Topic | People | Description | |
---|---|---|---|
Formal methods and theory of security standard compliant ACM 2012 | |||
Formal methods and theory of security |
Matteo Cristani Roberto Segala Luca Vigano' |
Development of formal, and possibly automated, methods for the analysis of the security of software systems | |
Formal methods for security analysis of cyber-physical systems |
Massimo Merro |
Development of formal, and possibly automated, methods for the security analysis of cyber-physical systems and IoT systems | |
Probabilistic Analysis of Security |
Alessandra Di Pierro Roberto Segala |
Static analysis of approximate security properties via Probabilistic Abstract Interpretation | |
Code protection |
Mila Dalla Preda Roberto Giacobazzi Isabella Mastroeni Luca Vigano' |
Development of formal techniques and tools for the protection of software. | |
Network security standard compliant ACM 2012 | |||
Network security |
Matteo Cristani Luca Vigano' |
Development of techniques and tools for the security of computer networks | |
Software and application security standard compliant ACM 2012 | |||
Formal software and application security |
Mila Dalla Preda Roberto Giacobazzi Isabella Mastroeni |
Development of models and analyses, based on abstract interpretation, for the security application verification and for security properties enforcement. | |
Software and application security |
Federica Maria Francesca Paci Luca Vigano' |
Development of security methodologies and technologies for the security of software systems and Internet applications | |
Software creation and management standard compliant ACM 2012 | |||
Code synthesis |
Mila Dalla Preda Roberto Giacobazzi Isabella Mastroeni |
Study and development of techniques for the synthesis of code (or code transformers) from the specification of semantic code properties. | |
Software creation and management |
Federica Maria Francesca Paci Luca Vigano' |
Study and development of formal and semi-formal methodologies and technologies for the creation and management of software systems | |
Software Verification |
Luca Vigano' |
Decision procedures for satisfiability modulo theories and their application to check program properties; invariant generation by theorem proving; interpolating theorem proving; abstraction refinement for either model checking or static analysis by theorem proving | |
Software organization and properties standard compliant ACM 2012 | |||
Static Analysis |
Mila Dalla Preda Roberto Giacobazzi Isabella Mastroeni Nicola Fausto Spoto |
Study of techniques for the static analysis of programming languages. Inference of properties of the heap memory used by programs. Inference of security properties for information manipulated by computer programs. | |
Quantitative static analysis |
Alessandra Di Pierro |
Study of formal methods for quantitative analysis of programs. Extension of classical program analysis techniques (data-flow, control-flow, abstract interpretation,type systems)to probabilistic and speculative analysis for program optimisation and transformation. | |
Verification of wireless network protocols |
Massimo Merro |
Semantics-based and model-checking techniques for the verification of wireless network protocols |
Name | Description | URL |
---|---|---|
K.Re.Art.I. | Rappresentazione della conoscenza tramite tecniche di IJntelligenza Artificiale | |
Logica | Logica in matematica ed informatica. | https://www.logicverona.it/ |
QUILAB | Quantum Informatics Laboratory | https://amasini58.wixsite.com/quilab |
REGIS: Research Group in Information Security | Studio e sviluppo di metodologie formali per l'analisi, l'ottimizzazione, la certificazione, la robustezza e la sicurezza di sistemi software complessi | http://regis.scienze.univr.it |
SPY |