I am Assistant Professor (RTD-A) of Computer Science within the SySMA research unit of IMT Lucca. Previously, I was postdoctoral researcher at the Department of Computer Science of University of Pisa.
I received my Ph.D. in Computer Science from the University of Pisa, in 2014.
My main research field is language-based security, i.e., using techniques from programming languages, compilers and formal verification to address security problems. I applied these techniques to address security in different application domains like adaptive software, the Internet of Things, and firewall configurations.
Lately I have been working on:
Secure compilation to devise compilation chains that preserve security;
Languages and techniques for specifying and analyzing access control policies;
Formal models and static analyses for smart contracts.
G. Costa, L. Galletta, P. Degano, D. Basin, C. Bodei: Natural Projection as Partial Model Checking. J. Autom. Reason. 64(7): 1445-1481 (2020)
M. Bartoletti, L. Galletta, M. Murgia: A true concurrent model of smart contracts executions. Coordination (2020)
M. Busi, J. Noorman, J. Van Bulck, L. Galletta, P. Degano, J.T. Mühlberg, F. Piessens: Provably secure isolation for interruptible enclaved execution on small microprocessors. IEEE CSF (2020)
C. Bodei, S. Chessa, L. Galletta: Measuring security in IoT communications. Theoretical Computer Science. 764:100-24 (2019).
C. Bodei, P. Degano, R. Focardi Galletta L, M. Tempesta, L. Veronese: Language-independent synthesis of firewall policies. IEEE EuroS&P (2018)
C. Bodei, P. Degano, R. Focardi, L. Galletta, M. Tempesta: Transcompiling Firewalls. POST (2018)
C. Bodei, P. Degano, G.L. Ferrari, L. Galletta: Tracing where IoT data are collected and aggregated. Logical Methods in Computer Science. 13 (2017).
C. Bodei, P. Degano, L. Galletta, F. Salvatori: Context-aware security: linguistic mechanisms and static analysis. J. Comp. Sec. 24(4):427-77 (2016)
P. Degano, G.L. Ferrari, L. Galletta: A two-component language for adaptation: design, semantics and program analysis. IEEE Trans. on Soft. Eng. 42(6):505-29 (2015)