Publications

Journal Papers

  • SecOnto: Ontological Representation of Security Directives

    G. Castiglione, G.Bella, D.F. Santamaria
    Elsevier Computers & Security, Vol. 148, January 2025, 104150. (doi: 10.1016/j.cose.2024.104150)


  • Towards a Semantic Blockchain: A Behaviouristic Approach to Modelling Ethereum

    G.Bella, D. Cantone, M. Nicolosi-Asmundo, D.F. Santamaria
    Applied Ontology, vol. 19, no. 2, pp. 143-180, 2024 DOI 10.3233/SW-243543. (doi: 10.3233/AO-230010)


  • A behaviouristic semantic approach to blockchain-based e-commerce

    G.Bella, D. Cantone, G. Castiglione, M. Nicolosi-Asmundo, D.F. Santamaria
    Semantic Web, vol. Pre-press, no. Pre-press, pp. 1-52, 2024 DOI 10.3233/SW-243543. (doi: 10.3233/SW-243543)


  • The ontology for agents, systems and integration of services: OASIS version 2

    G.Bella, D. Cantone, C.F. Longo, M. Nicolosi-Asmundo, D.F. Santamaria
    Intelligenza Artificiale, vol. 17, no. 1, pp. 51-62, 2023. DOI 10.3233/IA-230002. (doi: 10.3233/IA-230002) -- Link


  • A Context-Aware on-board Intrusion Detection System

    D.Micale, I.Matteucci, F.Fenzl, R.Rieke, G.Patanè
    International Journal of Information Security, 09 March 2023. (doi: 10.21203/rs.3.rs-2650857/v1) -- Link


  • The AILA Methodology for Automated and Intelligent Likelihood Assignment in Risk Assessment

    G.Bella, C.Daniele, M.Raciti
    IEEE Access, 2169-3536, 14 February 2023. (doi: 10.1109/ACCESS.2023.3245333) -- Link


  • PETIoT: PEnetration Testing the Internet of Things

    G.Bella, P.Biondi, S.Bognanni, S.Esposito
    Elsevier Internet of Things, Volume 22, July 2023. (doi: 10.1016/j.iot.2023.100707) -- Link


  • A Double Assessment of Privacy Risks Aboard Top-Selling Cars

    G.Bella, P.Biondi, G.Tudisco
    Springer Automotive Innovation, 1389-1286, 2023. (doi: 10.1007/s42154-022-00203-2) -- Link


  • Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security

    G.Bella, P.Biondi, G.Costantino, I.Matteucci
    Elsevier Computer Networks, 1389-1286, 2022. (doi: 10.1016/j.comnet.2022.109377)


  • Perceptions of Beauty in Security Ceremonies

    G. Bella, J. Ophoff, K. Renaud, D. Sempreboni, L. Viganò
    Springer Philosophy & Technology, 35(72), 2022 -- Link


  • Embedded Fuzzing: a Review of Challenges, Tools, and Solutions

    M.C.Eisele, M.Maugeri, R-Shriwas, C.Huth, G.Bella
    Springer Cybersecurity, 2523-3246, 2022 (doi: 10.1186/s42400-022-00123-y)


  • Modelling human threats in security ceremonies

    G.Bella, R.Giustolisi, C.Schürmann
    IOS Journal of Computer Security, pp.1-23, 2022. (doi: 10.3233/JCS-210059) -- Link


  • Multi-service threats: Attacking and protecting network printers and VoIP phones alike

    G.Bella, P.Biondi, S.Bognanni
    Elsevier Internet of Things, 2542-6605, 2022. (doi: 10.1016/j.iot.2022.100507) -- Link


  • Out to explore the cybersecurity planet

    G.Bella
    Emerald Journal of Intellectual Capital, 21(2):291-307, 2020. (doi: 10.1108/JIC-05-2019-0127) -- Link


  • Invalid Certificates in Modern Browsers: A Socio-Technical Analysis

    R.Giustolisi, G.Bella, G.Lenzini
    IOS Journal of Computer Security, 26(4):509-541, 2018. (doi: 10.3233/JCS-16891) -- Link


  • Trustworthy Exams without Trusted Parties

    G.Bella, R.Giustolisi, G.Lenzini, P.Y.A.Ryan
    Elsevier Computers & Security, 67:291-307, 2017. (doi: 10.1016/j.cose.2016.12.005) -- Link


  • Service Security and Privacy as a Socio-Technical Problem

    G.Bella, P.Curzon, G.Lenzini
    IOS Journal of Computer Security, 23(5):563-585, 2015. (doi: 10.3233/JCS-150536) -- Link


  • Inductive Study of Confidentiality: for Everyone

    G.Bella
    Springer Formal Aspects of Computing, 26(1):3-36, 2014. (doi: 10.1007/s00165-012-0246-3) -- Link


  • Enhancing DSR Maintainance with Power Awareness

    G.Bella, G.Costantino, J.Crowcroft, S.Riccobene
    Elsevier Computer Standards & Interfaces, 35(1):107-113, 2013. (doi: 10.1016/j.csi.2012.06.007)


  • Enforcing Privacy in E-Commerce by Balancing Anonimity and Trust

    G.Bella, R.Giustolisi, S.Riccobene
    Elsevier Computers and Security, 30(8):705-718, 2011. (doi: 10.1016/j.cose.2011.08.005) -- Link


  • Multi-Attacker Protocol Validation

    W.Arsac, G.Bella, X.Chantry, L.Compagna
    Springer Journal of Automated Reasoning, 46(3-4):353-388, 2011. (doi: 10.1007/s10817-010-9185-y) -- Link


  • The Principle of Guarantee Availability for Security Protocol Analysis

    G.Bella
    Springer International Journal of Information Security, 9(2):83-97, 2010. (doi: 10.1007/s10207-009-0097-y) -- Link


  • Evaluating the Device Reputation through Full Observation in MANETs

    G.Bella, G.Costantino, S.Riccobene
    Dynamic Publishers Journal of Information Assurance and Security, 4(4):458-465, 2009. (doi: 10.1109/IAS.2008.24)

  • Retaliation Against Protocol Attacks

    G.Bella, S.Bistarelli, F.Massacci
    Dynamic Publishers Journal of Information Assurance and Security, 3(4):313-325, 2008. (PDF)

  • What is Correctness of Security Protocols?

    G.Bella
    Springer Journal of Universal Computer Science, 14(12):2083-2107, 2008. Link

  • Accountability Protocols: Formalized and Verified

    G.Bella, L.C.Paulson
    ACM Transactions on Information and System Security, 9(2):138:161, 2006. (doi: 10.1145/1151414.1151416)

  • Verifying the SET Purchase Protocols

    G.Bella, L.C.Paulson
    Springer Journal of Automated Reasoning, 36(1-2):5-37, 2006. (doi: 10.1007/s10817-005-9018-6)

  • Information Assurance for Security Protocols

    G.Bella, S.Bistarelli
    Elsevier Computers and Security, 24(4):322-333, 2005. (doi: 10.1016/j.cose.2004.10.004)

  • An Overview of the Verification of SET

    G.Bella, F.Massacci, L.C.Paulson
    Springer International Journal of Information Security, 4(1-2):175-192, 2005. (doi: 10.1007/s10207-004-0047-7)

  • Soft Constraint Programming to Analysing Security Protocols

    G.Bella, S.Bistarelli
    Cambridge University Press Journal of Theory and Practice of Logic Programming, 4(5):1-28, 2004. (doi: 10.1017/S1471068404002121)

  • Inductive Verification of Smartcard Protocols

    G.Bella
    IOS Journal of Computer Security, 11(1):87-132, 2003. (doi: 10.3233/JCS-2003-11103)

  • Verifying the SET Registration Protocols

    G.Bella, F.Massacci, L.C.Paulson
    IEEE Journal on Selected Areas in Communications, 21(1):77-87, 2003. (doi: 10.1109/JSAC.2002.806133)

  • Formal Analysis of the Kerberos Authentication System

    G.Bella, E.Riccobene
    Springer Journal of Universal Computer Science, 3(12):1337-1381, 1997. Link

Conference Papers

2024

  • Privacy Enrooted Car Systems (PECS): Preliminary Design

    G. Bella, G. Castiglione, S. Esposito, M. G. Mangano, M. Marchetti, M. Maugeri, M. Raciti, Salvatore Riccobene, D. F. Santamaria
    In EAI SmartSP 2024 - 2nd EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles

  • Not Sure Your Car Withstands Cyberwarfare

    G. Bella, G. Castiglione, S. Esposito, M. Raciti, S. Riccobene
    In 2024 IEEE International Workshop On Technologies for Defense and Security -- Link

  • Compliance-driven CWE Assessment by Semantic Similarity

    G. Castiglione, G.Bella
    In SecAssure, the 3rd International Workshop on System Security Assurance (ESORICS 2024) -- Link

  • User-Empowered Federated Learning in the Automotive Domain

    M. Maugeri, M.I.P. Morana, S. Esposito, G.Bella
    In 2024 IEEE International Conference on Blockchain (Blockchain) -- Link

  • The IoT Breaches your Household Again

    D. Bonaventura, S. Esposito, G.Bella
    In Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT 2024) -- Link

  • A Meta-Ontological Approach to Securing the Semantic Web Data

    G.Bella, D. Cantone, G. Castiglione, M. Nicolosi-Asmundo, D.F. Santamaria
    In Semantic Shields I: 1st International Workshop on Modeling for Cybersecurity (FOIS 2024) -- Link

  • Modelling the privacy landscape of the Internet of Vehicles

    Cacciato R., Raciti M., Esposito S., Bella G.
    In 19th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2024) -- DOI

  • Supporting Criminal Investigations on the Blockchain: A Temporal Logic-based Approach

    Blanchini M., Cerreta M., Di Monda D., Fabbri M., Raciti M., Ahmad S. H., Costa G.
    In Proceedings of the Italian Conference on Cyber Security (ITASEC 2024) -- DOI

  • Behind the (Digital Crime) Scenes: An MSC Model

    M. Raciti, G. Bella
    In 12th International Symposium on Digital Forensics and Security (ISDFS 2024) -- DOI

  • Wendigo: Deep Reinforcement Learning for Denial-of-Service Query Discovery in GraphQL

    S. McFadden, M. Maugeri, C. Hicks, V. Mavroudis, F. Pierazzi
    IEEE Workshop on Deep Learning Security and Privacy (DLSP), 2024 -- Link

  • Fuzzing Matter(s): A White Paper for Fuzzing the Matter Protocol

    M. Maugeri
    In Proceedings of the 10th International Conference on Information Systems Security and Privacy

  • Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes

    M. Raciti
    In Proceedings of the 10th International Conference on Information Systems Security and Privacy, ISBN 978-989-758-683-5, ISSN 2184-4356, pages 831-837

2023

  • The VOCODES Kill Chain for Voice Controllable Devices

    S. Esposito, D. Sgandurra, G. Bella
    In the 6th International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2023), The Hague, The Netherlands, 25-29 September 2023 -- Link

  • Forkfuzz: Leveraging Fork-Awareness in Coverage-Guided Fuzzing

    M. Maugeri, C. Daniele, G. Bella
    In the 2nd International Workshop on System Security Assurance (SecAssure), The Hague, The Netherlands, 25-29 September 2023 --
    Link

  • Up-to-date Threat Modelling for Soft Privacy on Smart Cars

    M. Raciti, G. Bella
    In 7th International Workshop on SECurity and Privacy Requirements Engineering (SECPRE 2023), The Hague, The Netherlands, September 25-29, 2023 (DOI:10.1007/978-3-031-54204-6_27) -- Link

  • Smart Bulbs Can Be Hacked to Hack into Your Household

    D. Bonaventura, G. Bella, S. Esposito
    In Proceedings of the 20th International Conference on Security and Cryptography SECRYPT -- Link

  • A Threat Model for Soft Privacy on Smart Cars

    M. Raciti, G. Bella
    In the 2nd Workshop on Automotive Cyber Security (ACSW 2023), July 3, 2023, in Delft, Netherlands -- Link

  • Towards Grammatical Tagging for the Legal Language of Cybersecurity

    G. Bella, G. Castiglione, D.F. Santamaria
    In the 18th International Conference on Availability, Reliability and Security (ARES 2023), August 29-September 1, 2023, Benevento, Italy (DOI: 10.1145/3600160.3605069) -- Link

  • An Automated Method for the Ontological Representation of Security Directives

    G. Bella, G. Castiglione, D.F. Santamaria
    In the 2nd international workshop KM4LAW – Knowledge Management and Process Mining for Law, July 20, 2023 (Sherbrooke, Québec, Canada) Publication -- Link

  • A Behaviouristic Approach to Representing Processes and Procedures in the OASIS 2 Ontology

    G. Bella, G. Castiglione, D.F. Santamaria
    In the 7th Workshop on Foundational Ontology (FOUST) co-located with FOIS 2023, 19-20 July, 2023, Sherbrooke, Québec, Canada Publication -- Link

  • An Ontological Approach to Compliance Verification of the NIS 2 Directive

    G. Bella, G. Castiglione, D.F. Santamaria
    In the 2nd International Workshop on Ontologies for Services and Society (OSS) at JOWO 2023, 19-20 July, 2023, Sherbrooke, Québec, Canada Publication -- Link

  • Protecting Voice-Controllable Devices Against Self-Issued Voice Commands

    S. Esposito, D. Sgandurra, G. Bella
    In the 8th IEEE European Symposium on Security and Privacy (Euro S&P ’23), 2023

  • Evaluating the Fork-Awareness of Coverage-Guided Fuzzers

    M. Maugeri, C. Daniele, G. Bella, E. Poll
    In Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, February 22-24, 2023 (DOI: 10.5220/0011648600003405) -- Link

  • How to Model Privacy Threats in the Automotive Domain

    M.Raciti, G.Bella
    In Proceedings of the 9th International Conference on Vehicle Technology and Intelligent Transport Systems - VEHITS, 394-401, 2023 -- Link


2022

  • The Right Level of Human Interaction to Establish Cybersecurity (Invited Paper)

    G.Bella
    In 15th International Conference on Security for Information Technology and Communications (SECICT 2022) --- Link


  • CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem

    D.Micale, G.Costantino, I.Matteucci, F.Fenzl, R.Rieke, G.Patanè
    In 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2022)


  • Papyrus-based safety analysis automatization

    P.Biondi, G.Bella, F.Tronci
    In 6th International Conference on System Reliability and Safety (ICSRS 2022)


  • Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands

    S.Esposito, D.Sgandurra, G.Bella
    (doi: 10.48550/arXiv.2202.08619) --- BibTeX --- Link


  • The AILA Methodology for Automated and Intelligent Likelihood Assignment

    G.Bella, C.Daniele, M.Raciti
    In 6th International Conference on Cryptography, Security and Privacy (CSP 2022)


2021

  • Vulnerability Assessment and Penetration Testing on IP camera

    P.Biondi, S.Bognanni, G.Bella
    In International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2021) Pages 1-8 -- (doi: 10.1109/IOTSMS53705.2021.97048906) --- BibTeX -- Link


  • Private Drivers Identification based on users’ routine

    G.Costantino, I.Matteucci, D.Micale, G.Patanè
    In 10th International Symposium on Security and Privacy on the Internet of Things (SPIoT 2021) Pages 1753-1762 -- (doi: 10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00236) --- BibTeX


  • Privacy and modern cars through a dual lens

    G.Bella, P.Biondi, M.De Vincenzi, G.Tudisco
    In International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms (STRIVE21) Pages 136-143 -- (doi:10.1109/EuroSPW54576.2021.00022) --- BibTeX -- Link


  • Car drivers’ privacy concerns and trust perceptions

    G.Bella, P.Biondi, G.Tudisco
    In International Conference on Trust, Privacy and Security in Digital Business (TrustBUS 2021) Pages 143-154 -- (doi:10.1007/978-3-030-86586-3_10) --- BibTeX -- Link


  • Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS

    G.Bella, D.Cantone, C.Longo, M.Nicolosi-Asmundo, D.F.Santamaria
    In Proceedings of IDC 2021, The 14th International Symposium on Intelligent Distributed Computing, 16-18 September, 2021, Scilla, Reggio Calabria, Italy. -- Link


  • Semantic Representation as a Key Enabler for Blockchain-Based Commerce

    G.Bella, D.Cantone, C.Longo, M.Nicolosi-Asmundo, D.F.Santamaria
    Proceedings of GECON 2021 - Trustworthy Services, Information Exchange and Content Handling in the Context of Blockchain, 21--23 September, 2021.


  • SixPack: Abusing ABS to avoid Misbehavior detection in VANETs

    F.Pollicino, D.Stabili, G.Bella, M.Marchetti
    In IEEE Vehicular Technology Conference -- (doi: 10.1109/VTC2021-Spring51267.2021.9448656) --- BibTeX


  • Towards the COSCA framework for "COnseptualing Secure CArs"

    G.Bella, P.Biondi, G.Costantino, I.Matteucci, M.Marchetti
    In Open Identity Summit 2021 (OID2021) Pages 37-46 -- (doi:20.500.12116/36500) --- BibTeX


2020

  • Secure Routine: A Routine-Based Algorithm for Drivers Identification

    D.Micale, G.Costantino, I.Matteucci, G.Patanè, G.Bella
    In Ninth International Conference on Advances in Vehicular Systems, Technologies and Applications (VEHICULAR 2020) Pages 40-45 -- (doi:10.6084/m9.figshare.14013218) --- BibTeX -- Link


  • CINNAMON: A Module for AUTOSAR Secure Onboard Communication

    G.Bella, P.Biondi, G.Costantino, I.Matteucci
    In 2020 16th European Dependable Computing Conference (EDCC) Pages 103-110 -- (doi:10.1109/EDCC51268.2020.00026) --- BibTeX -- Link


  • VoIP Can Still Be Exploited - Badly

    P.Biondi, S.Bognanni, G.Bella
    In 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC) Pages 237-243 -- (doi:10.1109/FMEC49853.2020.9144875) --- BibTeX -- Link


2019

  • You overtrust your printer

    G.Bella, P.Biondi
    In 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2019) Lecture Notes in Computer Science book series (LNCS, volume 11699). Pages 264-274 -- (doi:10.1007/978-3-030-26250-1_21) --- BibTeX -- Link


  • Implementing CAN bus security by TOUCAN

    P.Biondi, G.Bella, G.Costantino, I.Matteucci
    In ACM Conference on Mobile Ad Hoc Networking and Computing (MobiHoc 2019) Pages 399-400 -- (doi:10.1145/3323679.3326614) --- BibTeX


  • Poster: Are you secure in your car?

    G.Bella, P.Biondi, G.Costantino, I.Matteucci
    In ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2019) Pages 308-309 -- (doi:10.1145/3317549.3326305) --- BibTeX


  • You Already Used Formal Methods but Did Not Know It

    G.Bella
    In FMTea 2019: Formal Methods Teaching pp 228-243 -- (doi: 10.1007/978-3-030-32441-4_15) --- BibTeX


  • What Are The Threats? (Charting The Threat Models Of Security Ceremonies)

    D.Sempreboni, G.Bella, R.Giustolisi, L.Viganò
    In International Conference on Security and Cryptography (Secrypt 2019) -- (Link)


  • An Investigation into the Beautification of Security Ceremonies

    G.Bella, K.Renaud, D.Sempreboni, L.Viganò
    In International Conference on Security and Cryptography (Secrypt 2019) -- (Link)


  • TOUCAN A proTocol tO secUre Controller Area Network

    G.Bella, P.Biondi, G.Costantino, I.Matteucci
    In ACM Workshop on Automotive Cybersecurity (AutoSec 2019) Pages 3-8 -- (doi:10.1145/3309171.3309175) --- BibTeX -- Link


  • A MapReduce based tool for the analysis and discovery of novel therapeutic targets

    G.Parasiliti, M.Pennisi, P.Biondi, G.Sgroi, G.Russo, C.Napoli, F.Pappalardo
    In 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2019) Pages 323-328 -- (doi:10.1109/EMPDP.2019.8671609) --- BibTeX

2018

  • Towards an Integrated Penetration Testing Environment for the CAN Protocol

    G.Bella, P.Biondi
    In 37th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2018) Lecture Notes in Computer Science, volume 11094 LNCS, pages 344-352 -- (doi:10.1007/978-3-319-99229-7_29) --- BibTeX -- Link


  • Getmewhere: A Location-Based Privacy-Preserving Information Service

    G.Bella, G.Costantino, F.Marino, F.Martinelli
    In 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP 2018) -- (doi:PDP2018.2018.00089)

Before 2017

  • A Unifying Theory for Evaluation Systems

    G.Bella, R.Giustolisi
    In 9th International Symposium on Engineering Secure Software and Systems (ESSoS 2017) pp 231-239 Springer LNCS 10379. -- (doi:10.1007/978-3-319-62105-0_15)


  • Analysing Privacy Analyses

    G.Bella, D.Butin, H.Jonker
    In 1st Italian Conference on Cybersecurity (ITASEC 2017) -- (Link)


  • Invisible Security

    G.Bella, B.Christianson, L.Viganò
    In 24th International Workshop on Security Protocols (IWSP 2016) pp 1--18, LNCS 10368, Springer -- (doi: 10.1007/978-3-319-62033-6)


  • Cybersecurity’s Way Forward: to get Beautiful or Invisible

    G.Bella
    In 7th Italian Conference on Theoretical Computer Science (ICTCS 2016) pp 1-7, CEUR 1720, CEUR Workshop Proceedings -- (PDF) --- BibTeX


  • A Secure Exam Protocol Without Trusted Parties

    G.Bella, R.Giustolisi, G.Lenzini, P.Ryan
    In 30th IFIP International Information Security and Privacy Conference (IFIP SEC 2015) pp 495-509, Volume 455, Springer. -- (doi: 10.1007/978-3-319-62033-6)


  • Security is Beautiful

    G.Bella, L.Viganò
    In 23rd International Workshop on Security Protocols (IWSP 2015) pp 247-260, LNCS 9379, Springer


  • A socio-technical methodology for the security and privacy analysis of services

    G.Bella, P.Curzon, R.Giustolisi, G.Lenzini
    In IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW 2014) pp 401-406, IEEE -- (doi:10.1109/COMPSACW.2014.69)


  • The Challenges behind Independent Living Support Systems

    G. Bella, P. Jappinen, J. Laakkonen
    In 8th International Workshop on Human Aspects in Ambient Intelligence (HAI 2014) pp 464-474, LNCS 8610, Springer -- (doi:10.1007/978-3-319-09912-5_39)


  • Secure Exams despite Malicious Management

    G.Bella, R.Giustolisi, G.Lenzini
    In 14th International Conference on Privacy, Security and Trust (PST 2014) pp 274-281, IEEE -- (doi:10.1109/PST.2014.6890949)


  • What Security for Electronic Exams?

    R.Giustolisi, G.Lenzini, G.Bella
    In 8th International Conference on Risks and Security of Internet and Systems (CRiSIS 2013) pp 1-5, IEEE -- (doi:10.1109/CRiSIS.2013.6766348)


  • Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers

    G.Bella, R.Giustolisi, G.Lenzini
    In 11th International Conference on Privacy, Security and Trust (PST 2013) pp 309-316, IEEE -- (doi:10.1109/PST.2013.6596067)


  • A Socio-Technical Understanding of TLS Certificate Validation

    G.Bella, R.Giustolisi, G.Lenzini
    In 7th IFIP International Conference on Trust Managemen (IFIP TM 2013) pp 281-288, Springer -- (doi:10.1007/978-3-642-38323-6_23)


  • Towards Verifying Voter Privacy Through Unlinkability

    D.Butin, D.Gray, G.Bella
    In 5th International Symposium on Engineering Secure Software and Systems (ESSoS 2013) pp 91-106, Springer -- (doi:10.1007/978-3-642-36563-8_7)


  • Verifying Privacy by Little Interaction and No Process Equivalence

    D.Butin, G.Bella
    In International Conference on Security and Cryptography (Secrypt 2012) -- (Link)


  • Layered Analysis of Security Ceremonies

    G.Bella, L.Coles-Kemp
    In 27th IFIP International Information Security and Privacy Conference (IFIP SEC 2012) pp 273-286, Springer -- (doi:10.1007/978-3-642-30436-1_23)


  • Seeing the Full Picture: the Case for Extending Security Ceremony Analysis

    G.Bella, L.Coles-Kemp
    In 9th Australian Information Security Management Conference pp 273-286, Springer -- (doi:10.4225/75/57b55170cd8d1)


  • Holistic Analysis of Mix Protocols

    G.Bella, D.Butin, D.Gray
    In 7th International Symposium on Information Assurance and Security (IAS 2011) IEEE -- (doi:10.1109/ISIAS.2011.6122843)


  • Internet Users' Security and Privacy while they Interact with Amazon

    G.Bella, L.Coles-Kemp
    In International Workshop on Trust and Identity in Mobile Internet (IEEE TrustID 2011) IEEE -- (doi:10.1109/TrustCom.2011.118)


  • Remote Management of Face-to-Face Written Authenticated Though Anonymous Exams

    G.Bella, L.Coles-Kemp, G.Costantino, S.Riccobene
    In 3nd International Conference on Computer Supported Education (CSEDU 2011) pp 431-437 -- (Link)


  • Virtually Perfect Democracy

    G.Bella, P.Ryan, V.Teague
    In 18th International Workshop on Security Protocols (IWSP 2010) pp 161-166, LNCS 7061, Spriger -- (doi:10.1007/978-3-662-45921-8_24)


  • WATA: A System for Written Authenticated Though Anonymous Exams

    G.Bella, G.Costantino, S.Riccobene
    In 2nd International Conference on Computer Supported Education (CSEDU 2010) pp 132-137 -- (Link)


  • Formal Analysis of the Genetic Toggle

    G.Bella, P.Liò
    In 7th Conference on Computational Methods in Systems Biology (CMSB 2009) pp 96-110, Springer -- (doi:10.1007/978-3-642-03845-7_7)


  • Analysing the microRNA-17-92/Myc/E2F/RB Compound Toggle Switch by Theorem Proving

    G.Bella, P.Liò
    In 9th Workshop on Network Tools and Applications in Biology (NETTAB 2009) -- (Link)


  • Enforcing Collaboration in MANET Routing Protocols

    G.Bella, G.Costantino, S.Riccobene
    In 5th International Conference on Wireless and Mobile Communications (ICWMC 2009) IEEE -- (doi:10.1109/ICWMC.2009.28)


  • Attacking Each Other

    W.Arsac, G.Bella, X.Chantry, L.Compagna
    In 17th International Workshop on Security Protocols (IWSP 2009) pp 41-47, Springer -- (doi:10.1007/978-3-642-36213-2_7)


  • Validating Security Protocols under the General Attacker

    W.Arsac, G.Bella, X.Chantry, L.Compagna
    In Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS 2009) pp 34-51, Springer. -- (doi:10.1007/978-3-642-03459-6_3)


  • Spreading of Reputation values in a Mobile Network

    G.Bella, G.Costantino, S.Riccobene
    In Workshop on Information and Communication Technologies, Sept. 2008, Split, Croatia. N.Rozic and D.Begusic (eds.), IEEE Press.


  • A Privacy Paradigm that Tradeoffs Anonymity and Trust

    G.Bella, F.Librizzi, S.Riccobene
    In SoftCOM 2008, International Conference on Software, Telecommunications and Computer Networks, Sept. 2008, Split, Croatia. N.Rozic and D.Begusic (eds.), pp 384-388, IEEE Press. -- (doi:10.1.1.654.5043)


  • Managing Reputation over MANETs

    G.Bella, G.Costantino, S.Riccobene
    In IAS 2008, 4th International Symposium on Information Assurance and Security, Sept. 2008, Naples, Italy. M.Rak et al. (eds.), pp 255-260, IEEE Press. -- (doi:10.1109/IAS.2008.24)


  • Realistic Threats to Self-Enforcing Privacy

    G.Bella, F.Librizzi, S.Riccobene
    In IAS 2008, 4th International Symposium on Information Assurance and Security, Sept. 2008, Naples, Italy. M.Rak et al. (eds.), pp 155-160, IEEE Press. -- (doi:10.1109/IAS.2008.23)


  • Security Protocol Deployment Risk

    S.Foley, G.Bella, S.Bistarelli
    In IWSP 2008, 16th International Workshop on Security Protocols, April 2008, Cambridge, UK. B.Christianson et al. (eds.), LNCS Series, Springer. -- (doi:10.1007/978-3-642-22137-8_3)


  • Augmented Risk Analysis

    G.Bella, S.Bistarelli, P.Peretti, S.Riccobene
    In VODCA 2006, 2nd International Workshop on Views on Designing Complex Architectures, Sept. 2006, Bertinoro, Italy. M. ter Beek and F.Gadducci (eds.), pp 207-220, ENTCS 168, Elsevier-Science. -- (doi:10.1016/j.entcs.2006.12.006)


  • Locating Mobile Nodes within Logical Networks

    G.Bella, C.Pistagna, S.Riccobene
    In PSC 2005, International Conference on Pervasive Systems and Computing, June 2005, Las Vegas, USA. M. Denko and J.Youn (eds.), pp 54-62, CSREA Press. -- (PDF)


  • Soft Constraints for Security (invited paper)

    G.Bella, S.Bistarelli, S.Foley
    In VODCA 2004, 1st International Workshop on Views on Designing Complex Architectures, Sept. 2004, Bertinoro, Italy. M. ter Beek and F.Gadducci (eds.), pp 11-29, ENTCS 142, Elsevier-Science. -- Link


  • Distributed Backup through Information Dispersal

    G.Bella, C.Pistagna, S.Riccobene
    In VODCA 2004, 1st International Workshop on Views on Designing Complex Architectures, Sept. 2004, Bertinoro, Italy. M. ter Beek and F.Gadducci (eds.), pp 63-77, ENTCS 142, Elsevier-Science. -- (doi: 10.1016/j.entcs.2004.11.046)


  • Should We Prove Security Policies Correct?

    S.Battiato, G.Bella, S.Riccobene
    In EGCDMAS 2004, 1st International Workshop on Electronic Government, and Commerce: Design, Modeling, Analysis and Security, Sept. 2004, Setubal, Portugal, pp 56-65, INSTICC Press. -- (PDF)


  • Advancing Assurance for Secure Distributed Communications

    G.Bella, S.Bistarelli
    In IEEE IAW 2004, 5th Annual IEEE Information Assurance Workshop, June 2004, New York, USA Pages 306-313. IEEE Press. -- (doi: 10.1109/IAW.2004.1437832)


  • Verifying Second-Level Security Protocols

    G.Bella, C.Longo, L.C.Paulson
    In TPHOLs 2003, 16th International Conference on Theorem Proving in Higher Order Logic, Sept. 2003, Rome, Italy D.Basin and B.Wolff (eds.), pp 352-366, LNCS 2758, Springer. -- (doi: 10.1007/10930755_23)


  • Biometrics to Enhance Smartcard Security: Simulating MOC using TOC

    G.Bella, S.Bistarelli, F.Martinelli
    In IWSP 2003, 11th International Workshop on Security Protocols, April 2003, Cambridge, UK B.Christianson et al. (eds.), LNCS 3364, pp 324-335, Springer. -- (doi: 10.1007/11542322_39)


  • A Protocol's Life after Attacks

    G.Bella, S.Bistarelli, F.Massacci
    In IWSP 2003, 11th International Workshop on Security Protocols, April 2003, Cambridge, UK B.Christianson et al. (eds.) , LNCS 3364, pp 3-18, Springer. -- (doi: 10.1007/11542322_3)


  • Is The Verification Problem For Cryptographic Protocols Solved?

    G.Bella, C.Longo, L.C.Paulson
    In IWSP 2003, 11th International Workshop on Security Protocols, April 2003, Cambridge, UK B.Christianson et al. (eds.), LNCS 3364, pp 183-189, Springer. -- (doi: 10.1007/11542322_23)


  • Availability of Protocol Goals

    G.Bella
    In ACM SAC 2003, 18th ACM Symposium on Applied Computing, March 2003, Melbourne FL, USA B.Panda (editor), pp 312-317, ACM press. -- (doi: 10.1145/952532.952596)


  • The Verification of an Industrial Payment Protocol: the SET Purchase Phase

    G.Bella, F.Massacci, L.C.Paulson
    In ACM CCS 2002, 10h ACM Conference on Computer and Communications Security, Nov. 2002, Washington, USA V.Atluri (editor), pp 12-20, ACM press. -- (PDF)


  • Interactive Simulation of Security Policies

    G.Bella
    In ACM SAC 2002, 17th ACM Symposium on Applied Computing, March 2002, Madrid, Spain B.Panda (editor), pp 247-252, ACM press. -- (doi: 10.1145/508791.508842)


  • Analyzing Delegation Properties

    G.Bella, L.C.Paulson
    In IWSP 2002, 10th International Workshop on Security Protocols, April 2002, Cambridge, UK B.Christianson et al. (eds.), LNCS 2845, pp 120-127, Springer. -- (doi: 10.1007/978-3-540-39871-4_11)


  • Analyzing Delegation Properties

    G.Bella, L.C.Paulson
    In IWSP 2002, 10th International Workshop on Security Protocols, April 2002, Cambridge, UK B.Christianson et al. (eds.), LNCS 2845, pp 120-127, Springer. -- (doi: 10.1007/978-3-540-39871-4_11)


  • Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks

    G.Bella, S.Bistarelli
    In IWSP 2002, 10th International Workshop on Security Protocols, April 2002, Cambridge, UK B.Christianson et al. (eds.), LNCS 2845, pp 104-119, Springer. -- (doi: 10.1007/978-3-540-39871-4_10)


  • Mechanical Proofs about a Non-Repudiation Protocols

    G.Bella, L.C.Paulson
    In TPHOLs 2001, 14th International Conference on Theorem Proving in Higher Order Logic, Sept. 2001, Edimbugh, UK R.J.Boulton and P.B.Jackson (eds.), pp 91-104, LNCS 2152, Springer. -- (doi: 10.1007/3-540-44755-5_8)


  • Mechanising a Protocol for Smart Cards

    G.Bella
    In e-SMART 2001, 1st International Conference on Research in Smart Cards, Sept. 2001, Cannes, France I.Attali and T.Jensen (eds.), pp 19-33, LNCS 2140, Springer. -- (doi: 10.5555/646803.705982)


  • A Proof of Non-Repudiation

    G.Bella, L.C.Paulson
    In IWSP 2001, 9th International Workshop on Security Protocols, April 2001, Cambridge, UK B.Christianson et al. (eds.), LNCS 2467, pp 119-133, Springer. -- (doi: 10.1007/3-540-44755-5_8)


  • Soft Constraints for Security Protocol Analysis: Confidentiality

    G.Bella, S.Bistarelli
    In PADL 2001, 3rd International Symposium on Practical Aspects of Declarative Languages, March 2001, Las Vegas, USA I.V.Ramakrishnan (editor), pp 108-122, LNCS 1990, Springer. -- (doi: 10.5555/645771.667923)


  • Formal Verification of Cardholder Registration in SET

    G.Bella, F.Massacci, L.C.Paulson, P.Tramontano
    In ESORICS 2000, 6th European Symposium on Research in Computer Security, Oct. 2000, Toulouse, France F.Cuppens et al. (eds.), pp 159-174, LNCS 1895, Springer. -- (PDF)


  • SCSPs for Modelling Attacks to Security Protocols

    G.Bella, S.Bistarelli
    In Workshop on Soft Constraints: Theory and Practice, F.Rossi (editor), satellite event of CP 2000. International Conference on Contraint Programming, Sept. 2000, Singapore. -- (doi: 10.1007/978-3-540-25925-1_10)


  • Lack of Explicitness Strikes Back

    G.Bella
    In IWSP 2000, 8th International Workshop on Security Protocols, April 2000, Cambridge, UK B.Christianson et al. (eds.), LNCS 2133, pp 87-99, Springer. -- (doi: 10.5555/647218.720713)


  • Making Sense of Specifications: the Formalization of SET

    G.Bella, F.Massacci, L.C.Paulson, P.Tramontano
    In IWSP 2000, 8th International Workshop on Security Protocols, April 2000, Cambridge, UK B.Christianson et al. (eds.), LNCS 2133, pp 74-86, Springer. -- (PDF)


  • Modelling Security Protocols based on Smart Cards

    G.Bella
    In CrypTEC 1999, International Workshop on Cryptographic Techniques and E-Commerce, July 1999, Hong Kong, China M.Blum and C.H.Lee (eds.), pp 139-146, Hong Kong CityU press. -- (PDF)


  • Modelling Security Protocols based on Smart Cards

    G.Bella
    In CrypTEC 1999, International Workshop on Cryptographic Techniques and E-Commerce, July 1999, Hong Kong, China M.Blum and C.H.Lee (eds.), pp 139-146, Hong Kong CityU press. -- (PDF)


  • Modelling Agents' Knowledge Inductively

    G.Bella
    In IWSP 1999, 7th International Workshop on Security Protocols, April 1999, Cambridge, UK B.Christianson et al. (eds.), LNCS 1796, pp 85-94, Springer. -- (doi: 10.1007/10720107_12)


  • Kerberos Version IV: Inductive Analysis of the Secrecy Goals

    G.Bella, L.C.Paulson
    In ESORICS 1998, 5th European Symposium on Research in Computer Security, Sept. 1998, Louvain la Neuve, Belgium J.J.Quisquater et al. (eds.), LNCS 1485, pp 361-375, Springer. -- (doi: 10.1007/BFb0055875)


  • Mechanising BAN Kerberos by the Inductive Method

    G.Bella, L.C.Paulson
    In CAV 1998, 10th Conference on Computer Aided Verification, June 1998, Vancouver, Canada A.J.Hu and M.Y.Vardi (eds.), LNCS 1427, pp 416-427, Springer. -- (doi: 10.1007/BFb0028763)


  • A Realistic Environment for Crypto-Protocol Analyses by ASMs

    G.Bella, E.Riccobene
    In 5th International Workshop on Abstract State Machines, U.Glasser (editor), satellite event of INFORMATIK 2000. Sept. 1998, Magdeburg, Germany. -- (PDF)


  • Using Isabelle to Prove Properties of the Kerberos Authentication System

    G.Bella, L.C.Paulson
    In DIMACS 1997, Workshop on Design and Formal Verification of Security Protocols, Sept. 1997, New York, USA. H.Orman and C.Meadows (eds.), on CD-ROM. -- (PDF)


  • The Validation of a Bidirectional Serial/Parallel Shift Register by Evolving Algebras

    G.Bella, E.Riccobene
    In AICA 1997, Congresso Annuale dell'Associazione Italiana per il Calcolo Automatico, Sept. 1997, Milan, Italy. -- (PDF)


  • Le Algebre Evolventi per la Validazione di Hardware

    G.Bella, E.Riccobene
    AICA 1996, Congresso Annuale dell'Associazione Italiana per il Calcolo Automatico, Sept. 1996, Rome, Italy -- (PDF)


Misc

  • Formal Correctness of Security Protocols

    G.Bella
    Springer Information Security and Cryptography series. -- (ISBN: 978-3-540-68136-6) Based on Bella's Ph.D. thesis mentioned below, it entirely rewrites it and extends it with four new chapters. (Book)


  • Retaliation: Can We Live with Flaws?

    G.Bella, S.Bistarelli, F.Massacci
    Chapter 1 in IOS "Information Assurance and Computer Security", Volume 6 of NATO Security through Science Series. -- (ISBN: 1-58603-678-5)
    Editors: J.P. Thomas and M. Essaaidi
    November 2006, 216 pp., Hardcover (Book Chapter)


  • Inductive Verification of Cryptographic Protocols

    G.Bella
    CUCL Technical Report 493 - Cambridge University Computer Laboratory press, Sept. 2000. -- (PDF)
    Accepted for publication as LNCS monograph by Springer in Jan. 2005 but never published as it was later extended as "Formal Correcteness of Security Protocols", which was accepted for publication in Springer's Information Security and Cryptography series in June 2006. (Ph.D. Thesis)


  • Message Reception in the Inductive Approach

    G.Bella
    CUCL Technical Report 460 - Cambridge University Computer Laboratory press, March 1999. -- (PDF) (Technical Reports)


  • Are Timestamps worth the Effort? A Formal Treatment

    G.Bella, L.C.Paulson
    CUCL Technical Report 447 - Cambridge University Computer Laboratory press, Sept. 1998. -- (PDF) (Technical Reports)