Author of the publication

A Perfect Verification: Combining Model Checking with Deductive Analysis to Verify Real-Life Software.

, , , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 173-194. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Black-box caches fingerprinting., , , and . CoNEXT, page 564-565. ACM, (2020)TemPredict: A Big Data Analytical Platform for Scalable Exploration and Monitoring of Personalized Multimodal Data for COVID-19., , , , , , , , , and 4 other author(s). IEEE BigData, page 4411-4420. IEEE, (2021)A Perfect Verification: Combining Model Checking with Deductive Analysis to Verify Real-Life Software., , , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 173-194. Springer, (1999)Device Tracking via Linux's New TCP Source Port Selection Algorithm., , and . USENIX Security Symposium, page 6167-6183. USENIX Association, (2023)Domain Validation++ For MitM-Resilient PKI., , , , and . CCS, page 2060-2076. ACM, (2018)Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version)., , and . CoRR, (2022)Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).. CoRR, (2020)Flaw Label: Exploiting IPv6 Flow Label., , and . SP, page 1259-1276. IEEE, (2020)Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).. SP, page 1179-1196. IEEE, (2021)DNS Cache-Based User Tracking., and . NDSS, The Internet Society, (2019)