Hoppa till huvudinnehållet
Till KTH:s startsida Till KTH:s startsida

Publikationer av Roberto Guanciale

Refereegranskade

Artiklar

[1]
J. K. Larsen et al., "P4R-Type : A Verified API for P4 Control Plane Programs," Proceedings of the ACM on Programming Languages, vol. 7, no. OOPSLA2, 2023.
[2]
A. Bocci et al., "Secure Partitioning of Cloud Applications, with Cost Look-Ahead," Future Internet, vol. 15, no. 7, 2023.
[3]
[4]
A. Coto, R. Guanciale och E. Tuosto, "An abstract framework for choreographic testing," The Journal of logical and algebraic methods in programming, vol. 123, 2021.
[5]
R. Guanciale och E. Tuosto, "PomCho : Atool chain for choreographic design," Science of Computer Programming, vol. 202, 2021.
[6]
J. Haglund och R. Guanciale, "Trustworthy isolation of DMA devices," Journal of Banking and Financial Technology, 2020.
[7]
R. Guanciale och E. Tuosto, "Realisability of pomsets," The Journal of logical and algebraic methods in programming, vol. 108, s. 69-89, 2019.
[8]
A. Lindner, R. Guanciale och R. Metere, "TrABin : Trustworthy analyses of binaries," Science of Computer Programming, vol. 174, s. 72-89, 2019.
[9]
T. Emilio och R. Guanciale, "Semantics of global view of choreographies," Journal of Logic and Algebraic Programming, vol. 95, 2017.
[10]
R. Guanciale et al., "Provably secure memory isolation for Linux on ARM," Journal of Computer Security, vol. 24, no. 6, s. 793-837, 2016.
[11]
R. Guanciale, D. Gurov och P. Laud, "Business process engineering and secure multiparty computation," Cryptology and Information Security Series, vol. 13, s. 129-149, 2015.
[12]
H. Chfouka, A. Corradini och R. Guanciale, "Classification techniques for conformance and performance checking in process analysis," CEUR Workshop Proceedings, vol. 1101, s. 21-30, 2013.

Konferensbidrag

[13]
N. Dong et al., "Formal Verification of Correctness and Information Flow Security for an In-Order Pipelined Processor," i Proceedings of the 23rd Conference on Formal Methods in Computer-Aided Design – FMCAD 2023, 2023.
[14]
J. Haglund och R. Guanciale, "Formally Verified Isolation of DMA," i Proceedings of the 22nd Conference on Formal Methods in Computer-Aided Design – FMCAD 2022, 2022.
[15]
K. Palmskog et al., "Foundations and Tools in HOL4 for Analysis of Microarchitectural Out-of-Order Execution," i Proceedings of the 22nd Conference on Formal Methods in Computer-Aided Design, FMCAD 2022, 2022, s. 129-138.
[16]
A. Alshnakat et al., "HOL4P4 : Semantics for a Verified Data Plane," i EuroP4 2022 : Proceedings of the 5th International Workshop on P4 in Europe, Part of CoNEXT 2022, 2022, s. 39-45.
[17]
A. Bocci et al., "Secure Partitioning of Composite Cloud Applications," i Service-Oriented and Cloud Computing, 2022, s. 47-64.
[18]
R. Guanciale, N. Paladi och A. Vahidi, "SoK : Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing," i 2022 IEEE international symposium on secure and private execution environment design (SEED 2022), 2022, s. 109-120.
[19]
C. Baumann et al., "On Compositional Information Flow Aware Refinement," i 2021 IEEE 34Th Computer Security Foundations Symposium (CSF 2021), 2021, s. 17-32.
[20]
N. Dong, R. Guanciale och M. Dam, "Refinement-Based Verification of Device-to-Device Information Flow," i Proceedings of the 21st Conference on Formal Methods in Computer-Aided Design – FMCAD 2021, 2021.
[21]
P. Buiras et al., "Validation of side-channel models via observation refinement," i Proceedings of the Annual International Symposium on Microarchitecture, MICRO, 2021, s. 578-591.
[22]
A. Coto, R. Guanciale och E. Tuosto, "Choreographic development of message-passing applications : a tutorial," i Lecture Notes in Computer Science book series, 2020, s. 20-36.
[23]
D. Lundberg et al., "Hoare-Style Logic for Unstructured Programs," i Software Engineering and Formal Methods, 2020, s. 193-213.
[24]
R. Guanciale, M. Balliu och M. Dam, "InSpectre : Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis," i CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications, 2020.
[25]
A. Coto, R. Guanciale och E. Tuosto, "On Testing Message-Passing Components," i Leveraging Applications of Formal Methods, Verification and Validation, 2020, s. 22-38.
[26]
H. Nemati et al., "Validation of Abstract Side-Channel Models for Computer Architectures," i Lecture Notes in Computer Science book series, 2020, s. 225-248.
[27]
R. Guanciale, "DiRPOMS: Automatic Checker of Distributed Realizability of POMSets," i COORDINATION 2019: Coordination Models and Languages, 2019.
[28]
J. Haglund och R. Guanciale, "Trustworthy Isolation of DMA Enabled Devices," i 15th International Conference on Information Systems Security, ICISS 2019, 2019, s. 35-55.
[29]
H. Nemati et al., "Formal verification of integrity-Preserving countermeasures against cache storage side-channels," i 7th International Conference on Principles of Security and Trust, POST 2018 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, 2018, s. 109-133.
[30]
R. Guanciale, "Protecting Instruction Set Randomization from Code Reuse Attacks," i 23rd Nordic Conference on Secure IT Systems, NordSec 2018, 2018, s. 421-436.
[31]
R. Guanciale och E. Tuosto, "Realisability of pomsets via communicating automata," i Electronic Proceedings in Theoretical Computer Science, EPTCS, 2018, s. 37-51.
[32]
R. Metere, A. Lindner och R. Guanciale, "Sound transpilation from binary to machine-independent code," i 20th Brazilian Symposium on Formal Methods, SBMF 2017, 2017, s. 197-214.
[33]
R. Guanciale och E. Tuosto, "An Abstract Semantics of the Global View of Choreographies," i Proceedings 9th Interaction and Concurrency Experience, 2016.
[34]
R. Guanciale et al., "Cache Storage Channels : Alias-Driven Attacks and Verified Countermeasures," i Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016, 2016, s. 38-55.
[35]
R. Guanciale och D. Gurov, "Privacy preserving business process fusion," i International Workshops on Business Process Management Workshops, BPM 2014, 2015, s. 96-101.
[36]
D. Gurov, P. Laud och R. Guanciale, "Privacy preserving business process matching," i 2015 13th Annual Conference on Privacy, Security and Trust, 2015, s. 36-43.
[37]
H. Nemati et al., "Trustworthy Memory Isolation of Linux on Embedded Devices," i Trust and Trustworthy Computing, TRUST 2015, 2015, s. 125-142.
[38]
H. Chfouka et al., "Trustworthy prevention of code injection in Linux on embedded devices," i 20th European Symposium on Research in Computer Security, ESORICS 2015, 2015, s. 90-107.
[39]
H. Nemati, R. Guanciale och M. Dam, "Trustworthy virtualization of the ARMv7 memory subsystem," i 41st International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2015, 2015, s. 578-589.
[40]
M. Balliu, M. Dam och R. Guanciale, "Automating Information Flow Analysis of Low Level Code," i Proceedings of CCS’14, November 3–7, 2014, Scottsdale, Arizona, USA, 2014.
[41]
R. Guanciale, D. Gurov och P. Laud, "Private intersection of regular languages," i Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, 2014, s. 112-120.
[42]
M. Dam et al., "Formal Verification of Information Flow Security for a Simple ARM-Based Separation Kernel," i 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS'13),November 4 - 8, 2013 Berlin, Germany, 2013.
[43]
M. Dam, R. Guanciale och H. Nemati, "Machine Code Verification of a Tiny ARM Hypervisor," i TrustED 13, November 4 2013, Berlin, Germany, 2013.

Icke refereegranskade

Konferensbidrag

[44]
A. Coto, R. Guanciale och E. Tuosto, "An abstract framework for choreographic testing," i Electronic Proceedings in Theoretical Computer Science, EPTCS, 2020, s. 43-60.

Kapitel i böcker

[45]
R. Guanciale et al., "A Case Study in Information Flow Refinement for Low Level Systems," i The Logic of Software. A Tasting Menu of Formal Methods, : Springer Nature, 2022, s. 54-79.
Senaste synkning med DiVA:
2024-04-23 00:18:41