Juan Diego Campo

Orcid: 0000-0001-5927-0708

According to our database1, Juan Diego Campo authored at least 17 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
COVID-19 Mobile Applications: A Study of Trackers and Data Leaks.
J. Internet Serv. Appl., 2024

Process Mining-Based Assessment of Cyber Range Trainings.
Proceedings of the L Latin American Computer Conference, 2024

2023
Third-Party Trackers in COVID-19 Mobile Applications Can Enable Privacy Leaks.
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023

2022
Contact tracing solutions for COVID-19: applications, data privacy and security.
CLEI Electron. J., 2022

2021
Proximity tracing applications for COVID-19: data privacy and security.
Proceedings of the XLVII Latin American Computing Conference, 2021

2020
System-Level Non-interference of Constant-Time Cryptography. Part II: Verified Static Analysis and Stealth Memory.
J. Autom. Reason., 2020

2019
System-Level Non-interference of Constant-Time Cryptography. Part I: Model.
J. Autom. Reason., 2019

2018
A formal approach for the verification of the permission-based security model of Android.
CLEI Electron. J., 2018

Security Analysis of Smart Grids.
Proceedings of the IV School on Systems and Networks, 2018

2017
A Certified Reference Validation Mechanism for the Permission Model of Android.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2017

Towards formal model-based analysis and testing of Android's security mechanisms.
Proceedings of the 2017 XLIII Latin American Computer Conference, 2017

2016
Formal Analysis of Android's Permission-Based Security Model, .
Sci. Ann. Comput. Sci., 2016

2015
Verifying Android's Permission Model.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2015, 2015

2014
System-level non-interference for constant-time cryptography.
IACR Cryptol. ePrint Arch., 2014

2013
Formally Verified Implementation of an Idealized Model of Virtualization.
Proceedings of the 19th International Conference on Types for Proofs and Programs, 2013

2012
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Formally Verifying Isolation and Availability in an Idealized Model of Virtualization.
Proceedings of the FM 2011: Formal Methods, 2011


  Loading...