Formal verification of information flow security for a simple ARM-based separation kernel M Dam, R Guanciale, N Khakpour, H Nemati, O Schwarz Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 79 | 2013 |
Cache storage channels: Alias-driven attacks and verified countermeasures R Guanciale, H Nemati, C Baumann, M Dam 2016 IEEE Symposium on Security and Privacy (SP), 38-55, 2016 | 59 | 2016 |
Jscl: A middleware for service coordination G Ferrari, R Guanciale, D Strollo International Conference on Formal Techniques for Networked and Distributed …, 2006 | 57 | 2006 |
Automating information flow analysis of low level code M Balliu, M Dam, R Guanciale Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 35 | 2014 |
Machine code verification of a tiny ARM hypervisor M Dam, R Guanciale, H Nemati Proceedings of the 3rd international workshop on Trustworthy embedded …, 2013 | 32 | 2013 |
Semantics of global view of choreographies E Tuosto, R Guanciale Journal of logical and algebraic methods in programming 95, 17-40, 2018 | 25 | 2018 |
Coordination via types in an event-based framework G Ferrari, R Guanciale, D Strollo, E Tuosto International Conference on Formal Techniques for Networked and Distributed …, 2007 | 22 | 2007 |
Trustworthy virtualization of the ARMv7 memory subsystem H Nemati, R Guanciale, M Dam International Conference on Current Trends in Theory and Practice of …, 2015 | 20 | 2015 |
An abstract semantics of the global view of choreographies R Guanciale, E Tuosto arXiv preprint arXiv:1608.03323, 2016 | 19 | 2016 |
Refactoring long running transactions GL Ferrari, R Guanciale, D Strollo, E Tuosto International Workshop on Web Services and Formal Methods, 127-142, 2008 | 15 | 2008 |
Event based service coordination over dynamic and heterogeneous networks G Ferrari, R Guanciale, D Strollo International Conference on Service-Oriented Computing, 453-458, 2006 | 15 | 2006 |
Trustworthy prevention of code injection in linux on embedded devices H Chfouka, H Nemati, R Guanciale, M Dam, P Ekdahl European Symposium on Research in Computer Security, 90-107, 2015 | 12 | 2015 |
Global coordination policies for services V Ciancia, GL Ferrari, R Guanciale, D Strollo Electronic Notes in Theoretical Computer Science 260, 73-89, 2010 | 12 | 2010 |
Checking correctness of transactional behaviors V Ciancia, GL Ferrari, R Guanciale, D Strollo International Conference on Formal Techniques for Networked and Distributed …, 2008 | 12 | 2008 |
Provably secure memory isolation for Linux on ARM R Guanciale, H Nemati, M Dam, C Baumann Journal of Computer Security 24 (6), 793-837, 2016 | 11 | 2016 |
Applying process analysis to the italian egovernment enterprise architecture R Bruni, A Corradini, G Ferrari, T Flagella, R Guanciale, G Spagnolo International Workshop on Web Services and Formal Methods, 111-127, 2011 | 11 | 2011 |
Event based choreography V Ciancia, G Ferrari, R Guanciale, D Strollo Science of Computer Programming 75 (10), 848-878, 2010 | 11 | 2010 |
Private intersection of regular languages R Guanciale, D Gurov, P Laud 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 10 | 2014 |
Inspectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis R Guanciale, M Balliu, M Dam Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 8 | 2020 |
Event-based service coordination GL Ferrari, R Guanciale, D Strollo, E Tuosto Concurrency, Graphs and Models, 312-329, 2008 | 8 | 2008 |