Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Riccardo Focardi is active.

Publication


Featured researches published by Riccardo Focardi.


Journal of Computer Security | 1995

A Classification of Security Properties for Process Algebras

Riccardo Focardi; Roberto Gorrieri

Several information flow security definitions, proposed in the literature, are generalized and adapted to the model of labelled transition systems. This very general model has been widely used as a semantic domain for many process algebras, e.g. CCS. As a by-product, we provide a process algebra similar to CCS with a set of security notions, hence relating these two areas of concurrency research. A classification of these generalized security definitions is presented, taking into account also the additional property of input totality, which can influence this taxonomy. We also show that some of these security properties are composable w.r.t. the operators of parallelism and action restriction.


IEEE Transactions on Software Engineering | 1997

The Compositional Security Checker: a tool for the verification of information flow security properties

Riccardo Focardi; Roberto Gorrieri

The Compositional Security Checker (CoSeC for short) is a semantic-based tool for the automatic verification of some compositional information flow properties. The specifications given as inputs to CoSeC are terms of the Security Process Algebra, a language suited for the specification of concurrent systems where actions belong to two different levels of confidentiality. The information flow security properties which can be verified by CoSeC are some of those classified in (Focardi and Gorrieri, 1994). They are derived from some classic notions, e.g., noninterference. The tool is based on the same architecture as the Concurrency Workbench, from which some modules have been imported unchanged. The usefulness of the tool is tested with the significant case-study of an access-monitor, presented in several versions in order to illustrate the relative merits of the various information flow properties that CoSeC can check. Finally, we present an application in the area of network security: we show that the theory (and the tool) can be reasonably applied also for singling out security flaws in a simple, yet paradigmatic, communication protocol.


International School on Foundations of Security Analysis and Design | 1993

A Classification of Security Properties

Riccardo Focardi; Roberto Gorrieri

Several security definitions proposed in the literature are reformulated over the general model of labelled transition systems, frequently used as a suitable semantic domain for abstract concurrent languages, such as CCS. A classification of these security properties is provided.


international colloquium on automata languages and programming | 2000

Non Interference for the Analysis of Cryptographic Protocols

Riccardo Focardi; Roberto Gorrieri; Fabio Martinelli

Many security properties of cryptographic protocols can be all seen as specific instances of a general property, we called Non Deducibility on Composition (NDC), that we proposed a few years ago for studying information flow properties in computer systems. The advantage of our unifying theory is that formal comparison among these properties is now easier and that the full generality of NDC has helped us in finding a few new attacks on cryptographic protocols.


ieee computer security foundations symposium | 2000

Information flow analysis in a discrete-time process algebra

Riccardo Focardi; Roberto Gorrieri; Fabio Martinelli

Some of the non-interference properties studied in (Focardi, 1998; Focardi and Gorrieri, 1995) for information flow analysis in computer systems, notably BNDC, are reformulated in a real-time setting. This is done by enhancing the Security Process Algebra of (Focardi and Gorrieri, 1997; Focardi and Martinelli, 1999) with some extra constructs to model real-time systems (in a discrete time setting); and then by studying the natural extensions of those properties in this enriched setting. We prove essentially the same results known for the untimed case: ordering relation among properties, compositionality aspects, partial model checking techniques. Finally, we illustrate a case study of a system that presents no information flows when analyzed without considering timing constraints. When the specification is refined with time, some interesting information flows are detected.


ieee computer security foundations symposium | 2002

Information flow ecurity in dynamic contexts

Riccardo Focardi; Sabina Rossi

We study a security property for processes in dynamic contexts, i.e., contexts that can be reconfigured at runtime. The security property that we propose in this paper, namedPersistentBNDC, is such that a process is “secure” when every state reachable from it satisfies a basic Non-Interference property. We define a suitable bisimulation based equivalence relation among processes, that allows us to express the new property as a single equivalence check, thus avoiding the universal quantifications over all the reachable states (required by PersistentBNDC) and over all the possible hostile environments (implicit in the basic Non-Interference property we adopt). We show that the novel security property is compositional and we discuss how it can be efficiently checked.


computer and communications security | 2010

Attacking and fixing PKCS#11 security tokens

Matteo Bortolozzo; Matteo Centenaro; Riccardo Focardi; Graham Steel

We show how to extract sensitive cryptographic keys from a variety of commercially available tamper resistant cryptographic security tokens, exploiting vulnerabilities in their RSA PKCS#11 based APIs. The attacks are performed by Tookan, an automated tool we have developed, which reverse-engineers the particular token in use to deduce its functionality, constructs a model of its API for a model checker, and then executes any attack trace found by the model checker directly on the token. We describe the operation of Tookan and give results of testing the tool on 17 commercially available tokens: 9 were vulnerable to attack, while the other 8 had severely restricted functionality. One of the attacks found by the model checker has not previously appeared in the literature. We show how Tookan may be used to verify patches to insecure devices, and give a secure configuration that we have implemented in a patch to a software token simulator. This is the first such configuration to appear in the literature that does not require any new cryptographic mechanisms to be added to the standard. We comment on lessons for future key management APIs.


IEEE Journal on Selected Areas in Communications | 2003

Real-time information flow analysis

Riccardo Focardi; Roberto Gorrieri; Fabio Martinelli

In previous work, we studied some noninterference properties for information flow analysis in computer systems on classic (possibilistic) labeled transition systems. In this paper, some of these properties, notably bisimulation-based nondeducibility on compositions (BNDC), are reformulated in a real-time setting. This is done by first enhancing the security process algebra proposed by two of the authors with some extra constructs to model real-time systems (in a discrete time setting), and then by studying the natural extension of these properties in this enriched setting. We prove essentially the same results known for the untimed case: ordering relation among properties, compositionality aspects, partial model checking techniques. Finally, we illustrate the approach through two case studies, where in both cases the untimed specification is secure, while the timed specification may show up interesting timing covert channels.


ACM Transactions on Software Engineering and Methodology | 2000

A compiler for analyzing cryptographic protocols using noninterference

Antonio Durante; Riccardo Focardi; Roberto Gorrieri

The Security Process Algebra (SPA) is a CCS-like specification languag e where actions belong to two different levels of confidentiality. It has been used to define several noninterference-like security properties whose verification has been automated by the tool CoSeC. In recent years, a method for analyzing security protocols using SPA and CoSeC has been developed. Even if it has been useful in analyzing small security protocols, this method has shown to be error-prone, as it requires the protocol description and its environment to be written by hand. This problem has been solved by defining a protocol specification language more abstract than SPA, called VSP, and a compiler CVS that automatically generates the SPA specification for a given protocol described in VSP. The VSP/CVS technology is very powerful, and its usefulness is shown with some case studies: the Woo-Lam one-way authentication protocol, for which a new attack to authentication is found, and the Wide Mouthed Frog protocol, where different kinds of attack are detected and analyzed.


Information Processing Letters | 2000

Feedback vertex set in hypercubes

Riccardo Focardi; Flaminia L. Luccio; David Peleg

Abstract Given a graph G=(V,E) , the minimum feedback vertex set V is a subset of vertices of minimum size whose removal induces an acyclic subgraph G′=(V\ V ,E′) . The problem of finding V is NP -hard for general networks but interesting polynomial solutions have been found for particular graph classes. In this paper we find close upper and lower bounds to the size of V in a k -dimensional hypercube.

Collaboration


Dive into the Riccardo Focardi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Flaminia L. Luccio

Ca' Foscari University of Venice

View shared research outputs
Top Co-Authors

Avatar

Michele Bugliesi

Ca' Foscari University of Venice

View shared research outputs
Top Co-Authors

Avatar

Agostino Cortesi

Ca' Foscari University of Venice

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sabina Rossi

Ca' Foscari University of Venice

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chiara Braghin

Ca' Foscari University of Venice

View shared research outputs
Researchain Logo
Decentralizing Knowledge