Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Good, The Bad and The Ugly: Pitfalls and Best Practices in Automated Sound Static Analysis of Ethereum Smart Contracts., , and . ISoLA (3), volume 12478 of Lecture Notes in Computer Science, page 212-231. Springer, (2020)Decision and Complexity of Dolev-Yao Hyperproperties., , and . Proc. ACM Program. Lang., 8 (POPL): 1913-1944 (January 2024)LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures., , and . CCS, page 859-873. ACM, (2023)Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability., , , , and . NDSS, The Internet Society, (2019)WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring., , , , , and . USENIX Security Symposium, page 1493-1510. USENIX Association, (2018)eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts., , , and . CCS, page 621-640. ACM, (2020)HoRStify: Sound Security Analysis of Smart Contracts., , and . CSF, page 245-260. IEEE, (2023)A Semantic Framework for the Security Analysis of Ethereum Smart Contracts., , and . POST, volume 10804 of Lecture Notes in Computer Science, page 243-269. Springer, (2018)Foundations and Tools for the Static Analysis of Ethereum Smart Contracts., , and . CAV (1), volume 10981 of Lecture Notes in Computer Science, page 51-78. Springer, (2018)