Seguir
Roberto Guanciale
Roberto Guanciale
Dirección de correo verificada de kth.se
Título
Citado por
Citado por
Año
Cache storage channels: Alias-driven attacks and verified countermeasures
R Guanciale, H Nemati, C Baumann, M Dam
2016 IEEE Symposium on Security and Privacy (SP), 38-55, 2016
1192016
Formal verification of information flow security for a simple ARM-based separation kernel
M Dam, R Guanciale, N Khakpour, H Nemati, O Schwarz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1172013
Inspectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis
R Guanciale, M Balliu, M Dam
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
842020
Semantics of global view of choreographies
E Tuosto, R Guanciale
Journal of logical and algebraic methods in programming 95, 17-40, 2018
702018
Jscl: A middleware for service coordination
G Ferrari, R Guanciale, D Strollo
International Conference on Formal Techniques for Networked and Distributed …, 2006
642006
Automating information flow analysis of low level code
M Balliu, M Dam, R Guanciale
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
542014
Machine code verification of a tiny ARM hypervisor
M Dam, R Guanciale, H Nemati
Proceedings of the 3rd international workshop on Trustworthy embedded …, 2013
412013
Realisability of pomsets
R Guanciale, E Tuosto
Journal of Logical and Algebraic Methods in Programming 108, 69-89, 2019
272019
Validation of abstract side-channel models for computer architectures
H Nemati, P Buiras, A Lindner, R Guanciale, S Jacobs
Computer Aided Verification: 32nd International Conference, CAV 2020, Los …, 2020
262020
Coordination via types in an event-based framework
G Ferrari, R Guanciale, D Strollo, E Tuosto
International Conference on Formal Techniques for Networked and Distributed …, 2007
262007
Validation of side-channel models via observation refinement
P Buiras, H Nemati, A Lindner, R Guanciale
MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture …, 2021
252021
Trustworthy virtualization of the ARMv7 memory subsystem
H Nemati, R Guanciale, M Dam
SOFSEM 2015: Theory and Practice of Computer Science: 41st International …, 2015
242015
TrABin: Trustworthy analyses of binaries
A Lindner, R Guanciale, R Metere
Science of Computer Programming 174, 72-89, 2019
232019
An abstract semantics of the global view of choreographies
R Guanciale, E Tuosto
arXiv preprint arXiv:1608.03323, 2016
222016
Provably secure memory isolation for Linux on ARM
R Guanciale, H Nemati, M Dam, C Baumann
Journal of Computer Security 24 (6), 793-837, 2016
222016
Event based service coordination over dynamic and heterogeneous networks
G Ferrari, R Guanciale, D Strollo
Service-Oriented Computing–ICSOC 2006: 4th International Conference, Chicago …, 2006
172006
Trustworthy prevention of code injection in linux on embedded devices
H Chfouka, H Nemati, R Guanciale, M Dam, P Ekdahl
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
152015
Applying process analysis to the italian egovernment enterprise architecture
R Bruni, A Corradini, G Ferrari, T Flagella, R Guanciale, G Spagnolo
International Workshop on Web Services and Formal Methods, 111-127, 2011
152011
Event based choreography
V Ciancia, G Ferrari, R Guanciale, D Strollo
Science of Computer Programming 75 (10), 848-878, 2010
142010
Refactoring long running transactions
GL Ferrari, R Guanciale, D Strollo, E Tuosto
International Workshop on Web Services and Formal Methods, 127-142, 2008
142008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20