Gustavo Betarte

Orcid: 0000-0002-6863-1082

According to our database1, Gustavo Betarte authored at least 50 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
COVID-19 Mobile Applications: A Study of Trackers and Data Leaks.
J. Internet Serv. Appl., 2024

A process mining-based method for attacker profiling using the MITRE ATT&CK taxonomy.
J. Internet Serv. Appl., 2024

A Formal Analysis of the Mimblewimble Cryptocurrency Protocol with a Security Approach.
CLEI Electron. J., 2024

A Methodological Approach for the Security Analysis of FIWARE Technology.
CLEI Electron. J., 2024

Capturing the security expert knowledge in feature selection for web application attack detection.
Proceedings of the 13th Latin-American Symposium on Dependable and Secure Computing, 2024

Consent validation for personal data access control using ABAC.
Proceedings of the 13th Latin-American Symposium on Dependable and Secure Computing, 2024

Process Mining-Based Assessment of Cyber Range Trainings.
Proceedings of the L Latin American Computer Conference, 2024

2023
A Blockchain based and GDPR-compliant design of a system for digital education certificates.
CLEI Electron. J., May, 2023

Third-Party Trackers in COVID-19 Mobile Applications Can Enable Privacy Leaks.
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023

Discovering attacker profiles using process mining and the MITRE ATT&CK taxonomy.
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023

A Security Analysis of a Referential Architecture of the FIWARE Platform.
Proceedings of the XLIX Latin American Computer Conference, 2023

2022
Contact tracing solutions for COVID-19: applications, data privacy and security.
CLEI Electron. J., 2022

An Idealized Model for the Formal Security Analysis of the Mimblewimble Cryptocurrency Protocol.
Proceedings of the XLVIII Latin American Computer Conference, 2022

2021
A Formal Analysis of the Mimblewimble Cryptocurrency Protocol.
Sensors, 2021

Set-Based Models for Cryptocurrency Software.
CLEI Electron. J., 2021

Design principles for constructing GDPR-compliant blockchain solutions.
Proceedings of the 4th IEEE/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain, 2021

Exploring the Application of Process Mining Techniques to Improve Web Application Security.
Proceedings of the XLVII Latin American Computing Conference, 2021

Proximity tracing applications for COVID-19: data privacy and security.
Proceedings of the XLVII Latin American Computing Conference, 2021

Privacy-aware blockchain solutions: design and threat analysis.
Proceedings of the 24th Iberoamerican Conference on Software Engineering, 2021

Web Application Attacks Detection Using Deep Learning.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2021

2020
System-Level Non-interference of Constant-Time Cryptography. Part II: Verified Static Analysis and Stealth Memory.
J. Autom. Reason., 2020

Towards a Formally Verified Implementation of the MimbleWimble Cryptocurrency Protocol.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
System-Level Non-interference of Constant-Time Cryptography. Part I: Model.
J. Autom. Reason., 2019

2018
Machine learning-assisted virtual patching of web applications.
CoRR, 2018

A formal approach for the verification of the permission-based security model of Android.
CLEI Electron. J., 2018

Security Analysis of Smart Grids.
Proceedings of the IV School on Systems and Networks, 2018

Security in iOS and Android: A Comparative Analysis.
Proceedings of the 37th International Conference of the Chilean Computer Science Society, 2018

Offloading Cryptographic Services to the SIM Card.
Proceedings of the 8th Latin-American Symposium on Dependable Computing, 2018

Web Application Attacks Detection Using Machine Learning Techniques.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

Improving Web Application Firewalls through Anomaly Detection.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

2017
A Certified Reference Validation Mechanism for the Permission Model of Android.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2017

Towards formal model-based analysis and testing of Android's security mechanisms.
Proceedings of the 2017 XLIII Latin American Computer Conference, 2017

2016
Formal Analysis of Android's Permission-Based Security Model, .
Sci. Ann. Comput. Sci., 2016

Towards Model-Driven Virtual Patching for Web Applications.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

2015
Formal Analysis of Security Models for Mobile Devices, Virtualization Platforms, and Domain Name Systems.
CLEI Electron. J., 2015

Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery.
Proceedings of the 4th International Workshop "What can FCA do for Artificial Intelligence?", 2015

Verifying Android's Permission Model.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2015, 2015

2014
System-level non-interference for constant-time cryptography.
IACR Cryptol. ePrint Arch., 2014

2013
Formally Verified Implementation of an Idealized Model of Virtualization.
Proceedings of the 19th International Conference on Types for Proofs and Programs, 2013

Design and implementation of a computer security Diploma.
Proceedings of the 2013 XXXIX Latin American Computing Conference (CLEI), 2013

2012
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
A Formal Specification of the DNSSEC Model.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011

Towards machine-assisted formal procedures for the collection of digital evidence.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Formally Verifying Isolation and Availability in an Idealized Model of Virtualization.
Proceedings of the FM 2011: Formal Methods, 2011

2009
A Certified Access Controller for JME-MIDP 2.0 Enabled Mobile Devices.
Proceedings of the 2009 International Conference of the Chilean Computer Science Society, 2009

Formal Specification and Analysis of the MIDP 3.0 Security Model.
Proceedings of the 2009 International Conference of the Chilean Computer Science Society, 2009

2008
A Framework for the Analysis of Access Control Models for Interactive Mobile Devices.
Proceedings of the Types for Proofs and Programs, International Conference, 2008

2006
A Formal Specification of the MIDP 2.0 Security Model.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

2000
Type checking dependent (record) types and subtyping.
J. Funct. Program., 2000

1999
Specification of a Smart Card Operating System.
Proceedings of the Types for Proofs and Programs, 1999


  Loading...