Research
-
Formal analysis of android’s permission-based security model,
Gustavo Betarte, Juan Diego Campo, Carlos Luna, Agustín Romano
Sci. Ann. Comp. Sci. page 27-68 -
Towards model-driven virtual patching for web applications
Gustavo Betarte, Rodrigo De La Fuente, Rodrigo Martinez, Juan Pirez, Felipe Zipitria
2016 seventh latin-american symposium on dependable computing, LADC 2016, cali, colombia, october 19-21, 2016 page 109-118 -
Formal analysis of security models for mobile devices, virtualization platforms, and domain name systems
Gustavo Betarte, Carlos Luna
CLEI Electron. J. page 3 -
Verifying android’s permission model
Gustavo Betarte, Juan Diego Campo, Carlos Luna, Agustín Romano
Theoretical aspects of computing - ICTAC 2015 - 12th international colloquium cali, colombia, october 29-31, 2015, proceedings page 485-504 -
Machine-assisted cyber threat analysis using conceptual knowledge discovery
Martín Barrère, Gustavo Betarte, Víctor Codocedo, Marcelo Rodríguez, Hernán Astudillo, Marcelo Aliquintuy, Javier Baliosian, Remi Badonnel, Olivier Festor, Carlos Raniery Paula Santos, Jéferson Campos Nobre, Lisandro Zambenedetti Granville, Amedeo Napoli
Proceedings of the 4th international workshop “what can FCA do for artificial intelligence?”, FCA4AI 2015, co-located with the international joint conference on artificial intelligence (IJCAI 2015), buenos aires, argentina, july 25, 2015. page 75-86 -
System-level non-interference for constant-time cryptography
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie
Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, Scottsdale, AZ, USA, November 3-7, 2014 page 1267-1279 -
System-level non-interference for constant-time cryptography
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie
IACR Cryptology ePrint Archive page 422 -
Design and implementation of a computer security diploma
Gustavo Betarte, Maria E. Corti
2013 XXXIX latin american computing conference (clei), caracas (naiguata), venezuela, october 7-11, 2013 page 1-6 -
Formally verified implementation of an idealized model of virtualization
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Jesús Mauricio Chimento, Carlos Luna
19th international conference on types for proofs and programs, TYPES 2013, april 22-26, 2013, toulouse, france page 45-63 -
Cache-leakage resilient OS isolation in an idealized model of virtualization
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna
25th IEEE computer security foundations symposium, CSF 2012, cambridge, ma, usa, june 25-27, 2012 page 186-197 -
A formal specification of the DNSSEC model
Ezequiel Bazan Eixarch, Gustavo Betarte, Carlos Luna
ECEASST -
Formally verifying isolation and availability in an idealized model of virtualization
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna
FM 2011: Formal methods - 17th international symposium on formal methods, Limerick, Ireland, June 20-24, 2011. Proceedings page 231-245 -
Towards machine-assisted formal procedures for the collection of digital evidence
Martín Barrère, Gustavo Betarte, Marcelo Rodríguez
Ninth annual conference on privacy, security and trust, PST 2011, 19-21 july, 2011, montreal, québec, canada page 32-35 -
Un framework para la definición e implantación de mecanismos de control de acceso basado en roles, contenidos e información contextual
Gustavo Betarte, Andrés Gatto, Rodrigo Martínez, Felipe Zipitría
Proceedings of the VI Congreso iberoamericano de seguridad informática, Bucaramanga, Colombia, 2011 -
A certified access controller for JME-MIDP 2.0 enabled mobile devices
Ramin Roushani Oskui, Gustavo Betarte, Carlos Luna
2009 international conference of the chilean computer science society, SCCC 2009, Santiago, Chile, November 10-12, 2009 page 51-58 -
Formal specification and analysis of the MIDP 3.0 security model
Gustavo Mazeikis, Gustavo Betarte, Carlos Luna
2009 international conference of the chilean computer science society, SCCC 2009, Santiago, Chile, November 10-12, 2009 page 59-66 -
Proceedings of the V Congreso iberoamericano de seguridad informática, Montevideo, Uruguay, 2009
Gustavo Betarte, J. Ramió Aguirre, A. Ribagorda Garnacho, Editors
-
A framework for the analysis of access control models for interactive mobile devices
Juan Manuel Crespo, Gustavo Betarte, Carlos Luna
Types for proofs and programs, international conference, TYPES 2008, Torino, Italy, March 26-29, 2008, Revised selected papers page 49-63 -
Concepción, diseño e implantación de un laboratorio de seguridad informática
María Eugenia Corti, Gustavo Betarte, Marcelo Rodríguez
Reporte Técnico nro. 07-15, InCo-Pedeciba -
Especificación y verificación formal de sistemas críticos en el instituto de computación de la universidad de la república
Gustavo Betarte, Carlos Luna, Luis Sierra
Reporte Técnico nro. 07-14, InCo-Pedeciba -
A formal specification of the MIDP 2.0 security model
Santiago Zanella Béguelin, Gustavo Betarte, Carlos Luna
Formal aspects in security and trust, fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised selected papers page 220-234 -
CERTuy: Hacia un CSIRT nacional
María Eugenia Corti, Marcelo Rodríguez, Gustavo Betarte
Proceedings of the conference MVD Telecom, Montevideo, Uruguay, September 8-10, 2006 -
Hacia una implementación exitosa de un SGSI
Gustavo Betarte, María Eugenia Corti, Reynaldo Fuente
Proceedings de la conferencia iberoamericana de seguridad informática (CIBSI05), LNCS, Valparaíso, Chile, noviembre 2005.
2016
2015
2014
2013
2012
2011
2009
2008
2007
2006
2005
Thesis
-
Formally verified countermeasures against cache based attacks in virtualization platforms
Juan Diego Campo
-
Towards Secure Distributed Computations
Felipe Zipitría
-
Análisis y automatización de la Implantación de SGSI en empresas uruguayas
María Eugenia Corti