default search action
Gustavo Betarte
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Adrián Silveira, Gustavo Betarte, Carlos Luna:
A Formal Analysis of the Mimblewimble Cryptocurrency Protocol with a Security Approach. CLEI Electron. J. 27(3) (2024) - [j15]Adrián Silveira, Gustavo Betarte, Carlos Luna:
A Formal Analysis of the Mimblewimble Cryptocurrency Protocol with a Security Approach. CLEI Electron. J. 27(3) (2024) - [j14]Juan Pablo Perata, Gustavo Betarte:
A Methodological Approach for the Security Analysis of FIWARE Technology. CLEI Electron. J. 27(4) (2024) - [j13]Nicolás Serrano, Gustavo Betarte, Juan Diego Campo:
COVID-19 Mobile Applications: A Study of Trackers and Data Leaks. J. Internet Serv. Appl. 15(1): 139-159 (2024) - [j12]Marcelo Rodríguez, Gustavo Betarte, Daniel Calegari:
A process mining-based method for attacker profiling using the MITRE ATT&CK taxonomy. J. Internet Serv. Appl. 15(1): 212-232 (2024) - [c34]Guillermo Guerrero, Gustavo Betarte, Juan Diego Campo:
Process Mining-Based Assessment of Cyber Range Trainings. CLEI 2024: 1-10 - [c33]Maria Molina, Gustavo Betarte, Carlos Daniel Luna:
Consent validation for personal data access control using ABAC. LADC 2024: 30-31 - [c32]Amanda Riverol, Gustavo Betarte, Rodrigo Martínez, Alvaro Pardo:
Capturing the security expert knowledge in feature selection for web application attack detection. LADC 2024: 153-158 - [i8]Amanda Riverol, Gustavo Betarte, Rodrigo Martínez, Álvaro Pardo:
Capturing the security expert knowledge in feature selection for web application attack detection. CoRR abs/2407.18445 (2024) - 2023
- [j11]Fernanda Molina, Gustavo Betarte, Carlos Luna:
A Blockchain based and GDPR-compliant design of a system for digital education certificates. CLEI Electron. J. 26(1) (2023) - [c31]Juan Pablo Perata, Gustavo Betarte:
A Security Analysis of a Referential Architecture of the FIWARE Platform. CLEI 2023: 1-9 - [c30]Nicolás Serrano, Gustavo Betarte, Juan Diego Campo:
Third-Party Trackers in COVID-19 Mobile Applications Can Enable Privacy Leaks. LADC 2023: 80-89 - [c29]Marcelo Rodríguez, Gustavo Betarte, Daniel Calegari:
Discovering attacker profiles using process mining and the MITRE ATT&CK taxonomy. LADC 2023: 146-155 - 2022
- [j10]Gustavo Betarte, Juan Diego Campo, Andrea Delgado, Laura González, Álvaro Martín, Rodrigo Martínez, Bárbara Muracciole:
Contact tracing solutions for COVID-19: applications, data privacy and security. CLEI Electron. J. 25(2) (2022) - [c28]Adrián Silveira, Gustavo Betarte, Maximiliano Cristiá, Carlos Luna:
An Idealized Model for the Formal Security Analysis of the Mimblewimble Cryptocurrency Protocol. CLEI 2022: 1-10 - 2021
- [j9]Gustavo Betarte, Maximiliano Cristiá, Carlos Luna, Adrián Silveira, Dante Zanarini:
Set-Based Models for Cryptocurrency Software. CLEI Electron. J. 24(3) (2021) - [j8]Adrián Silveira, Gustavo Betarte, Maximiliano Cristiá, Carlos Luna:
A Formal Analysis of the Mimblewimble Cryptocurrency Protocol. Sensors 21(17): 5951 (2021) - [c27]Nicolás Montés, Gustavo Betarte, Rodrigo Martínez, Álvaro Pardo:
Web Application Attacks Detection Using Deep Learning. CIARP 2021: 227-236 - [c26]Fernanda Molina, Gustavo Betarte, Carlos Luna:
Privacy-aware blockchain solutions: design and threat analysis. CIbSE 2021: 150-163 - [c25]Gustavo Betarte, Juan Diego Campo, Andrea Delgado, Pablo Ezzatti, Laura González, Álvaro Martín, Rodrigo Martínez, Bárbara Muracciole:
Proximity tracing applications for COVID-19: data privacy and security. CLEI 2021: 1-10 - [c24]Marcelo Bruno, Pablo Ibáñez, Tamara Techera, Daniel Calegari, Gustavo Betarte:
Exploring the Application of Process Mining Techniques to Improve Web Application Security. CLEI 2021: 1-10 - [c23]Fernanda Molina, Gustavo Betarte, Carlos Daniel Luna:
Design principles for constructing GDPR-compliant blockchain solutions. WETSEB@ICSE 2021: 1-8 - [i7]Adrián Silveira, Gustavo Betarte, Maximiliano Cristiá, Carlos Daniel Luna:
A Formal Analysis of the MimbleWimble Cryptocurrency Protocol. CoRR abs/2104.00822 (2021) - 2020
- [j7]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie:
System-Level Non-interference of Constant-Time Cryptography. Part II: Verified Static Analysis and Stealth Memory. J. Autom. Reason. 64(8): 1685-1729 (2020) - [c22]Gustavo Betarte, Maximiliano Cristiá, Carlos Daniel Luna, Adrián Silveira, Dante Zanarini:
Towards a Formally Verified Implementation of the MimbleWimble Cryptocurrency Protocol. ACNS Workshops 2020: 3-23 - [i6]Fernanda Molina, Gustavo Betarte, Carlos Daniel Luna:
A Blockchain based and GDPR-compliant design of a system for digital education certificates. CoRR abs/2010.12980 (2020)
2010 – 2019
- 2019
- [j6]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna:
System-Level Non-interference of Constant-Time Cryptography. Part I: Model. J. Autom. Reason. 63(1): 1-51 (2019) - [i5]Gustavo Betarte, Maximiliano Cristiá, Carlos Luna, Adrián Silveira, Dante Zanarini:
Towards a formally verified implementation of the MimbleWimble cryptocurrency protocol. CoRR abs/1907.01688 (2019) - [i4]Gustavo Betarte, Maximiliano Cristiá, Carlos Luna, Adrián Silveira, Dante Zanarini:
Set-Based Models for Cryptocurrency Software. CoRR abs/1908.00591 (2019) - 2018
- [j5]Carlos Luna, Gustavo Betarte, Juan Diego Campo, Camila Sanz, Maximiliano Cristiá, Felipe Gorostiaga:
A formal approach for the verification of the permission-based security model of Android. CLEI Electron. J. 21(2) (2018) - [c21]Gustavo Betarte, Eduardo Giménez, Rodrigo Martínez, Álvaro Pardo:
Improving Web Application Firewalls through Anomaly Detection. ICMLA 2018: 779-784 - [c20]Gustavo Betarte, Álvaro Pardo, Rodrigo Martínez:
Web Application Attacks Detection Using Machine Learning Techniques. ICMLA 2018: 1065-1072 - [c19]Daniel Pedraja, Javier Baliosian, Gustavo Betarte:
Offloading Cryptographic Services to the SIM Card. LADC 2018: 47-56 - [c18]Raul Ignacio Galuppo, Carlos Luna, Gustavo Betarte:
Security in iOS and Android: A Comparative Analysis. SCCC 2018: 1-8 - [c17]Joaquín Márquez, Gabriel Rodríguez, Gustavo Betarte, Juan Diego Campo, Eduardo Grampín:
Security Analysis of Smart Grids. SSN 2018: 50-52 - [i3]Gustavo Betarte, Eduardo Giménez, Rodrigo Martínez, Álvaro Pardo:
Machine learning-assisted virtual patching of web applications. CoRR abs/1803.05529 (2018) - 2017
- [c16]Gustavo Betarte, Juan Diego Campo, Maximiliano Cristiá, Felipe Gorostiaga, Carlos Luna, Camila Sanz:
Towards formal model-based analysis and testing of Android's security mechanisms. CLEI 2017: 1-10 - [c15]Gustavo Betarte, Juan Diego Campo, Felipe Gorostiaga, Carlos Luna:
A Certified Reference Validation Mechanism for the Permission Model of Android. LOPSTR 2017: 271-288 - [i2]Gustavo Betarte, Juan Diego Campo, Felipe Gorostiaga, Carlos Luna:
A certified reference validation mechanism for the permission model of Android. CoRR abs/1709.03652 (2017) - 2016
- [j4]Gustavo Betarte, Juan Diego Campo, Carlos Luna, Agustín Romano:
Formal Analysis of Android's Permission-Based Security Model, . Sci. Ann. Comput. Sci. 26(1): 27-68 (2016) - [c14]Gustavo Betarte, Rodrigo De La Fuente, Rodrigo Martínez, Juan Pirez, Felipe Zipitria:
Towards Model-Driven Virtual Patching for Web Applications. LADC 2016: 109-118 - 2015
- [j3]Gustavo Betarte, Carlos Luna:
Formal Analysis of Security Models for Mobile Devices, Virtualization Platforms, and Domain Name Systems. CLEI Electron. J. 18(3): 3 (2015) - [c13]Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, Agustín Romano:
Verifying Android's Permission Model. ICTAC 2015: 485-504 - [c12]Martín Barrère, Gustavo Betarte, Víctor Codocedo, Marcelo Rodríguez, Hernán Astudillo, Marcelo Aliquintuy, Javier Baliosian, Remi Badonnel, Olivier Festor, Carlos Raniery Paula dos Santos, Jéferson Campos Nobre, Lisandro Zambenedetti Granville, Amedeo Napoli:
Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery. FCA4AI@IJCAI 2015: 75-86 - 2014
- [c11]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, David Pichardie:
System-level Non-interference for Constant-time Cryptography. CCS 2014: 1267-1279 - [i1]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie:
System-level non-interference for constant-time cryptography. IACR Cryptol. ePrint Arch. 2014: 422 (2014) - 2013
- [c10]Gustavo Betarte, Maria E. Corti:
Design and implementation of a computer security Diploma. CLEI 2013: 1-6 - [c9]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Jesús Mauricio Chimento, Carlos Luna:
Formally Verified Implementation of an Idealized Model of Virtualization. TYPES 2013: 45-63 - 2012
- [c8]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna:
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization. CSF 2012: 186-197 - 2011
- [j2]Ezequiel Bazan Eixarch, Gustavo Betarte, Carlos Daniel Luna:
A Formal Specification of the DNSSEC Model. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 48 (2011) - [c7]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna:
Formally Verifying Isolation and Availability in an Idealized Model of Virtualization. FM 2011: 231-245 - [c6]Martín Barrère, Gustavo Betarte, Marcelo Rodríguez:
Towards machine-assisted formal procedures for the collection of digital evidence. PST 2011: 32-35
2000 – 2009
- 2009
- [c5]Ramin Roushani Oskui, Gustavo Betarte, Carlos Luna:
A Certified Access Controller for JME-MIDP 2.0 Enabled Mobile Devices. SCCC 2009: 51-58 - [c4]Gustavo Mazeikis, Gustavo Betarte, Carlos Luna:
Formal Specification and Analysis of the MIDP 3.0 Security Model. SCCC 2009: 59-66 - 2008
- [c3]Juan Manuel Crespo, Gustavo Betarte, Carlos Luna:
A Framework for the Analysis of Access Control Models for Interactive Mobile Devices. TYPES 2008: 49-63 - 2006
- [c2]Santiago Zanella Béguelin, Gustavo Betarte, Carlos Luna:
A Formal Specification of the MIDP 2.0 Security Model. Formal Aspects in Security and Trust 2006: 220-234 - 2000
- [j1]Gustavo Betarte:
Type checking dependent (record) types and subtyping. J. Funct. Program. 10(2): 137-166 (2000)
1990 – 1999
- 1999
- [c1]Gustavo Betarte, Cristina Cornes, Nora Szasz, Alvaro Tasistro:
Specification of a Smart Card Operating System. TYPES 1999: 77-93
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint