Skip to main content

Showing 1–21 of 21 results for author: Galletta, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.21214  [pdf, other

    cs.LO

    Policies for Fair Exchanges of Resources

    Authors: Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta, Luca Viganò

    Abstract: People increasingly use digital platforms to exchange resources in accordance to some policies stating what resources users offer and what they require in return. In this paper, we propose a formal model of these environments, focussing on how users' policies are defined and enforced, so ensuring that malicious users cannot take advantage of honest ones. To that end, we introduce the declarative p… ▽ More

    Submitted 28 October, 2024; originally announced October 2024.

  2. arXiv:2408.09516  [pdf, other

    cs.LO cs.AI

    A Logic for Policy Based Resource Exchanges in Multiagent Systems

    Authors: Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta, Luca Viganò

    Abstract: In multiagent systems autonomous agents interact with each other to achieve individual and collective goals. Typical interactions concern negotiation and agreement on resource exchanges. Modeling and formalizing these agreements pose significant challenges, particularly in capturing the dynamic behaviour of agents, while ensuring that resources are correctly handled. Here, we propose exchange envi… ▽ More

    Submitted 18 August, 2024; originally announced August 2024.

  3. Explainable Ponzi Schemes Detection on Ethereum

    Authors: Letterio Galletta, Fabio Pinelli

    Abstract: Blockchain technology has been successfully exploited for deploying new economic applications. However, it has started arousing the interest of malicious actors who deliver scams to deceive honest users and to gain economic advantages. Ponzi schemes are one of the most common scams. Here, we present a classifier for detecting smart Ponzi contracts on Ethereum, which can be used as the backbone for… ▽ More

    Submitted 18 April, 2024; v1 submitted 12 January, 2023; originally announced January 2023.

    Comments: Accepted to ACM SAC'24

  4. arXiv:2207.12326  [pdf, ps, other

    cs.CR cs.LO

    Automatic Fair Exchanges

    Authors: Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, Luca Viganò

    Abstract: In a decentralized environment, exchanging resources requires users to bargain until an agreement is found. Moreover, human agreements involve a combination of collaborative and selfish behavior and often induce circularity, complicating the evaluation of exchange requests. We introduce MuAC, a policy language that allows users to state in isolation under which conditions they are open to grant th… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

  5. arXiv:2205.15915  [pdf, ps, other

    cs.CR

    IFCIL: An Information Flow Configuration Language for SELinux (Extended Version)

    Authors: Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David Basin

    Abstract: Security Enhanced Linux (SELinux) is a security architecture for Linux implementing mandatory access control. It has been used in numerous security-critical contexts ranging from servers to mobile devices. But this is challenging as SELinux security policies are difficult to write, understand, and maintain. Recently, the intermediate language CIL was introduced to foster the development of high-le… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

    Comments: Extended version of the paper "IFCIL: An Information Flow Configuration Language for SELinux"

  6. A theory of transaction parallelism in blockchains

    Authors: Massimo Bartoletti, Letterio Galletta, Maurizio Murgia

    Abstract: Decentralized blockchain platforms have enabled the secure exchange of crypto-assets without the intermediation of trusted authorities. To this purpose, these platforms rely on a peer-to-peer network of byzantine nodes, which collaboratively maintain an append-only ledger of transactions, called blockchain. Transactions represent the actions required by users, e.g. the transfer of some units of cr… ▽ More

    Submitted 17 November, 2021; v1 submitted 27 November, 2020; originally announced November 2020.

    Comments: arXiv admin note: text overlap with arXiv:1905.04366

    Journal ref: Logical Methods in Computer Science, Volume 17, Issue 4 (November 18, 2021) lmcs:6935

  7. arXiv:2010.09303  [pdf, other

    cs.CR

    Private-Yet-Verifiable Contact Tracing

    Authors: Andrea Canidio, Gabriele Costa, Letterio Galletta

    Abstract: We propose PrYVeCT, a private-yet-verifiable contact tracing system. PrYVeCT works also as an authorization framework allowing for the definition of fine-grained policies, which a certain facility can define and apply to better model its own access rules. Users are authorized to access the facility only when they exhibit a contact trace that complies with the policy. The policy evaluation process… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

    Comments: Submitted for publication

  8. A type language for message passing component-based systems

    Authors: Zorica Savanović, Letterio Galletta, Hugo Torres Vieira

    Abstract: Component-based development is challenging in a distributed setting, for starters considering programming a task may involve the assembly of loosely-coupled remote components. In order for the task to be fulfilled, the supporting interaction among components should follow a well-defined protocol. In this paper we address a model for message passing component-based systems where components are asse… ▽ More

    Submitted 16 September, 2020; originally announced September 2020.

    Comments: In Proceedings ICE 2020, arXiv:2009.07628

    ACM Class: F.3.1; F.3.2

    Journal ref: EPTCS 324, 2020, pp. 3-24

  9. arXiv:2003.05836  [pdf, ps, other

    cs.PL cs.CR

    Control-flow Flattening Preserves the Constant-Time Policy (Extended Version)

    Authors: Matteo Busi, Pierpaolo Degano, Letterio Galletta

    Abstract: Obfuscating compilers protect a software by obscuring its meaning and impeding the reconstruction of its original source code. The typical concern when defining such compilers is their robustness against reverse engineering and the performance of the produced code. Little work has been done in studying whether the security properties of a program are preserved under obfuscation. In this paper we s… ▽ More

    Submitted 12 March, 2020; originally announced March 2020.

    Comments: Extended version of ITASEC20 camera ready paper

  10. arXiv:2001.10881  [pdf, other

    cs.CR

    Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version

    Authors: Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens

    Abstract: Computer systems often provide hardware support for isolation mechanisms like privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features, bri… ▽ More

    Submitted 29 January, 2020; originally announced January 2020.

    Comments: Extended version of the paper "Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors"

  11. arXiv:1908.02709  [pdf, ps, other

    cs.PL

    A minimal core calculus for Solidity contracts

    Authors: Massimo Bartoletti, Letterio Galletta, Maurizio Murgia

    Abstract: The Ethereum platform supports the decentralized execution of smart contracts, i.e. computer programs that transfer digital assets between users. The most common language used to develop these contracts is Solidity, a Javascript-like language which compiles into EVM bytecode, the language actually executed by Ethereum nodes. While much research has addressed the formalisation of the semantics of E… ▽ More

    Submitted 6 August, 2019; originally announced August 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1905.04366

  12. arXiv:1905.04366  [pdf, ps, other

    cs.PL

    A true concurrent model of smart contracts executions

    Authors: Massimo Bartoletti, Letterio Galletta, Maurizio Murgia

    Abstract: The development of blockchain technologies has enabled the trustless execution of so-called smart contracts, i.e. programs that regulate the exchange of assets (e.g., cryptocurrency) between users. In a decentralized blockchain, the state of smart contracts is collaboratively maintained by a peer-to-peer network of mutually untrusted nodes, which collect from users a set of transactions (represent… ▽ More

    Submitted 27 April, 2020; v1 submitted 10 May, 2019; originally announced May 2019.

    Comments: Full version of the paper presented at COORDINATION 2020

  13. arXiv:1901.05082  [pdf, ps, other

    cs.PL cs.CR

    Translation Validation for Security Properties

    Authors: Matteo Busi, Pierpaolo Degano, Letterio Galletta

    Abstract: Secure compilation aims to build compilation chains that preserve security properties when translating programs from a source to a target language. Recent research led to the definition of secure compilation principles that, if met, guarantee that the compilation chain in hand never violates specific families of security properties. Still, to the best of our knowledge, no effective procedure is av… ▽ More

    Submitted 15 January, 2019; originally announced January 2019.

    Comments: Presented at PriSC Workshop 2019

  14. arXiv:1808.00225  [pdf, other

    cs.PL

    Using Standard Typing Algorithms Incrementally

    Authors: Matteo Busi, Pierpaolo Degano, Letterio Galletta

    Abstract: Modern languages are equipped with static type checking/inference that helps programmers to keep a clean programming style and to reduce errors. However, the ever-growing size of programs and their continuous evolution require building fast and efficient analysers. A promising solution is incrementality, so one only re-types those parts of the program that are new, rather than the entire codebase.… ▽ More

    Submitted 27 November, 2018; v1 submitted 1 August, 2018; originally announced August 2018.

    Comments: corrected and updated; experimental results added

  15. Tool Supported Analysis of IoT

    Authors: Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Emilio Tuosto

    Abstract: The design of IoT systems could benefit from the combination of two different analyses. We perform a first analysis to approximate how data flow across the system components, while the second analysis checks their communication soundness. We show how the combination of these two analyses yields further benefits hardly achievable by separately using each of them. We exploit two independently devel… ▽ More

    Submitted 29 November, 2017; originally announced November 2017.

    Comments: In Proceedings ICE 2017, arXiv:1711.10708

    Journal ref: EPTCS 261, 2017, pp. 37-56

  16. Tracing where IoT data are collected and aggregated

    Authors: Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta

    Abstract: The Internet of Things (IoT) offers the infrastructure of the information society. It hosts smart objects that automatically collect and exchange data of various kinds, directly gathered from sensors or generated by aggregations. Suitable coordination primitives and analysis mechanisms are in order to design and reason about IoT systems, and to intercept the implied technological shifts. We addres… ▽ More

    Submitted 18 July, 2017; v1 submitted 26 October, 2016; originally announced October 2016.

    ACM Class: F.1.2; F.3.1

    Journal ref: Logical Methods in Computer Science, Volume 13, Issue 3 (July 19, 2017) lmcs:2186

  17. A Step Towards Checking Security in IoT

    Authors: Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta

    Abstract: The Internet of Things (IoT) is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

    Submitted 10 August, 2016; originally announced August 2016.

    Comments: In Proceedings ICE 2016, arXiv:1608.03131

    ACM Class: F.3.2; D.2.4

    Journal ref: EPTCS 223, 2016, pp. 128-142

  18. Event-driven Adaptation in COP

    Authors: Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta

    Abstract: Context-Oriented Programming languages provide us with primitive constructs to adapt program behaviour depending on the evolution of their operational environment, namely the context. In previous work we proposed ML_CoDa, a context-oriented language with two-components: a declarative constituent for programming the context and a functional one for computing. This paper describes an extension of ML… ▽ More

    Submitted 19 June, 2016; originally announced June 2016.

    Comments: In Proceedings PLACES 2016, arXiv:1606.05403

    Journal ref: EPTCS 211, 2016, pp. 37-45

  19. A Context-Oriented Extension of F#

    Authors: Andrea Canciani, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta

    Abstract: Context-Oriented programming languages provide us with primitive constructs to adapt program behaviour depending on the evolution of their operational environment, namely the context. In previous work we proposed ML_CoDa, a context-oriented language with two-components: a declarative constituent for programming the context and a functional one for computing. This paper describes the implementation… ▽ More

    Submitted 23 December, 2015; originally announced December 2015.

    Comments: In Proceedings FOCLASA 2015, arXiv:1512.06947

    ACM Class: D.1.1; D.1.6; D.3.4

    Journal ref: EPTCS 201, 2015, pp. 18-32

  20. Typing Context-Dependent Behavioural Variation

    Authors: Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti

    Abstract: Context Oriented Programming (COP) concerns the ability of programs to adapt to changes in their running environment. A number of programming languages endowed with COP constructs and features have been developed. However, some foundational issues remain unclear. This paper proposes adopting static analysis techniques to reason on and predict how programs adapt their behaviour. We introduce a core… ▽ More

    Submitted 26 February, 2013; originally announced February 2013.

    Comments: In Proceedings PLACES 2012, arXiv:1302.5798

    ACM Class: D.3.1; F.3.1; F.3.2

    Journal ref: EPTCS 109, 2013, pp. 28-33

  21. An Abstract Semantics for Inference of Types and Effects in a Multi-Tier Web Language

    Authors: Letterio Galletta, Giorgio Levi

    Abstract: Types-and-effects are type systems, which allow one to express general semantic properties and to statically reason about program's execution. They have been widely exploited to specify static analyses, for example to track computational side effects, exceptions and communications in concurrent programs. In this paper we adopt abstract interpretation techniques to reconstruct (following the Couso… ▽ More

    Submitted 11 August, 2011; originally announced August 2011.

    Comments: In Proceedings WWV 2011, arXiv:1108.2085

    ACM Class: D.2.4; F.3.1; F.3.2

    Journal ref: EPTCS 61, 2011, pp. 81-95