Cache storage channels: Alias-driven attacks and verified countermeasures R Guanciale, H Nemati, C Baumann, M Dam 2016 IEEE Symposium on Security and Privacy (SP), 38-55, 2016 | 115 | 2016 |
Formal verification of information flow security for a simple ARM-based separation kernel M Dam, R Guanciale, N Khakpour, H Nemati, O Schwarz Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 114 | 2013 |
Inspectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis R Guanciale, M Balliu, M Dam Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 78 | 2020 |
Semantics of global view of choreographies E Tuosto, R Guanciale Journal of logical and algebraic methods in programming 95, 17-40, 2018 | 70 | 2018 |
Jscl: A middleware for service coordination G Ferrari, R Guanciale, D Strollo International Conference on Formal Techniques for Networked and Distributed …, 2006 | 64 | 2006 |
Automating information flow analysis of low level code M Balliu, M Dam, R Guanciale Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 53 | 2014 |
Machine code verification of a tiny ARM hypervisor M Dam, R Guanciale, H Nemati Proceedings of the 3rd international workshop on Trustworthy embedded …, 2013 | 41 | 2013 |
Realisability of pomsets R Guanciale, E Tuosto Journal of Logical and Algebraic Methods in Programming 108, 69-89, 2019 | 27 | 2019 |
Coordination via types in an event-based framework G Ferrari, R Guanciale, D Strollo, E Tuosto International Conference on Formal Techniques for Networked and Distributed …, 2007 | 26 | 2007 |
Provably secure memory isolation for Linux on ARM R Guanciale, H Nemati, M Dam, C Baumann Journal of Computer Security 24 (6), 793-837, 2016 | 25 | 2016 |
Trustworthy virtualization of the ARMv7 memory subsystem H Nemati, R Guanciale, M Dam SOFSEM 2015: Theory and Practice of Computer Science: 41st International …, 2015 | 24 | 2015 |
Validation of abstract side-channel models for computer architectures H Nemati, P Buiras, A Lindner, R Guanciale, S Jacobs Computer Aided Verification: 32nd International Conference, CAV 2020, Los …, 2020 | 23 | 2020 |
Validation of side-channel models via observation refinement P Buiras, H Nemati, A Lindner, R Guanciale MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture …, 2021 | 22 | 2021 |
TrABin: Trustworthy analyses of binaries A Lindner, R Guanciale, R Metere Science of Computer Programming 174, 72-89, 2019 | 22 | 2019 |
An abstract semantics of the global view of choreographies R Guanciale, E Tuosto arXiv preprint arXiv:1608.03323, 2016 | 22 | 2016 |
Event based service coordination over dynamic and heterogeneous networks G Ferrari, R Guanciale, D Strollo Service-Oriented Computing–ICSOC 2006: 4th International Conference, Chicago …, 2006 | 17 | 2006 |
Trustworthy prevention of code injection in linux on embedded devices H Chfouka, H Nemati, R Guanciale, M Dam, P Ekdahl Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 15 | 2015 |
Refactoring long running transactions GL Ferrari, R Guanciale, D Strollo, E Tuosto International Workshop on Web Services and Formal Methods, 127-142, 2008 | 15 | 2008 |
Global coordination policies for services V Ciancia, GL Ferrari, R Guanciale, D Strollo Electronic Notes in Theoretical Computer Science 260, 73-89, 2010 | 14 | 2010 |
Checking correctness of transactional behaviors V Ciancia, GL Ferrari, R Guanciale, D Strollo Formal Techniques for Networked and Distributed Systems–FORTE 2008: 28th …, 2008 | 14 | 2008 |