Journals and Conferences
-
A formal analysis of the mimblewimble cryptocurrency protocol with a security approach
Adrián Silveira, Gustavo Betarte, Carlos Luna
CLEI Electron. J. -
A formal analysis of the mimblewimble cryptocurrency protocol with a security approach
Adrián Silveira, Gustavo Betarte, Carlos Luna
CLEI Electron. J. -
A methodological approach for the security analysis of FIWARE technology
Juan Pablo Perata, Gustavo Betarte
CLEI Electron. J. -
COVID-19 mobile applications: A study of trackers and data leaks
Nicolás Serrano, Gustavo Betarte, Juan Diego Campo
J. Internet Serv. Appl. page 139-159 -
A process mining-based method for attacker profiling using the MITRE ATT&CK taxonomy
Marcelo Rodrı́guez, Gustavo Betarte, Daniel Calegari
J. Internet Serv. Appl. page 212-232 -
Process mining-based assessment of cyber range trainings
Guillermo Guerrero, Gustavo Betarte, Juan Diego Campo
L latin american computer conference, CLEI 2024, buenos aires, argentina, august 12-16, 2024 page 1-10 IEEE -
Capturing the security expert knowledge in feature selection for web application attack detection
Amanda Riverol, Gustavo Betarte, Rodrigo Martı́nez, Pardo
CoRR -
A blockchain based and GDPR-compliant design of a system for digital education certificates
Fernanda Molina, Gustavo Betarte, Carlos Luna
CLEI Electron. J. -
A security analysis of a referential architecture of the FIWARE platform
Juan Pablo Perata, Gustavo Betarte
XLIX latin american computer conference, CLEI 2023, la paz, bolivia, october 16-20, 2023 page 1-9 IEEE -
Third-party trackers in COVID-19 mobile applications can enable privacy leaks
Nicolás Serrano, Gustavo Betarte, Juan Diego Campo
12th latin-american symposium on dependable and secure computing, LADC 2023, la paz, bolivia, october 16-18, 2023 page 80-89 ACM -
Discovering attacker profiles using process mining and the MITRE ATT&CK taxonomy
Marcelo Rodrı́guez, Gustavo Betarte, Daniel Calegari
12th latin-american symposium on dependable and secure computing, LADC 2023, la paz, bolivia, october 16-18, 2023 page 146-155 ACM -
Contact tracing solutions for COVID-19: Applications, data privacy and security
Gustavo Betarte, Juan Diego Campo, Andrea Delgado, Laura González, Martı́n, Rodrigo Martı́nez, Bárbara Muracciole
CLEI Electron. J. -
An idealized model for the formal security analysis of the mimblewimble cryptocurrency protocol
Adrián Silveira, Gustavo Betarte, Maximiliano Cristiá, Carlos Luna
XLVIII latin american computer conference, CLEI 2022, armenia, colombia, october 17-21, 2022 page 1-10 IEEE -
Set-based models for cryptocurrency software
Gustavo Betarte, Maximiliano Cristiá, Carlos Luna, Adrián Silveira, Dante Zanarini
CLEI Electron. J. -
A formal analysis of the mimblewimble cryptocurrency protocol
Adrián Silveira, Gustavo Betarte, Maximiliano Cristiá, Carlos Luna
Sensors page 5951 -
Web application attacks detection using deep learning
Nicolás Montés, Gustavo Betarte, Rodrigo Martı́nez, Pardo
Lecture notes in computer science page 227-236 Springer -
Privacy-aware blockchain solutions: Design and threat analysis
Fernanda Molina, Gustavo Betarte, Carlos Luna
24th iberoamerican conference on software engineering, CIbSE 2021, san jose, costa rica, august 20 - september 3, 2021 page 150-163 Curran Associates -
Proximity tracing applications for COVID-19: Data privacy and security
Gustavo Betarte, Juan Diego Campo, Andrea Delgado, Pablo Ezzatti, Laura González, Martı́n, Rodrigo Martı́nez, Bárbara Muracciole
XLVII latin american computing conference, CLEI 2021, cartago, costa rica, october 25-29, 2021 page 1-10 IEEE -
Exploring the application of process mining techniques to improve web application security
Marcelo Bruno, Pablo Ibáñez, Tamara Techera, Daniel Calegari, Gustavo Betarte
XLVII latin american computing conference, CLEI 2021, cartago, costa rica, october 25-29, 2021 page 1-10 IEEE -
Design principles for constructing GDPR-compliant blockchain solutions
Fernanda Molina, Gustavo Betarte, Carlos Daniel Luna
4th IEEE/ACM international workshop on emerging trends in software engineering for blockchain, WETSEB@ICSE 2021, madrid, spain, may 31, 2021 page 1-8 IEEE -
A formal analysis of the MimbleWimble cryptocurrency protocol
Adrián Silveira, Gustavo Betarte, Maximiliano Cristiá, Carlos Daniel Luna
CoRR -
System-level non-interference of constant-time cryptography. Part II: Verified static analysis and stealth memory
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie
J. Autom. Reason. page 1685-1729 -
Towards a formally verified implementation of the MimbleWimble cryptocurrency protocol
Gustavo Betarte, Maximiliano Cristiá, Carlos Daniel Luna, Adrián Silveira, Dante Zanarini
Lecture notes in computer science page 3-23 Springer -
A blockchain based and GDPR-compliant design of a system for digital education certificates
Fernanda Molina, Gustavo Betarte, Carlos Daniel Luna
CoRR -
System-level non-interference of constant-time cryptography. Part I: model
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna
J. Autom. Reason. page 1-51 -
Towards a formally verified implementation of the MimbleWimble cryptocurrency protocol
Gustavo Betarte, Maximiliano Cristiá, Carlos Luna, Adrián Silveira, Dante Zanarini
CoRR -
Set-based models for cryptocurrency software
Gustavo Betarte, Maximiliano Cristiá, Carlos Luna, Adrián Silveira, Dante Zanarini
CoRR -
A formal approach for the verification of the permission-based security model of android
Carlos Luna, Gustavo Betarte, Juan Diego Campo, Camila Sanz, Maximiliano Cristiá, Felipe Gorostiaga
CLEI Electron. J. -
Improving web application firewalls through anomaly detection
Gustavo Betarte, Eduardo Giménez, Rodrigo Martı́nez, Pardo
17th IEEE international conference on machine learning and applications, ICMLA 2018, orlando, FL, USA, december 17-20, 2018 page 779-784 IEEE -
Web application attacks detection using machine learning techniques
Gustavo Betarte, Pardo, Rodrigo Martı́nez
17th IEEE international conference on machine learning and applications, ICMLA 2018, orlando, FL, USA, december 17-20, 2018 page 1065-1072 IEEE -
Offloading cryptographic services to the SIM card
Daniel Pedraja, Javier Baliosian, Gustavo Betarte
8th latin-american symposium on dependable computing, LADC 2018, foz do iguaçu, brazil, october 8-10, 2018 page 47-56 IEEE -
Security in iOS and android: A comparative analysis
Raul Ignacio Galuppo, Carlos Luna, Gustavo Betarte
37th international conference of the chilean computer science society, SCCC 2018, santiago, chile, november 5-9, 2018 page 1-8 IEEE -
Security analysis of smart grids
Joaquı́n Márquez, Gabriel Rodrı́guez, Gustavo Betarte, Juan Diego Campo, Eduardo Grampı́n
CEUR workshop proceedings page 50-52 CEUR-WS.org -
Machine learning-assisted virtual patching of web applications
Gustavo Betarte, Eduardo Giménez, Rodrigo Martı́nez, Pardo
CoRR -
Towards formal model-based analysis and testing of android’s security mechanisms
Gustavo Betarte, Juan Diego Campo, Maximiliano Cristiá, Felipe Gorostiaga, Carlos Luna, Camila Sanz
2017 XLIII latin american computer conference, CLEI 2017, córdoba, argentina, september 4-8, 2017 page 1-10 IEEE -
A certified reference validation mechanism for the permission model of android
Gustavo Betarte, Juan Diego Campo, Felipe Gorostiaga, Carlos Luna
Lecture notes in computer science page 271-288 Springer -
A certified reference validation mechanism for the permission model of android
Gustavo Betarte, Juan Diego Campo, Felipe Gorostiaga, Carlos Luna
CoRR -
Formal analysis of android’s permission-based security model,
Gustavo Betarte, Juan Diego Campo, Carlos Luna, Agustı́n Romano
Sci. Ann. Comput. Sci. page 27-68 -
Towards model-driven virtual patching for web applications
Gustavo Betarte, Rodrigo De La Fuente, Rodrigo Martı́nez, Juan Pirez, Felipe Zipitria
2016 seventh latin-american symposium on dependable computing, LADC 2016, cali, colombia, october 19-21, 2016 page 109-118 IEEE Computer Society -
Formal analysis of security models for mobile devices, virtualization platforms, and domain name systems
Gustavo Betarte, Carlos Luna
CLEI Electron. J. page 3 -
Verifying android’s permission model
Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, Agustı́n Romano
Lecture notes in computer science page 485-504 Springer -
Machine-assisted cyber threat analysis using conceptual knowledge discovery
Martı́n Barrère, Gustavo Betarte, Vı́ctor Codocedo, Marcelo Rodrı́guez, Hernán Astudillo, Marcelo Aliquintuy, Javier Baliosian, Remi Badonnel, Olivier Festor, Carlos Raniery Paula Santos, Jéferson Campos Nobre, Lisandro Zambenedetti Granville, Amedeo Napoli
CEUR workshop proceedings page 75-86 CEUR-WS.org -
System-level non-interference for constant-time cryptography
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, David Pichardie
Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, scottsdale, AZ, USA, november 3-7, 2014 page 1267-1279 ACM -
System-level non-interference for constant-time cryptography
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie
IACR Cryptol. ePrint Arch. page 422 -
Design and implementation of a computer security diploma
Gustavo Betarte, Maria E. Corti
2013 XXXIX latin american computing conference (CLEI), caracas (naiguata), venezuela, october 7-11, 2013 page 1-6 IEEE -
Formally verified implementation of an idealized model of virtualization
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Jesús Mauricio Chimento, Carlos Luna
LIPIcs page 45-63 Schloss Dagstuhl - Leibniz-Zentrum für Informatik -
Cache-leakage resilient OS isolation in an idealized model of virtualization
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna
25th IEEE computer security foundations symposium, CSF 2012, cambridge, MA, USA, june 25-27, 2012 page 186-197 IEEE Computer Society -
A formal specification of the DNSSEC model
Ezequiel Bazan Eixarch, Gustavo Betarte, Carlos Daniel Luna
Electron. Commun. Eur. Assoc. Softw. Sci. Technol. -
Formally verifying isolation and availability in an idealized model of virtualization
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna
Lecture notes in computer science page 231-245 Springer -
Towards machine-assisted formal procedures for the collection of digital evidence
Martı́n Barrère, Gustavo Betarte, Marcelo Rodrı́guez
Ninth annual conference on privacy, security and trust, PST 2011, 19-21 july, 2011, montreal, québec, canada page 32-35 IEEE -
A certified access controller for JME-MIDP 2.0 enabled mobile devices
Ramin Roushani Oskui, Gustavo Betarte, Carlos Luna
2009 international conference of the chilean computer science society, SCCC 2009, santiago, chile, november 10-12, 2009 page 51-58 IEEE Computer Society -
Formal specification and analysis of the MIDP 3.0 security model
Gustavo Mazeikis, Gustavo Betarte, Carlos Luna
2009 international conference of the chilean computer science society, SCCC 2009, santiago, chile, november 10-12, 2009 page 59-66 IEEE Computer Society -
A framework for the analysis of access control models for interactive mobile devices
Juan Manuel Crespo, Gustavo Betarte, Carlos Luna
Lecture notes in computer science page 49-63 Springer -
A formal specification of the MIDP 2.0 security model
Santiago Zanella Béguelin, Gustavo Betarte, Carlos Luna
Lecture notes in computer science page 220-234 Springer -
Type checking dependent (record) types and subtyping
Gustavo Betarte
J. Funct. Program. page 137-166 -
Specification of a smart card operating system
Gustavo Betarte, Cristina Cornes, Nora Szasz, Alvaro Tasistro
Lecture notes in computer science page 77-93 Springer
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2009
2008
2006
2000
1999
Graduate Theses
-
Detection and classification of privacy leaks enabled by third-party trackers in COVID-19 mobile applications
Nicolas Serrano
-
A Formal Analysis of the Mimblewimble Cryptocurrency Protocol with a Security Approach
Adrián Silveira
-
Constructing privacy aware blockchain solutions: Design guidelines and threat analysis techniques
Fernanda Molina
-
Web Application Attacks Detection Using Deep Learning
Nicolas Montes
-
Offloading cryptographic services to the SIM card in smartphones
Daniel Pedraja
-
Enhancing web application attack detection using machine learning
Rodrigo Martinez
-
Formally verified countermeasures against cache based attacks in virtualization platforms
Juan Diego Campo
-
Formal analysis of security models for mobile devices, virtualization platforms, and domain name systems
Carlos Luna
-
Methodology for implementing an ISMS in a hierarchical business group
Gustavo Pallas Mega
-
Towards Secure Distributed Computations
Felipe Zipitría
-
Análisis y automatización de la Implantación de SGSI en empresas uruguayas
María Eugenia Corti