default search action
Fabio Massacci
Person information
- affiliation: University of Trento, Italy
- affiliation: Vrije Universiteit Amsterdam, The Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j92]Quang-Cuong Bui, Ranindya Paramitha, Duc-Ly Vu, Fabio Massacci, Riccardo Scandariato:
APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities. Empir. Softw. Eng. 29(1): 18 (2024) - [j91]Aurora Papotti, Ranindya Paramitha, Fabio Massacci:
On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools. Empir. Softw. Eng. 29(5): 132 (2024) - [j90]Fabio Massacci:
The Holy Grail of Vulnerability Predictions. IEEE Secur. Priv. 22(1): 4-6 (2024) - [j89]Antonino Sabetta, Serena Elisa Ponta, Rocío Cabrera Lozoya, Michele Bezzi, Tommaso Sacchetti, Matteo Greco, Gergö Balogh, Péter Hegedüs, Rudolf Ferenc, Ranindya Paramitha, Ivan Pashchenko, Aurora Papotti, Ákos Milánkovich, Fabio Massacci:
Known Vulnerabilities of Open Source Projects: Where Are the Fixes? IEEE Secur. Priv. 22(2): 49-59 (2024) - [j88]Fabio Massacci, Aurora Papotti, Ranindya Paramitha:
Addressing combinatorial experiments and scarcity of subjects by provably orthogonal and crossover experimental designs. J. Syst. Softw. 211: 111990 (2024) - [j87]Marcello Meschini, Giorgio Di Tizio, Marco Balduzzi, Fabio Massacci:
A Case-Control Study to Measure Behavioral Risks of Malware Encounters in Organizations. IEEE Trans. Inf. Forensics Secur. 19: 9419-9432 (2024) - [c179]Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl:
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns. CCS 2024: 2726-2740 - [c178]Chenglu Jin, Chao Yin, Marten van Dijk, Sisi Duan, Fabio Massacci, Michael K. Reiter, Haibin Zhang:
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery. CCS 2024: 3272-3286 - [c177]Aurora Papotti, Fabio Massacci, Katja Tuma:
On the Effects of Program Slicing for Vulnerability Detection during Code Inspection: Extended Abstract. ICSE Companion 2024: 368-369 - [c176]Francesco Minna, Agathe Blaise, Fabio Massacci, Katja Tuma:
Automated Security Repair for Helm Charts. ICSE Companion 2024: 412-413 - [d17]Aurora Papotti, Ranindya Paramitha, Fabio Massacci:
On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools - Dataset. Version 2. Zenodo, 2024 [all versions] - [d16]Aurora Papotti, Ranindya Paramitha, Fabio Massacci:
On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools - Dataset. Version 3. Zenodo, 2024 [all versions] - [d15]Aurora Papotti, Ranindya Paramitha, Fabio Massacci:
On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools - Dataset. Version 4. Zenodo, 2024 [all versions] - [d14]Aurora Papotti, Ranindya Paramitha, Fabio Massacci:
Artefact for "Addressing Combinatorial Experiments and Scarcity of Subjects by Provably Orthogonal and Crossover Experimental Designs". Zenodo, 2024 - [d13]Aurora Papotti, Ranindya Paramitha, Fabio Massacci:
On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools - Dataset. Version 5. Zenodo, 2024 [all versions] - [i27]Ranindya Paramitha, Yuan Feng, Fabio Massacci, Carlos E. Budde:
Cross-ecosystem categorization: A manual-curation protocol for the categorization of Java Maven libraries along Python PyPI Topics. CoRR abs/2403.06300 (2024) - [i26]Francesco Minna, Fabio Massacci, Katja Tuma:
Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub. CoRR abs/2403.09537 (2024) - [i25]Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl:
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns. CoRR abs/2405.06371 (2024) - [i24]Emanuele Mezzi, Aurora Papotti, Fabio Massacci, Katja Tuma:
Risks of uncertainty propagation in Al-augmented security pipelines. CoRR abs/2407.14540 (2024) - [i23]Stefano M. Nicoletti, Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga, Fabio Massacci, Carlos E. Budde:
How hard can it be? Quantifying MITRE attack campaigns with attack trees and cATM logic. CoRR abs/2410.06692 (2024) - 2023
- [j86]Fabio Massacci, Giorgio Di Tizio:
Are Software Updates Useless against Advanced Persistent Threats? Commun. ACM 66(1): 31-33 (2023) - [j85]Carlos E. Budde, Anni Karinsalo, Silvia Vidor, Jarno Salonen, Fabio Massacci:
Consolidating cybersecurity in Europe: A case study on job profiles assessment. Comput. Secur. 127: 103082 (2023) - [j84]Francesco Minna, Fabio Massacci:
SoK: Run-time security for cloud microservices. Are we there yet? Comput. Secur. 127: 103119 (2023) - [j83]Katsiaryna Labunets, Fabio Massacci, Federica Paci, Katja Tuma:
A new, evidence-based, theory for knowledge reuse in security risk analysis. Empir. Softw. Eng. 28(4): 90 (2023) - [j82]Ranindya Paramitha, Fabio Massacci:
Technical leverage analysis in the Python ecosystem. Empir. Softw. Eng. 28(6): 139 (2023) - [j81]Francesco Ciclosi, Fabio Massacci:
The Data Protection Officer: A Ubiquitous Role That No One Really Knows. IEEE Secur. Priv. 21(1): 66-77 (2023) - [j80]Fabio Massacci, Laurie A. Williams:
Software Supply Chain Security [Guest Editors' Introduction]. IEEE Secur. Priv. 21(6): 8-10 (2023) - [j79]Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci:
A Graph-Based Stratified Sampling Methodology for the Analysis of (Underground) Forums. IEEE Trans. Inf. Forensics Secur. 18: 5473-5483 (2023) - [j78]Giorgio Di Tizio, Michele Armellini, Fabio Massacci:
Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats. IEEE Trans. Software Eng. 49(3): 1359-1373 (2023) - [d12]Francesco Ciclosi, Fabio Massacci:
Documentary sources of case studies on the issues a data protection officer faces on a daily basis. Zenodo, 2023 - [d11]Francesco Ciclosi, Silvia Vidor, Fabio Massacci:
Cross-language corpora of privacy policies. Zenodo, 2023 - [d10]Ranindya Paramitha, Fabio Massacci:
Technical Leverage Analysis in the Python Ecosystem. Zenodo, 2023 - [d9]Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci:
A graph-based representation of the Hack Forums using Neo4j. Zenodo, 2023 - [i22]Francesco Ciclosi, Silvia Vidor, Fabio Massacci:
Building cross-language corpora for human understanding of privacy policies. CoRR abs/2302.05355 (2023) - [i21]Fabio Massacci, Giorgio Di Tizio:
Are Software Updates Useless Against Advanced Persistent Threats? CoRR abs/2306.07355 (2023) - [i20]Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci:
A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums. CoRR abs/2308.09413 (2023) - 2022
- [j77]Gabriel Kaptchuk, Fabio Massacci, Sara Nieves Matheu-García, Elissa M. Redmiles:
Introduction to the Special Issue on Security and Privacy for COVID-19. DTRAP 3(3): 24:1-24:2 (2022) - [j76]Fabio Massacci, Nick Nikiforakis, Ivan Pashchenko, Antonino Sabetta, Victoria Wang:
Introduction to the Special Issue on Vulnerabilities. DTRAP 3(4): 37:1 (2022) - [j75]Linghui Luo, Felix Pauck, Goran Piskachev, Manuel Benz, Ivan Pashchenko, Martin Mory, Eric Bodden, Ben Hermann, Fabio Massacci:
TaintBench: Automatic real-world malware benchmarking of Android taint analyses. Empir. Softw. Eng. 27(1): 16 (2022) - [j74]Adam Shostack, Fabio Massacci, Eric Bodden, Antonino Sabetta:
25 Years in Application Security: Looking Back, Looking Forward. IEEE Secur. Priv. 20(1): 109-112 (2022) - [j73]Fabio Massacci:
Pseudo Ground-Truth Generators and Large-Scale Studies. IEEE Secur. Priv. 20(2): 4-7 (2022) - [j72]Fabio Massacci, Silvia Vidor:
Building Principles for Lawful Cyber Lethal Autonomous Weapons. IEEE Secur. Priv. 20(2): 101-106 (2022) - [j71]Fabio Massacci, Antonino Sabetta, Jelena Mirkovic, Toby Murray, Hamed Okhravi, Mohammad Mannan, Anderson Rocha, Eric Bodden, Daniel E. Geer:
"Free" as in Freedom to Protest? IEEE Secur. Priv. 20(5): 16-21 (2022) - [j70]Tina Marjanov, Ivan Pashchenko, Fabio Massacci:
Machine Learning for Source Code Vulnerability Detection: What Works and What Isn't There Yet. IEEE Secur. Priv. 20(5): 60-76 (2022) - [j69]Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi:
Cryptographic and Financial Fairness. IEEE Trans. Inf. Forensics Secur. 17: 3391-3406 (2022) - [j68]Alberto Giaretta, Nicola Dragoni, Fabio Massacci:
S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices. ACM Trans. Sens. Networks 18(1): 12:1-12:51 (2022) - [j67]Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci:
Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies. IEEE Trans. Software Eng. 48(5): 1592-1609 (2022) - [c175]Luca Mecenero, Ranindya Paramitha, Ivan Pashchenko, Fabio Massacci:
Lightweight Parsing and Slicing for Bug Identification in C. ARES 2022: 114:1-114:10 - [c174]Simone Scalco, Ranindya Paramitha, Duc-Ly Vu, Fabio Massacci:
On the feasibility of detecting injections in malicious npm packages. ARES 2022: 115:1-115:8 - [c173]Francesco Minna, Fabio Massacci, Katja Tuma:
Towards a Security Stress-Test for Cloud Configurations. CLOUD 2022: 191-196 - [c172]Francesco Minna, Fabio Massacci:
An Open-Source Cloud Testbed for Security Experimentation. CCGRID 2022: 756-759 - [c171]Francesco Ciclosi, Silvia Vidor, Fabio Massacci:
Building Cross-language Corpora for Human Understanding of Privacy Policies. CyberSec4Europe 2022: 113-131 - [c170]Linghui Luo, Felix Pauck, Goran Piskachev, Manuel Benz, Ivan Pashchenko, Martin Mory, Eric Bodden, Ben Hermann, Fabio Massacci:
TaintBench: Automatic Real-World Malware Benchmarking of Android Taint Analyses. Software Engineering 2022: 65-67 - [d8]Fabio Massacci, Ivan Pashchenko:
Technical Leverage Dataset for Java Dependencies in Maven. Zenodo, 2022 - [d7]Giorgio Di Tizio, Michele Armellini, Fabio Massacci:
Advanced Persistent Threats (APTs) campaigns database. Version v1.0.0. Zenodo, 2022 [all versions] - [d6]Giorgio Di Tizio, Michele Armellini, Fabio Massacci:
Advanced Persistent Threats (APTs) campaigns database. Version v1.0.1. Zenodo, 2022 [all versions] - [d5]Giorgio Di Tizio, Michele Armellini, Fabio Massacci:
Advanced Persistent Threats (APTs) campaigns database. Version v1.0.1.1. Zenodo, 2022 [all versions] - [i19]Giorgio Di Tizio, Michele Armellini, Fabio Massacci:
Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats. CoRR abs/2205.07759 (2022) - [i18]Francesco Minna, Fabio Massacci, Katja Tuma:
Towards a Security Stress-Test for Cloud Configurations. CoRR abs/2205.14498 (2022) - [i17]Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi:
Cryptographic and Financial Fairness. CoRR abs/2207.10780 (2022) - [i16]Aurora Papotti, Ranindya Paramitha, Fabio Massacci:
On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools. CoRR abs/2209.07211 (2022) - [i15]Francesco Ciclosi, Fabio Massacci:
The Data Protection Officer, an ubiquitous role nobody really knows. CoRR abs/2212.07712 (2022) - 2021
- [j66]Ganbayar Uuganbayar, Artsiom Yautsiukhin, Fabio Martinelli, Fabio Massacci:
Optimisation of cyber insurance coverage with selection of cost effective security controls. Comput. Secur. 101: 102121 (2021) - [j65]Fabio Massacci, Chan Nam Ngo:
Distributed Financial Exchanges: Security Challenges and Design Principles. IEEE Secur. Priv. 19(1): 54-64 (2021) - [j64]Nicola Dragoni, Alberto Lluch-Lafuente, Fabio Massacci, Anders Schlichtkrull:
Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education]. IEEE Secur. Priv. 19(1): 81-88 (2021) - [j63]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [j62]Fabio Massacci, Trent Jaeger, Sean Peisert:
SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil? IEEE Secur. Priv. 19(2): 14-19 (2021) - [j61]Fabio Massacci, Ivan Pashchenko:
Technical Leverage: Dependencies Are a Mixed Blessing. IEEE Secur. Priv. 19(3): 58-62 (2021) - [j60]Francesco Minna, Agathe Blaise, Filippo Rebecchi, Balakrishnan Chandrasekaran, Fabio Massacci:
Understanding the Security Implications of Kubernetes Networking. IEEE Secur. Priv. 19(5): 46-56 (2021) - [j59]Giorgio Di Tizio, Fabio Massacci:
A Calculus of Tracking: Theory and Practice. Proc. Priv. Enhancing Technol. 2021(2): 259-281 (2021) - [c169]Chan Nam Ngo, Fabio Massacci, Florian Kerschbaum, Julian Williams:
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading. Financial Cryptography (2) 2021: 579-598 - [c168]Ivan Pashchenko, Riccardo Scandariato, Antonino Sabetta, Fabio Massacci:
Secure Software Development in the Era of Fluid Multi-party Open Software and Services. ICSE (NIER) 2021: 91-95 - [c167]Fabio Massacci, Ivan Pashchenko:
Technical Leverage in a Software Ecosystem: Development Opportunities and Security Risks. ICSE 2021: 1386-1397 - [c166]Duc-Ly Vu, Ivan Pashchenko, Fabio Massacci:
Please hold on: more time = more patches? Automated program repair as anytime algorithms. APR@ICSE 2021: 9-10 - [c165]Duc-Ly Vu, Fabio Massacci, Ivan Pashchenko, Henrik Plate, Antonino Sabetta:
LastPyMile: identifying the discrepancy between sources and packages. ESEC/SIGSOFT FSE 2021: 780-792 - [p4]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - [d4]Nicola Dragoni, Fabio Massacci, Alberto Lluch-Lafuente, Anders Schlichtkrull:
A Survey of European Cybersecurity in Higher Education Programs. IEEE DataPort, 2021 - [d3]Ivan Pashchenko, Duc-Ly Vu, Fabio Massacci:
Code Analysis Tables for Developers Interviews on Dependencies Paper. Version 1. Zenodo, 2021 [all versions] - [d2]Ivan Pashchenko, Duc-Ly Vu, Fabio Massacci:
Code Analysis Tables for Developers Interviews on Dependencies Paper. Version 1. Zenodo, 2021 [all versions] - [d1]Giorgio Di Tizio, Fabio Massacci:
Database - A Calculus of Tracking: Theory and Practice. Zenodo, 2021 - [i14]Fabio Massacci, Ivan Pashchenko:
Technical Leverage in a Software Ecosystem: Development Opportunities and Security Risks. CoRR abs/2103.03317 (2021) - [i13]Ivan Pashchenko, Riccardo Scandariato, Antonino Sabetta, Fabio Massacci:
Secure Software Development in the Era of Fluid Multi-party Open Software and Services. CoRR abs/2103.03331 (2021) - 2020
- [j58]Luca Allodi, Marco Cremonini, Fabio Massacci, Woohyun Shim:
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals. Empir. Softw. Eng. 25(2): 1063-1094 (2020) - [j57]Duc-Ly Vu, Trong-Kha Nguyen, Tam V. Nguyen, Tu N. Nguyen, Fabio Massacci, Phu H. Phung:
HIT4Mal: Hybrid image transformation for malware classification. Trans. Emerg. Telecommun. Technol. 31(11) (2020) - [j56]Pierantonia Sterlini, Fabio Massacci, Natalia Kadenko, Tobias Fiebig, Michel van Eeten:
Governance Challenges for European Cybersecurity Policies: Stakeholder Views. IEEE Secur. Priv. 18(1): 46-54 (2020) - [j55]Sebastian Pape, Federica Paci, Jan Jürjens, Fabio Massacci:
Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach. Inf. 11(5): 261 (2020) - [c164]Ivan Pashchenko, Duc-Ly Vu, Fabio Massacci:
A Qualitative Study of Dependency Management and Its Security Implications. CCS 2020: 1513-1531 - [c163]Duc-Ly Vu, Ivan Pashchenko, Fabio Massacci, Henrik Plate, Antonino Sabetta:
Towards Using Source Code Repositories to Identify Software Supply Chain Attacks. CCS 2020: 2093-2095 - [c162]Giorgio Di Tizio, Fabio Massacci, Luca Allodi, Stanislav Dashevskyi, Jelena Mirkovic:
An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags. EuroS&P Workshops 2020: 56-65 - [c161]Chan Nam Ngo, Daniele Friolo, Fabio Massacci, Daniele Venturi, Ettore Battaiola:
Vision: What If They All Die? Crypto Requirements For Key People. EuroS&P Workshops 2020: 178-183 - [c160]Luca Allodi, Alice Hutchings, Fabio Massacci, Sergio Pastrana, Marie Vasek:
WACCO 2020: the 2nd Workshop on Attackers and Cybercrime Operations Co-held with IEEE European Symposium on Security and Privacy 2020. EuroS&P Workshops 2020: 427 - [c159]Duc-Ly Vu, Ivan Pashchenko, Fabio Massacci, Henrik Plate, Antonino Sabetta:
Typosquatting and Combosquatting Attacks on the Python Ecosystem. EuroS&P Workshops 2020: 509-514 - [c158]Ivan Pashchenko, Duc-Ly Vu, Fabio Massacci:
Preliminary findings on FOSS dependencies and security: a qualitative study on developers' attitudes and experience. ICSE (Companion Volume) 2020: 284-285
2010 – 2019
- 2019
- [j54]Fabio Massacci:
Is "Deny Access" a Valid "Fail-Safe Default" Principle for Building Security in Cyberphysical Systems? IEEE Secur. Priv. 17(5): 90-93 (2019) - [j53]Neline van Ginkel, Willem De Groef, Fabio Massacci, Frank Piessens:
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries. Secur. Commun. Networks 2019: 9629034:1-9629034:21 (2019) - [j52]Alberto Giaretta, Nicola Dragoni, Fabio Massacci:
IoT Security Configurability with Security-by-Contract. Sensors 19(19): 4121 (2019) - [j51]Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta:
TestREx: a framework for repeatable exploits. Int. J. Softw. Tools Technol. Transf. 21(1): 105-119 (2019) - [j50]Stanislav Dashevskyi, Achim D. Brucker, Fabio Massacci:
A Screening Test for Disclosed Vulnerabilities in FOSS Components. IEEE Trans. Software Eng. 45(10): 945-966 (2019) - [j49]Duy-Phuc Pham, Duc-Ly Vu, Fabio Massacci:
Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques. J. Comput. Virol. Hacking Tech. 15(4): 249-257 (2019) - [c157]Ganbayar Uuganbayar, Fabio Massacci, Artsiom Yautsiukhin, Fabio Martinelli:
Cyber Insurance and Time-to-Compromise: An Integrated Approach. CyberSA 2019: 1-8 - [c156]Ettore Battaiola, Fabio Massacci, Chan Nam Ngo, Pierantonia Sterlini:
Blockchain-based Invoice Factoring: from business requirements to commitments. DLT@ITASEC 2019: 17-31 - [c155]Elia Geretto, Cédric Tessier, Fabio Massacci:
A QBDI-based Fuzzer Taming Magic Bytes. ITASEC 2019 - [c154]Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi:
Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols? Security Protocols Workshop 2019: 135-147 - [c153]Alberto Giaretta, Nicola Dragoni, Fabio Massacci:
Protecting the Internet of Things with Security-by-Contract and Fog Computing. WF-IoT 2019: 1-6 - [i12]Duc-Ly Vu, Trong-Kha Nguyen, Tam V. Nguyen, Tu N. Nguyen, Fabio Massacci, Phu H. Phung:
A Convolutional Transformation Network for Malware Classification. CoRR abs/1909.07227 (2019) - 2018
- [c152]Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci:
Vulnerable open source dependencies: counting those that matter. ESEM 2018: 42:1-42:10 - [c151]Katsiaryna Labunets, Fabio Massacci, Federica Paci, Sabrina Marczak, Flávio Moreira de Oliveira:
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations. ICSE 2018: 395 - [c150]Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams:
FuturesMEX: Secure, Distributed Futures Market Exchange. IEEE Symposium on Security and Privacy 2018: 335-353 - [c149]Fabio Massacci, Chan Nam Ngo, Daniele Venturi, Julian Williams:
Non-monotonic Security Protocols and Failures in Financial Intermediation. Security Protocols Workshop 2018: 45-54 - [c148]Fabio Massacci:
Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion). Security Protocols Workshop 2018: 55-62 - [i11]Luca Allodi, Fabio Massacci:
Attack Potential in Impact and Complexity. CoRR abs/1801.04703 (2018) - [i10]Luca Allodi, Marco Cremonini, Fabio Massacci, Woohyun Shim:
The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities. CoRR abs/1808.06547 (2018) - [i9]Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci:
Vulnerable Open Source Dependencies: Counting Those That Matter. CoRR abs/1808.09753 (2018) - 2017
- [j48]Maria Riaz, Jason Tyler King, John Slankas, Laurie A. Williams, Fabio Massacci, Christian Quesada-López, Marcelo Jenkins:
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates. Empir. Softw. Eng. 22(4): 2127-2178 (2017) - [j47]Katsiaryna Labunets, Fabio Massacci, Federica Paci, Sabrina Marczak, Flávio Moreira de Oliveira:
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations. Empir. Softw. Eng. 22(6): 3017-3056 (2017) - [c147]Luca Allodi, Fabio Massacci:
Attack Potential in Impact and Complexity. ARES 2017: 32:1-32:6 - [c146]Ivan Pashchenko, Stanislav Dashevskyi, Fabio Massacci:
Delta-Bench: Differential Benchmark for Static Analysis Security Testing Tools. ESEM 2017: 163-168 - [c145]Katsiaryna Labunets, Fabio Massacci, Alessandra Tedeschi:
Graphical vs. Tabular Notations for Risk Models: On the Role of Textual Labels and Complexity. ESEM 2017: 267-276 - [c144]Luca Allodi, Silvio Biagioni, Bruno Crispo, Katsiaryna Labunets, Fabio Massacci, Wagner Santos:
Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment. FDSE 2017: 23-39 - [c143]Katsiaryna Labunets, Andrea Janes, Michael Felderer, Fabio Massacci:
Teaching predictive modeling to junior software engineers - seminar format and its evaluation: poster. ICSE (Companion Volume) 2017: 339-340 - [c142]Ali Davanian, Fabio Massacci, Luca Allodi:
Diversity: A Poor Man's Solution to Drone Takeover. PECCS 2017: 25-34 - [c141]Katsiaryna Labunets, Fabio Massacci, Federica Paci:
On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment. REFSQ 2017: 191-208 - [c140]Ha Xuan Son, Tran Khanh Dang, Fabio Massacci:
REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies. SpaCCS 2017: 501-515 - [c139]Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams:
The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations. Security Protocols Workshop 2017: 171-179 - [e10]Eric Knauss, Angelo Susi, David Ameller, Daniel M. Berry, Fabiano Dalpiaz, Maya Daneva, Marian Daun, Oscar Dieste, Peter Forbrig, Eduard C. Groen, Andrea Herrmann, Jennifer Horkoff, Fitsum Meshesha Kifetew, Marite Kirikova, Alessia Knauss, Patrick Maeder, Fabio Massacci, Cristina Palomares, Jolita Ralyté, Ahmed Seffah, Alberto Siena, Bastian Tenbergen:
Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, Germany, February 27, 2017. CEUR Workshop Proceedings 1796, CEUR-WS.org 2017 [contents] - [i8]Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta:
TestREx: a Framework for Repeatable Exploits. CoRR abs/1709.03084 (2017) - 2016
- [j46]Viet Hung Nguyen, Stanislav Dashevskyi, Fabio Massacci:
An automatic method for assessing the versions affected by a vulnerability. Empir. Softw. Eng. 21(6): 2268-2297 (2016) - [j45]Karen Elliott, Fabio Massacci, Julian Williams:
Action, Inaction, Trust, and Cybersecurity's Common Property Problem. IEEE Secur. Priv. 14(1): 82-86 (2016) - [j44]Fabio Massacci, Raminder S. Ruprai, Matthew Collinson, Julian Williams:
Economic Impacts of Rules- versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers. IEEE Secur. Priv. 14(3): 52-60 (2016) - [j43]Luca Allodi, Marco Corradin, Fabio Massacci:
Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned. IEEE Trans. Emerg. Top. Comput. 4(1): 35-46 (2016) - [c138]Stanislav Dashevskyi, Achim D. Brucker, Fabio Massacci:
On the Security Cost of Using a Free and Open Source Component in a Proprietary Product. ESSoS 2016: 190-206 - 2015
- [j42]Martina de Gramatica, Fabio Massacci, Woohyun Shim, Alessandra Tedeschi, Julian Williams:
IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation. IEEE Secur. Priv. 13(5): 52-61 (2015) - [c137]Yury Zhauniarovich, Anton Philippov, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci:
Towards Black Box Testing of Android Apps. ARES 2015: 501-510 - [c136]Yury Zhauniarovich, Maqsood Ahmad, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci:
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. CODASPY 2015: 37-48 - [c135]Luca Allodi, Fabio Massacci:
The Work-Averse Attacker Model. ECIS 2015 - [c134]Minh Ngo, Fabio Massacci, Dimiter Milushev, Frank Piessens:
Runtime Enforcement of Security Policies on Black Box Reactive Programs. POPL 2015: 43-54 - [c133]Katsiaryna Labunets, Federica Paci, Fabio Massacci:
Which security catalogue is better for novices? EmpiRE 2015: 25-32 - [c132]Martina de Gramatica, Katsiaryna Labunets, Fabio Massacci, Federica Paci, Alessandra Tedeschi:
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals. REFSQ 2015: 98-114 - 2014
- [j41]Olga Gadyatskaya, Fabio Massacci, Yury Zhauniarovich:
Security in the Firefox OS and Tizen Mobile Platforms. Computer 47(6): 57-63 (2014) - [j40]Fabio Massacci, Federica Paci, Le Minh Sang Tran, Alessandra Tedeschi:
Assessing a requirements evolution approach: Empirical studies in the air traffic management domain. J. Syst. Softw. 95: 70-88 (2014) - [j39]Luca Allodi, Fabio Massacci:
Comparing Vulnerability Severity and Exploits Using Case-Control Studies. ACM Trans. Inf. Syst. Secur. 17(1): 1:1-1:20 (2014) - [j38]Fabio Massacci, Viet Hung Nguyen:
An Empirical Methodology to Evaluate Vulnerability Discovery Models. IEEE Trans. Software Eng. 40(12): 1147-1162 (2014) - [c131]Woohyun Shim, Fabio Massacci, Alessandra Tedeschi, Alessandro Pollini:
A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies. ARES 2014: 514-522 - [c130]Fabio Massacci, Federica Paci, Bjørnar Solhaug, Alessandra Tedeschi:
EMFASE - An Empirical Framework for Security Design and Economic Trade-off. ARES 2014: 537-543 - [c129]Willem De Groef, Fabio Massacci, Frank Piessens:
NodeSentry: least-privilege library integration for server-side JavaScript. ACSAC 2014: 446-455 - [c128]Martina de Gramatica, Fabio Massacci, Olga Gadyatskaya:
An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects. CSP Forum 2014: 159-170 - [c127]Matteo Giacalone, Federica Paci, Rocco Mammoliti, Rodolfo Perugino, Fabio Massacci, Claudio Selli:
Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements. ESEM 2014: 24:1-24:8 - [c126]Minh Ngo, Fabio Massacci:
Programmable enforcement framework of information flow policies. ICTCS 2014: 197-211 - [c125]Matteo Giacalone, Rocco Mammoliti, Fabio Massacci, Federica Paci, Rodolfo Perugino, Claudio Selli:
Security triage: A report of a lean security requirements methodology for cost-effective security analysis. EmpiRE 2014: 25-27 - [c124]Katsiaryna Labunets, Federica Paci, Fabio Massacci, Raminder S. Ruprai:
An experiment on comparing textual vs. visual industrial methods for security risk assessment. EmpiRE 2014: 28-35 - [c123]Le Minh Sang Tran, Fabio Massacci:
An Approach for Decision Support on the Uncertainty in Feature Model Evolution. RE 2014: 93-102 - [c122]Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta:
TESTREX: a Testbed for Repeatable Exploits. CSET 2014 - [p3]Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout, Fabio Massacci, Wouter Joosen:
Empirical Assessment of Security Requirements and Architecture: Lessons Learned. Engineering Secure Future Internet Services and Systems 2014: 35-64 - 2013
- [j37]Olga Gadyatskaya, Fabio Massacci, Quang Huy Nguyen, Boutheina Chetali:
Load time code validation for mobile phone Java Cards. J. Inf. Secur. Appl. 18(2-3): 108-129 (2013) - [c121]Woohyun Shim, Fabio Massacci, Martina de Gramatica, Alessandra Tedeschi, Alessandro Pollini:
Evaluation of Airport Security Training Programs: Perspectives and Issues. ARES 2013: 753-758 - [c120]Le Minh Sang Tran, Fabio Massacci:
UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolution. CAiSE Forum 2013: 161-168 - [c119]Viet Hung Nguyen, Fabio Massacci:
The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities. AsiaCCS 2013: 493-498 - [c118]Katsiaryna Labunets, Fabio Massacci, Federica Paci, Le Minh Sang Tran:
An Experimental Comparison of Two Risk-Based Security Methods. ESEM 2013: 163-172 - [c117]Vadim Kotov, Fabio Massacci:
Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts. ESSoS 2013: 181-196 - [c116]Luca Allodi, Woohyun Shim, Fabio Massacci:
Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring. IEEE Symposium on Security and Privacy Workshops 2013: 165-172 - [c115]Luca Allodi, Vadim Kotov, Fabio Massacci:
MalwareLab: Experimentation with Cybercrime Attack Tools. CSET 2013 - [i7]Luca Allodi, Fabio Massacci:
My Software has a Vulnerability, should I worry? CoRR abs/1301.1275 (2013) - [i6]Viet Hung Nguyen, Fabio Massacci:
The (Un)Reliability of NVD Vulnerable Versions Data: an Empirical Experiment on Google Chrome Vulnerabilities. CoRR abs/1302.4133 (2013) - [i5]Minh Ngo, Fabio Massacci, Olga Gadyatskaya:
MAP-REDUCE Runtime Enforcement of Information Flow Policies. CoRR abs/1305.2136 (2013) - [i4]Viet Hung Nguyen, Fabio Massacci:
A Systematically Empirical Evaluation of Vulnerability Discovery Models: a Study on Browsers' Vulnerabilities. CoRR abs/1306.2476 (2013) - 2012
- [j36]Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci, Anton Philippov:
High-level algorithms and data structures requirements for security-by-contract on Java cards. Int. J. Crit. Comput. Based Syst. 3(4): 284-304 (2012) - [j35]Jongmoon Baik, Fabio Massacci, Mohammad Zulkernine:
Guest Editorial: Special section on software reliability and security. Inf. Softw. Technol. 54(12): 1376 (2012) - [j34]Nataliia Bielova, Fabio Massacci:
Iterative enforcement by suppression: Towards practical enforcement theories. J. Comput. Secur. 20(1): 51-79 (2012) - [c114]Viet Hung Nguyen, Fabio Massacci:
An independent validation of vulnerability discovery models. AsiaCCS 2012: 6-7 - [c113]Luca Allodi, Fabio Massacci:
A preliminary analysis of vulnerability scores for attacks in wild: the ekits and sym datasets. BADGERS@CCS 2012: 17-24 - [c112]Woohyun Shim, Luca Allodi, Fabio Massacci:
Crime Pays If You Are Just an Average Hacker. CyberSecurity 2012: 62-68 - [c111]Viet Hung Nguyen, Fabio Massacci:
An Idea of an Independent Validation of Vulnerability Discovery Models. ESSoS 2012: 89-96 - [c110]Olga Gadyatskaya, Fabio Massacci:
Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract. FMCO 2012: 197-215 - [c109]Federica Paci, Fabio Massacci, Fabrice Bouquet, Stephane Debricon:
Managing Evolution by Orchestrating Requirements and Testing Engineering Processes. ICST 2012: 834-841 - [c108]Fabio Massacci, Federica Paci:
How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners. NordSec 2012: 89-104 - [c107]Fabio Massacci, Deepa Nagaraj, Federica Paci, Le Minh Sang Tran, Alessandra Tedeschi:
Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain. EmpiRE 2012: 49-56 - [c106]Olga Gadyatskaya, Fabio Massacci, Anton Philippov:
Security-by-Contract for the OSGi Platform. SEC 2012: 364-375 - [i3]Viet Hung Nguyen, Fabio Massacci:
An Independent Validation of Vulnerability Discovery Models. CoRR abs/1203.5830 (2012) - 2011
- [j33]Nataliia Bielova, Fabio Massacci:
Do you really mean what you actually enforced? - Edited automata revisited. Int. J. Inf. Sec. 10(4): 239-254 (2011) - [j32]Yudistira Asnar, Fabio Massacci, Ayda Saïdane, Carlo Riccucci, Massimo Felici, Alessandra Tedeschi, Paul El Khoury, Keqin Li, Magali Seguran, Nicola Zannone:
Organizational Patterns for Security and Dependability: From Design to Application. Int. J. Secur. Softw. Eng. 2(3): 1-22 (2011) - [c105]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
A Tool for Managing Evolving Security Requirements. CAiSE Forum 2011: 49-56 - [c104]Le Minh Sang Tran, Fabio Massacci:
Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution. CAiSE 2011: 62-76 - [c103]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
A Tool for Managing Evolving Security Requirements. CAiSE Forum (Selected Papers) 2011: 110-125 - [c102]Fabio Massacci, John Mylopoulos, Federica Paci, Thein Than Tun, Yijun Yu:
An Extended Ontology for Security Requirements. CAiSE Workshops 2011: 622-636 - [c101]Nataliia Bielova, Fabio Massacci:
Predictability of Enforcement. ESSoS 2011: 73-86 - [c100]Fabio Massacci, Stephan Neuhaus, Viet Hung Nguyen:
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes. ESSoS 2011: 195-208 - [c99]Wouter Joosen, Javier López, Fabio Martinelli, Fabio Massacci:
Engineering Secure Future Internet Services. Future Internet Assembly 2011: 177-192 - [c98]Yudistira Asnar, Fabio Massacci:
A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach. FOSAD 2011: 152-184 - [c97]Olga Gadyatskaya, Eduardo Lostal, Fabio Massacci:
Load Time Security Verification. ICISS 2011: 250-264 - [c96]Edith Felix, Olivier Delande, Fabio Massacci, Federica Paci:
Managing changes with legacy security engineering processes. ISI 2011: 137-142 - [c95]Nataliia Bielova, Dominique Devriese, Fabio Massacci, Frank Piessens:
Reactive non-interference for a browser model. NSS 2011: 97-104 - [c94]Nataliia Bielova, Fabio Massacci:
Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies. POLICY 2011: 89-96 - [c93]Nicola Dragoni, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci, Federica Paci:
A Load Time Policy Checker for Open Multi-application Smart Cards. POLICY 2011: 153-156 - [c92]Neil A. M. Maiden, Massimiliano Di Penta, Fabio Massacci:
Invited talks. EmpiRE 2011: 10-12 - [c91]Fabio Massacci, Fabrice Bouquet, Elizabeta Fourneret, Jan Jürjens, Mass Soldal Lund, Sébastien Madelénat, Jan Tobias Mühlberg, Federica Paci, Stéphane Paul, Frank Piessens, Bjørnar Solhaug, Sven Wenzel:
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper). ServiceWave 2011: 134-143 - [c90]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
SeCMER: A Tool to Gain Control of Security Requirements Evolution. ServiceWave 2011: 321-322 - [c89]Yudistira Asnar, Tong Li, Fabio Massacci, Federica Paci:
Computer Aided Threat Identification. CEC 2011: 145-152 - [p2]Fabio Massacci, Nicola Zannone:
Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. Social Modeling for Requirements Engineering 2011: 337-362 - 2010
- [j31]Gabor Karsai, Fabio Massacci, Leon J. Osterweil, Ina Schieferdecker:
Evolving Embedded Systems. Computer 43(5): 34-40 (2010) - [j30]Jan Camenisch, Javier López, Fabio Massacci, Massimo Ciscato, Thomas Skordas:
JCS special issue on EU-funded ICT research on Trust and Security. J. Comput. Secur. 18(1): 1-5 (2010) - [j29]Gabriele Costa, Aliaksandr Lazouski, Fabio Martinelli, Ilaria Matteucci, Valérie Issarny, Rachid Saadi, Nicola Dragoni, Fabio Massacci:
Security-by-Contract-with-Trust for Mobile Devices. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 75-91 (2010) - [j28]Luca Compagna, Paul El Khoury, Fabio Massacci, Ayda Saïdane:
A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application. Trans. Comput. Sci. 10: 1-24 (2010) - [c88]Gabriele Costa, Nicola Dragoni, Aliaksandr Lazouski, Fabio Martinelli, Fabio Massacci, Ilaria Matteucci:
Extending Security-by-Contract with Quantitative Trust on Mobile Devices. CISIS 2010: 872-877 - [c87]Stephan Neuhaus, Fabio Massacci:
Towards Security Climate Forecasts. Future Internet Assembly 2010: 41-50 - [c86]Riccardo Scandariato, Fabio Massacci:
SecureChange: Security Engineering for Lifelong Evolvable Systems. ISoLA (2) 2010: 9-12 - [c85]Olga Gadyatskaya, Fabio Massacci, Federica Paci, Sergey A. Stankevich:
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications. NordSec 2010: 187-192 - [c84]Fabio Massacci:
Infringo ergo sum: when will software engineering support infringements? FoSER 2010: 233-238 - [c83]Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci:
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? WISTP 2010: 221-228 - [p1]Fabio Massacci, John Mylopoulos, Nicola Zannone:
Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology. Advances in Intelligent Information Systems 2010: 147-174 - [e9]Fabio Massacci, Dan S. Wallach, Nicola Zannone:
Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Lecture Notes in Computer Science 5965, Springer 2010, ISBN 978-3-642-11746-6 [contents]
2000 – 2009
- 2009
- [j27]Luca Compagna, Paul El Khoury, Alzbeta Krausová, Fabio Massacci, Nicola Zannone:
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law 17(1): 1-30 (2009) - [j26]Nicola Dragoni, Fabio Massacci, Ayda Saïdane:
A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems. Comput. Networks 53(10): 1628-1648 (2009) - [j25]Nicola Dragoni, Fabio Massacci, Thomas Walter, Christian Schaefer:
What the heck is this application doing? - A security-by-contract architecture for pervasive services. Comput. Secur. 28(7): 566-577 (2009) - [j24]Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadko:
Generalized XML security views. Int. J. Inf. Sec. 8(3): 173-203 (2009) - [j23]Nataliia Bielova, Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Sri Rejeki Siahaan:
Matching in security-by-contract for mobile code. J. Log. Algebraic Methods Program. 78(5): 340-358 (2009) - [c82]Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin:
Logging key assurance indicators in business processes. AsiaCCS 2009: 364-367 - [c81]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Ida Sri Rejeki Siahaan, Dries Vanoverberghe:
A Security Architecture for Web 2.0 Applications. Future Internet Assembly 2009: 35-46 - [c80]Alzbeta Krausová, Fabio Massacci, Ayda Saïdane:
How to capture and use legal patterns in IT. ICAIL 2009: 228-229 - [c79]Daniela Marino, Fabio Massacci, Andrea Micheletti, Nataliya Rassadko, Stephan Neuhaus:
Satisfaction of Control Objectives by Control Processes. ICSOC/ServiceWave 2009: 531-545 - [c78]Nataliia Bielova, Fabio Massacci, Andrea Micheletti:
Towards Practical Enforcement Theories. NordSec 2009: 239-254 - [c77]Fabio Massacci, Viet Hung Nguyen:
Goal-Oriented Access Control Model for Ambient Assisted Living. PrimeLife 2009: 160-173 - [c76]Alzbeta Krausová, Fabio Massacci, Ayda Saïdane:
Legal Patterns Implement Trust in IT Requirements: When Legal Means are the "Best" Implementation of IT Technical Goals. RELAW 2009: 33-38 - [c75]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe:
The S3MS.NET Run Time Monitor: Tool Demonstration. BYTECODE@ETAPS 2009: 153-159 - [e8]Fabio Massacci, Samuel T. Redwine Jr., Nicola Zannone:
Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings. Lecture Notes in Computer Science 5429, Springer 2009, ISBN 978-3-642-00198-7 [contents] - [e7]Mike Barley, Haralambos Mouratidis, Amy Unruh, Diana F. Spears, Paul Scerri, Fabio Massacci:
Safety and Security in Multiagent Systems - Research Results from 2004-2006. Lecture Notes in Computer Science 4324, Springer 2009, ISBN 978-3-642-04878-4 [contents] - 2008
- [j22]Lieven Desmet, Wouter Joosen, Fabio Massacci, Pieter Philippaerts, Frank Piessens, Ida Sri Rejeki Siahaan, Dries Vanoverberghe:
Security-by-contract on the .NET platform. Inf. Secur. Tech. Rep. 13(1): 25-32 (2008) - [j21]Fabio Massacci, Frank Piessens, Sjouke Mauw:
Preface. Sci. Comput. Program. 74(1-2): 1 (2008) - [j20]Hristo Koshutanski, Fabio Massacci:
Interactive access control for autonomic systems: From theory to implementation. ACM Trans. Auton. Adapt. Syst. 3(3): 9:1-9:31 (2008) - [j19]Volkmar Lotz, Emmanuel Pigout, Peter M. Fischer, Donald Kossmann, Fabio Massacci, Alexander Pretschner:
Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach. Wirtschaftsinf. 50(5): 383-391 (2008) - [c74]Fabio Massacci, Katsiaryna Naliuka:
Towards Practical Security Monitors of UML Policies for Mobile Applications. ARES 2008: 1112-1119 - [c73]Fabio Massacci, Frank Piessens, Ida Sri Rejeki Siahaan:
Security-By-Contract for the Future Internet. FIS 2008: 29-43 - [c72]Nataliia Bielova, Fabio Massacci:
Do You Really Mean What You Actually Enforced?. Formal Aspects in Security and Trust 2008: 287-301 - [c71]Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka:
An Inline Monitoring System for .NET Mobile Devices. IFIPTM 2008: 363-366 - [c70]Fabio Massacci, Nicola Zannone:
A Model-Driven Approach for the Specification and Analysis of Access Control Policies. OTM Conferences (2) 2008: 1087-1103 - [c69]Fabio Massacci, Ida Sri Rejeki Siahaan:
Simulating midlet's security claims with automata modulo theory. PLAS 2008: 1-9 - [c68]Azzedine Benameur, Fabio Massacci, Nataliya Rassadko:
Security views for outsourced business processes. SWS 2008: 45-52 - [e6]Fabio Massacci, Frank Piessens:
Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, REM@ESORICS 2007, Dresden, Germany, September 27, 2007. Electronic Notes in Theoretical Computer Science 197(1), Elsevier 2008 [contents] - [e5]Akshai Aggarwal, Mohamad Badra, Fabio Massacci:
NTMS 2008, 2nd International Conference on New Technologies, Mobility and Security, November 5-7, 2008, Tangier, Morocco. IEEE 2008, ISBN 978-2-9532443-0-4 [contents] - [e4]Luca Compagna, Volkmar Lotz, Fabio Massacci:
Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007. Electronic Notes in Theoretical Computer Science 197(2), Elsevier 2008 [contents] - [i2]Fabio Martinelli, Fabio Massacci, Paolo Mori, Christian Schaefer, Thomas Walter:
Enhancing Java ME Security Support with Resource Usage Monitoring. ERCIM News 2008(75) (2008) - 2007
- [j18]Fabio Massacci, John Mylopoulos, Nicola Zannone:
Computer-aided Support for Secure Tropos. Autom. Softw. Eng. 14(3): 341-364 (2007) - [j17]Fabio Massacci, John Mylopoulos, Nicola Zannone:
From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. Int. J. Softw. Eng. Knowl. Eng. 17(2): 265-284 (2007) - [j16]Hristo Koshutanski, Fabio Massacci:
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication. J. Netw. Syst. Manag. 15(1): 117-136 (2007) - [c67]Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone:
From Trust to Dependability through Risk Analysis. ARES 2007: 19-26 - [c66]Fabio Massacci, Artsiom Yautsiukhin:
Modelling Quality of Protection in Outsourced Business Processes. IAS 2007: 247-252 - [c65]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe:
A flexible security architecture to support third-party applications on mobile devices. CSAW 2007: 19-28 - [c64]Fabio Massacci, Artsiom Yautsiukhin:
An algorithm for the appraisal of assurance indicators for complex business processes. QoP 2007: 22-27 - [c63]Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Sri Rejeki Siahaan:
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code. EuroPKI 2007: 297-312 - [c62]Luca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone:
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL 2007: 149-153 - [c61]Hugo A. López, Fabio Massacci, Nicola Zannone:
Goal-Equivalent Secure Business Process Re-engineering. ICSOC Workshops 2007: 212-223 - [c60]Ganna Frankova, Fabio Massacci, Magali Seguran:
From Early Requirements Analysis towards Secure Workflows. IFIPTM 2007: 407-410 - [c59]Fabio Massacci, Katsiaryna Naliuka:
Towards Practical Security Monitors of UML Policies for Mobile Applications. POLICY 2007: 278 - [c58]Nicola Dragoni, Fabio Massacci, Christian Schaefer, Thomas Walter, Eric Vétillard:
A Security-by-Contract Architecture for Pervasive Services. SECPerU 2007: 49-54 - [c57]Nicola Dragoni, Fabio Massacci:
Security-by-contract for web services. SWS 2007: 90-98 - [c56]Alexander Pretschner, Fabio Massacci, Manuel Hilty:
Usage Control in Service-Oriented Architectures. TrustBus 2007: 83-93 - [c55]Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin:
The Meaning of Logs. TrustBus 2007: 145-154 - [c54]Luca Compagna, Volkmar Lotz, Fabio Massacci:
Preface. STM@ESORICS 2007: 1-2 - [c53]Fabio Massacci, Frank Piessens:
Preface. REM@ESORICS 2007: 1-2 - 2006
- [j15]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec. 5(4): 257-274 (2006) - [j14]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson:
Verifying the SET Purchase Protocols. J. Autom. Reason. 36(1-2): 5-37 (2006) - [j13]Simon Dobson, Spyros G. Denazis, Antonio Fernández, Dominique Gaïti, Erol Gelenbe, Fabio Massacci, Paddy Nixon, Fabrice Saffre, Nikita Schmidt, Franco Zambonelli:
A survey of autonomic communications. ACM Trans. Auton. Adapt. Syst. 1(2): 223-259 (2006) - [j12]Fabio Massacci, John Mylopoulos, Nicola Zannone:
Hierarchical hippocratic databases with minimal disclosure for virtual organizations. VLDB J. 15(4): 370-387 (2006) - [c52]Volha Bryl, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Designing Security Requirements Models Through Planning. CAiSE 2006: 33-47 - [c51]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Detecting Conflicts of Interest. RE 2006: 308-311 - [c50]Yücel Karabulut, Florian Kerschbaum, Fabio Massacci, Philip Robinson, Artsiom Yautsiukhin:
Security and Trust in IT Business Outsourcing: a Manifesto. STM 2006: 47-58 - [e3]Günter Karjoth, Fabio Massacci:
Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006. ACM 2006, ISBN 1-59593-553-3 [contents] - [e2]Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio Massacci:
Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings. Lecture Notes in Computer Science 3986, Springer 2006, ISBN 3-540-34295-8 [contents] - [e1]Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin:
Quality of Protection - Security Measurements and Metrics. Advances in Information Security 23, Springer 2006, ISBN 978-0-387-29016-4 [contents] - 2005
- [j11]Fabio Massacci, Marco Prest, Nicola Zannone:
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Comput. Stand. Interfaces 27(5): 445-455 (2005) - [j10]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson:
An overview of the verification of SET. Int. J. Inf. Sec. 4(1-2): 17-28 (2005) - [c49]Fabio Massacci, John Mylopoulos, Nicola Zannone:
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. ESORICS 2005: 438-454 - [c48]Paolo Giorgini, Fabio Massacci, Nicola Zannone:
Security and Trust Requirements Engineering. FOSAD 2005: 237-272 - [c47]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Modeling Social and Individual Trust in Requirements Engineering Methodologies. iTrust 2005: 161-176 - [c46]Hristo Koshutanski, Fabio Massacci:
Interactive Credential Negotiation for Stateful Business Processes. iTrust 2005: 256-272 - [c45]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Alberto Siena, Nicola Zannone:
ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. iTrust 2005: 415-419 - [c44]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Modeling Security Requirements Through Ownership, Permission and Delegation. RE 2005: 167-176 - [c43]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
ST-Tool: A CASE Tool for Security Requirements Engineering. RE 2005: 451-452 - [c42]Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadko:
Generalized XML security views. SACMAT 2005: 77-84 - [c41]Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera:
Maintaining privacy on derived objects. WPES 2005: 10-19 - [c40]Alexey Gotsman, Fabio Massacci, Marco Pistore:
Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language. ARSPA@ICALP 2005: 59-77 - 2004
- [c39]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. EuroPKI 2004: 98-111 - [c38]Hristo Koshutanski, Fabio Massacci:
A System for Interactive Authorization for Business Processes for Web Services. ICWE 2004: 521-525 - [c37]Hristo Koshutanski, Fabio Massacci:
An Interactive Trust Management and Negotiation Scheme. Formal Aspects in Security and Trust 2004: 115-128 - [c36]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. iTrust 2004: 176-190 - [c35]Hristo Koshutanski, Fabio Massacci:
Interactive Access Control for Web Services. SEC 2004: 151-166 - [c34]Fabio Massacci, Nicola Zannone:
Privacy Is Linking Permission to Purpose. Security Protocols Workshop 2004: 179-191 - [c33]Fabio Massacci:
Privacy is Linking Permission to Purpose (Transcript of Discussion). Security Protocols Workshop 2004: 192-198 - [c32]Hristo Koshutanski, Fabio Massacci:
E Pluribus Unum. WAC 2004: 179-190 - 2003
- [j9]Claudia Fiorini, Enrico Martinelli, Fabio Massacci:
How to fake an RSA signature by encoding modular root finding as a SAT problem. Discret. Appl. Math. 130(2): 101-127 (2003) - [j8]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson:
Verifying the SET registration protocols. IEEE J. Sel. Areas Commun. 21(1): 77-87 (2003) - [c31]Paolo Giorgini, Fabio Massacci, John Mylopoulos:
Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard. ER 2003: 263-276 - [c30]Giampaolo Bella, Stefano Bistarelli, Fabio Massacci:
A Protocol's Life After Attacks.... Security Protocols Workshop 2003: 3-10 - [c29]Hristo Koshutanski, Fabio Massacci:
An access control framework for business processes for web services. XML Security 2003: 15-24 - 2002
- [c28]Luigia Carlucci Aiello, Fabio Massacci:
Planning Attacks to Security Protocols: Case Studies in Logic Programming. Computational Logic: Logic Programming and Beyond 2002: 533-560 - [c27]Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci:
The verification of an industrial payment protocol: the SET purchase phase. CCS 2002: 12-20 - [c26]Francesco M. Donini, Paolo Liberatore, Fabio Massacci, Marco Schaerf:
Solving QBF by SMV. KR 2002: 578-592 - 2001
- [j7]Luigia Carlucci Aiello, Fabio Massacci:
Verifying security protocols as planning in logic programming. ACM Trans. Comput. Log. 2(4): 542-580 (2001) - [c25]Luis Fariñas del Cerro, David Fauthoux, Olivier Gasquet, Andreas Herzig, Dominique Longin, Fabio Massacci:
Lotrec : The Generic Tableau Prover for Modal and Description Logics. IJCAR 2001: 453-458 - [c24]Fabio Massacci:
Decision Procedures for Expressive Description Logics with Intersection, Composition, Converse of Roles and Role Identity. IJCAI 2001: 193-198 - [c23]Luigia Carlucci Aiello, Fabio Massacci:
Attacking fair-exchange protocols: parallel models vs trace models. LACPV@CAV 2001: 51-68 - 2000
- [j6]Francesco M. Donini, Fabio Massacci:
EXPTIME tableaux for ALC. Artif. Intell. 124(1): 87-138 (2000) - [j5]Giuseppe De Giacomo, Fabio Massacci:
Combining Deduction and Model Checking into Tableaux and Algorithms for Converse-PDL. Inf. Comput. 162(1-2): 117-137 (2000) - [j4]Fabio Massacci, Laura Marraro:
Logical Cryptanalysis as a SAT Problem. J. Autom. Reason. 24(1/2): 165-203 (2000) - [j3]Fabio Massacci:
Single Step Tableaux for Modal Logics. J. Autom. Reason. 24(3): 319-364 (2000) - [j2]Fabio Massacci:
The proof complexity of analytic and clausal tableaux. Theor. Comput. Sci. 243(1-2): 477-487 (2000) - [c22]Peter Baumgartner, Fabio Massacci:
The Taming of the (X)OR. Computational Logic 2000: 508-522 - [c21]Luigia Carlucci Aiello, Fabio Massacci:
An Executable Specification Language for Planning Attacks to Security Protocols. CSFW 2000: 88-102 - [c20]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano:
Formal Verification of Cardholder Registration in SET. ESORICS 2000: 159-174 - [c19]Fabio Massacci:
Reduction rules and universal variables for first order tableaux and DPLL. KR 2000: 186-197 - [c18]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano:
Making Sense of Specifications: The Formalization of SET. Security Protocols Workshop 2000: 74-81 - [c17]Fabio Massacci, Francesco M. Donini:
Design and Results of TANCS-2000 Non-classical (Modal) Systems Comparison. TABLEAUX 2000: 52-56 - [i1]Maarit Hietalahti, Fabio Massacci, Ilkka Niemelä:
DES: a Challenge Problem for Nonmonotonic Reasoning Systems. CoRR cs.AI/0003039 (2000)
1990 – 1999
- 1999
- [c16]Fabio Massacci:
Using Walk-SAT and Rel-Sat for Cryptographic Key Search. IJCAI 1999: 290-295 - [c15]Fabio Massacci:
Design and Results of the Tableaux-99 Non-classical (Modal) Systems Comparison. TABLEAUX 1999: 14-18 - [c14]Fabio Massacci:
Automated Reasoning and the Verification of Security Protocols. TABLEAUX 1999: 32-33 - 1998
- [j1]Fabio Massacci:
Tableau Methods for Formal Verification of Multi-Agent Distributed Systems. J. Log. Comput. 8(3): 373-400 (1998) - [c13]Fabio Massacci:
Anytime Approximate Modal Reasoning. AAAI/IAAI 1998: 274-279 - [c12]Fabio Massacci:
Cook and Reckhow are Wrong: Subexponential Tableaux Proofs for Their Family of Formulae. ECAI 1998: 408-409 - [c11]Fabio Massacci:
Simplification: A General Constraint Propagation Technique for Propositional and Modal Tableaux. TABLEAUX 1998: 217-231 - 1997
- [c10]Fabio Massacci:
A Proof Theory for Tractable Approximations of Propositional Reasoning. AI*IA 1997: 219-230 - [c9]Fabio Massacci:
Breaking Security Protocols as an AI Planning Problem. ECP 1997: 286-298 - [c8]Fabio Massacci:
Reasoning About Security: A Logic and a Decision Method for Role-Based Access Control. ECSQARU-FAPR 1997: 421-435 - [c7]Fabio Massacci:
Tableaux Methods for Access Control in Distributed Systems. TABLEAUX 1997: 246-260 - 1996
- [c6]Fabio Massacci:
Contextual Reasoning Is NP-Complete. AAAI/IAAI, Vol. 1 1996: 621-626 - [c5]Giuseppe De Giacomo, Fabio Massacci:
Tableaux and Algorithms for Propositional Dynamic Logic with Converse. CADE 1996: 613-627 - [c4]Giuseppe De Giacomo, Francesco M. Donini, Fabio Massacci:
Exptime Tableaux for ALC. Description Logics 1996: 107-110 - [c3]Fabio Massacci:
Approximate Reasoning for Contextual Databases. ICTAI 1996: 308-315 - [c2]Francesco M. Donini, Fabio Massacci, Daniele Nardi, Riccardo Rosati:
A Uniform Tableaux Method for Nonmonotonic Modal Logics. JELIA 1996: 87-103 - 1994
- [c1]Fabio Massacci:
Strongly Analytic Tableaux for Normal Modal Logics. CADE 1994: 723-737
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint