Skip to main content

Publications by Roberto Guanciale



R. Guanciale and E. Tuosto, "PomCho : Atool chain for choreographic design," Science of Computer Programming, vol. 202, 2021.
J. Haglund and R. Guanciale, "Trustworthy isolation of DMA devices," Journal of Banking and Financial Technology, 2020.
R. Guanciale and E. Tuosto, "Realisability of pomsets," The Journal of logical and algebraic methods in programming, vol. 108, pp. 69-89, 2019.
A. Lindner, R. Guanciale and R. Metere, "TrABin : Trustworthy analyses of binaries," Science of Computer Programming, vol. 174, pp. 72-89, 2019.
T. Emilio and R. Guanciale, "Semantics of global view of choreographies," Journal of Logic and Algebraic Programming, vol. 95, 2017.
R. Guanciale et al., "Provably secure memory isolation for Linux on ARM," Journal of Computer Security, vol. 24, no. 6, pp. 793-837, 2016.
R. Guanciale, D. Gurov and P. Laud, "Business process engineering and secure multiparty computation," Cryptology and Information Security Series, vol. 13, pp. 129-149, 2015.
H. Chfouka, A. Corradini and R. Guanciale, "Classification techniques for conformance and performance checking in process analysis," CEUR Workshop Proceedings, vol. 1101, pp. 21-30, 2013.


A. Coto, R. Guanciale and E. Tuosto, "Choreographic development of message-passing applications : a tutorial," in Lecture Notes in Computer Science book series, 2020, pp. 20-36.
D. Lundberg et al., "Hoare-Style Logic for Unstructured Programs," in Software Engineering and Formal Methods, 2020, pp. 193-213.
R. Guanciale, M. Balliu and M. Dam, "InSpectre : Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis," in CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications, 2020.
A. Coto, R. Guanciale and E. Tuosto, "On Testing Message-Passing Components," in Leveraging Applications of Formal Methods, Verification and Validation, 2020, pp. 22-38.
H. Nemati et al., "Validation of Abstract Side-Channel Models for Computer Architectures," in Lecture Notes in Computer Science book series, 2020, pp. 225-248.
R. Guanciale, "DiRPOMS: Automatic Checker of Distributed Realizability of POMSets," in COORDINATION 2019: Coordination Models and Languages, 2019.
J. Haglund and R. Guanciale, "Trustworthy Isolation of DMA Enabled Devices," in 15th International Conference on Information Systems Security, ICISS 2019, 2019, pp. 35-55.
H. Nemati et al., "Formal verification of integrity-Preserving countermeasures against cache storage side-channels," in 7th International Conference on Principles of Security and Trust, POST 2018 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, 2018, pp. 109-133.
R. Guanciale, "Protecting Instruction Set Randomization from Code Reuse Attacks," in 23rd Nordic Conference on Secure IT Systems, NordSec 2018, 2018, pp. 421-436.
R. Guanciale and E. Tuosto, "Realisability of pomsets via communicating automata," in Electronic Proceedings in Theoretical Computer Science, EPTCS, 2018, pp. 37-51.
R. Metere, A. Lindner and R. Guanciale, "Sound transpilation from binary to machine-independent code," in 20th Brazilian Symposium on Formal Methods, SBMF 2017, 2017, pp. 197-214.
R. Guanciale and E. Tuosto, "An Abstract Semantics of the Global View of Choreographies," in Proceedings 9th Interaction and Concurrency Experience, 2016.
R. Guanciale et al., "Cache Storage Channels : Alias-Driven Attacks and Verified Countermeasures," in Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016, 2016, pp. 38-55.
R. Guanciale and D. Gurov, "Privacy preserving business process fusion," in International Workshops on Business Process Management Workshops, BPM 2014, 2015, pp. 96-101.
D. Gurov, P. Laud and R. Guanciale, "Privacy preserving business process matching," in 2015 13th Annual Conference on Privacy, Security and Trust, 2015, pp. 36-43.
H. Nemati et al., "Trustworthy Memory Isolation of Linux on Embedded Devices," in Trust and Trustworthy Computing, TRUST 2015, 2015, pp. 125-142.
H. Chfouka et al., "Trustworthy prevention of code injection in Linux on embedded devices," in 20th European Symposium on Research in Computer Security, ESORICS 2015, 2015, pp. 90-107.
H. Nemati, R. Guanciale and M. Dam, "Trustworthy virtualization of the ARMv7 memory subsystem," in 41st International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2015, 2015, pp. 578-589.
M. Balliu, M. Dam and R. Guanciale, "Automating Information Flow Analysis of Low Level Code," in Proceedings of CCS’14, November 3–7, 2014, Scottsdale, Arizona, USA, 2014.
R. Guanciale, D. Gurov and P. Laud, "Private intersection of regular languages," in Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, 2014, pp. 112-120.
M. Dam et al., "Formal Verification of Information Flow Security for a Simple ARM-Based Separation Kernel," in 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS'13),November 4 - 8, 2013 Berlin, Germany, 2013.
M. Dam, R. Guanciale and H. Nemati, "Machine Code Verification of a Tiny ARM Hypervisor," in TrustED 13, November 4 2013, Berlin, Germany, 2013.

Icke refereegranskade

Senaste synkning med DiVA:
2021-03-07 02:03:05