scispace - formally typeset
C

Carlos Luna

Researcher at University of the Republic

Publications -  64
Citations -  471

Carlos Luna is an academic researcher from University of the Republic. The author has contributed to research in topics: Formal specification & Computer security model. The author has an hindex of 9, co-authored 61 publications receiving 401 citations.

Papers
More filters
Proceedings ArticleDOI

System-level Non-interference for Constant-time Cryptography

TL;DR: In this paper, the authors propose a new information-flow analysis that checks if an x86 application executes in constant-time, or in S-constant-time (i.e., which do not branch on secrets and do not perform memory accesses that depend on secrets).
Book ChapterDOI

Formally verifying isolation and availability in an idealized model of virtualization

TL;DR: This work formalizes in the Coq proof assistant an idealized model of a hypervisor, and formally establish that the hypervisor ensures strong isolation properties between the different operating systems, and guarantees that requests from guest operating systems are eventually attended.
Book ChapterDOI

A type-theoretic framework for certified model transformations

TL;DR: A framework based on the Calculus of Inductive Constructions and its associated tool the Coq proof assistant is presented to allow certification of model transformations in the context of Model-Driven Engineering.
Proceedings ArticleDOI

Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization

TL;DR: This work formalizes an idealized model of virtualization that features the cache and the Translation Look aside Buffer (TLB), and that provides an abstract treatment of cache-based side-channels, and shows that virtualized platforms are transparent.
Book ChapterDOI

A formal specification of the MIDP 2.0 security model

TL;DR: This paper presents the first formal specification of the application security model defined by the Mobile Information Device Profile 2.0 for Java 2 Micro Edition, and state and sketch the proof of some desirable properties of the security model.