Some publications
Formal methods and security
- G. Betarte; M. Cristiá;C. Luna, A. Silveira; D. Zanarini; Set-Based Models for Cryptocurrency Software.CLEI Electronic Journal, Vol. 24 No. 3 (2021): Regular papers and Special Issue For Digital Healthcare, 2021.
- A. Silveira; G. Betarte; M. Cristiá; C Luna,; A Formal Analysis of the Mimblewimble Cryptocurrency Protocol.Sensors 21(17): 5951, 2021.
- G. Betarte; M. Cristiá ;C. Luna, A. Silveira; D. Zanarini; Towards a formally verified implementation of the MimbleWimble cryptocurrency protocol.International Conference on Application Intelligence and Blockchain Security, 2020.
- G. Barthe; G. Betarte; J. Campo; C. Luna; D. Pichardie, System-Level Non-interference of Constant-Time Cryptography. Part II: Verified Static Analysis and Stealth Memory.Journal of Automated Reasoning (accepted for publication, 2020).
- G. Barthe; G. Betarte; J. D. Campo; C. Luna, System-Level Non-interference of Constant-Time Cryptography. Part I: Model. Journal of Automated Reasoning, 2019.
- G. Betarte; J. D. Campo; F. Gorostiaga; C. Luna, A certified reference validation mechanism for the permission model of Android. 27th International Symposium on Logic-Based Program Synthesis and Trasformation (LOPSTR), 2017.
- G. Betarte; J. Campo; M. Cristiá; F. Gorostiaga; C. Luna; C. Sanz, Towards formal model-based analysis and testing of Android's security mechanisms.. Simposio Latinoamericano de Ingeniería de Software - CLEI 2017.
- G. Betarte; J. D. Campo; C. Luna; A. Romano, Formal Analysis of Android's Permission-Based Security Model. Scientific Annals of Computer Science, Vol. 26; 27-68, 2016.
- G. Betarte; C. Luna, Formal Analysis of Security Models for Mobile Devices, Virtualization Platforms, and Domain Name Systems. CLEI Electronic Journal, Vol. 18, Number 3, Paper 3, December 2015.
- G. Betarte; J. D. Campo; C. Luna; A. Romano, Verifying Android's Permission Model. In Proceedings of ICTAC 2015: the 12th International Colloquium on Theoretical Aspects of Computing, Cali, Colombia, October 2015.
- M. Barrère; G. Betarte et al, Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery.In Proceedings of FCA4AI 2015: the 4th Workshop 'What can FCA do for Artificial Intelligence?', Buenos Aires, Argentina, 2015.
- G. Barthe; G. Betarte; J. D. Campo; C. Luna; D. Pichardie, System-level non-interference for constant-time cryptography. To appear in Proceedings of CCS 2014: the 21st ACM Conference on Computer and Communications Security, Arizona, USA, 2014.
- G. Barthe; G. Betarte; J. D. Campo; J. M. Chimento; C. Luna, Verified Implementation of an Idealized Model of Virtualization. In Proceedings of TYPES 2013: the 19th International Conference on TYpes for proofs and Programs, LIPIcs, 2013.
- G. Barthe; G. Betarte; J. D. Campo; C. Luna, Cache-leakage resilient OS isolation in an idealized model of virtualization. In Proceedings of CSF 2012: the 25th IEEE Computer Security Foundations Symposium, IEEE Computer Society Press, 2012.
- E. Bazán; G. Betarte; C. Luna, A Formal Specification of the DNSSEC Model. In Proceedings of OpenCert 2011: the 5th International Workshop on Foundations and Techniques for Open source Software Certification, Electronic Communications of the EASST, 2011.
- G. Barthe; G. Betarte; J. D. Campo; C. Luna, Formally verifying isolation and availability in an idealized model of virtualization. In Proceedings of FM 2011: the 17th International Symposium on Formal Methods, Lecture Notes in Computer Science, vol. 6664, pp 231-245, 2011.
- R. Roushani; G. Betarte; C. Luna, A Certified Access Controller for JME-MIDP 2.0 enabled Mobile Devices. Proceedings of the Chilean Computer Science Society International Conference, IEEE Computer Science, 2010.
- G. Mazeikis; G. Betarte; C. Luna, Formal Specification and Analisys of the MIDP 3.0 Security Model. Proceedings of the Chilean Computer Science Society International Conference, IEEE Computer Science, 2010.
- J. M. Crespo; G. Betarte; C. Luna, A Framework for the Analysis of Access Control Models for Interactive Mobile Devices. Proceedings of the Workshop Types for proofs and Programs, Lecture Notes in Computer Science, vol. 5497, p. 49-63, 2009.
- S. Zanella Béguelin, G. Betarte, C. Luna, A Formal Specification of the MIDP 2.0 Security Model, Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust, FAST 2006, Hamilton, Canada, August 26–27 2006, LNCS, Springer, 2007.
- G. Betarte, E. Giménez, C. Loiseaux, B. Chetali, FORMAVIE: Formal Modeling and Verification of the Java Card 2.1.1 Security Architecture. In Proceedings of eSmart 2002, Nice, France, 2002.
- G. Betarte, C. Cornes, N. Szasz, A. Tasistro, Specification of a Smart Card Operating System. In Proceedings of The 1999 Workshop on Types for Proofs and Programs, LNCS 1956, Springer, 2001.
Methods and Tools
- G. Betarte; J. Campo; A. Delgado; P. Ezzatti; L. González; A. Martín; R. Martínez; B. Muracciole; Proximity tracing applications for COVID-19: data privacy and security.CLEI Electronic Journal, Vol. 25 No. 4 (2022).
- N. Montes; G. Betarte; R. Martínez; A. Pardo; Web Application Attacks Detection Using Deep Learning Techniques.25th Iberoamerican Congress on Pattern Recognition (CIARP 2021), LNCS 12702, 2021.
- F. Molina; G. Betarte; C. Luna,; Design principles for constructing GDPR-compliant blockchain solutions.IEEE/ACM 4th International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), ICSE, 2021.
- G. Betarte; E. Giménez; R. Martínez; A. Pardo, Improving Web Application Firewalls through Anomaly Detection, International Conference on Machine Learning and Applications 2018: 779-784, 2018.
- G. Betarte; A. Pardo; R. Martínez; Web Application Attacks Detection Using Machine Learning Techniques, International Conference on Machine Learning and Applications 2018: 1065-1072, 2018.
- D. Pedraja; J. Baliosian; G. Betarte,Offloading Cryptographic Services to the SIM Card. Latin American Symposium on Dependable Computing 2018: 47-56, (2018), 2018.
- G. Betarte; I. Galuppo; C. Luna, Security in iOS and Android: a comparative analysis. SCCC 2018, IEEE Xplore, 2018.
- F. Baladán, G. Betarte, A. Blanco, C. Montaña, B. Muracciole, B. Rodríguez, Privacy by Design: de la abstracción jurídica a la práctica ingenieril . IX Congreso Iberoamericano de Seguridad Informática, 2017.
- G. Betarte; R. De La Fuente, R. Martínez, J. Pírez, F. Zipitría, Towards model-driven virtual patching for web applications. Latin American Symposium on Dependable Computing, 2016.
- M. Barrère, G. Betarte, M. Rodríguez, Towards machine-assisted formal procedures for the collection of digital evidence . 9th Annual Conference on Privacy, Security and Trust (PST 2011), Quebec, Canada, 2011.
- G. Betarte, A. Gatto, R. Martínez, F. Zipitría, Un Framework para la Definición e Implantación de Mecanismos de Control de Acceso Basado en Roles, Contenidos e Información Contextual. VI Congreso Iberoamericano de Seguridad Informática, Bucaramanga, Colombia, 2011.
- G. Betarte, M.E. Corti, M. Rodríguez, Concepción, Diseño e Implementación de un Laboratorio de Seguridad Informática. IV Congreso Iberoamericano de Seguridad Informática, Mar del Plata, Argentina, 2007.
- E. Carozo, C. Martínez, L. Vidal, G. Betarte, A. Blanco, J. Pérez, CERTuy: Hacia un CSIRT Nacional. Proceedings of the Conference MVD Telecom, September 8-10, Montevideo, Uruguay, 2006.
- G. Betarte, M.E. Corti, R. de la Fuente. Hacia una Implementación Exitosa de un SGSI. III Conferencia Iberoamericana de Seguridad Informática (CIBSI 05), LNCS, Valparaiso, Chile, 2005.
Dependent record types and subtyping in Type Theory
- G. Betarte, Type Checking Dependent (Record) Types and Subtyping. In Journal of Functional Programming, Volume 10(2), 137-166, Cambridge University Press, March 2000.
- G. Betarte, A. Tasistro, Extension of Martin-Löf's Type Theory with Record Types and Subtyping. Chapter 2 of the book Twenty-five Years of Constructive Type Theory, Oxford University Press, 1998.
Proceedings
Theses