Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Abstract Program Slicing: From Theory towards an Implementation., and . ICFEM, volume 6447 of Lecture Notes in Computer Science, page 452-467. Springer, (2010)A Formal Framework for Property-Driven Obfuscation Strategies., , and . FCT, volume 8070 of Lecture Notes in Computer Science, page 133-144. Springer, (2013)On the Rôle of Abstract Non-interference in Language-Based Security.. APLAS, volume 3780 of Lecture Notes in Computer Science, page 418-433. Springer, (2005)Proving Abstract Non-interference., and . CSL, volume 3210 of Lecture Notes in Computer Science, page 280-294. Springer, (2004)Analyzing program dependencies for malware detection., , and . PPREW@POPL, page 6:1-6:7. ACM, (2014)SEA: String Executability Analysis by Abstract Interpretation., , , and . CoRR, (2017)On the semantic equivalence of language syntax formalisms., and . Theor. Comput. Sci., (2020)Adjoining Declassification and Attack Models by Abstract Interpretation., and . ESOP, volume 3444 of Lecture Notes in Computer Science, page 295-310. Springer, (2005)Preface.. NSAD@SAS, volume 331 of Electronic Notes in Theoretical Computer Science, page 1-2. Elsevier, (2016)Statically analyzing information flows: an abstract interpretation-based hyperanalysis for non-interference., and . SAC, page 2215-2223. ACM, (2019)