Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Automated Proving of Relational Properties of Probabilistic Programs (Invited Talk)., , and . VPT@CAV, volume 28 of EPiC Series in Computing, page 2. EasyChair, (2014)InvisiGuard: Data Integrity for Microcontroller-Based Devices via Hardware-Triggered Write Monitoring., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 22 (1): 343-358 (January 2025)Pretend synchrony: synchronous verification of asynchronous distributed programs., , , , and . Proc. ACM Program. Lang., 3 (POPL): 59:1-59:30 (2019)PLAS: The 18th Workshop on Programming Languages and Analysis for Security., and . CCS, page 3659. ACM, (2023)Cardinalities in Software Verification.. Technical University Munich, Germany, (2016)Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts., , , , and . CCS, page 2128-2142. ACM, (2023)IODINE: Verifying Constant-Time Execution of Hardware., , , and . USENIX Security Symposium, page 1411-1428. USENIX Association, (2019)Solver-Aided Constant-Time Hardware Verification., , , and . CCS, page 429-444. ACM, (2021)Triereme: Speeding up hybrid fuzzing through efficient query scheduling., , , , , and . ACSAC, page 56-70. ACM, (2023)Refinement Type Refutations., , and . Proc. ACM Program. Lang., 8 (OOPSLA2): 962-987 (2024)