System-level non-interference for constant-time cryptography G Barthe, G Betarte, J Campo, C Luna, D Pichardie Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 176 | 2014 |
Formally verifying isolation and availability in an idealized model of virtualization G Barthe, G Betarte, JD Campo, C Luna International Symposium on Formal Methods, 231-245, 2011 | 72 | 2011 |
Extension of Martin-Löf’s type theory with record types and subtyping G Betarte, A Tasistro Twenty-Five Years of Constructive Type Theory 36, 21-39, 1998 | 64 | 1998 |
Cache-leakage resilient OS isolation in an idealized model of virtualization G Barthe, G Betarte, JD Campo, C Luna 2012 IEEE 25th Computer Security Foundations Symposium, 186-197, 2012 | 50 | 2012 |
Web application attacks detection using machine learning techniques G Betarte, Á Pardo, R Martínez 2018 17th IEEE International Conference on Machine Learning and Applications …, 2018 | 42 | 2018 |
Dependent record types and algebraic structures in type theory G Betarte | 37 | 1998 |
Improving web application firewalls through anomaly detection G Betarte, E Giménez, R Martínez, A Pardo 2018 17th IEEE International Conference on Machine Learning and Applications …, 2018 | 29 | 2018 |
A formal specification of the MIDP 2.0 security model S Zanella Béguelin, G Betarte, C Luna International Workshop on Formal Aspects in Security and Trust, 220-234, 2006 | 24 | 2006 |
Formal Analysis of Android's Permission-Based Security Model. G Betarte, J Campo, C Luna, A Romano Scientific Annals of Computer Science 26 (1), 2016 | 23 | 2016 |
Formally verified implementation of an idealized model of virtualization G Barthe, G Betarte, JD Campo, JM Chimento, C Luna 19th International Conference on Types for Proofs and Programs (TYPES 2013 …, 2014 | 22 | 2014 |
Verifying android’s permission model G Betarte, JD Campo, C Luna, A Romano Theoretical Aspects of Computing-ICTAC 2015: 12th International Colloquium …, 2015 | 20 | 2015 |
Machine learning-assisted virtual patching of web applications G Betarte, E Giménez, R Martínez, Á Pardo arXiv preprint arXiv:1803.05529, 2018 | 19 | 2018 |
Towards machine-assisted formal procedures for the collection of digital evidence G Betarte 2011 Ninth Annual International Conference on Privacy, Security and Trust, 32-35, 2011 | 18 | 2011 |
System-level non-interference of constant-time cryptography. Part I: model G Barthe, G Betarte, JD Campo, C Luna Journal of Automated Reasoning 63, 1-51, 2019 | 16 | 2019 |
Design principles for constructing GDPR-compliant blockchain solutions F Molina, G Betarte, C Luna 2021 IEEE/ACM 4th International Workshop on Emerging Trends in Software …, 2021 | 15 | 2021 |
Towards a formally verified implementation of the mimblewimble cryptocurrency protocol G Betarte, M Cristiá, C Luna, A Silveira, D Zanarini Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite …, 2020 | 15 | 2020 |
Formavie: Formal modelling and verification of the javacard 2.1. 1 security architecture G Betarte, E Giménez, C Loiseaux, B Chetali Proc. eSmart, 2002 | 15 | 2002 |
Towards formal model-based analysis and testing of Android's security mechanisms G Betarte, J Campo, M Cristiá, F Gorostiaga, C Luna, C Sanz 2017 XLIII Latin American Computer Conference (CLEI), 1-10, 2017 | 14 | 2017 |
Type checking dependent (record) types and subtyping G Betarte Journal of functional programming 10 (2), 137-166, 2000 | 14 | 2000 |
A formal analysis of the mimblewimble cryptocurrency protocol A Silveira, G Betarte, M Cristiá, C Luna Sensors 21 (17), 5951, 2021 | 12 | 2021 |