Edited Contributions in the Security & Privacy Column of the SigLog Newsletter

  1. Volume 1, Number 1, 2014 (Introduction) (pdf)
  2. Volume 2, Number 1, 2015 ("The Joint EasyCrypt-F*-CryptoVerif School 2014" by Catalin Hritcu and "Formal verification of E-voting: solutions and challenges" by Veronique Cortier) (pdf)
  3. Volume 2, Number 3, 2015 ("Location Privacy via Geo-Indistinguishability" by Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Marco Stronati) (pdf)
  4. Volume 4, Number 1, 2017 ("Type Systems for Information Flow Control: The Question of Granularity" by Vineet Rajani, Iulia Bastys, Willard Rafnsson, and Deepak Garg) (pdf)

Journal and Conference Publications

  1. A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications
    Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, and Matteo Maffei
    In Proceedings of 30th Computer Security Foundations Symposium (CSF 2017). To appear.
  2. Maliciously Secure Multi-Client ORAM
    Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schroeder
    In Proceedings of the 15th International Conference on Applied Cryptography and Network Security (ACNS 2017). To appear.
  3. SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
    Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
    In Proceedings of 2017 Network and Distributed System Security Symposium (NDSS 2017) (pdf)
  4. Micro-Policies for Web Session Security
    Stefano Calzavara, Riccardo Focardi, Niklas Grimm, and Matteo Maffei
    29th IEEE Computer Security Foundations Symposium (CSF 2016). (pdf).
  5. HornDroid: Practical and Sound Security Static Analysis of Android Applications by SMT Solving
    Stefano Calzavara, Ilya Grishchenko, and Matteo Maffei
    In Proceedings of 1st IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2016). (pdf) [Website]
  6. Achieving Optimal Utility for Distributed Differential Privacy Using Secure Multiparty Computation
    Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, and Ivan Pryvalov
    Applications of Secure Multiparty Computation, pages 85-101, Chapter 5, IOS Press, 2015 (pdf).
  7. Symbolic Malleable Zero-knowledge Proofs
    Michael Backes, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi and Kim Pecina
    In Proceedings of 28th IEEE Symposium on Computer Security Foundations (CSF 2015). Long version (pdf).
  8. Privacy and Access Control for Outsourced Personal Records
    Matteo Maffei, Giulio Malavolta, Manuel Reinert, and Dominique Schröder
    In Proceedings of 36th IEEE Symposium on Security and Privacy (S&P 2015) (pdf).
    Technical report: GORAM - Group ORAM for Privacy and Access Control in Outsourced Personal Records
  9. Type-Based Verification of Electronic Voting Protocols
    Veronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei and Cyrille Wiedling
    In Proceedings of 4th Conference on Principles of Security and Trust (POST 2015) (pdf).
  10. Privacy Preserving Payments in Credit Networks
    Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Kim Pecina
    In Proceedings of 2015 Network and Distributed System Security Symposium (NDSS 2015) (pdf).
  11. Affine Refinement Types for Secure Distributed Programming
    Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, and Matteo Maffei
    ACM Transactions on Programming Languages and Systems (TOPLAS), ACM, 2015. Long Version (pdf).
  12. Differentially Private Data Aggregation with Optimal Utility
    Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, and Ivan Pryvalov
    In Proceedings of 30th Annual Computer Security Applications Conference (ACSAC 2014) (pdf).
  13. Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-Party Setting
    Matteo Maffei, Giulio Malavolta, Manuel Reinert, and Dominique Schroeder.
    In Proceedings of 33th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2014), pages 144-146, ACM, 2014. (pdf).
  14. Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations
    Michael Backes, Catalin Hritcu, and Matteo Maffei
    In Journal of Computer Security, pages 301-353, IOS Press, ISSN 0926-227X, 2014. (pdf)
  15. AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications
    Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, and Philippe von Styp-Rekowsky.
    In Proceedings of 8th International Workshop on Data Privacy Management (DPM 2013), pages 213-231, LNCS, ISBN 978-3-642-54567-2, 2013. (pdf)
  16. Differential Privacy by Typing in Security Protocols
    Fabienne Eigner and Matteo Maffei
    In Proceedings of IEEE 26th Computer Security Foundations Symposium (CSF 2013), pages 272-286, IEEE, ISBN 978-0-7695-5031-2 (pdf). Long Version (pdf).
  17. Security and Privacy by Declarative Design
    Matteo Maffei, Manuel Reinert, and Kim Pecina
    In Proceedings of IEEE 26th Computer Security Foundations Symposium (CSF 2013), pages 81-96, IEEE, ISBN 978-0-7695-5031-2. (pdf)
  18. AppGuard - Enforcing User Requirements on Android Apps
    Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, and Philipp von Styp-Rekowsky
    In Proceedings of 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), pages 543-548, LNCS, ISBN 978-3-642-36741-0. (pdf). See also the technical report "The Android Monitor - Real-time policy enforcement for third-party applications" (pdf)
  19. Logical Foundations of Secure Resource Management
    Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, and Matteo Maffei
    In Proceedings of 2nd Conference on Principles of Security and Trust (POST 2013), pages 105-125, LNCS, ISBN 978-3-642-36830-1. Conference version (pdf).
    EATCS award for "Best theory paper at ETAPS".
  20. ObliviAd: Provably Secure and Practical Online Behavioral Advertising
    Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina.
    In Proceedings of 33rd IEEE Symposium on Security and Privacy (S&P 2012), pages 257-271, IEEE, ISBN 978-1-4673-1244-8. (pdf)
  21. Automated Synthesis of Privacy-Preserving Distributed Applications
    Michael Backes, Matteo Maffei, and Kim Pecina.
    In Proceedings of 19th Annual Network & Distributed System Security Symposium (NDSS 2012), Internet Society. (pdf)
  22. Affine Refinement Types for Authentication and Authorization
    Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, and Matteo Maffei
    In Proceedings of 5th International Symposium on Trustworthy Global Computing (TGC 2011), invited paper. (pdf)
  23. Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols
    Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, and Matteo Maffei.
    In Proceedings of 24th IEEE Symposium on Computer Security Foundations (CSF 2011), pages 83-98, IEEE, ISBN 978-0-7695-4365-9, 2011. (pdf)
  24. Privacy-aware Proof-Carrying Authorization
    Matteo Maffei and Kim Pecina.
    In Proceedings of ACM SIGPLAN Fifth Workshop on Programming Languages and Analysis for Security (PLAS 2011). (pdf)
  25. Brief Announcement: Securing Social Networks
    Michael Backes, Matteo Maffei, and Kim Pecina.
    In Proceedings of 30th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2011), pages 341-342, ACM, ISBN 978-1-4503-0719-2. (pdf).
  26. Types for Security Protocols
    Riccardo Focardi and Matteo Maffei.
    In Formal Models and Techniques for Analyzing Security Protocols, pages 143-181, volume 5, chapter 7. Cryptology and Information Security Series, IOS Press, ISBN 978-1-60750-713-0, 2011. (pdf)
  27. Union and Intersection Types for Secure Implementations
    Michael Backes, Catalin Hritcu, and Matteo Maffei.
    In Proceedings of Theory of Security and Applications (TOSCA'11), LNCS, volume 6993, Springer-Verlag, pages 1-28, ISBN 978-3-642-27375-9. (pdf)
  28. G2C: Cryptographic Protocols From Goal-Driven Specifications
    Michael Backes, Matteo Maffei, Kim Pecina, and Raphael Reischuk.
    In Proceedings of Theory of Security and Applications (TOSCA'11), LNCS, volume 6993, Springer-Verlag, pages 55-77, ISBN 978-3-642-27375-9. (pdf)
  29. A Security API for Distributed Social Networks
    Michael Backes, Matteo Maffei, and Kim Pecina.
    In Proceedings of 18th Annual Network & Distributed System Security Symposium (NDSS 2011), pages 35-52, Internet Society, ISBN 1-891562-32-0, 2011. (pdf)
  30. Computationally Sound Abstraction and Verification of Secure Multi-party Computations
    Michael Backes, Matteo Maffei, and Esfandiar Mohammadi.
    In Proceedings of 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2010), Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, volume 8, LIPIcs, pages 352-363, ISBN 978-3-939897-23-1. Conference version (pdf) Long version (pdf).
  31. Computationally Sound Verification of Source Code
    Michael Backes, Matteo Maffei, and Dominique Unruh.
    17th ACM Conference on Computer and Communications Security (CCS 2010), ACM, pages 387-398, ISBN 978-1-4503-0244-9. Conference version (pdf). Long version (pdf).
  32. Ubiqitous Verification of Ubiquitous Systems
    Reinhard Wilhelm and Matteo Maffei.
    In Proceedings of 8th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (SEUS 2010), LNCS, volume 6399, Springer-Verlag, pages 47-58, ISBN 978-3-642-16255-8. (pdf)
  33. Brief Announcement: Anonymity and Trust in Distributed Systems
    Michael Backes, Stefan Lorenz, Matteo Maffei, and Kim Pecina.
    In Proceedings of Twenty-Ninth Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2010), ACM, pages 237-238, ISBN 978-1-60558-888-9. (pdf)
  34. Anonymous Webs of Trust
    Michael Backes, Stefan Lorenz, Matteo Maffei, and Kim Pecina.
    In Proceedings of 10th Privacy Enhancing Technologies Symposium (PETS 2010), LNCS, volume 6205, Springer-Verlag, pages 130-148, ISBN 978-3-642-14526-1. (pdf)
  35. Design and Verification of Anonymous Trust Protocols
    Michael Backes and Matteo Maffei.
    In proceedings of 17th International Workshop on Security Protocols, LNCS, 2009. (pdf)
  36. Anonymity and Censorship Resistance in Unstructured Overlay Networks
    Michael Backes, Marek Hamerlick, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, and Gerhard Weikum.
    In Proceedings of 17th International Conference on Cooperative Information Systems (CoopIS 2009), LNCS, volume 5870, Springer-Verlag, pages 147-164, ISBN 978-3-642-05147-0. (pdf)
  37. Types for Security Protocols (abstract of invited talk)
    Riccardo Focardi and Matteo Maffei.
    In Proceedings of 7th International Workshop on Security Issues in Concurrency (Secco '09), EPTCS, volume 7. (pdf)
  38. Achieving Security Despite Compromise Using Zero-Knowledge
    Michael Backes, Martin Grochulla, Catalin Hritcu, and Matteo Maffei.
    In Proceedings of 22nd IEEE Symposium on Computer Security Foundations (CSF 2009), IEEE, pages 308-323, ISBN 978-0-7695-3712-2. (pdf)
  39. Type-checking Zero-knowledge
    Michael Backes, Catalin Hritcu, and Matteo Maffei.
    In Proceedings of 15th ACM Conference on Computer and Communications Security (CCS 2008), ACM, pages 357-370, ISBN 978-1-59593-810-7. Long version (pdf)
  40. The CASPA Tool: Causality-based Abstraction for Security Protocol Analysis (Tool Paper)
    Michael Backes, Stefan Lorenz, Matteo Maffei, and Kim Pecina.
    In Proceedings of 20th International Conference on Computer Aided Verification (CAV 2008), LNCS, volume 5123, Springer-Verlag, pages 419-422, ISBN 978-3-540-70543-7. (pdf)
  41. Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays (Brief Announcement)
    Michael Backes, Marek Hamerlick, Alessandro Linari, Matteo Maffei, Christos Tryphonopoulos, and Gerhard Weikum.
    In Proceedings of 27th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2008), ACM, page 429, ISBN 978-1-59593-989-0. (pdf)
  42. Automated Verification of Electronic Voting Protocols in the Applied Pi-calculus
    Michael Backes, Catalin Hritcu, and Matteo Maffei.
    In Proceedings of 21st IEEE Symposium on Computer Security Foundations (CSF 2008), IEEE, pages 195-209,ISBN 978-0-7695-3183-3. (pdf)
  43. Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
    Michael Backes, Matteo Maffei and Dominique Unruh.
    In Proceedings of IEEE Symposium on Security and Privacy 2008, IEEE, pages 202-215, ISBN 978-0-7695-3168-7. (pdf).
  44. A Calculus of Challenges and Responses
    Michael Backes, Agostino Cortesi, Riccardo Focardi and Matteo Maffei.
    In Proceedings of 5th ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE 2007), ACM, pages 51-60, ISBN 978-1-59593-887. (pdf)
  45. Causality-based Abstraction of Multiplicity in Cryptographic Protocols
    Michael Backes, Agostino Cortesi and Matteo Maffei.
    In Proceedings of 20th IEEE Computer Security Foundations Symposium (CSF-20 2007), pages 355-369, ISBN 0-7695-2819-8. (pdf)
  46. Dynamic Types for Authentication
    Michele Bugliesi, Riccardo Focardi and Matteo Maffei.
    In Journal of Computer Security, volume 15, number 6, pages 563-617, 2007. (pdf)
  47. Analysis of Typed Analyses of Authentication Protocols
    Michele Bugliesi, Riccardo Focardi and Matteo Maffei.
    In Proceedings of 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), pages 112-125, ISBN 0-7695-2340-4. (pdf)
  48. Inferring Authentication Tags
    Riccardo Focardi, Matteo Maffei and Francesco Placella.
    In proceedings of 2005 IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security (WITS 2005), ACM Digital Library, pages 42-49, ISBN 1-58113-980-2. (pdf)
  49. Authenticity by Tagging and Typing
    Michele Bugliesi, Riccardo Focardi and Matteo Maffei.
    In proceedings of 2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE 2004), ACM, pages 1-12, ISBN 1-58113-971-3. (pdf)
  50. Tags for Multi-Protocol Authentication
    Matteo Maffei.
    In proceedings of 2nd International Workshop on Security Issues in Coordination Models, Languages and Systems (SECCO 2004), London, United Kingdom, Electronic Notes in Theoretical Computer Science, Elsevier, volume 128, pages 55-63, 2004. (pdf)
  51. p-spi calculus at work: Authentication Case Studies
    Riccardo Focardi and Matteo Maffei.
    In proceedings of Mefisto Project, Formal Methods for Security and Time, Electronic Notes in Theoretical Computer Science, Elsevier, volume 99, pages 267-293, 2004.
  52. Compositional Analysis of Authentication Protocols
    Michele Bugliesi, Riccardo Focardi and Matteo Maffei.
    In proceedings of the European Symposium on Programming (ESOP 2004), Barcelona, Spain, March 2004, LNCS 2986, Springer-Verlag, pg 140-154. (pdf)
  53. Principles for Entity Authentication
    Michele Bugliesi, Riccardo Focardi and Matteo Maffei.
    In proceedings of Andrei Ershov Fifth International Conference PERSPECTIVES OF SYSTEM INFORMATICS (PSI 2003), Novosibirsk, Siberia, Russia, July 2003, LNCS 2890, Springer-Verlag, pg 294-307. (pdf)

Peer-Reviewed Informal Publications

  1. Computationally Sound Abstraction and Verification of Secure Multi-party Computations
    Michael Backes, Matteo Maffei, and Esfandiar Mohammadi.
    In proceedings of the 7th Workshop on Formal and Computational Cryptography (FCC 2011).
  2. Type-checking Implementations of Protocols Based on Zero-knowledge Proofs - Work in Progress
    Michael Backes, Catalin Hritcu, and Matteo Maffei.
    In proceedings of the 8th Workshop on Foundations of Computer Security (FCS'09).
  3. Achieving Security Despite Compromise Using Zero-Knowledge
    Michael Backes, Martin Grochulla, Catalin Hritcu, and Matteo Maffei.
    In proceedings of 9th International Workshop on Issues in the Theory of Security (WITS'09). (pdf)
  4. Computational Soundness of RCF Implementations
    Michael Backes, Matteo Maffei, and Dominique Unruh.
    In proceedings of the 7th Workshop on Formal and Computational Cryptography (FCC 2009).
  5. Type-checking Zero-knowledge
    Michael Backes, Catalin Hritcu, and Matteo Maffei.
    In proceedings of 8th International Workshop on Issues in the Theory of Security (WITS'08). (pdf)
  6. Abstracting Multiplicity in Cryptographic Protocols
    Michael Backes, Agostino Cortesi and Matteo Maffei.
    In proceedings of 7th International Workshop on Issues in the Theory of Security (WITS'07). (pdf)
  7. A Calculus of Challenges and Responses
    Michael Backes, Agostino Cortesi, Riccardo Focardi and Matteo Maffei.
    In proceedings of 7th International Workshop on Issues in the Theory of Security (WITS'07). (pdf)

Ph.D. Thesis

  • Dynamic Typing for Cryptographic Protocols
    Matteo Maffei
    Advisor: Prof. Riccardo Focardi
    Ca' Foscari University of Venice, March 2006. (pdf)