difficul…
View article: Usable cryptographic QR codes
Usable cryptographic QR codes Open
QR codes are widely used in various settings such as consumer advertising, commercial tracking, ticketing and marketing. People tend to scan QR codes and trust their content, but there exists no standard mechanism for providing authenticit…
View article: Firewall management with FireWall synthesizer
Firewall management with FireWall synthesizer Open
Firewalls are notoriously hard to configure and maintain. Policies are written in low-
\nlevel, system-specific languages where rules are inspected and enforced along non-trivial
\ncontrol flow paths. Moreover, firewalls are tightly relate…
View article: Mind Your Keys? A Security Evaluation of Java Keystores
Mind Your Keys? A Security Evaluation of Java Keystores Open
Cryptography is complex and variegate and requires to combine different algorithms and mechanisms in nontrivial ways. This complexity is often source of vulnerabilities. Secure key management is one of the most critical aspects, since leak…
View article: Transcompiling Firewalls
Transcompiling Firewalls Open
Porting a policy from a firewall system to another is a difficult and error prone task. Indeed, network administrators have to know in detail the policy meaning, as well as the internals of the firewall systems and of their languages. Equa…
View article: Surviving the Web
Surviving the Web Open
We survey the most common attacks against web sessions, i.e., attacks which target honest web browser users establishing an authenticated session with a trusted web application. We then review existing security solutions which prevent or m…
View article: Run-Time Attack Detection in Cryptographic APIs
Run-Time Attack Detection in Cryptographic APIs Open
Cryptographic APIs are often vulnerable to attacks that compromise sensitive cryptographic keys. In the literature we find many proposals for preventing or mitigating such attacks but they typically require to modify the API or to configur…
View article: Surviving the Web
Surviving the Web Open
In this article, we survey the most common attacks against web sessions, that is, attacks that target honest web browser users establishing an authenticated session with a trusted web application. We then review existing security solutions…
View article: Gathering of Robots in a Ring with Mobile Faults
Gathering of Robots in a Ring with Mobile Faults Open
International audience
View article: Localizing Firewall Security Policies
Localizing Firewall Security Policies Open
In complex networks, filters may be applied at different nodes to control how packets flow. In this paper, we study how to locate filtering functionality within a network. We show how to enforce a set of security goals while allowing maxim…
View article: Localizing Security for Distributed Firewalls
Localizing Security for Distributed Firewalls Open
In complex networks, filters may be applied at different nodes to control how packets flow. In this paper, we study how to locate filtering functionality within a network. We show how to enforce a set of security goals while allowing maxim…