Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Linda Brodo is active.

Publication


Featured researches published by Linda Brodo.


IEEE Transactions on Pattern Analysis and Machine Intelligence | 2010

The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB)

Javier Ortega-Garcia; Julian Fierrez; Fernando Alonso-Fernandez; Javier Galbally; Manuel Freire; Joaquin Gonzalez-Rodriguez; Carmen García-Mateo; Jose-Luis Alba-Castro; Elisardo González-Agulla; Enrique Otero-Muras; Sonia Garcia-Salicetti; Lorene Allano; Bao Ly-Van; Bernadette Dorizzi; Josef Kittler; Thirimachos Bourlai; Norman Poh; Farzin Deravi; Ming Wah R. Ng; Michael C. Fairhurst; Jean Hennebert; Andrea Monika Humm; Massimo Tistarelli; Linda Brodo; Jonas Richiardi; Andrzej Drygajlo; Harald Ganster; Federico M. Sukno; Sri-Kaushik Pavani; Alejandro F. Frangi

A new multimodal biometric database designed and acquired within the framework of the European BioSecure Network of Excellence is presented. It is comprised of more than 600 individuals acquired simultaneously in three scenarios: 1 over the Internet, 2 in an office environment with desktop PC, and 3 in indoor/outdoor environments with mobile portable hardware. The three scenarios include a common part of audio/video data. Also, signature and fingerprint data have been acquired both with desktop PC and mobile portable hardware. Additionally, hand and iris data were acquired in the second scenario using desktop PC. Acquisition has been conducted by 11 European institutions. Additional features of the BioSecure Multimodal Database (BMDB) are: two acquisition sessions, several sensors in certain modalities, balanced gender and age distributions, multimodal realistic scenarios with simple and quick tasks per modality, cross-European diversity, availability of demographic data, and compatibility with other multimodal databases. The novel acquisition conditions of the BMDB allow us to perform new challenging research and evaluation of either monomodal or multimodal biometric systems, as in the recent BioSecure Multimodal Evaluation campaign. A description of this campaign including baseline results of individual modalities from the new database is also given. The database is expected to be available for research purposes through the BioSecure Association during 2008.


parallel computing technologies | 2007

A stochastic semantics for bioambients

Linda Brodo; Pierpaolo Degano; Corrado Priami

We consider BioAmbients, a calculus for specifying biological entities and for simulating and analysing their behaviour. We extend BioAmbients to take quantitative information into account by defining a stochastic semantics, based on a simulation stochastic algorithm, to determine the actual rate of transitions.


tests and proofs | 2008

Distinctiveness of faces: A computational approach

Manuele Bicego; Enrico Grosso; Andrea Lagorio; Gavin Brelstaff; Linda Brodo; Massimo Tistarelli

This paper develops and demonstrates an original approach to face-image analysis based on identifying distinctive areas of each individuals face by its comparison to others in the population. The method differs from most others—that we refer as unary—where salient regions are defined by analyzing only images of the same individual. We extract a set of multiscale patches from each face image before projecting them into a common feature space. The degree of “distinctiveness” of any patch depends on its distance in feature space from patches mapped from other individuals. First a pairwise analysis is developed and then a simple generalization to the multiple-face case is proposed. A perceptual experiment, involving 45 observers, indicates the method to be fairly compatible with how humans mark faces as distinct. A quantitative example of face authentication is also performed in order to show the essential role played by the distinctive information. A comparative analysis shows that performance of our n-ary approach is as good as several contemporary unary, or binary, methods, while tapping a complementary source of information. Furthermore, we show it can also provide a useful degree of illumination invariance.


Journal of Computer Security | 2010

Detecting and preventing type flaws at static time

Chiara Bodei; Linda Brodo; Pierpaolo Degano; Han Gao

A type flaw attack on a security protocol is an attack where an honest principal is cheated on interpreting a field in a message as the one with a type other than the intended one. In this paper, we shall present an extension of the LYSA calculus to cope with types, by using tags to represent the intended types of terms. We develop a Control Flow Analysis for this calculus which soundly over-approximates all the possible behaviour of a protocol and, in particular, is able to capture any type confusion that may occur during the protocol execution. The analysis acts in a descriptive way: it describes which violations may occur. In the same setting, our approach also offers a prescriptive usage: we can impose a type discipline, by forcing some data to be of the expected types. At this point, the analysis may statically check that type violations are not possible any longer. In other words, we instrument the code with the only checks necessary to enforce type security. Finally, we apply our framework to a multi-protocol setting, where the risk of having type flaw attacks is higher. Our analysis has been implemented and successfully applied to a number of security protocols, showing it is able to capture type flaw attacks. The implementation complexity of the analysis is low polynomial.


Electronic Notes in Theoretical Computer Science | 2007

Detecting and Preventing Type flaws: a Control Flow Analysis with Tags

Chiara Bodei; Pierpaolo Degano; Han Gao; Linda Brodo

A type flaw attack on a security protocol is an attack where an honest principal is cheated on interpreting a field in a message as the one with a type other than the intended one. In this paper, we shall present an extension of the LySa calculus with tags attached to each field, indicating the intended types. We developed a control flow analysis for analysing the extended LySa, which over-approximates all the possible behaviour of a protocol and hence is able to capture any type confusion that may happen during the protocol execution. The control flow analysis has been applied to a number of security protocols, either subject to type flaw attacks or not. The results show that it is able to capture type flaw attacks on those security protocols.


Lecture Notes in Computer Science | 2003

Performance Evaluation for Global Computation

Linda Brodo; Pierpaolo Degano; Stephen Gilmore; Jane Hillston; Corrado Priami

Global computing applications co-ordinate distributed computations across widely-dispersed hosts. Such systems present formidable design and implementation challenges to software developers and synchronisation, scheduling and performance problems come to the fore. Complex systems such as these can benefit from the application of high-level performance analysis methods founded on timed process algebras. In this paper we compare the use of two such approaches, the PEPA nets and EOS methods, illustrating our presentation with the example of modelling Web services.


workshop on information technologies and systems | 2009

Static Detection of Logic Flaws in Service-Oriented Applications

Chiara Bodei; Linda Brodo; Roberto Bruni

Application or business logic, used in the development of services, has to do with the operations that define the application functionalities and not with the platform ones. Often security problems can be found at this level, because circumventing or misusing the required operations can lead to unexpected behaviour or to attacks, called application logic attacks. We investigate this issue, by using the CaSPiS calculus to model services, and by providing a Control Flow Analysis able to detect and prevent some possible misuses.


workshop on recent trends in algebraic development techniques | 2012

Open multiparty interaction

Chiara Bodei; Linda Brodo; Roberto Bruni

We present the link-calculus, a process calculus based on interactions that are multiparty, i.e., that may involve more than two processes and are open, i.e., the number of involved processes is not fixed or known a priori. Communications are seen as chains of links, that record the source and the target ends of each hop of interactions. The semantics of our calculus mildly extends the one of CCS in the version without message passing, and the one of π-calculus in the full version. Cardelli and Gordon’s Mobile Ambients, whose movement interactions we show to be inherently open multi-party, is encoded in our calculus in a natural way, thus providing an illustrative example of its expressiveness.


algebraic biology | 2007

Deducing interactions in partially unspecified biological systems

Paolo Baldan; Andrea Bracciali; Linda Brodo; Roberto Bruni

We show how a symbolic approach to the semantics of process algebras can be fruitfully applied to the modeling and analysis of partially unspecified biological systems, i.e., systems whose components are not fully known, cannot be described entirely, or whose functioning is not completely understood. This adds a novel deductive perspective to the use of process algebras within systems biology: the investigation of the behavioural or structural properties that unspecified components must satisfy to interact within the system. These can be computationally inferred, extending the effectiveness of the in silico experiments. The use of the approach is illustrated by means of case studies.


Lecture Notes in Computer Science | 2015

Static Evidences for Attack Reconstruction

Chiara Bodei; Linda Brodo; Riccardo Focardi

Control Flow Analysis CFA has been proven successful for the analysis of cryptographic protocols. Due to its over-approximative nature, the absence of detected flaws implies their absence also at run time, while their presence only says that there is the possibility for flaws to occur. Nevertheless, the static detection of a flaw can be considered as a warning bell that alerts against a possible attack, of which the flaw is the result. Reconstructing the possible attack leading to the detected flaw is not trivial, though. We propose a CFA enriched with causal information that accounts for attacker activity. In case a flaw is predicted, the causal information provides a sort of climbing holds that can be escalated to reconstruct the attack sequence leading to the flaw.

Collaboration


Dive into the Linda Brodo's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge