Skip to main content

Publications by Roberto Guanciale

Refereegranskade

Artiklar

[1]
R. Guanciale and E. Tuosto, "PomCho : Atool chain for choreographic design," Science of Computer Programming, vol. 202, 2021.
[2]
J. Haglund and R. Guanciale, "Trustworthy isolation of DMA devices," Journal of Banking and Financial Technology, 2020.
[3]
R. Guanciale and E. Tuosto, "Realisability of pomsets," The Journal of logical and algebraic methods in programming, vol. 108, pp. 69-89, 2019.
[4]
A. Lindner, R. Guanciale and R. Metere, "TrABin : Trustworthy analyses of binaries," Science of Computer Programming, vol. 174, pp. 72-89, 2019.
[5]
T. Emilio and R. Guanciale, "Semantics of global view of choreographies," Journal of Logic and Algebraic Programming, vol. 95, 2017.
[6]
R. Guanciale et al., "Provably secure memory isolation for Linux on ARM," Journal of Computer Security, vol. 24, no. 6, pp. 793-837, 2016.
[7]
R. Guanciale, D. Gurov and P. Laud, "Business process engineering and secure multiparty computation," Cryptology and Information Security Series, vol. 13, pp. 129-149, 2015.
[8]
H. Chfouka, A. Corradini and R. Guanciale, "Classification techniques for conformance and performance checking in process analysis," CEUR Workshop Proceedings, vol. 1101, pp. 21-30, 2013.

Konferensbidrag

[9]
A. Coto, R. Guanciale and E. Tuosto, "Choreographic development of message-passing applications : a tutorial," in Lecture Notes in Computer Science book series, 2020, pp. 20-36.
[10]
D. Lundberg et al., "Hoare-Style Logic for Unstructured Programs," in Software Engineering and Formal Methods, 2020, pp. 193-213.
[11]
R. Guanciale, M. Balliu and M. Dam, "InSpectre : Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis," in CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications, 2020.
[12]
A. Coto, R. Guanciale and E. Tuosto, "On Testing Message-Passing Components," in Leveraging Applications of Formal Methods, Verification and Validation, 2020, pp. 22-38.
[13]
H. Nemati et al., "Validation of Abstract Side-Channel Models for Computer Architectures," in Lecture Notes in Computer Science book series, 2020, pp. 225-248.
[14]
R. Guanciale, "DiRPOMS: Automatic Checker of Distributed Realizability of POMSets," in COORDINATION 2019: Coordination Models and Languages, 2019.
[15]
J. Haglund and R. Guanciale, "Trustworthy Isolation of DMA Enabled Devices," in 15th International Conference on Information Systems Security, ICISS 2019, 2019, pp. 35-55.
[16]
H. Nemati et al., "Formal verification of integrity-Preserving countermeasures against cache storage side-channels," in 7th International Conference on Principles of Security and Trust, POST 2018 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, 2018, pp. 109-133.
[17]
R. Guanciale, "Protecting Instruction Set Randomization from Code Reuse Attacks," in 23rd Nordic Conference on Secure IT Systems, NordSec 2018, 2018, pp. 421-436.
[18]
R. Guanciale and E. Tuosto, "Realisability of pomsets via communicating automata," in Electronic Proceedings in Theoretical Computer Science, EPTCS, 2018, pp. 37-51.
[19]
R. Metere, A. Lindner and R. Guanciale, "Sound transpilation from binary to machine-independent code," in 20th Brazilian Symposium on Formal Methods, SBMF 2017, 2017, pp. 197-214.
[20]
R. Guanciale and E. Tuosto, "An Abstract Semantics of the Global View of Choreographies," in Proceedings 9th Interaction and Concurrency Experience, 2016.
[21]
R. Guanciale et al., "Cache Storage Channels : Alias-Driven Attacks and Verified Countermeasures," in Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016, 2016, pp. 38-55.
[22]
R. Guanciale and D. Gurov, "Privacy preserving business process fusion," in International Workshops on Business Process Management Workshops, BPM 2014, 2015, pp. 96-101.
[23]
D. Gurov, P. Laud and R. Guanciale, "Privacy preserving business process matching," in 2015 13th Annual Conference on Privacy, Security and Trust, 2015, pp. 36-43.
[24]
H. Nemati et al., "Trustworthy Memory Isolation of Linux on Embedded Devices," in Trust and Trustworthy Computing, TRUST 2015, 2015, pp. 125-142.
[25]
H. Chfouka et al., "Trustworthy prevention of code injection in Linux on embedded devices," in 20th European Symposium on Research in Computer Security, ESORICS 2015, 2015, pp. 90-107.
[26]
H. Nemati, R. Guanciale and M. Dam, "Trustworthy virtualization of the ARMv7 memory subsystem," in 41st International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2015, 2015, pp. 578-589.
[27]
M. Balliu, M. Dam and R. Guanciale, "Automating Information Flow Analysis of Low Level Code," in Proceedings of CCS’14, November 3–7, 2014, Scottsdale, Arizona, USA, 2014.
[28]
R. Guanciale, D. Gurov and P. Laud, "Private intersection of regular languages," in Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, 2014, pp. 112-120.
[29]
M. Dam et al., "Formal Verification of Information Flow Security for a Simple ARM-Based Separation Kernel," in 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS'13),November 4 - 8, 2013 Berlin, Germany, 2013.
[30]
M. Dam, R. Guanciale and H. Nemati, "Machine Code Verification of a Tiny ARM Hypervisor," in TrustED 13, November 4 2013, Berlin, Germany, 2013.

Icke refereegranskade

Senaste synkning med DiVA:
2021-03-07 02:03:05