Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential assertion checking., , , and . ESEC/SIGSOFT FSE, page 345-355. ACM, (2013)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , and 6 other author(s). SP, page 983-1002. IEEE, (2020)Vale: Verifying High-Performance Cryptographic Assembly Code., , , , , , , , and . USENIX Security Symposium, page 917-934. USENIX Association, (2017)J-Kernel: A Capability-Based Operating System for Java., , , , , and . Secure Internet Programming, volume 1603 of Lecture Notes in Computer Science, page 369-393. Springer, (1999)SYMDIFF: A Language-Agnostic Semantic Diff Tool for Imperative Programs., , , and . CAV, volume 7358 of Lecture Notes in Computer Science, page 712-717. Springer, (2012)Ironclad Apps: End-to-End Security via Automated Full-System Verification., , , , , , and . OSDI, page 165-181. USENIX Association, (2014)Verified Transformations and Hoare Logic: Beautiful Proofs for Ugly Assembly Language., , , , and . VSTTE, volume 12549 of Lecture Notes in Computer Science, page 106-123. Springer, (2020)Everest: Towards a Verified, Drop-in Replacement of HTTPS., , , , , , , , , and 12 other author(s). SNAPL, volume 71 of LIPIcs, page 1:1-1:12. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Language support for fast and reliable message-based communication in singularity OS., , , , , , and . EuroSys, page 177-190. ACM, (2006)Automated and Modular Refinement Reasoning for Concurrent Programs., , , and . CAV (2), volume 9207 of Lecture Notes in Computer Science, page 449-465. Springer, (2015)