Skip to main content

Showing 1–16 of 16 results for author: Degano, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2207.12326  [pdf, ps, other

    cs.CR cs.LO

    Automatic Fair Exchanges

    Authors: Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, Luca Viganò

    Abstract: In a decentralized environment, exchanging resources requires users to bargain until an agreement is found. Moreover, human agreements involve a combination of collaborative and selfish behavior and often induce circularity, complicating the evaluation of exchange requests. We introduce MuAC, a policy language that allows users to state in isolation under which conditions they are open to grant th… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

  2. arXiv:2205.15915  [pdf, ps, other

    cs.CR

    IFCIL: An Information Flow Configuration Language for SELinux (Extended Version)

    Authors: Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David Basin

    Abstract: Security Enhanced Linux (SELinux) is a security architecture for Linux implementing mandatory access control. It has been used in numerous security-critical contexts ranging from servers to mobile devices. But this is challenging as SELinux security policies are difficult to write, understand, and maintain. Recently, the intermediate language CIL was introduced to foster the development of high-le… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

    Comments: Extended version of the paper "IFCIL: An Information Flow Configuration Language for SELinux"

  3. arXiv:2003.05836  [pdf, ps, other

    cs.PL cs.CR

    Control-flow Flattening Preserves the Constant-Time Policy (Extended Version)

    Authors: Matteo Busi, Pierpaolo Degano, Letterio Galletta

    Abstract: Obfuscating compilers protect a software by obscuring its meaning and impeding the reconstruction of its original source code. The typical concern when defining such compilers is their robustness against reverse engineering and the performance of the produced code. Little work has been done in studying whether the security properties of a program are preserved under obfuscation. In this paper we s… ▽ More

    Submitted 12 March, 2020; originally announced March 2020.

    Comments: Extended version of ITASEC20 camera ready paper

  4. arXiv:2001.10881  [pdf, other

    cs.CR

    Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version

    Authors: Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens

    Abstract: Computer systems often provide hardware support for isolation mechanisms like privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features, bri… ▽ More

    Submitted 29 January, 2020; originally announced January 2020.

    Comments: Extended version of the paper "Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors"

  5. arXiv:1901.05082  [pdf, ps, other

    cs.PL cs.CR

    Translation Validation for Security Properties

    Authors: Matteo Busi, Pierpaolo Degano, Letterio Galletta

    Abstract: Secure compilation aims to build compilation chains that preserve security properties when translating programs from a source to a target language. Recent research led to the definition of secure compilation principles that, if met, guarantee that the compilation chain in hand never violates specific families of security properties. Still, to the best of our knowledge, no effective procedure is av… ▽ More

    Submitted 15 January, 2019; originally announced January 2019.

    Comments: Presented at PriSC Workshop 2019

  6. arXiv:1808.00225  [pdf, other

    cs.PL

    Using Standard Ty** Algorithms Incrementally

    Authors: Matteo Busi, Pierpaolo Degano, Letterio Galletta

    Abstract: Modern languages are equipped with static type checking/inference that helps programmers to keep a clean programming style and to reduce errors. However, the ever-growing size of programs and their continuous evolution require building fast and efficient analysers. A promising solution is incrementality, so one only re-types those parts of the program that are new, rather than the entire codebase.… ▽ More

    Submitted 27 November, 2018; v1 submitted 1 August, 2018; originally announced August 2018.

    Comments: corrected and updated; experimental results added

  7. Tool Supported Analysis of IoT

    Authors: Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Emilio Tuosto

    Abstract: The design of IoT systems could benefit from the combination of two different analyses. We perform a first analysis to approximate how data flow across the system components, while the second analysis checks their communication soundness. We show how the combination of these two analyses yields further benefits hardly achievable by separately using each of them. We exploit two independently devel… ▽ More

    Submitted 29 November, 2017; originally announced November 2017.

    Comments: In Proceedings ICE 2017, arXiv:1711.10708

    Journal ref: EPTCS 261, 2017, pp. 37-56

  8. Tracing where IoT data are collected and aggregated

    Authors: Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta

    Abstract: The Internet of Things (IoT) offers the infrastructure of the information society. It hosts smart objects that automatically collect and exchange data of various kinds, directly gathered from sensors or generated by aggregations. Suitable coordination primitives and analysis mechanisms are in order to design and reason about IoT systems, and to intercept the implied technological shifts. We addres… ▽ More

    Submitted 18 July, 2017; v1 submitted 26 October, 2016; originally announced October 2016.

    ACM Class: F.1.2; F.3.1

    Journal ref: Logical Methods in Computer Science, Volume 13, Issue 3 (July 19, 2017) lmcs:2186

  9. A Step Towards Checking Security in IoT

    Authors: Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta

    Abstract: The Internet of Things (IoT) is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

    Submitted 10 August, 2016; originally announced August 2016.

    Comments: In Proceedings ICE 2016, arXiv:1608.03131

    ACM Class: F.3.2; D.2.4

    Journal ref: EPTCS 223, 2016, pp. 128-142

  10. Automata for Specifying and Orchestrating Service Contracts

    Authors: Davide Basile, Pierpaolo Degano, Gian-Luigi Ferrari

    Abstract: An approach to the formal description of service contracts is presented in terms of automata. We focus on the basic property of guaranteeing that in the multi-party composition of principals each of them gets his requests satisfied, so that the overall composition reaches its goal. Depending on whether requests are satisfied synchronously or asynchronously, we construct an orchestrator that at sta… ▽ More

    Submitted 27 December, 2016; v1 submitted 28 July, 2016; originally announced July 2016.

    ACM Class: F.1.2; F.3.1; H.3.5; H.5.3

    Journal ref: Logical Methods in Computer Science, Volume 12, Issue 4 (April 27, 2017) lmcs:2614

  11. Event-driven Adaptation in COP

    Authors: Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta

    Abstract: Context-Oriented Programming languages provide us with primitive constructs to adapt program behaviour depending on the evolution of their operational environment, namely the context. In previous work we proposed ML_CoDa, a context-oriented language with two-components: a declarative constituent for programming the context and a functional one for computing. This paper describes an extension of ML… ▽ More

    Submitted 19 June, 2016; originally announced June 2016.

    Comments: In Proceedings PLACES 2016, arXiv:1606.05403

    Journal ref: EPTCS 211, 2016, pp. 37-45

  12. A Context-Oriented Extension of F#

    Authors: Andrea Canciani, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta

    Abstract: Context-Oriented programming languages provide us with primitive constructs to adapt program behaviour depending on the evolution of their operational environment, namely the context. In previous work we proposed ML_CoDa, a context-oriented language with two-components: a declarative constituent for programming the context and a functional one for computing. This paper describes the implementation… ▽ More

    Submitted 23 December, 2015; originally announced December 2015.

    Comments: In Proceedings FOCLASA 2015, arXiv:1512.06947

    ACM Class: D.1.1; D.1.6; D.3.4

    Journal ref: EPTCS 201, 2015, pp. 18-32

  13. From Orchestration to Choreography through Contract Automata

    Authors: Davide Basile, Pierpaolo Degano, Gian-Luigi Ferrari, Emilio Tuosto

    Abstract: We study the relations between a contract automata and an interaction model. In the former model, distributed services are abstracted away as automata - oblivious of their partners - that coordinate with each other through an orchestrator. The interaction model relies on channel-based asynchronous communication and choreography to coordinate distributed services. We define a notion of strong a… ▽ More

    Submitted 27 October, 2014; originally announced October 2014.

    Comments: In Proceedings ICE 2014, arXiv:1410.7013

    Journal ref: EPTCS 166, 2014, pp. 67-85

  14. Ty** Context-Dependent Behavioural Variation

    Authors: Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti

    Abstract: Context Oriented Programming (COP) concerns the ability of programs to adapt to changes in their running environment. A number of programming languages endowed with COP constructs and features have been developed. However, some foundational issues remain unclear. This paper proposes adopting static analysis techniques to reason on and predict how programs adapt their behaviour. We introduce a core… ▽ More

    Submitted 26 February, 2013; originally announced February 2013.

    Comments: In Proceedings PLACES 2012, arXiv:1302.5798

    ACM Class: D.3.1; F.3.1; F.3.2

    Journal ref: EPTCS 109, 2013, pp. 28-33

  15. Differential Privacy: on the trade-off between Utility and Information Leakage

    Authors: Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi

    Abstract: Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent datasets give the same answer is bound by e^epsilon. In the field of information flow there is a similar concern for controlling information leakage,… ▽ More

    Submitted 25 August, 2011; v1 submitted 27 March, 2011; originally announced March 2011.

    Comments: 30 pages; HAL repository

    Report number: inria-00580122

    Journal ref: Proceedings of the 8th International Workshop on Formal Aspects of Security & Trust (FAST'11), Springer, LNCS 7140, pp. 39-54, 2011

  16. arXiv:1012.4250  [pdf, ps, other

    cs.IT cs.CR cs.DB

    Differential Privacy versus Quantitative Information Flow

    Authors: Mário S. Alvim, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi

    Abstract: Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities of two different entries to originate a certain answer is bound by e^ε. In the fields of anonymity and information flow there is a similar concern for controlling info… ▽ More

    Submitted 20 December, 2010; originally announced December 2010.