From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Automated Proving of Relational Properties of Probabilistic Programs (Invited Talk)., , и . VPT@CAV, том 28 из EPiC Series in Computing, стр. 2. EasyChair, (2014)InvisiGuard: Data Integrity for Microcontroller-Based Devices via Hardware-Triggered Write Monitoring., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 22 (1): 343-358 (января 2025)Pretend synchrony: synchronous verification of asynchronous distributed programs., , , , и . Proc. ACM Program. Lang., 3 (POPL): 59:1-59:30 (2019)PLAS: The 18th Workshop on Programming Languages and Analysis for Security., и . CCS, стр. 3659. ACM, (2023)Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts., , , , и . CCS, стр. 2128-2142. ACM, (2023)IODINE: Verifying Constant-Time Execution of Hardware., , , и . USENIX Security Symposium, стр. 1411-1428. USENIX Association, (2019)Cardinalities in Software Verification.. Technical University Munich, Germany, (2016)Triereme: Speeding up hybrid fuzzing through efficient query scheduling., , , , , и . ACSAC, стр. 56-70. ACM, (2023)Solver-Aided Constant-Time Hardware Verification., , , и . CCS, стр. 429-444. ACM, (2021)Refinement Type Refutations., , и . Proc. ACM Program. Lang., 8 (OOPSLA2): 962-987 (2024)