Home
Research
Teaching
Calendar
Links

Research Interests

  • Language-based Security
  • Cryptographic protocols
  • Static analysis
  • Theory of concurrency
  • Type theory

Journal, Conference, and Workshop Papers

  • Achieving Security Despite Compromise Using Zero-Knowledge
    Michael Backes, Martin Grochulla, Catalin Hritcu, and Matteo Maffei. To appear in 22nd IEEE Symposium on Computer Security Foundations (CSF 2009).
  • Design and Verification of Anonymous Trust Protocols
    Michael Backes and Matteo Maffei. To appear in 17th International Workshop on Security Protocols, 2009.
  • Type-checking Zero-knowledge
    Michael Backes, Catalin Hritcu, and Matteo Maffei. In Proceedings of 15th ACM Conference on Computer and Communications Security (CCS 2008), ACM, pages 357-370, ISBN 978-1-59593-810-7. Long version (pdf).
  • The CASPA Tool: Causality-based Abstraction for Security Protocol Analysis (Tool Paper)
    Michael Backes, Stefan Lorenz, Matteo Maffei, and Kim Pecina. In Proceedings of 20th International Conference on Computer Aided Verification (CAV 2008), LNCS, volume 5123, Springer-Verlag, pages 419-422, ISBN 978-3-540-70543-7. (pdf)
  • Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays (Brief Announcement)
    Michael Backes, Marek Hamerlick, Alessandro Linari, Matteo Maffei, Christos Tryphonopoulos, and Gerhard Weikum. In Proceedings of 27th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2008), ACM, page 429, ISBN 978-1-59593-989-0. (pdf). Long version (pdf).
  • Automated Verification of Electronic Voting Protocols in the Applied Pi-calculus
    Michael Backes, Catalin Hritcu, and Matteo Maffei. In Proceedings of 21st IEEE Symposium on Computer Security Foundations (CSF 2008), IEEE, pages 195-209,ISBN 978-0-7695-3183-3. (pdf)
  • Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
    Michael Backes, Matteo Maffei and Dominique Unruh. In Proceedings of IEEE Symposium on Security and Privacy 2008, IEEE, pages 202-215, ISBN 978-0-7695-3168-7. (pdf). Long version (pdf).
  • A Calculus of Challenges and Responses
    Michael Backes, Agostino Cortesi, Riccardo Focardi and Matteo Maffei. In Proceedings of 5th ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE 2007), ACM, pages 51-60, ISBN 978-1-59593-887. (pdf)
  • Causality-based Abstraction of Multiplicity in Cryptographic Protocols
    Michael Backes, Agostino Cortesi and Matteo Maffei. In Proceedings of 20th IEEE Computer Security Foundations Symposium (CSF-20 2007), pages 355-369, ISBN 0-7695-2819-8. (pdf)
  • Dynamic Types for Authentication
    Michele Bugliesi, Riccardo Focardi and Matteo Maffei. In Journal of Computer Security, volume 15, number 6, pages 563-617, 2007. (pdf)
  • Analysis of Typed Analyses of Authentication Protocols
    Michele Bugliesi, Riccardo Focardi and Matteo Maffei. In Proceedings of 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), pages 112-125, ISBN 0-7695-2340-4. (pdf)
  • Inferring Authentication Tags
    Riccardo Focardi, Matteo Maffei and Francesco Placella. In proceedings of 2005 IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security (WITS 2005), ACM Digital Library, pages 42-49, ISBN 1-58113-980-2. (pdf)
  • Authenticity by Tagging and Typing
    Michele Bugliesi, Riccardo Focardi and Matteo Maffei. In proceedings of 2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE 2004), ACM, pages 1-12, ISBN 1-58113-971-3. (pdf)
  • Tags for Multi-Protocol Authentication
    Matteo Maffei. In proceedings of 2nd International Workshop on Security Issues in Coordination Models, Languages and Systems (SECCO 2004), London, United Kingdom, Electronic Notes in Theoretical Computer Science, Elsevier, volume 128, pages 55-63, 2004. (pdf)
  • p-spi calculus at work: Authentication Case Studies
    Riccardo Focardi and Matteo Maffei. In proceedings of Mefisto Project, Formal Methods for Security and Time, Electronic Notes in Theoretical Computer Science, Elsevier, volume 99, pages 267-293, 2004. (pdf)
  • Compositional Analysis of Authentication Protocol
    Michele Bugliesi, Riccardo Focardi and Matteo Maffei. In proceedings of the European Symposium on Programming (ESOP 2004), Barcelona, Spain, March 2004, LNCS 2986, Springer-Verlag, pg 140-154. (pdf)
  • Principles for Entity Authentication
    Michele Bugliesi, Riccardo Focardi and Matteo Maffei. In proceedings of Andrei Ershov Fifth International Conference PERSPECTIVES OF SYSTEM INFORMATICS (PSI 2003), Novosibirsk, Siberia, Russia, July 2003, LNCS 2890, Springer-Verlag, pg 294-307. (pdf)

Informal Proceedings

  • Achieving Security Despite Compromise Using Zero-Knowledge
    Michael Backes, Martin Grochulla, Catalin Hritcu, and Matteo Maffei. In Proceedings of 9th International Workshop on Issues in the Theory of Security (WITS'09). (pdf)
  • Type-checking Zero-knowledge
    Michael Backes, Catalin Hritcu, and Matteo Maffei. In Proceedings of 8th International Workshop on Issues in the Theory of Security (WITS'08). (pdf)
  • Abstracting Multiplicity in Cryptographic Protocols
    Michael Backes, Agostino Cortesi and Matteo Maffei. In Proceedings of 7th International Workshop on Issues in the Theory of Security (WITS'07). (pdf)
  • A Calculus of Challenges and Responses
    Michael Backes, Agostino Cortesi, Riccardo Focardi and Matteo Maffei. In proceedings of 7th International Workshop on Issues in the Theory of Security (WITS'07). (pdf)

Ph.D. Thesis

  • Dynamic Typing for Cryptographic Protocols (pdf)
    Advisor: Prof. Riccardo Focardi
    Ca' Foscari University of Venice, March 2006