default search action
Gabriele Costa 0001
Person information
- affiliation: Institute for Advanced Studies (IMT), Lucca, Italy
Other persons with the same name
- Gabriele Costa 0002 — Università degli Studi di Messina, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c38]Michele Cerreta, Gabriele Costa:
Automating Penetration Testing with MeTeOr. EuroS&P Workshops 2024: 718-725 - [c37]Gabriele Costa, Silvia de Francisci, Letterio Galletta, Cosimo Perini Brogi, Marinella Petrocchi, Fabio Pinelli, Roberto Pizziol, Manuel Pratelli, Margherita Renieri, Simone Soderi, Mirco Tribastone, Serenella Valiani:
Systems Security Modeling and Analysis at IMT Lucca. ISoLA (1) 2024: 13-26 - [c36]Marco Blanchini, Michele Cerreta, Davide Di Monda, Matteo Fabbri, Mario Raciti, Hamza Sajjad Ahmad, Gabriele Costa:
Supporting Criminal Investigations on the Blockchain: A Temporal Logic-based Approach. ITASEC 2024 - [c35]Gabriele Costa, Cosimo Perini Brogi:
Toward dynamic epistemic verification of zero-knowledge protocols. ITASEC 2024 - 2023
- [j21]Gabriele Costa, Pierpaolo Degano, Letterio Galletta, Simone Soderi:
Formally verifying security protocols built on watermarking and jamming. Comput. Secur. 128: 103133 (2023) - [j20]Enrico Russo, Gabriele Costa, Giacomo Longo, Alessandro Armando, Alessio Merlo:
LiDiTE: A Full-Fledged and Featherweight Digital Twin Framework. IEEE Trans. Dependable Secur. Comput. 20(6): 4899-4912 (2023) - [c34]Gabriele Costa, Silvia de Francisci, Serenella Valiani, Paolo Prinetto:
Why Mary Can Hack: Effectively Introducing High School Girls to Cybersecurity. ARES 2023: 71:1-71:8 - [c33]Alessandro Bonfiglio, Gabriele Costa, Silvia de Francisci:
NIF: Reactive Injection Attack via Nmap Piggybacking. ITASEC 2023 - [p1]Gabriele Costa, Marina Ribaudo:
Designing a Serious Game for Cybersecurity Education. Software Engineering for Games in Serious Contexts 2023: 265-290 - 2022
- [j19]Gianluca Roascio, Gabriele Costa, Emmanuel Baccelli, Lukas Malina, Raimundas Matulevicius, Marius Momeu, Nerijus Morkevicius, Enrico Russo, Branka Stojanovic, Aimilia Tasidou:
HArMoNICS: High-Assurance Microgrid Network Infrastructure Case Study. IEEE Access 10: 115372-115383 (2022) - [j18]Gabriele Costa, Fabio Pinelli, Simone Soderi, Gabriele Tolomei:
Turning Federated Learning Systems Into Covert Channels. IEEE Access 10: 130642-130656 (2022) - [j17]Gabriele Costa, Enrico Russo, Alessandro Armando:
Automating the Generation of Cyber Range Virtual Scenarios with VSDL. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 61-80 (2022) - [i10]Enrico Russo, Gabriele Costa, Giacomo Longo, Alessandro Armando, Alessio Merlo:
LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework. CoRR abs/2202.06954 (2022) - 2021
- [c32]Gabriele Costa, Enrico Russo, Andrea Valenza:
Damn Vulnerable Application Scanner. ITASEC 2021: 424-435 - [c31]Chinmay Siwach, Gabriele Costa, Rocco De Nicola:
Enhancing Malware Classification with Symbolic Features. ITASEC 2021: 509-522 - [i9]Gabriele Costa, Fabio Pinelli, Simone Soderi, Gabriele Tolomei:
Covert Channel Attack to Federated Learning Systems. CoRR abs/2104.10561 (2021) - [i8]Gabriele Costa:
A Protocol for Emotions. CoRR abs/2110.15695 (2021) - 2020
- [j16]Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Nicola Zannone:
A survey on multi-factor authentication for online banking in the wild. Comput. Secur. 95: 101745 (2020) - [j15]Enrico Russo, Gabriele Costa, Alessandro Armando:
Building next generation Cyber Ranges with CRACK. Comput. Secur. 95: 101837 (2020) - [j14]Gabriele Costa, Letterio Galletta, Pierpaolo Degano, David A. Basin, Chiara Bodei:
Natural Projection as Partial Model Checking. J. Autom. Reason. 64(7): 1445-1481 (2020) - [j13]Andrea Valenza, Luca Demetrio, Gabriele Costa, Giovanni Lagorio:
WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs. SoftwareX 11: 100367 (2020) - [c30]Andrea Valenza, Gabriele Costa, Alessandro Armando:
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners. RAID 2020: 17-29 - [c29]Luca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio:
WAF-A-MoLE: evading web application firewalls through adversarial machine learning. SAC 2020: 1745-1752 - [c28]Gabriele Costa, Martina Lualdi, Marina Ribaudo, Andrea Valenza:
A NERD DOGMA: Introducing CTF to Non-expert Audience. SIGITE 2020: 413-418 - [c27]Andrea Canidio, Gabriele Costa, Letterio Galletta:
VeriOSS: Using the Blockchain to Foster Bug Bounty Programs. Tokenomics 2020: 6:1-6:14 - [i7]Luca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio:
WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning. CoRR abs/2001.01952 (2020) - [i6]Gabriele Costa, Enrico Russo, Alessandro Armando:
Automating the Generation of Cyber Range Virtual Scenarios with VSDL. CoRR abs/2001.06681 (2020) - [i5]Andrea Valenza, Gabriele Costa, Alessandro Armando:
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners. CoRR abs/2006.09769 (2020) - [i4]Andrea Canidio, Gabriele Costa, Letterio Galletta:
Private-Yet-Verifiable Contact Tracing. CoRR abs/2010.09303 (2020) - [i3]Gabriele Costa, Andrea Valenza:
Why Charles Can Pen-test: an Evolutionary Approach to Vulnerability Testing. CoRR abs/2011.13213 (2020)
2010 – 2019
- 2019
- [c26]Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Silvio Ranise:
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols. ETAA@ESORICS 2019: 138-155 - 2018
- [j12]Gabriele Costa, Alessio Merlo, Luca Verderame, Alessandro Armando:
Automatic security verification of mobile app configurations. Future Gener. Comput. Syst. 80: 519-536 (2018) - [c25]Enrico Russo, Gabriele Costa, Alessandro Armando:
Scenario Design and Validation for Next Generation Cyber Ranges. NCA 2018: 1-4 - [c24]Gabriele Costa, David A. Basin, Chiara Bodei, Pierpaolo Degano, Letterio Galletta:
From Natural Projection to Partial Model Checking and Back. TACAS (1) 2018: 344-361 - 2017
- [c23]Gabriele Costa, Federico Sinigaglia, Roberto Carbone:
PolEnA: Enforcing Fine-grained Permission Policies in Android. SAFECOMP Workshops 2017: 407-414 - [c22]Federico Sinigaglia, Roberto Carbone, Gabriele Costa:
Strong Authentication for e-Banking: A Survey on European Regulations and Implementations. SECRYPT 2017: 480-485 - 2016
- [j11]Alessio Merlo, Gabriele Costa, Luca Verderame, Alessandro Armando:
Android vs. SEAndroid: An empirical assessment. Pervasive Mob. Comput. 30: 113-131 (2016) - [c21]Gabriele Costa, Paolo Gasti, Alessio Merlo, Shunt-Hsi Yu:
FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization. AsiaCCS 2016: 389-400 - [c20]Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame, Konrad S. Wrona:
Developing a NATO BYOD security policy. ICMCIS 2016: 1-6 - 2015
- [j10]Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:
Formal modeling and automatic enforcement of Bring Your Own Device policies. Int. J. Inf. Sec. 14(2): 123-140 (2015) - [c19]Gabriele Costa:
Securing Android with Local Policies. Programming Languages with Applications to Biology and Security 2015: 202-218 - [c18]Alessandro Armando, Gianluca Bocci, Gabriele Costa, Rocco Mammoliti, Alessio Merlo, Silvio Ranise, Riccardo Traverso, Andrea Valenza:
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module. MIST@CCS 2015: 41-49 - [c17]Alessandro Armando, Roberto Carbone, Gabriele Costa, Alessio Merlo:
Android Permissions Unleashed. CSF 2015: 320-333 - [c16]Alessandro Armando, Gianluca Bocci, Giantonio Chiarelli, Gabriele Costa, Gabriele De Maglie, Rocco Mammoliti, Alessio Merlo:
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform. TACAS 2015: 225-230 - 2014
- [j9]Alessandro Armando, Gabriele Costa, Luca Verderame, Alessio Merlo:
Securing the "Bring Your Own Device" Paradigm. Computer 47(6): 48-56 (2014) - [j8]Alessandro Armando, Giantonio Chiarelli, Gabriele Costa, Gabriele De Maglie, Rocco Mammoliti, Alessio Merlo:
Mobile App Security Analysis with the MAVeriC Static Analysis Module. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 103-119 (2014) - [c15]Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:
Enabling BYOD through secure meta-market. WISEC 2014: 219-230 - 2013
- [c14]Gabriele Costa, Fabio Martinelli, Artsiom Yautsiukhin:
Multi-dimensional Secure Service Orchestration. Business Process Management Workshops 2013: 473-485 - [c13]Alessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, Ilsun You:
Trustworthy Opportunistic Access to the Internet of Services. ICT-EurAsia 2013: 469-478 - [c12]Alessandro Armando, Gabriele Costa, Alessio Merlo:
Bring your own device, securely. SAC 2013: 1852-1858 - [i2]Gabriele Costa, Alessio Merlo, Luca Verderame:
Market-Based Security for Mobile Devices. ERCIM News 2013(93) (2013) - 2012
- [j7]Gabriele Costa, Ilaria Matteucci:
Gate automata-driven run-time enforcement. Comput. Math. Appl. 63(2): 518-524 (2012) - [j6]Gabriele Costa, Pierpaolo Degano, Fabio Martinelli:
Modular plans for secure service composition. J. Comput. Secur. 20(1): 81-117 (2012) - [j5]Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:
Securing the "Bring Your Own Device" Policy. J. Internet Serv. Inf. Secur. 2(3/4): 3-17 (2012) - [c11]Giulio Caravagna, Gabriele Costa, Luca Wiegand, Giovanni Pardini:
Lazy Monitoring for Distributed Computing Environments. IMIS 2012: 259-265 - [c10]Giulio Caravagna, Gabriele Costa, Giovanni Pardini:
Lazy Security Controllers. STM 2012: 33-48 - [c9]Alessandro Armando, Gabriele Costa, Alessio Merlo:
Formal Modeling and Reasoning about the Android Security Framework. TGC 2012: 64-81 - [c8]Gabriele Costa, Fabio Martinelli, Artsiom Yautsiukhin:
Metric-Aware Secure Service Orchestration. ICE 2012: 32-46 - 2011
- [b1]Gabriele Costa:
On the Security of Software Systems and Services. University of Pisa, Italy, 2011 - [j4]Gabriele Costa, Pierpaolo Degano, Fabio Martinelli:
Secure service orchestration in open networks. J. Syst. Archit. 57(3): 231-239 (2011) - [c7]Gabriele Costa, Ilaria Matteucci:
Trust-Driven Policy Enforcement through Gate Automata. IMIS 2011: 208-215 - [c6]Gabriele Costa, Ilaria Matteucci:
Elective temporal logic. QoSA/ISARCS 2011: 143-152 - [c5]Gabriele Costa, Valérie Issarny, Fabio Martinelli, Ilaria Matteucci, Rachid Saadi:
Security and Trust. SFM 2011: 393-416 - 2010
- [j3]Gabriele Costa, Fabio Martinelli, Paolo Mori, Christian Schaefer, Thomas Walter:
Runtime monitoring for next generation Java ME platform. Comput. Secur. 29(1): 74-87 (2010) - [j2]Gabriele Costa, Aliaksandr Lazouski, Fabio Martinelli, Ilaria Matteucci, Valérie Issarny, Rachid Saadi, Nicola Dragoni, Fabio Massacci:
Security-by-Contract-with-Trust for Mobile Devices. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 75-91 (2010) - [c4]Gabriele Costa, Nicola Dragoni, Aliaksandr Lazouski, Fabio Martinelli, Fabio Massacci, Ilaria Matteucci:
Extending Security-by-Contract with Quantitative Trust on Mobile Devices. CISIS 2010: 872-877 - [c3]Gabriele Costa, Pierpaolo Degano, Fabio Martinelli:
Modular Plans for Secure Service Composition. ARSPA-WITS 2010: 41-58 - [i1]Gabriele Costa, Francesco La Torre, Fabio Martinelli, Paolo Mori:
Parental Control for Mobile Devices. ERCIM News 2010(82): 61-62 (2010)
2000 – 2009
- 2009
- [j1]Massimo Bartoletti, Gabriele Costa, Pierpaolo Degano, Fabio Martinelli, Roberto Zunino:
Securing Java with Local Policies. J. Object Technol. 8(4): 5-32 (2009) - [c2]Giuseppe Amato, Paolo Bolettieri, Gabriele Costa, Francesco La Torre, Fabio Martinelli:
Detection of images with adult content for parental control on mobile devices? Mobility Conference 2009 - [c1]Massimo Bartoletti, Gabriele Costa, Roberto Zunino:
Jalapa: Securing Java with Local Policies: Tool Demonstration. BYTECODE@ETAPS 2009: 145-151
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint