Topic | People | Description | |
---|---|---|---|
Formal methods and theory of security standard compliant ACM 2012 | |||
Formal methods and theory of security |
Matteo Cristani Roberto Segala |
Development of formal, and possibly automated, methods for the analysis of the security of software systems | |
Formal methods for security analysis of cyber-physical systems |
Massimo Merro |
Development of formal, and possibly automated, methods for the security analysis of cyber-physical systems and IoT systems | |
Probabilistic Analysis of Security |
Alessandra Di Pierro Roberto Segala |
Static analysis of approximate security properties via Probabilistic Abstract Interpretation | |
Code protection |
Mariano Ceccato Mila Dalla Preda Roberto Giacobazzi Isabella Mastroeni |
Development of formal techniques and tools for the protection of software. | |
Network security standard compliant ACM 2012 | |||
Network security |
Matteo Cristani |
Development of techniques and tools for the security of computer networks | |
Software and application security standard compliant ACM 2012 | |||
Formal software and application security |
Mila Dalla Preda Roberto Giacobazzi Isabella Mastroeni |
Development of models and analyses, based on abstract interpretation, for the security application verification and for security properties enforcement. | |
Software and application security |
Federica Maria Francesca Paci |
Development of security methodologies and technologies for the security of software systems and Internet applications | |
Software creation and management standard compliant ACM 2012 | |||
Code synthesis |
Mila Dalla Preda Roberto Giacobazzi Isabella Mastroeni |
Study and development of techniques for the synthesis of code (or code transformers) from the specification of semantic code properties. | |
Software creation and management |
Federica Maria Francesca Paci |
Study and development of formal and semi-formal methodologies and technologies for the creation and management of software systems | |
Software organization and properties standard compliant ACM 2012 | |||
Static Analysis |
Mila Dalla Preda Roberto Giacobazzi Isabella Mastroeni Nicola Fausto Spoto |
Study of techniques for the static analysis of programming languages. Inference of properties of the heap memory used by programs. Inference of security properties for information manipulated by computer programs. | |
Quantitative static analysis |
Alessandra Di Pierro |
Study of formal methods for quantitative analysis of programs. Extension of classical program analysis techniques (data-flow, control-flow, abstract interpretation,type systems)to probabilistic and speculative analysis for program optimisation and transformation. | |
Verification of wireless network protocols |
Massimo Merro |
Semantics-based and model-checking techniques for the verification of wireless network protocols |
Name | Description | URL |
---|---|---|
Blockchain | L'attività del gruppo di ricerca riguarda diverse tematiche relative allo sviluppo e all'applicazione della tecnologia blockchain e dell'infrastruttura degli smart contracts. | |
ForME - Metodi Formali per la Progettazione di Sistemi Ingegneristici | Obiettivo del gruppo di ricerca è applicare metodi formali alla modellazione, verifica e sintesi di sistemi ingegneristici. I domini spaziano dai sistemi temporizzati per andare fino ai sistemi ciberfisici non lineari. | |
Intelligenza Artificiale (IA) | Il gruppo svolge ricerche in Intelligenza Artificiale: Ragionamento Automatico, Algoritmi di Ricerca, Rappresentazione della Conoscenza, Apprendimento Automatico, Sistemi Multi-Agenti e applicazioni. | |
K.Re.Art.I. | Rappresentazione della conoscenza tramite tecniche di IJntelligenza Artificiale | |
Logica | Logica in matematica ed informatica. | https://www.logicverona.it/ |
Quantum Informatics Laboratory - QUILAB | Laboratorio di Informatica Quantistica | https://quilab.github.io |
SPY |
CSS e script comuni siti DOL - frase 9957