IMDEA Software

IMDEA initiative

Home > Research > Publications
Filter

Articles in Refereed Journals (231)

  1. Abstract Environment Trimming
    Theory and Practice of Logic Programming. Cambridge U. Press, October 2024.
  2. Michael H. Borkowski, Niki Vazou, Ranjit Jhala.
    ACM SIGACT Symposium on Principles of Programming Languages 8 (POPL). Association for Computing Machinery, January 2024.
  3. Cecilia Boschini, Dario Fiore, Elena Pagnin, Luca Torresetti, Andrea Visconti.
    Journal of Cryptographic Engineering 14 (3), 551–575. 2024.
  4. Agustín Nolasco, Facundo Molina, Renzo Degiovanni, Alessandra Gorla, Diego Garbervetsky, Mike Papadakis, Sebastián Uchitel, Nazareno Aguirre, Marcelo F. Frias.
    Proc. ACM Softw. Eng. 1 ({FSE}), 450–472. 2024.
  5. Mariano Politano, Valeria S. Bengolea, Facundo Molina, Nazareno Aguirre, Marcelo F. Frias, Pablo Ponzio.
    Science of Computer Programming 238, 103153. 2024.
  6. Liveness and latency of Byzantine state-machine replication
    Manuel Bravo, Gregory Chockler, Alexey Gotsman.
    Distributed Computing 37 (2), 177–205. Springer, 2024.
  7. Daniel Benarroch, Matteo Campanelli, Dario Fiore, Kobi Gurkan, Dimitris Kolonelos.
    Data Compression Conference. July 2023.
  8. Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications 144, 74-89. July 2023.
  9. Nico Lehmann, Adam T. Geller, Niki Vazou, Ranjit Jhala.
    ACM SIGPLAN Conference on Programming Language Design and Implementation 7 (PLDI). Association for Computing Machinery, June 2023.
  10. Gibran Gomez, Platon Kotzias, Matteo Dell'Amico, Leyla Bilge, Juan Caballero.
    Security and Communication Networks 2023. January 2023.
  11. Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti.
    IEEE Internet Computing 27 (2), 13–19. 2023.
  12. Pooja Rani, Arianna Blasi, Nataliia Stulova, Sebastiano Panichella, Alessandra Gorla, Oscar Nierstrasz.
    Journal of Systems and Software 195, 111515. 2023.
  13. Formal Methods for Systems Design. 2023.
  14. Bartosz Bednarczyk, Stéphane Demri, Raul Fervari, Alessio Mansutti.
    ACM Transactions on Computational Logic. 2023.
  15. Proceedings of the ACM on Programming Languages 6 (ICFP), 596–624. Association for Computing Machinery, August 2022.
  16. Philipp Körner, Michael Leuschel, João Barbosa, Vítor Santos-Costa, Verónica Dahl, Manuel V. Hermenegildo, Jose F. Morales, Jan Wielemaker, Daniel Diaz, Salvador Abreu, Giovanni Ciatto.
    Theory and Practice of Logic Programming 22 (6), 776–858. Cambridge U. Press, May 2022.
  17. Agostino Dovier, Andrea Formisano, Gopal Gupta, Manuel V. Hermenegildo, Enrico Pontelli, Ricardo Rocha.
    Theory and Practice of Logic Programming 22 (6), 905–973. Cambridge U. Press, March 2022.
  18. Proceedings of the ACM on Programming Languages 6 (POPL), 1–30. Association for Computing Machinery, January 2022.
  19. José Carlos Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela.
    J. Log. Algebraic Methods Program. 125, 100736. 2022.
  20. Gilles Barthe, Charlie Jacomme, Steve Kremer.
    ACM Transactions on Computational Logic 23 (1), 5:1–5:42. 2022.
  21. Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso.
    Journal of Computer Security 30 (1), 109–165. IOS Press, 2022.
  22. Xueliang Li, Junyang Chen, Yepang Liu, Kaishun Wu, John P. Gallagher.
    ACM Transactions on Software Engineering and Methodology 32 (1), 1–44. Association for Computing Machinery, 2022.
  23. Manuel Bravo, Gregory Chockler, Alexey Gotsman.
    Distributed Computing 35 (6), 503–532. Springer, 2022.
  24. Joaquín Arias, Seppo Törmä, Manuel Carro, Gopal Gupta.
    Theory and Practice of Logic Programming 22 (5), 723–738. 2022.
  25. Zachary Grannan, Niki Vazou, Eva Darulova, Alexander J. Summers.
    Dagstuhl Artifacts Series 8 (2), 12:1–12:2. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022.
  26. Yuliya Lierler, José F. Morales.
    Theory and Practice of Logic Programming 22 (4), 499–504. 2022.
  27. Yuliya Lierler, José F. Morales.
    Theory and Practice of Logic Programming 22 (5), 640–640. 2022.
  28. Arianna Blasi, Nataliia Stulova, Alessandra Gorla, Oscar Nierstrasz.
    Journal of Systems and Software 182. December 2021.
  29. Arianna Blasi, Alessandra Gorla, Michael D. Ernst, Mauro Pezzè, Antonio Carzaniga.
    Journal of Systems and Software 181. November 2021.
  30. Pierre Ganty, Francesco Ranzato, Pedro Valero.
    ACM Transactions on Computational Logic 22 (4). Association for Computing Machinery, September 2021.
  31. Theory and Practice of Logic Programming 21 (6), 768–784. Cambridge U. Press, September 2021.
  32. Nikita Zyuzin, Aleksandar Nanevski.
    International Conference on Functional Programming 5 (ICFP). Association for Computing Machinery, August 2021.
  33. Irfan Ul Haq, Juan Caballero.
    ACM Computing Surveys 54 (3). April 2021.
  34. Incremental and Modular Context-sensitive Analysis
    Theory and Practice of Logic Programming 21 (2), 196–243. January 2021.
  35. Olivier Blazy, Laura Brouilhet, Celine Chevalier, Patrick Towa, Ida Tucker, Damien Vergnaud.
    Electronic Notes in Theoretical Computer Science 895, 178-211. 2021.
  36. Ignacio Cascudo, Reto Schnyder.
    Journal of Mathematical Cryptology 15 (1), 284–297. 2021.
  37. Alejandro Aguirre, Gilles Barthe, Justin Hsu, Benjamin Lucien Kaminski, Joost-Pieter Katoen, Christoph Matheja.
    ACM SIGACT Symposium on Principles of Programming Languages 5 ({POPL}), 1–28. 2021.
  38. Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Shin-ya Katsumata, Tetsuya Sato.
    Proceedings of the ACM on Programming Languages 5 ({ICFP}), 1–30. 2021.
  39. ACM SIGACT Symposium on Principles of Programming Languages 5 ({POPL}), 1–32. 2021.
  40. Gilles Barthe, Marc Gourjon, Benjamin Grégoire, Maximilian Orlt, Clara Paglialonga, Lars Porth.
    IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021 (2), 189–228. 2021.
  41. Emanuele De Angelis, Fabio Fioravanti, John P. Gallagher, Manuel V. Hermenegildo, Alberto Pettorossi, Maurizio Proietti.
    Theory and Practice of Logic Programming First view, 1–69. Cambridge University Press, 2021.
  42. John P. Gallagher, Martin Sulzmann.
    Science of Computer Programming 202, 102577. 2021.
  43. Miguel Ambrona, Dario Fiore, Claudio Soriente.
    Privacy Enhancing Technologies Symposium 2021 (1), 21 - 42. Sciendo, 2021.
  44. Ranjit Jhala, Niki Vazou.
    Foundations and Trends® in Programming Languages 6 (3–4), 159-317. 2021.
  45. Somayeh Dolatnezhad Samarin, Dario Fiore, Daniele Venturi, Morteza Amini.
    Electronic Notes in Theoretical Computer Science 889, 145-170. 2021.
  46. Joaquín Arias, Manuel Carro, Zhuo Chen, Gopal Gupta.
    Theory and Practice of Logic Programming, 1–30. Cambridge University Press, 2021.
  47. Gregory Chockler, Alexey Gotsman.
    Distributed Computing 34 (4), 301–318. Springer, 2021.
  48. Hagit Attiya, Sebastian Burckhardt, Alexey Gotsman, Adam Morrison, Hongseok Yang, Marek Zawirski.
    Electronic Notes in Theoretical Computer Science 855, 141–160. Elsevier, 2021.
  49. International Journal on Software Tools for Technology Transfer 23, 157–183. 2021.
  50. Symbolic AI for XAI: Evaluating LFIT Inductive Programming for Explaining Biases in Machine Learning
    Alfonso Ortega, Julian Fierrez, Aythami Morales, Zilong Wang, Marina de la Cruz, César Luis Alonso, Tony Ribeiro.
    Computers 10 (11), 154. Multidisciplinary Digital Publishing Institute, 2021.
  51. Alejandro Aguirre, Shin-ya Katsumata.
    Electronic Notes in Theoretical Computer Science 352, 5–27. 2020.
  52. Ignacio Cascudo, Jaron Skovsted Gundersen, Diego Ruano.
    Finite Fields and Their Applications 62. 2020.
  53. Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira.
    IEEE Data Engineering Bulletin 43 (2), 36–66. 2020.
  54. Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie.
    Journal of Automated Reasoning 64 (8), 1685–1729. 2020.
  55. Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub.
    Journal of Cryptographic Engineering 10 (1), 17–26. 2020.
  56. Borja Balle, Gilles Barthe, Marco Gaboardi.
    Journal of Privacy and Confidentiality 10 (1). 2020.
  57. Gilles Barthe, Sandrine Blazy, Benjamin Grégoire, Rémi Hutin, Vincent Laporte, David Pichardie, Alix Trieu.
    ACM SIGACT Symposium on Principles of Programming Languages 4 ({POPL}), 7:1–7:30. 2020.
  58. Gilles Barthe, Justin Hsu, Kevin Liao.
    ACM SIGACT Symposium on Principles of Programming Languages 4 ({POPL}), 55:1–55:30. 2020.
  59. Gilles Barthe, Justin Hsu, Mingsheng Ying, Nengkun Yu, Li Zhou.
    ACM SIGACT Symposium on Principles of Programming Languages 4 ({POPL}), 21:1–21:29. 2020.
  60. Martin A. T. Handley, Niki Vazou, Graham Hutton.
    ACM SIGACT Symposium on Principles of Programming Languages 4 ({POPL}), 24:1–24:27. 2020.
  61. Fabio Fioravanti, John P. Gallagher, Maurizio Proietti.
    Fundam. Inform. 173 (4). 2020.
  62. Stream Runtime Verification of Real-Time Event-Streams with the Striver Language
    International Journal on Software Tools for Technology Transfer. 2020.
  63. Martin Leucker, César Sánchez, Torben Scheffel, Malte Schmitz, Alexander Schramm.
    Software Quality Journal 28 (2), 745–787. 2020.
  64. Verifying replicated data types with typeclass refinements in Liquid Haskell
    Yiyun Liu, James Parker, Patrick Redmond, Lindsey Kuper, Michael Hicks, Niki Vazou.
    ACM Conference on Object Oriented Programming Systems Languages and Applications 4 (OOPSLA), 1–30. ACM New York, NY, USA, 2020.
  65. Fireplug: Efficient and Robust Geo-Replication of Graph Databases
    R. Neiheiser, L. Rech, M. Bravo, L. Rodrigues, M. Correia.
    IEEE Transactions on Parallel and Distributed Systems 31 (8), 1942–1953. 2020.
  66. Proving Highly-Concurrent Traversals Correct
    Yotam M. Y. Feldman, Artem Khyzha, Constantin Enea, Adam Morrison, Aleksandar Nanevski, Noam Rinetzky, Sharon Shoham.
    ACM Conference on Object Oriented Programming Systems Languages and Applications 4 ({OOPSLA}), 128:1–128:29. 2020.
  67. Sandro Stucki, César Sánchez, Gerardo Schneider, Borzoo Bonarkdarpour.
    Formal Methods in Systems Desing, 1–36. 2020.
  68. Alejandro Calleja, Juan Tapiador, Juan Caballero.
    IEEE Transactions on Information Forensics and Security 14 (12), 3175-3190. IEEE, December 2019.
  69. César Sánchez, Gerardo Schneider, Wolfgang Ahrendt, Ezio Bartocci, Domenico Bianculli, Christian Colombo, Yliès Falcone, Adrian Francalanza, Srdan Krstic, João M. Lourenço, Dejan Nickovic, Gordon J. Pace, José Rufino, Julien Signoles, Dmitriy Traytel, Alexander Weiss.
    Formal Methods in System Design 54 (3), 279–335. November 2019.
  70. ACM Conference on Object Oriented Programming Systems Languages and Applications 3 ({OOPSLA}), 1–30. ACM, October 2019.
  71. Jesús J. Doménech, John P. Gallagher, Samir Genaim.
    Theory and Practice of Logic Programming 19 (5-6), 990–1005. Cambridge University Press, September 2019.
  72. Theory and Practice of Logic Programming 19 (5-6), 1107–1123. September 2019.
  73. Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin.
    IET Information Security 13 (6), 618–638. Institution of Engineering and Technology, April 2019.
  74. Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt.
    Journal of Cryptology 32 (2), 324–360. April 2019.
  75. Logical Methods in Computer Science 15 (1). March 2019.
  76. Patrick Cousot, Roberto Giacobazzi, Francesco Ranzato.
    ACM SIGACT Symposium on Principles of Programming Languages 3 ({POPL}), 1–31. ACM, January 2019.
  77. IET Information Security 13 (1), 27–35. IET, January 2019.
  78. Luca Aceto, Dario Della Monica, Ignacio Fábregas, Anna Ingólfsdóttir.
    Electronic Notes in Theoretical Computer Science 777, 3–31. 2019.
  79. Luca Aceto, Ignacio Fábregas, Carlos Gregorio-Rodríguez, Anna Ingólfsdóttir.
    Journal of Logical and Algebraic Methods in Programming 106, 78–106. 2019.
  80. Luca Aceto, Ignacio Fábregas, Álvaro García-Pérez, Anna Ingólfsdóttir, Yolanda Ortega-Mallén.
    Logical Methods in Computer Science 15 (4). 2019.
  81. Patrick Baillot, Gilles Barthe, Ugo Dal Lago.
    Journal of Automated Reasoning 63 (4), 813–855. 2019.
  82. Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna.
    Journal of Automated Reasoning 63 (1), 1–51. 2019.
  83. Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Pierre-Yves Strub.
    Journal of Functional Programming 29, e16. 2019.
  84. Gilles Barthe, Christos Dimitrakakis, Marco Gaboardi, Andreas Haeberlen, Aaron Roth, Aleksandra B. Slavkovic.
    Journal of Privacy and Confidentiality 9 (1). 2019.
  85. Gilles Barthe, Thomas Espitau, Justin Hsu, Tetsuya Sato, Pierre-Yves Strub.
    Logical Methods in Computer Science 15 (4). 2019.
  86. James Parker, Niki Vazou, Michael Hicks.
    ACM SIGACT Symposium on Principles of Programming Languages 3 ({POPL}), 1–30. 2019.
  87. Tetsuya Sato, Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Justin Hsu.
    ACM SIGACT Symposium on Principles of Programming Languages 3 ({POPL}), 38:1–38:30. 2019.
  88. Julio Mariño, Raúl N. N. Alborodo, Lars-Åke Fredlund, Ángel Herranz-Nieva.
    Software and Systems Modeling 18 (1), 71–105. 2019.
  89. Álvaro García-Pérez, Pablo Nogueira.
    Journal of Functional Programming 29 (E7), 1–38. Cambridge University Press, 2019.
  90. Gustavo Alonso, Zsolt Istvan, Kaan Kara, Muhsen Owaida, David Sidler.
    IEEE Data Engineering Bulletin 42 (2), 19–31. 2019.
  91. IEEE Data Engineering Bulletin 42 (1), 49–60. 2019.
  92. International Conference on Very Large Databases 12 (12), 1838–1841. VLDB Endowment, 2019.
  93. Zorana Banković, Umer Liqat, Pedro Lopez-Garcia.
    Journal of Multiple-Valued Logic and Soft Computing 32 (3-4), 313–341. Old City Publishing, 2019.
  94. Roberto Bruni, Roberto Giacobazzi, Roberta Gori.
    Formal Aspects of Computing: applicable formal methods 30 (6), 685–711. November 2018.
  95. Dario Catalano, Dario Fiore, Nizzardo Luca.
    Design, Codes and Cryptography 86 (10), 2197–2246. October 2018.
  96. Computers and Security 78, 347–363. Elsevier, August 2018.
  97. Zsolt István, David Sidler, Gustavo Alonso.
    IEEE Internet Computing 22 (4), 6–14. July 2018.
  98. Anindya Banerjee, David A. Naumann, Mohammad Nikouei.
    ACM Transactions on Programming Languages and Systems 40 (2), 1–90. ACM, May 2018.
  99. Some Trade-offs in Reducing the Overhead of Assertion Run-time Checks via Static Analysis
    Science of Computer Programming 155, 3–26. Elsevier, April 2018.
  100. Tree dimension in verification of constrained Horn clauses
    Bishoksan Kafle, John P. Gallagher, Pierre Ganty.
    Theory and Practice of Logic Programming 18 (2), 224–251. March 2018.
  101. Theory and Practice of Logic Programming 18, 167–223. Cambridge U. Press, March 2018.
  102. Andrea Cerone, Alexey Gotsman.
    Journal of the ACM 65 (2), 1-41. ACM Press, March 2018.
  103. John P. Gallagher, Mai Ajspur, Bishoksan Kafle.
    Journal of Logical and Algebraic Methods in Programming 95, 1–16. February 2018.
  104. Roberto Giacobazzi, Isabella Mastroeni.
    ACM Transactions on Information and System Security 21 (2), 1–31. ACM, February 2018.
  105. Andreas Abel, Joakim Öhman, Andrea Vezzosi.
    ACM SIGACT Symposium on Principles of Programming Languages 2 ({POPL}), 1–29. ACM, January 2018.
  106. Hagit Attiya, Alexey Gotsman, Sandeep Hans, Noam Rinetzky.
    Journal of the ACM 65 (1), 1-44. ACM Press, January 2018.
  107. Gilles Barthe, Thomas Espitau, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub.
    ACM SIGACT Symposium on Principles of Programming Languages 2 ({POPL}), 1–29. 2018.
  108. Ivan Radicek, Gilles Barthe, Marco Gaboardi, Deepak Garg, Florian Zuleger.
    ACM SIGACT Symposium on Principles of Programming Languages 2 (POPL), 1–32. 2018.
  109. Niki Vazou, Éric Tanter, David Van Horn.
    ACM Conference on Object Oriented Programming Systems Languages and Applications 2 ({OOPSLA}), 1–25. 2018.
  110. Bishoksan Kafle, John P. Gallagher, Graeme Gange, Peter Schachte, Harald Søndergaard, Peter J. Stuckey.
    Theory and Practice of Logic Programming 18 (3-4), 553–570. 2018.
  111. Dario Catalano, Dario Fiore.
    Journal of Cryptology 31 (1), 23–59. Springer, 2018.
  112. Yliès Falcone, César Sánchez.
    Formal Methods in System Design 53 (1), 1–5. 2018.
  113. J. Arias, M. Carro, E. Salazar, K. Marple, G. Gupta.
    Theory and Practice of Logic Programming. Cambridge U. Press, 2018.
  114. Description, Implementation, and Evaluation of a Generic Design for Tabled CLP
    Theory and Practice of Logic Programming. Cambridge U. Press, 2018.
  115. Logic Journal of the IGPL 25 (6), 1006–1019. Oxford Academic Press, December 2017.
  116. Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Pierre-Yves Strub.
    Proceedings of the ACM on Programming Languages 1, 1–29. ACM, August 2017.
  117. Annals of Mathematics and Artificial Intelligence 80 (3–4), 249–282. August 2017.
  118. Dario Catalano, Dario Fiore, Rosario Gennaro.
    International Journal of Intelligent Systems 16 (3), 327–343. Springer, June 2017.
  119. Dario Fiore, María Isabel González Vasco, Claudio Soriente.
    The Computer Journal 60 (12), 1912–1922. 2017.
  120. Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue.
    Communications of the ACM 60 (2), 99–107. 2017.
  121. Bishoksan Kafle, John P. Gallagher.
    Computer Languages, Systems & Structures 47, 2–18. 2017.
  122. Bishoksan Kafle, John P. Gallagher.
    Science of Computer Programming 137, 125–140. 2017.
  123. Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro.
    Privacy Enhancing Technologies Symposium 2017 (4), 156–176. 2017.
  124. Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy
    Reza Shokri, George Theodorakopoulos, Carmela Troncoso.
    ACM Transactions on Information and System Security 19 (4), 1–31. 2017.
  125. Carmela Troncoso, George Danezis, Marios Isaakidis, Harry Halpin.
    Privacy Enhancing Technologies Symposium 2017 (4), 404–426. 2017.
  126. K. Eder, J.P. Gallagher, P. Lopez-Garcia, H. Muller, Z. Banković, K. Georgiou, R. Haemmerlé, M. V. Hermenegildo, B. Kafle, S. Kerrison, M. Kirkeby, M. Klemen, X. Li, U. Liqat, J. Morse, M. Rhiger, M. Rosendahl.
    Microprocessors and Microsystems - Embedded Hardware Design 47, Part B, 278–286. Elsevier, November 2016.
  127. Theory and Practice of Logic Programming 16 (5-6), 849–865. Cambridge U. Press, October 2016.
  128. Mobile Collaborative Learning Systems with Augmented Reality
    Veronica Mendoza, Richard Rivera, J.J. Barriga-Andrade.
    Revista Politécnica 38 (1), 71-80. Escuela Politécnica Nacional, September 2016.
  129. Manuel Carro, Andy King.
    Theory and Practice of Logic Programming 16 (5-6), 509-514. Cambridge University Press, September 2016.
  130. Semantic Code Browsing
    Theory and Practice of Logic Programming 16 (5-6), 721–737. CUP, September 2016.
  131. Lars-Åke Fredlund, Julio Mariño, Raúl N.N. Alborodo, Angel Herranz.
    Journal of Risk and Reliability, Proceedings of the Institution of Mechanical Engineers, Part O 230 (5), 457–472. Sage Publications, July 2016.
  132. Roberto Giacobazzi, Isabella Mastroeni.
    Mathematical Structures in Computer Science 26 (4), 658–701. Cambridge University Press, May 2016.
  133. Juan Caballero, Zhiqiang Lin.
    ACM Computing Surveys 48 (4), 1–35. ACM, May 2016.
  134. Javier Esparza, Pierre Ganty, Rupak Majumdar.
    Journal of the ACM 63 (1), 1–48. ACM, March 2016.
  135. Building Resource Adaptive Software Systems (BRASS): Objectives and System Evaluation
    J. Hughes, C. Sparks, A. Stoughton, R. Parikh, A. Reuther, S. Jagannathan.
    ACM SIGSOFT Software Engineering Notes 41 (1), 1–2. ACM, January 2016.
  136. Theory and Practice of Logic Programming 16 (1), 1–58. Cambridge University Press, January 2016.
  137. No solvable lambda-value term left behind
    Logical Methods in Computer Science 12 (2), 1-43. 2016.
  138. Axel Schulz, Eneldo Loza Mencía, Benedikt Schmidt.
    IEEE International Conference on Intelligent Systems 57, 88–110. 2016.
  139. Gilles Barthe, Juan Manuel Crespo, César Kunz.
    Journal of Logical and Algebraic Methods in Programming 85 (5), 847–859. 2016.
  140. Gilles Barthe, Marco Gaboardi, Justin Hsu, Benjamin C. Pierce.
    ACM SIGLOG News 3 (1), 34–53. 2016.
  141. Antoine Durand-Gasselin, Javier Esparza, Pierre Ganty, Rupak Majumdar.
    Formal Methods in System Design, 1–28. 2016.
  142. Javier Esparza, Pierre Ganty, Jérôme Leroux, Rupak Majumdar.
    Acta Informatica, 1–25. 2016.
  143. Maximal incompleteness as obfuscation potency
    Roberto Giacobazzi, Isabella Mastroeni, Mila Dalla Preda.
    Formal Aspects of Computing. 2016.
  144. Pierre Ganty, Radu Iosif, Filip Konečný.
    International Journal on Software Tools for Technology Transfer, 1–20. 2016.
  145. Sandrine Blazy, Vincent Laporte, David Pichardie.
    Journal of Automated Reasoning 56 (3), 283–308. 2016.
  146. Isabella Mastroeni, Roberto Giacobazzi.
    Order - A Journal on the Theory of Ordered Sets and its Applications 33 (3), 503–516. 2016.
  147. Design of Pool Mixes Against Profiling Attacks in Real Conditions
    S. Oya, F. Pérez-González, C. Troncoso.
    IEEE ACM Transactions on Networking 24 (6), 3662–3675. 2016.
  148. Laura Bozzelli, César Sánchez.
    Electronic Notes in Theoretical Computer Science 631, 118–138. 2016.
  149. Bernd Finkbeiner, César Sánchez.
    Acta Informatica 53 (4), 325–326. 2016.
  150. César Sánchez, Kristen Brent Venable, Esteban Zimányi.
    Acta Informatica 53 (2), 87–88. 2016.
  151. Practical Run-time Checking via Unobtrusive Property Caching
    Theory and Practice of Logic Programming 15 (04-05), 726-741. CUP, September 2015.
  152. Goran Doychev, Boris Köpf, Laurent Mauborgne, Jan Reineke.
    ACM Transactions on Information and System Security 18 (1), 1–32. ACM, June 2015.
  153. Guillermo Vigueras, Juan M. Orduña.
    The Computer Journal. May 2015.
  154. Quantifying information flow in cryptographic systems
    Michael Backes, Boris Köpf.
    Mathematical Structures in Computer Science 25 (2), 457–479. February 2015.
  155. Antonio Nappa, M. Zubair Rafique, Juan Caballero.
    International Journal of Information Security 14 (1), 15-33. Springer Berlin Heidelberg, February 2015.
  156. Andreas Metzger, Philip Leitner, Dragan Ivanovic, Eric Schmieders, Roslin Franklin, Manuel Carro, Schahram Dustdar, Klaus Pohl.
    IEEE Transactions on Human-Machine Systems 45 (2), 276-290. February 2015.
  157. Automatic Workarounds: Exploiting the Intrinsic Redundancy of Web Applications
    Antonio Carzaniga, Alessandra Gorla, Nicolò Perino, Mauro Pezzè.
    ACM Transactions on Software Engineering and Methodology 24 (3), 1–42. 2015.
  158. Electronic Notes in Theoretical Computer Science 317, 133–139. 2015.
  159. Pavithra Prabhakar, Parasara Sridhar Duggirala, Sayan Mitra, Mahesh Viswanathan.
    Formal Methods in System Design 46 (2), 105–134. 2015.
  160. IEEE Security and Privacy Magazine 13 (5), 86–89. 2015.
  161. Gilles Barthe, Alberto Pardo, Gerardo Schneider.
    Software and Systems Modeling 14 (1), 3–4. 2015.
  162. Pavithra Prabhakar, Geir E. Dullerud, Mahesh Viswanathan.
    IEEE Transactions on Automatic Control 60 (12), 3210–3225. 2015.
  163. Pavithra Prabhakar, Vladimeros Vladimerou, Mahesh Viswanathan, Geir E. Dullerud.
    Electronic Notes in Theoretical Computer Science 574, 1–17. 2015.
  164. Mila Dalla Preda, Roberto Giacobazzi, Saumya K. Debray.
    Electronic Notes in Theoretical Computer Science 577, 74–97. 2015.
  165. Algebraic (trapdoor) one-way functions: Constructions and applications
    Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis.
    Electronic Notes in Theoretical Computer Science 592, 143–165. Springer, 2015.
  166. Acta Informatica 52 (6), 525–557. 2015.
  167. Stochastic vs. Deterministic Evolutionary Algorithm-based Allocation and Scheduling for XMOS Chips
    Neurocomputing 150, 82–89. Elsevier, 2015.
  168. Guillermo Vigueras, Federico Sket, Cristóbal Samaniego, Ling Wu, Ludovic Noels, Denny Tjahjanto, Eva Casoni, Guillaume Houzeaux, Ahmed Makradi, Jon M. Molina-Aldareguia, Mariano Vázquez, Antoine Jérusalem.
    Composite Structures 125 (0), 542-557. 2015.
  169. Mtac: A Monad for Typed Tactic Programming in Coq
    Beta Ziliani, Derek Dreyer, Neelakantan R. Krishnaswami, Aleksandar Nanevski, Viktor Vafeiadis.
    Journal of Functional Programming 25. 2015.
  170. Gilles Barthe, Delphine Demange, David Pichardie.
    ACM Transactions on Programming Languages and Systems 36 (1), 1–35. ACM, March 2014.
  171. IEEE Transactions on Software Engineering 40 (4), 324–337. 2014.
  172. On Automation in the Verification of Software Barriers: Experience Report
    Alexander Malkis, Anindya Banerjee.
    Journal of Automated Reasoning 52 (3), 275–329. 2014.
  173. Álvaro García-Pérez, Pablo Nogueira.
    Science of Computer Programming 95, 176–199. Elsevier, 2014.
  174. Verifiable Random Functions: Relations to Identity-Based Key-Encapsulation and New Constructions
    Michel Abdalla, Dario Catalano, Dario Fiore.
    Journal of Cryptology 27 (3), 544–593. Springer, 2014.
  175. Pushdown flow analysis with abstract garbage collection
    J. Ian Johnson, Ilya Sergey, Christopher Earl, Matthew Might, David Van Horn.
    Journal of Functional Programming 24 (2-3), 218–283. 2014.
  176. Laura Bozzelli, César Sánchez.
    Acta Informatica 51 (1), 25–49. 2014.
  177. G.J. Duck, R. Haemmerlé, M. Sulzmann.
    Theory and Practice of Logic Programming 14 (4-5), 619-632. Cambridge U. Press, 2014.
  178. Javier Esparza, Pierre Ganty, Tomás Poch.
    ACM Transactions on Programming Languages and Systems 36 (3), 1–29. 2014.
  179. François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann.
    Journal of Computer Security 22 (5), 823–866. IOS Press, 2014.
  180. Ahmed Bouajjani, Michael Emmi.
    International Journal on Software Tools for Technology Transfer 16 (2), 127–146. 2014.
  181. Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types
    Theory and Practice of Logic Programming. 2014.
  182. Accelerating collision detection for large-scale crowd simulation on multi-core and many-core architectures
    Guillermo Vigueras, Juan M. Orduña, Miguel Lozano, Jose M. Cecilia, Jose M. Garcia.
    International Journal of High Performance Computing Applications 28 (1). 2014.
  183. Guillermo Vigueras, Ishani Roy, Andrew Cookson, Jack Lee, Nicolas Smith, David Nordsletten.
    International Journal for Numerical Methods in Biomedical Engineering 30 (1), 117–134. 2014.
  184. Gilles Barthe, David Pichardie, Tamara Rezk.
    Mathematical Structures in Computer Science 23 (5), 1032–1081. Cambridge University Press, October 2013.
  185. Sized Type Analysis for Logic Programs
    Theory and Practice of Logic Programming 13 (4-5), 1-14. Cambridge U. Press, August 2013.
  186. How to make ad hoc proof automation less ad hoc
    Georges Gonthier, Beta Ziliani, Aleksandar Nanevski, Derek Dreyer.
    Journal of Functional Programming 23 (4), 357–401. July 2013.
  187. Alexey Gotsman, Hongseok Yang.
    Journal of Functional Programming 23 (4), 452–514. Cambridge University Press, July 2013.
  188. Guillermo Vigueras, Juan M. Orduña, Miguel Lozano, Yvon Jégou.
    Science of Computer Programming 78 (6), 715–724. Elsevier North-Holland, Inc., June 2013.
  189. Computing 95 (6), 453-492. Springer Wien, June 2013.
  190. Denotation of syntax and metaprogramming in contextual modal type theory (CMTT)
    Murdoch J. Gabbay, Aleksandar Nanevski.
    Journal of Applied Logic (JAPPL) 11 (1), 1–29. March 2013.
  191. Juan Caballero, Dawn Song.
    Computer Networks 57 (2), 451-474. Elsevier, February 2013.
  192. Local Reasoning for Global Invariants, Part II: Dynamic Boundaries
    Anindya Banerjee, David A. Naumann.
    Journal of the ACM 60 (3), 1–73. ACM, 2013.
  193. Local Reasoning for Global Invariants, Part I: Region Logic
    Anindya Banerjee, David A. Naumann, Stan Rosenberg.
    Journal of the ACM 60 (3), 1–56. ACM, 2013.
  194. Secure distributed programming with value-dependent types
    Nikhil Swamy, Juan Chen, Cédric Fournet, Pierre-Yves Strub, Karthikeyan Bhargavan, Jean Yang.
    Journal of Functional Programming 23 (4), 402-451. 2013.
  195. Dependent Type Theory for Verification of Information Flow and Access Control Policies
    ACM Transactions on Programming Languages and Systems 35 (2), 1–41. ACM, 2013.
  196. A Model-Driven Approach to Teaching Concurrency
    M. Carro, Ángel Herranz, Julio Mariño.
    ACM Transactions on Computing Education 13 (1). 2013.
  197. Analysis of Recursively Parallel Programs
    Ahmed Bouajjani, Michael Emmi.
    ACM Transactions on Programming Languages and Systems 35 (3), 1–49. 2013.
  198. A Survey on Service Quality Description
    Kyriakos Kritikos, Barbara Pernici, Pierluigi Plebani, Cinzia Cappiello, Marco Comuzzi, Salima Benbernou, Ivona Brandic, Attila Kertesz, Michael Parkin, M. Carro.
    ACM Computing Surveys 46 (1). 2013.
  199. Maria-Cristina Marinescu, César Sánchez.
    ACM Transactions on Embedded Computing Systems 12, 1–21. 2013.
  200. A computationally efficient framework for the simulation of cardiac perfusion using a multi-compartment Darcy porous-media flow model
    C. Michler, A. N. Cookson, R. Chabiniok, E. Hyde, J. Lee, M. Sinclair, T. Sochi, A. Goyal, G. Vigueras, D. A. Nordsletten, N.P. Smith.
    International Journal of Numerical Methods in Biomedical Engineering 29 (2). 2013.
  201. Guillermo Vigueras, Juan M. Orduña, Miguel Lozano.
    Journal of Supercomputing 64 (1), 156–166. Springer US, 2013.
  202. Marina Zapater, César Sánchez, José L. Ayala, José M. Moya, José L. Risco-Martín.
    Sensors 12 (8), 10659–10677. August 2012.
  203. Understanding the Role of Malware in Cybercrime
    ERCIM News 2012 (90), 15-16. July 2012.
  204. Certificate Size Reduction in Abstraction-Carrying Code
    E. Albert, P. Arenas, G. Puebla, M. Hermenegildo.
    Theory and Practice of Logic Programming 12 (3), 283–318. 2012.
  205. Lightweight compilation of (C)LP to JavaScript
    Theory and Practice of Logic Programming 12 (4-5), 755-773. Cambridge U. Press, 2012.
  206. Pierre Ganty, Rupak Majumdar.
    ACM Transactions on Programming Languages and Systems 34 (1), 1–48. ACM, 2012.
  207. Pierre Ganty, Rupak Majumdar, Benjamin Monmege.
    Formal Methods in System Design 40 (2), 206-231. 2012.
  208. An Overview of Ciao and its Design Philosophy
    M.V. Hermenegildo, F. Bueno, M. Carro, P. Lopez-Garcia, E. Mera, J.F. Morales, G. Puebla.
    Theory and Practice of Logic Programming 12 (1–2), 219–252. Cambridge Univ Press, 2012.
  209. Quantitative Security Analysis (Dagstuhl Seminar 12481)
    Boris Köpf, Pasquale Malacaria, Catuscia Palamidessi.
    Dagstuhl Reports 2 (11), 135-154. 2012.
  210. Mark Marron, César Sánchez, Zhendong Su, Manuel Fähndrich.
    IEEE Transactions on Software Engineering 99. IEEE Computer Society, 2012.
  211. Verification of Bounded Discrete Horizon Hybrid Automata
    Vladimeros Vladimerou, Pavithra Prabhakar, Mahesh Viswanathan, Geir E. Dullerud.
    IEEE Transactions on Automatic Control 57 (6), 1445-1455. 2012.
  212. Modelling Declassification Policies using Abstract Domain Completeness
    Isabella Mastroeni, Anindya Banerjee.
    Mathematical Structures in Computer Science 21 (6), 1253-1299. December 2011.
  213. Gilles Barthe, Pedro D'Argenio, Tamara Rezk.
    Mathematical Structures in Computer Science 21 (6), 1207-1252. Cambridge University Press, October 2011.
  214. ACM Transactions on Programming Languages and Systems 33 (4), 1–13. ACM, July 2011.
  215. Parallel Backtracking with Answer Memoing for Independent And-Parallelism
    P. Chico de Guzmán, A. Casas, M. Carro, M. V. Hermenegildo.
    Theory and Practice of Logic Programming. Cambridge U. Press, July 2011.
  216. Efficient Local Unfolding with Ancestor Stacks
    G. Puebla, E. Albert, M. V. Hermenegildo.
    Theory and Practice of Logic Programming 11 (1), 1–32. Cambridge U. Press, January 2011.
  217. Javier Esparza, Pierre Ganty, Stefan Kiefer, Michael Luttenberger.
    Information Processing Letters 111, 614-619. 2011.
  218. Automatically Deriving Information-theoretic Bounds for Adaptive Side-channel Attacks
    Boris Köpf, David Basin.
    Journal of Computer Security 1, 1–31. 2011.
  219. Security of Multithreaded Programs by Compilation
    Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld.
    ACM Transactions on Information and System Security 13 (3). 2010.
  220. Formal Executable Semantics for Conformance in the MDE Framework
    M. Egea, V. Rusu.
    Innovations in Systems and Software Engineering 6, 73-81. Springer London, 2010.
  221. Automatic Inference of Determinacy and Mutual Exclusion for Logic Programs Using Mode and Type Analyses
    New Generation Computing: computing paradigms and computational intelligence 28 (2), 117–206. 2010.
  222. Pierre Ganty, Nicolas Maquet, Jean-François Raskin.
    Electronic Notes in Theoretical Computer Science 411 (38-39), 3444-3459. 2010.
  223. A. Stivala, P. J. Stuckey, M. García de la Banda, M. V. Hermenegildo, A. Wirth.
    Journal of Parallel and Distributed Computing 70 (8), 839-848. Elsevier, 2010.
  224. D. Cabeza, M. Hermenegildo.
    Electronic Notes in Theoretical Computer Science 410 (46), 4704–4723. Elsevier Science, October 2009.
  225. Type-based homeomorphic embedding for online termination
    Elvira Albert, John P. Gallagher, Miguel Gómez-Zamalloa, Germán Puebla.
    Information Processing Letters 109 (15), 879-886. Elsevier, July 2009.
  226. Certificate Translation for Optimizing Compilers
    Gilles Barthe, Benjamin Grégoire, César Kunz, Tamara Rezk.
    ACM Transactions on Programming Languages and Systems 31 (5). ACM, July 2009.
  227. User-Definable Resource Usage Bounds Analysis for Java Bytecode
    J. Navas, M. Méndez-Lojo, M. V. Hermenegildo.
    ENTCS - BYTECODE'09 253 (5). Elsevier, March 2009.
  228. Toufik Taibi, Ángel Herranz, Juan José Moreno-Navarro.
    Journal of Object Technology 8 (2), 137-161. March 2009.
  229. Implementing Constructive Intensional Negation
    Julio Mariño, Juan José Moreno-Navarro, Susana Muñoz Hernández.
    New Generation Computing 27 (1), 25-56. January 2009.
  230. Automated Analysis of Security-Design Models
    D. Basin, M. Clavel, J. Doser, M. Egea.
    Information and Software Technology 51 (5), 815-831. 2009.
  231. Abstraction-Carrying Code: A Model for Mobile Code Safety
    E. Albert, G. Puebla, M. V. Hermenegildo.
    New Generation Computing: computing paradigms and computational intelligence 26 (2). 2008.

Articles in Refereed Conferences (673)

  1. Konstantinos Kleftogiorgos, Patrick Zielinski, Shan Huang, Jun Xu, Georgios Portokalidis.
    Proceedings of the Annual Computer Security Applications Conference (ACSAC). December 2024.
  2. Proceedings of the 31st Static Analysis Symposium (SAS 2024). October 2024.
  3. Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries
    Lukas Aumayr, Esra Ceylan, Yannik Kopyciok, Matteo Maffei, Pedro Moreno-Sanchez, Iosif Salem, Stefan Schmid.
    IFIP Networking Conference. 2024.
  4. Fully-Succinct Multi-key Homomorphic Signatures from Standard Assumptions
    Advances in Cryptology (CRYPTO). 2024.
  5. Antonio Faonio, Dario Fiore, Luigi Russo.
    ACM Conference on Computer and Communications Security (CCS). 2024.
  6. International Conference on Software Testing, Verification and Validation (ICST). 2024.
  7. International Symposium on Software Testing and Analysis (ISSTA). 2024.
  8. Ignacio Cascudo, Bernardo David.
    International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2024.
  9. International Conference on Practice and Theory in Public Key Cryptography (PKC). 2024.
  10. Matteo Campanelli, Antonio Faonio, Dario Fiore, Tianyu Li, Helger Lipmaa.
    International Conference on Practice and Theory in Public Key Cryptography (PKC). 2024.
  11. Matteo Campanelli, Dario Fiore, Hamidreza Khoshakhlagh.
    International Conference on Practice and Theory in Public Key Cryptography (PKC). 2024.
  12. A Myhill-Nerode Style Characterization for Timed Automata With Integer Resets
    Kyveli Doveri, Pierre Ganty, B. Srivathsan.
    Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2024.
  13. Taming the Infinities of Concurrency: Essays Dedicated to Javier Esparza on the Occasion of His 60th Birthday. 2024.
  14. Succinctness of Cosafety Fragments of LTL via Combinatorial Proof Systems
    Luca Geatti, Alessio Mansutti, Angelo Montanari.
    Foundations of Software Science and Computational Structures (FOSSACS). 2024.
  15. Pierre Ganty, Nicolas Manini, Francesco Ranzato.
    Reachability Problems (RP). 2024.
  16. Learning the State Machine Behind a Modal Text Editor: The (Neo)Vim Case Study
    International SPIN Symposium on Model Checking of Software (SPIN). 2024.
  17. Synthesizing Hardware‐Software Leakage Contracts for RISC‐V Open‐Source Processors
    Gideon Mohr, Marco Guarnieri, Jan Reineke.
    Proceedings of the 27th Design, Automation and Test in Europe Conference and Exhibition. 2024.
  18. Integer Programming with GCD Constraints
    Rémy Défossez, Christoph Haase, Alessio Mansutti, Guillermo A. Pérez.
    ACM/SIAM Symposium on Discrete Algorithms (SODA). 2024.
  19. Symposium on Networked Systems, Design and Implementation (NSDI). 2024.
  20. Yuchen Zhang, Ashish Kundu, Georgios Portokalidis, Jun Xu.
    ACM SIGSOFT Software Engineering Notes. December 2023.
  21. Silvia Sebastián, Raluca-Georgia Diugan, Juan Caballero, Iskander Sanchez-Rola, Leyla Bilge.
    Annual Computer Security Applications Conference (ACSAC). December 2023.
  22. Gibran Gomez, Kevin van Liebergen, Juan Caballero.
    ACM Conference on Computer and Communications Security (CCS). November 2023.
  23. Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge.
    ACM Conference on Computer and Communications Security (CCS). November 2023.
  24. Vidya Lakshmi Rajagopalan, Konstantinos Kleftogiorgos, Enes Göktaş, Jun Xu, Georgios Portokalidis.
    ACM Conference on Computer and Communications Security (CCS). November 2023.
  25. Aniketh Girish, Tianrui Hu, Vijay Prakash, Daniel J. Dubois, Srdjan Matic, Danny Yuxing Huang, Serge Egelman, Joel Reardon, Juan Tapiador, David R. Choffnes, Narseo Vallina-Rodriguez.
    Internet Measurement Conference (IMC). October 2023.
  26. International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). October 2023.
  27. David Balbás, Daniel Collins, Serge Vaudenay.
    Usenix Annual Technical Conference (USENIX). August 2023.
  28. One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles
    Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero.
    Usenix Security Symposium (USENIX-Security). August 2023.
  29. Mohamad Mansouri, Jun Xu, Georgios Portokalidis.
    Asia Conference on Information, Computer and Communications Security (AsiaCCS). July 2023.
  30. José Miguel Moreno, Srdjan Matic, Narseo Vallina-Rodriguez, Juan Tapiador.
    Proceedings of the 7th Network Traffic Measurement and Analysis Conference (TMA). June 2023.
  31. A Deep Dive into the VirusTotal File Feed
    Kevin van Liebergen, Juan Caballero, Platon Kotzias, Chris Gates.
    GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). 2023.
  32. Efficient Reactive Synthesis Using Mode Decomposition
    International Colloquium on Theoretical Aspects of Computing (ICTAC). 2023.
  33. WhatsUpp with Sender Keys? Analysis, Improvements and Security Proofs
    David Balbás, Daniel Collins, Phillip Gajland.
    International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2023.
  34. Dario Fiore, Dimitris Kolonelos, Paola de Perthuis.
    International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2023.
  35. Ignacio Cascudo, Bernardo David, Omer Shlomovits, Denis Varlakov.
    International Conference on Applied Cryptography and Network Security (ACNS). 2023.
  36. On the Impossibility of Algebraic NIZK in Pairing-Free Groups
    Advances in Cryptology – CRYPTO 2023. 2023.
  37. David Balbás, Dario Fiore, María Isabel González Vasco, Damien Robissout, Claudio Soriente.
    ACM Conference on Computer and Communications Security (CCS). 2023.
  38. Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen.
    Australasian Conference on Information Security and Privacy (ACISP). 2023.
  39. Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen.
    International Conference on Applied Cryptography and Network Security (ACNS). 2023.
  40. Hamza Abusalah, Valerio Cini.
    International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2023.
  41. Luiz Carvalho, Renzo Degiovanni, Matías Brizzio, Maxime Cordy, Nazareno Aguirre, Yves Le Traon, Mike Papadakis.
    Fundamental Approaches to Software Engineering (FASE). 2023.
  42. Mariano Politano, Valeria S. Bengolea, Facundo Molina, Nazareno Aguirre, Marcelo F. Frias, Pablo Ponzio.
    Fundamental Approaches to Software Engineering (FASE). 2023.
  43. Matías Brizzio, Maxime Cordy, Mike Papadakis, César Sánchez, Nazareno Aguirre, Renzo Degiovanni.
    Genetic and Evolutionary Computations (GECCO). 2023.
  44. Juan Manuel Copia, Facundo Molina, Nazareno Aguirre, Marcelo F. Frias, Alessandra Gorla, Pablo Ponzio.
    International Symposium on Software Reliability Engineering (ISSRE). 2023.
  45. Aayush Garg, Renzo Degiovanni, Facundo Molina, Maxime Cordy, Nazareno Aguirre, Mike Papadakis, Yves Le Traon.
    International Symposium on Software Reliability Engineering (ISSRE). 2023.
  46. Facundo Molina, Pablo Ponzio, Nazareno Aguirre, Marcelo F. Frias.
    International Symposium on Software Testing and Analysis (ISSTA). 2023.
  47. Facundo Molina, Marcelo d'Amorim, Nazareno Aguirre.
    Automated Software Engineering Conference (ASE). 2023.
  48. Gennaro Avitabile, Vincenzo Botta, Dario Fiore.
    International Conference on Practice and Theory in Public Key Cryptography (PKC). 2023.
  49. Antonio Faonio, Dario Fiore, Markulf Kohlweiss, Luigi Russo, Michal Zajac.
    Theory of Cryptography Conference (TCC). 2023.
  50. International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2023.
  51. Efficient and universally composable single secret leader election from pairings
    Dario Catalano, Dario Fiore, Emanuele Giunta.
    International Conference on Practice and Theory in Public Key Cryptography (PKC). 2023.
  52. David Balbás, Dario Catalano, Dario Fiore, Russell W. F. Lai.
    Theory of Cryptography Conference (TCC). 2023.
  53. Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols
    Theory of Cryptography Conference (TCC). 2023.
  54. Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos.
    Financial Cryptography and Data Security Conference (FC). 2023.
  55. International Conference on Principles of Distributed Systems (OPODIS). 2023.
  56. International Conference on Concurrency Theory (CONCUR). 2023.
  57. Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei.
    Network and Distributed System Security Symposium (NDSS). 2023.
  58. Proceedings of the 2023 ACM Symposium on Cloud Computing. 2023.
  59. Antichains Algorithms for the Inclusion Problem Between ω-VPL
    International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2023.
  60. Monserrat Hermo, Paqui Lucio, César Sánchez.
    International Symposium on Formal Methods (FM). 2023.
  61. Tzu-Han Shu, Borzoo Bonakdarpour, Bernd Finkbeiner, César Sánchez.
    International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2023.
  62. Tzu-Han Shu, Sarai Sheinvald, César Sánchez, Borzoo Bonakdarpour.
    International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2023.
  63. The complexity of Presburger arithmetic with power or powers
    Michael Benedikt, Dmitry Chistikov, Alessio Mansutti.
    International Colloquium on Automata Languages and Programming (ICALP). 2023.
  64. LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures
    Erkan Tairi, Pedro Moreno-Sanchez, Clara Schneidewind.
    ACM Conference on Computer and Communications Security (CCS). 2023.
  65. On Polynomial-Time Decidability of k-Negations Fragments of FO Theories (extended abstract)
    Christoph Haase, Alessio Mansutti, Amaury Pouly.
    International Symposium on Mathematical Foundations of Computer Science (MFCS). 2023.
  66. Oleksii Oleksenko, Marco Guarnieri, Boris Köpf, Mark Silberstein.
    IEEE Symposium on Security and Privacy (SP). 2023.
  67. Varun Madathil, Sri Aravinda Krishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez.
    Network and Distributed System Security Symposium (NDSS). 2023.
  68. International Conference on Runtime Verification (RV). 2023.
  69. Proc. of the 35th International Conference on Computer Aided Verification (CAV'23). 2023.
  70. Efficient Modular SMT-Based Model Checking of Pointer Programs
    I. Garcia-Contreras, A. Gurfinkel, J. A. Navas.
    Static Analysis Symposium (SAS). December 2022.
  71. ACM Conference on Computer and Communications Security (CCS). November 2022.
  72. Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Compliant with Temporal Constraints
    Arianna Blasi, Alessandra Gorla, Michael D. Ernst, Mauro Pezzè.
    International Conference on Automated Software Engineering (ASE). October 2022.
  73. LISSA: Lazy Initialization with Specialized Solver Aid
    Juan Manuel Copia, Pablo Ponzio, Nazareno Aguirre, Alessandra Gorla, Marcelo Frias.
    International Conference on Automated Software Engineering (ASE). October 2022.
  74. Daniel Dominguez, Alessandra Gorla, Juan Caballero.
    IEEE Working Conference on Source Code Analysis and Manipulation (SCAM). October 2022.
  75. Said Jawad Saidi, Srdjan Matic, Georgios Smaragdakis, Oliver Gasser, Anja Feldmann.
    Internet Measurement Conference (IMC). October 2022.
  76. Matthias Götze, Srdjan Matic, Costas Iordanou, Georgios Smaragdakis, Nikolaos Laoutaris.
    Web Science Conference (WebSci). June 2022.
  77. Daniel Domínguez-Álvarez, Daniel Tomic, Alessandra Gorla.
    International Conference on Mobile Software Engineering and Systems (MOBILESoft). May 2022.
  78. Mattia Fazzini, Chase Choi, Juan Manuel Copia, Gabriel Lee, Yoshiki Kakehi, Alessandra Gorla, Alessandro Orso.
    International Conference on Software Engineering (ICSE). May 2022.
  79. Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez.
    IEEE Symposium on Security and Privacy (SP). May 2022.
  80. Sankha Narayan Guria, Niki Vazou, Marco Guarnieri, James Parker.
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2022.
  81. Niki Vazou, Michael Greenberg.
    ACM SIGPLAN International Symposium on Haskell (Haskell). 2022.
  82. Henry Blanchette, Niki Vazou, Leonidas Lampropoulos.
    ACM SIGPLAN International Symposium on Haskell (Haskell). 2022.
  83. Lykourgos Mastorou, Nikolaos Papaspyrou, Niki Vazou.
    ACM SIGPLAN International Symposium on Haskell (Haskell). 2022.
  84. Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring.
    International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2022.
  85. Dario Catalano, Dario Fiore, Ida Tucker.
    International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2022.
  86. Cecilia Boschini, Dario Fiore, Elena Pagnin.
    International Conference on Applied Cryptography and Network Security (ACNS). 2022.
  87. Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh.
    ACM Conference on Computer and Communications Security (CCS). 2022.
  88. ACM Conference on Computer and Communications Security (CCS). 2022.
  89. Antonio Faonio, Dario Fiore, Luca Nizzardo, Claudio Soriente.
    The Cryptographer’s Track at RSA Conference (CT-RSA). 2022.
  90. Margarita Capretto, Martín Ceresa, Antonio Fernández Anta, Antonio Russo, César Sánchez.
    IEEE International Conference on Blockchain (Blockchain). 2022.
  91. Transaction Monitoring of Smart Contracts
    International Conference on Runtime Verification (RV). 2022.
  92. Computer Aided Verification (CAV). 2022.
  93. Itsaka Rakotonirina, Miguel Ambrona, Alejandro Aguirre, Gilles Barthe.
    Asia Conference on Information, Computer and Communications Security (AsiaCCS). 2022.
  94. Gilles Barthe, Ugo Dal Lago, Giulio Malavolta, Itsaka Rakotonirina.
    ACM Conference on Computer and Communications Security (CCS). 2022.
  95. Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya.
    ACM Conference on Computer and Communications Security (CCS). 2022.
  96. Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Ivan Visconti.
    European Symposium On Research In Computer Security (ESORICS). 2022.
  97. Junyi Liu, Li Zhou, Gilles Barthe, Mingsheng Ying.
    IEEE Symposium on Logic in Computer Science (LICS). 2022.
  98. Joaquín Arias, Manuel Carro, Gopal Gupta.
    Practical Aspects of Declarative Languages (PADL). 2022.
  99. Gilles Barthe, Adrien Koutsos, Solène Mirliaz, David Pichardie, Peter Schwabe.
    Static Analysis Symposium (SAS). 2022.
  100. Sunjay Cauligi, Craig Disselkoen, Daniel Moghimi, Gilles Barthe, Deian Stefan.
    IEEE Symposium on Security and Privacy (SP). 2022.
  101. Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar.
    IEEE Symposium on Security and Privacy (SP). 2022.
  102. Roberto Bruni, Roberta Gori, Nicolas Manini.
    Static Analysis Symposium (SAS). 2022.
  103. European Symposium On Research In Computer Security (ESORICS). 2022.
  104. Financial Cryptography and Data Security Conference (FC). 2022.
  105. Dario Catalano, Dario Fiore, Emanuele Giunta.
    ACM Symposium on Principles of Distributed Computing (PODC). 2022.
  106. Hien Chu, Dario Fiore, Dimitris Kolonelos, Dominique Schröder.
    Conference on Security and Cryptography for Networks (SCN). 2022.
  107. Thomas Attema, Ignacio Cascudo, Ronald Cramer, Ivan Damgård, Daniel Escudero.
    Theory of Cryptography Conference (TCC). 2022.
  108. On the impossibility of algebraic vector commitments in pairing-free groups
    Dario Catalano, Dario Fiore, Rosario Gennaro, Emanuele Giunta.
    Theory of Cryptography Conference (TCC). 2022.
  109. Joseph Izraelevitz, Gaukas Wang, Rhett Hanscom, Kayli Silvers, Tamara Silbergleit Lehman, Gregory Chockler, Alexey Gotsman.
    International Conference on Parallel Processing (ICPP). 2022.
  110. Rainer Stütz, Johann Stockinger, Bernhard Haslhofer, Pedro Moreno-Sanchez, Matteo Maffei.
    Conference on Advances in Financial Technologies (AFT). 2022.
  111. Laura Bozzelli, Adriano Peron, César Sánchez.
    International Conference on Concurrency Theory (CONCUR). 2022.
  112. Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri Aravinda Krishnan Thyagarajan.
    ACM Conference on Computer and Communications Security (CCS). 2022.
  113. Computer Aided Verification (CAV). 2022.
  114. Xaver Fabian, Marco Guarnieri, Marco Patrignani.
    ACM Conference on Computer and Communications Security (CCS). 2022.
  115. Felipe Gorostiaga, Sebastián Zudaire, César Sánchez, Gerardo Schneider, Sebastián Uchitel.
    International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2022.
  116. Monitorability of Expressive Verdicts
    NASA Formal Methods (NFM). 2022.
  117. Hannes Kallwies, Martin Leucker, César Sánchez, Torben Scheffel.
    International Conference on Runtime Verification (RV). 2022.
  118. Hannes Kallwies, Martin Leucker, César Sánchez.
    International Symposium on Automated Technology for Verification and Analysis (ATVA). 2022.
  119. Manuel Bravo, Gregory Chockler, Alexey Gotsman.
    International Symposium on Distributed Computing (DISC). 2022.
  120. Lukas Aumayr, Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei.
    ACM Conference on Computer and Communications Security (CCS). 2022.
  121. International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). December 2021.
  122. Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi.
    International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). December 2021.
  123. Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei.
    Usenix Security Symposium (USENIX-Security). August 2021.
  124. Nico Lehmann, Rose Kunkel, Jordan Brown, Jean Yang, Niki Vazou, Nadia Polikarpova, Deian Stefan, Ranjit Jhala.
    Usenix Symposium on Operating Systems Design and Implementation (OSDI). July 2021.
  125. Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei.
    IEEE Symposium on Security and Privacy (SP). May 2021.
  126. Platon Kotzias, Juan Caballero, Leyla Bilge.
    IEEE Symposium on Security and Privacy (SP). May 2021.
  127. Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi.
    IEEE Symposium on Security and Privacy (SP). May 2021.
  128. Manuel Barbosa, Gilles Barthe, Xiong Fan, Benjamin Grégoire, Shih-Han Hung, Jonathan Katz, Pierre-Yves Strub, Xiaodi Wu, Li Zhou.
    ACM Conference on Computer and Communications Security (CCS). 2021.
  129. Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub.
    ACM Conference on Computer and Communications Security (CCS). 2021.
  130. Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya.
    ACM Conference on Computer and Communications Security (CCS). 2021.
  131. Gilles Barthe, Sandrine Blazy, Rémi Hutin, David Pichardie.
    IEEE Computer Security Foundations Symposium (CSF). 2021.
  132. Li Zhou, Gilles Barthe, Justin Hsu, Mingsheng Ying, Nengkun Yu.
    IEEE Symposium on Logic in Computer Science (LICS). 2021.
  133. Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno.
    IEEE Symposium on Security and Privacy (SP). 2021.
  134. Gilles Barthe, Sunjay Cauligi, Benjamin Grégoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe.
    IEEE Symposium on Security and Privacy (SP). 2021.
  135. Daniel Benarroch, Matteo Campanelli, Dario Fiore, Kobi Gurkan, Dimitris Kolonelos.
    Financial Cryptography and Data Security Conference (FC). 2021.
  136. Ashley Fraser, Lydia Garms, Anja Lehmann.
    International Conference on Cryptology and Network Security (CANS). 2021.
  137. Ismaël Jecker, Nicolas Mazzocchi, Petra Wolf.
    International Conference on Concurrency Theory (CONCUR). 2021.
  138. Computing Research Repository (CoRR). 2021.
  139. International Conference on Practice and Theory in Public Key Cryptography (PKC). 2021.
  140. Joaquín Arias, Mar Moreno-Rebato, Jose A. Rodriguez-García, Sascha Ossowski.
    Advances in Artificial Intelligence, CAEPIA 20/21. 2021.
  141. Enrico Bacis, Dario Facchinetti, Marco Guarnieri, Marco Rosa, Matthew Rossi, Stefano Paraboschi.
    International Conference on Availability, Reliability and Security (ARES). 2021.
  142. Kinjal Basu, Sarat Varanasi, Farhad Shakerin, Joaquin Arias, Gopal Gupta.
    National Conference of the American Association for Artificial Intelligence (AAAI). 2021.
  143. Jan Baumeister, Norine Coenen, Borzoo Bonakdarpour, Bernd Finkbeiner, César Sánchez.
    Computer Aided Verification (CAV). 2021.
  144. Laura Bozzelli, Adriano Peron, César Sánchez.
    IEEE Symposium on Logic in Computer Science (LICS). 2021.
  145. UniStore: A fault-tolerant marriage of causal and strong consistency
    Usenix Annual Technical Conference (USENIX). 2021.
  146. An Experimental Framework for Improving the Performance of BFT Consensus for Future Permissioned Blockchains
    Proceedings of the 15th ACM International Conference on Distributed and Event-Based Systems. 2021.
  147. Kyveli Doveri, Pierre Ganty, Francesco Parolini, Francesco Ranzato.
    International Conference on Concurrency Theory (CONCUR). 2021.
  148. Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei.
    Financial Cryptography and Data Security Conference (FC). 2021.
  149. Matteo Romiti, Friedhelm Victor, Pedro Moreno-Sanchez, Bernhard Haslhofer, Matteo Maffei.
    Financial Cryptography and Data Security Conference (FC). 2021.
  150. Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Elefterios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William Knottenbelt.
    Financial Cryptography and Data Security Conference (FC). 2021.
  151. HLola: a Very Functional Tool for Extensible Stream Runtime Verification
    International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2021.
  152. International Symposium on Formal Methods (FM). 2021.
  153. International Conference on Runtime Verification (RV). 2021.
  154. IEEE Symposium on Security and Privacy (SP). 2021.
  155. Brendan Hall, Sarat Chandra Varanasi, Jan Fiedor, Joaquín Arias, Kinjal Basu, Fang Li, Devesh Bhatt, Kevin Driscoll, Elmer Salazar, Gopal Gupta.
    Computing Research Repository (CoRR). 2021.
  156. Tzu-Han Hsu, César Sánchez, Borzoo Bonakdarpour.
    International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2021.
  157. Marco Patrignani, Marco Guarnieri.
    ACM Conference on Computer and Communications Security (CCS). 2021.
  158. International Symposium on Software Testing and Analysis (ISSTA). 2021.
  159. Vitor Enes, Carlos Baquero, Alexey Gotsman, Pierre Sutra.
    Eurosys Conference (EuroSys). 2021.
  160. International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2021.
  161. Sebastián Zudaire, Felipe Gorostiaga, César Sánchez, Gerardo Schneider, Sebastián Uchitel.
    IEEE International Conference on Robotics and Automation (ICRA). 2021.
  162. Matteo Campanelli, Dario Fiore, Nicola Grego, Dimitris Kolonelos, Luca Nizzardo.
    International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). December 2020.
  163. Ignacio Cascudo, Bernardo David.
    International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). December 2020.
  164. Ignacio Cascudo, Jaron Skovsted Gundersen.
    Theory of Cryptography Conference (TCC). December 2020.
  165. Annual Computer Security Applications Conference (ACSAC). December 2020.
  166. ACM Conference on Computer and Communications Security (CCS). November 2020.
  167. Fabio Gadducci, Hernán C. Melgratti, Christian Roldán, Matteo Sammartino.
    International Colloquium on Theoretical Aspects of Computing, ICTAC 2020. November 2020.
  168. Nataliia Stulova, Arianna Blasi, Alessandra Gorla, Oscar Nierstrasz.
    IEEE Working Conference on Source Code Analysis and Manipulation (SCAM). October 2020.
  169. Mattia Fazzini, Alessandra Gorla, Alessandro Orso.
    Automated Software Engineering Conference (ASE). September 2020.
  170. Paolo Calciati, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller.
    IEEE International Working Conference on Mining Software Repositories (MSR). June 2020.
  171. International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). April 2020.
  172. International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR'19). April 2020.
  173. International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). April 2020.
  174. Network and Distributed System Security Symposium (NDSS). February 2020.
  175. R. Bruni, R. Giacobazzi, R. Gori, I. Garcia-Contreras, D. Pavlovic.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). January 2020.
  176. Antonio Faonio, Dario Fiore.
    International Conference on Applied Cryptography and Network Security (ACNS). 2020.
  177. Borja Balle, Gilles Barthe, Marco Gaboardi, Justin Hsu, Tetsuya Sato.
    International Conference on Artificial Intelligence and Statistics (AISTATS). 2020.
  178. Amir-Hossein Karimi, Gilles Barthe, Borja Balle, Isabel Valera.
    International Conference on Artificial Intelligence and Statistics (AISTATS). 2020.
  179. Gilles Barthe, Raphaëlle Crubillé, Ugo Dal Lago, Francesco Gavazzo.
    European Symposium on Programming (ESOP). 2020.
  180. Elena Gutiérrez, Takamasa Okudono, Masaki Waga, Ichiro Hasuo.
    Genetic and Evolutionary Computations (GECCO). 2020.
  181. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Vincent Laporte, Tiago Oliveira.
    International Conference on Cryptology in India (INDOCRYPT). 2020.
  182. Gilles Barthe, Rohit Chadha, Vishal Jagannath, A. Prasad Sistla, Mahesh Viswanathan.
    IEEE Symposium on Logic in Computer Science (LICS). 2020.
  183. Gilles Barthe, Charlie Jacomme, Steve Kremer.
    IEEE Symposium on Logic in Computer Science (LICS). 2020.
  184. Joaquín Arias, Zhuo Chen, Manuel Carro, Gopal Gupta.
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2020.
  185. International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2020.
  186. International Symposium on Mathematical Foundations of Computer Science (MFCS). 2020.
  187. Sunjay Cauligi, Craig Disselkoen, Klaus von Gleissenthall, Dean M. Tullsen, Deian Stefan, Tamara Rezk, Gilles Barthe.
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2020.
  188. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Vincent Laporte, Tiago Oliveira, Pierre-Yves Strub.
    IEEE Symposium on Security and Privacy (SP). 2020.
  189. Alvaro Feal, Paolo Calciati, Narseo Vallina-Rodriguez, Carmela Troncoso, Alessandra Gorla.
    Privacy Enhancing Technologies Symposium (PETS). 2020.
  190. John P. Gallagher, Robert Glück.
    Computing Research Repository (CoRR). 2020.
  191. Computing Research Repository (CoRR). 2020.
  192. Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli.
    International Conference on Practice and Theory in Public Key Cryptography (PKC). 2020.
  193. Dario Fiore, Anca Nitulescu, David Pointcheval.
    International Conference on Practice and Theory in Public Key Cryptography (PKC). 2020.
  194. Detecting and Diagnosing Energy Issues for Mobile Applications
    Xueliang Li, Yuming Yang, Yepang Liu, John P. Gallagher, Kaishun Wu.
    International Symposium on Software Testing and Analysis (ISSTA). 2020.
  195. Vitor Enes, Carlos Baquero, Tuanir França Rezende, Alexey Gotsman, Matthieu Perrin, Pierre Sutra.
    Eurosys Conference (EuroSys). 2020.
  196. From big-step to small-step semantics and back with interpreter specialization
    VPT 2020. 2020.
  197. Borzoo Bonakdarpour, Pavithra Prabhakar, César Sánchez.
    NASA Formal Methods (NFM). 2020.
  198. Combining High Throughput and Low Migration Latency for Consistent Data Storage on the Edge
    Nuno Afonso, Manuel Bravo, Luís Rodrigues.
    International Conference on Computer Communication and Networks (ICCCN). 2020.
  199. ASIAN Symposium on Programming Languages and Systems (APLAS). 2020.
  200. International Conference on Runtime Verification (RV). 2020.
  201. IEEE Symposium on Security and Privacy (SP). 2020.
  202. International Symposium on Mathematical Foundations of Computer Science (MFCS). 2020.
  203. Incremental Analysis of Logic Programs with Assertions and Open Predicates
    LOPSTR'19. 2020.
  204. Gordon J. Pace, César Sánchez, Gerardo Schneider.
    International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2020.
  205. Cost Analysis of Smart Contracts via Parametric Resource Analysis
    Static Analysis Symposium (SAS). 2020.
  206. ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2020.
  207. Antonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols.
    International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). November 2019.
  208. ACM Conference on Computer and Communications Security (CCS). November 2019.
  209. Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli.
    International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). November 2019.
  210. Marco Campion, Mila Dalla Preda, Roberto Giacobazzi.
    Static Analysis Symposium (SAS). October 2019.
  211. Martin Leucker, César Sánchez, Torben Scheffel, Malte Schmitz, Daniel Thoma.
    International Conference on Runtime Verification (RV). October 2019.
  212. International Symposium on Distributed Computing (DISC). October 2019.
  213. Towards Computing Abstract Distances in Logic Programs
    ICLP Tech. Comms.. September 2019.
  214. Towards a General Framework for Static Cost Analysis of Parallel Logic Programs
    ICLP, Tech. Comms.. September 2019.
  215. Iskander Sánchez-Rola, Matteo Dell'Amico, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, Igor Santos.
    ACM Conference on Computer and Communications Security (CCS). July 2019.
  216. White-box atomic multicast
    Alexey Gotsman, Anatole Lefort, Gregory Chockler.
    IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). June 2019.
  217. IEEE Symposium on Security and Privacy (SP). May 2019.
  218. Computing Research Repository (CoRR). April 2019.
  219. Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, Juan Caballero.
    Network and Distributed System Security Symposium (NDSS). February 2019.
  220. Orion: A distributed file system for non-volatile main memory and RDMA-capable networks
    Jian Yang, Joseph Izraelevitz, Steven Swanson.
    Conference on File and Storage Technologies (FAST). February 2019.
  221. Practical Aspects of Declarative Languages (PADL). January 2019.
  222. Multivariant Assertion-based Guidance in Abstract Interpretation
    28th Int’l. Symp. on Logic-based Program Synthesis and Transformation (LOPSTR'18). January 2019.
  223. José Bacelar Almeida, Cecile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub.
    ACM Conference on Computer and Communications Security (CCS). 2019.
  224. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Grégoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran.
    ACM Conference on Computer and Communications Security (CCS). 2019.
  225. Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi.
    ACM Conference on Computer and Communications Security (CCS). 2019.
  226. Gilles Barthe, Benjamin Grégoire, Charlie Jacomme, Steve Kremer, Pierre-Yves Strub.
    IEEE Computer Security Foundations Symposium (CSF). 2019.
  227. Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert.
    European Symposium On Research In Computer Security (ESORICS). 2019.
  228. Gilles Barthe, Renate Eilers, Pamina Georgiou, Bernhard Gleiss, Laura Kovács, Matteo Maffei.
    Formal Methods in Computer-Aided Design (FMCAD). 2019.
  229. Tetsuya Sato, Gilles Barthe, Marco Gaboardi, Justin Hsu, Shin-ya Katsumata.
    IEEE Symposium on Logic in Computer Science (LICS). 2019.
  230. International Symposium on Mathematical Foundations of Computer Science (MFCS). 2019.
  231. Borja Balle, Gilles Barthe, Marco Gaboardi, Joseph Geumlek.
    Advances in Neural Information Processing Systems (NeurIPS). 2019.
  232. Sunjay Cauligi, Gary Soeller, Brian Johannesmeyer, Fraser Brown, Riad S. Wahby, John Renner, Benjamin Grégoire, Gilles Barthe, Ranjit Jhala, Deian Stefan.
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2019.
  233. Ezgi Çiçek, Weihao Qu, Gilles Barthe, Marco Gaboardi, Deepak Garg.
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2019.
  234. Milod Kazerounian, Sankha Narayan Guria, Niki Vazou, Jeffrey S. Foster, David Van Horn.
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2019.
  235. International Conference on Runtime Verification (RV). 2019.
  236. Pierre Ganty, Francesco Ranzato, Pedro Valero.
    Static Analysis Symposium (SAS). 2019.
  237. Álvaro García-Pérez, Maria A. Schett.
    International Conference on Principles of Distributed Systems (OPODIS). 2019.
  238. Design Patterns for Code Reuse in HLS Packet Processing Pipelines
    Haggai Eran, Lior Zeno, Zsolt István, Mark Silberstein.
    IEEE Symposium on Field Programmable Custom Computing Machines (FCCM). 2019.
  239. International Conference on Field-Programmable Logic and Applications (FPL). 2019.
  240. Reconfigurable Atomic Transaction Commit
    ACM Symposium on Principles of Distributed Computing (PODC). 2019.
  241. Norine Coenen, Bernd Finkbeiner, César Sánchez, Leander Tentrup.
    Computer Aided Verification (CAV). 2019.
  242. Data Compression Conference (DCC). 2019.
  243. Marco Guarnieri, Musard Balliu, Daniel Schoepe, David Basin, Andrei Sabelfeld.
    IEEE European Symposium on Security and Privacy (EuroS&P). 2019.
  244. Hourglass: Leveraging Transient Resources for Time-Constrained Graph Processing in the Cloud
    Pedro Joaquim, Manuel Bravo, Luís Rodrigues, Miguel Matos.
    Eurosys Conference (EuroSys). 2019.
  245. Sandro Stucki, César Sánchez, Gerardo Schneider, Borzoo Bonakdarpour.
    International Symposium on Formal Methods (FM). 2019.
  246. International Conference on Runtime Verification (RV). November 2018.
  247. Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu.
    ACM Conference on Computer and Communications Security (CCS). October 2018.
  248. Qingrui Liu, Joseph Izraelevitz, Se Kwon Lee, Michael L. Scott, Sam H. Noh, Changhee Jung.
    International Symposium on Microarchitecture (MICRO). October 2018.
  249. Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson, Narseo Vallina-Rodriguez, Juan Caballero.
    Internet Measurement Conference (IMC). October 2018.
  250. Dario Fiore, Elena Pagnin.
    Conference on Security and Cryptography for Networks (SCN). September 2018.
  251. Static Performance Guarantees for Programs with Run-time Checks
    International Conference on Principles and Practice of Declarative Programming (PPDP). September 2018.
  252. Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu.
    Advances in Cryptology (CRYPTO). August 2018.
  253. Zhenhao He, David Sidler, Zsolt István, Gustavo Alonso.
    International Conference on Field-Programmable Logic and Applications (FPL). August 2018.
  254. Zsolt István, Gustavo Alonso, Ankit Singla.
    International Conference on Field-Programmable Logic and Applications (FPL). August 2018.
  255. Translating Code Comments to Procedure Specifications
    Arianna Blasi, Alberto Goffi, Konstantin Kuznetsov, Alessandra Gorla, Michael D. Ernst, Mauro Pezzè, Sergio Delgado Castellanos.
    International Symposium on Software Testing and Analysis (ISSTA). July 2018.
  256. IEEE International Conference on Web Services (ICWS). July 2018.
  257. Towards Incremental and Modular Context-sensitive Analysis
    International Conference on Logic Programming (ICLP). July 2018.
  258. Dario Catalano, Dario Fiore, Nizzardo Luca.
    International Conference on Applied Cryptography and Network Security (ACNS). June 2018.
  259. Vishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan, Kevin Hamlen.
    Asia Conference on Information, Computer and Communications Security (AsiaCCS). June 2018.
  260. IEEE International Conference on Program Comprehension (ICPC). May 2018.
  261. Paolo Calciati, Konstantin Kuznetsov, Alessandra Gorla.
    IEEE International Working Conference on Mining Software Repositories (MSR). May 2018.
  262. Konstantin Kuznetsov, Vitalii Avdiienko, Alessandra Gorla, Andreas Zeller.
    International Conference on Mobile Software Engineering and Systems (MOBILESoft). May 2018.
  263. Chen Chen, Daniele E. Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso.
    IEEE European Symposium on Security and Privacy (EuroS&P). April 2018.
  264. Haosen Wen, Joseph Izraelevitz, Wentao Cai, H. Alan Beadle, Michael L. Scott.
    Principles and Practice of Parallel Programming (PPoPP). February 2018.
  265. Exploiting Term Hiding to Reduce Run-time Checking Overhead
    Practical Aspects of Declarative Languages (PADL). January 2018.
  266. Filippo Bonchi, Pierre Ganty, Roberto Giacobazzi, Dusko Pavlovic.
    IEEE Symposium on Logic in Computer Science (LICS). 2018.
  267. Roberto Bruni, Roberto Giacobazzi, Roberta Gori.
    International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2018.
  268. Patrick Cousot, Roberto Giacobazzi, Francesco Ranzato.
    Computer Aided Verification (CAV). 2018.
  269. Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi.
    ACM Conference on Computer and Communications Security (CCS). 2018.
  270. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela.
    IEEE Computer Security Foundations Symposium (CSF). 2018.
  271. Gilles Barthe, Benjamin Grégoire, Vincent Laporte.
    IEEE Computer Security Foundations Symposium (CSF). 2018.
  272. Alejandro Aguirre, Gilles Barthe, Lars Birkedal, Ales Bizjak, Marco Gaboardi, Deepak Garg.
    European Symposium on Programming (ESOP). 2018.
  273. Gilles Barthe, Thomas Espitau, Marco Gaboardi, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub.
    European Symposium on Programming (ESOP). 2018.
  274. Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi.
    International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2018.
  275. Alejandro Aguirre, Gilles Barthe, Justin Hsu, Alexandra Silva.
    International Colloquium on Automata Languages and Programming (ICALP). 2018.
  276. Borja Balle, Gilles Barthe, Marco Gaboardi.
    Advances in Neural Information Processing Systems (NeurIPS). 2018.
  277. Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi.
    Conference on Security and Cryptography for Networks (SCN). 2018.
  278. i2kit: A Deployment Tool with the Simplicity of Containers and the Security of Virtual Machines
    Pablo Chico de Guzmán, Felipe Gorostiaga, César Sánchez.
    International Conference on Web Information Systems Engineering (WISE). 2018.
  279. Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro.
    Network and Distributed System Security Symposium (NDSS). 2018.
  280. Miriam García Soto, Pavithra Prabhakar.
    International Conference on Hybrid Systems: Computation and Control (HSCC). 2018.
  281. Logic-Based Program Synthesis and Transformation - 27th International Symposium. 2018.
  282. Borzoo Bonakdarpour, César Sánchez, Gerardo Schneider.
    International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2018.
  283. Fine-Grained Secure Computation
    Matteo Campanelli, Rosario Gennaro.
    Theory of Cryptography Conference (TCC). 2018.
  284. Christian Colombo, Yliés Falcone, Martin Leucker, Giles Reger, César Sánchez, Gerardo Schneider, Volker Stolz.
    International Conference on Runtime Verification (RV). 2018.
  285. Gregory Chockler, Alexey Gotsman.
    International Symposium on Distributed Computing (DISC). 2018.
  286. Compositional verification of compiler optimisations on relaxed memory
    Mike Dodds, Mark Batty, Alexey Gotsman.
    European Symposium on Programming (ESOP). 2018.
  287. Javier Esparza, Pierre Ganty, Rupak Majumdar, Chana Weil-Kennedy.
    International Conference on Concurrency Theory (CONCUR). 2018.
  288. Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2018.
  289. Martin Leucker, César Sánchez, Torben Scheffel, Malte Schmitz, Alexander Schramm.
    ACM Symposium on Applied Computing (SAC). 2018.
  290. Raúl Pardo, César Sánchez, Gerardo Schneider.
    International Symposium on Formal Methods (FM). 2018.
  291. Paxos consensus, deconstructed and abstracted
    European Symposium on Programming (ESOP). 2018.
  292. Artem Khyzha, Hagit Attiya, Alexey Gotsman, Noam Rinetzky.
    Principles and Practice of Parallel Programming (PPoPP). 2018.
  293. Cedric Baumann, Andrei Marian Dan, Yuri Meshman, Torsten Hoefler, Martin T. Vechev.
    International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2018.
  294. International Conference on Runtime Verification (RV). 2018.
  295. César Sánchez, Gerardo Schneider, Martin Leucker.
    International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2018.
  296. Federated Byzantine quorum systems
    International Conference on Principles of Distributed Systems (OPODIS). 2018.
  297. Distributed Transactional Reads: The Strong, the Quick, the Fresh & the Impossible
    Alejandro Z. Tomsic, Manuel Bravo, Marc Shapiro.
    ACM/IFIP/USENIX International Middleware Conference (Middleware). 2018.
  298. Graeme Gange, Pierre Ganty, Peter J. Stuckey.
    International Symposium on Automated Technology for Verification and Analysis (ATVA). October 2017.
  299. International Symposium on Automated Technology for Verification and Analysis (ATVA). October 2017.
  300. G. Betarte, J. Campo, M. Cristiá, F. Gorostiaga, C. Luna, C. Sanz.
    Conferencia Latinoamericana En Informatica (CLEI). September 2017.
  301. Manuel Barbosa, Dario Catalano, Dario Fiore.
    European Symposium On Research In Computer Security (ESORICS). September 2017.
  302. International Symposium on Fundamentals of Computation Theory (FCT). September 2017.
  303. Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore, Romain Gay.
    Advances in Cryptology (CRYPTO). August 2017.
  304. Vitalii Avdiienko, Konstantin Kuznetsov, Isabelle Rommelfanger, Andreas Rau, Alessandra Gorla, Andreas Zeller.
    International Conference on Software Engineering (ICSE). May 2017.
  305. IEEE International Working Conference on Mining Software Repositories (MSR). May 2017.
  306. Chaz Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, Manos Antonakakis.
    IEEE Symposium on Security and Privacy (SP). May 2017.
  307. Oliver Kennedy, D. Richard Hipp, Stratos Idreos, Amélie Marian, Arnab Nandi, Carmela Troncoso, Eugene Wu.
    International Conference on Data Engineering (ICDE). April 2017.
  308. Alessio Gambi, Alessandra Gorla, Andreas Zeller.
    International Conference on Software Testing, Verification and Validation (ICST). March 2017.
  309. Simon Oya, Fernando Pérez-González, Carmela Troncoso.
    IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). March 2017.
  310. App Mining
    Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, Eric Bodden.
    Systems Engineering. February 2017.
  311. Vergleich und Kombination von Techniken des Predictive Business Process Monitoring
    Andreas Metzger, Philipp Leitner, Dragan Ivanovic, Eric Schmieders, Rod Franklin, Manuel Carro, Schahram Dustdar, Klaus Pohl.
    Systems Engineering. February 2017.
  312. Network and Distributed System Security Symposium (NDSS). February 2017.
  313. Luca Aceto, Ignacio Fábregas, Álvaro García-Pérez, Anna Ingólfsdóttir, Yolanda Ortega-Mallén.
    International Conference on Concurrency Theory (CONCUR). 2017.
  314. A Fast and Verified Software Stack for Secure Function Evaluation
    José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira.
    ACM Conference on Computer and Communications Security (CCS). 2017.
  315. Jasmin: High-Assurance and High-Speed Cryptography
    José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub.
    ACM Conference on Computer and Communications Security (CCS). 2017.
  316. Zero-knowledge contingent payments revisited: Attacks and payments for services
    Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo.
    ACM Conference on Computer and Communications Security (CCS). 2017.
  317. Verified Translation Validation of Static Analyses
    Gilles Barthe, Sandrine Blazy, Vincent Laporte, David Pichardie, Alix Trieu.
    IEEE Computer Security Foundations Symposium (CSF). 2017.
  318. Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee.
    ACM Conference on Computer and Communications Security (CCS). 2017.
  319. Advances in Cryptology (CRYPTO). 2017.
  320. Pedro R. D'Argenio, Gilles Barthe, Sebastian Biewer, Bernd Finkbeiner, Holger Hermanns.
    European Symposium on Programming (ESOP). 2017.
  321. Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub.
    International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2017.
  322. Martín Ochoa, Sebastian Banescu, Cynthia Disenfeld, Gilles Barthe, Vijay Ganesh.
    IEEE European Symposium on Security and Privacy (EuroS&P). 2017.
  323. Pavithra Prabhakar, Miriam García Soto.
    International Conference on Hybrid Systems: Computation and Control (HSCC). 2017.
  324. Gilles Barthe, Thomas Espitau, Justin Hsu, Tetsuya Sato, Pierre-Yves Strub.
    International Colloquium on Automata Languages and Programming (ICALP). 2017.
  325. Gilles Barthe, Thomas Espitau, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub.
    Logic Programming and Automated Reasoning (LPAR). 2017.
  326. Marina Egea, Carolina Dania.
    International Conference on Model Driven Engineering Languages and Systems (MODELS). 2017.
  327. Gilles Barthe, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2017.
  328. Ezgi Çiçek, Gilles Barthe, Marco Gaboardi, Deepak Garg, Jan Hoffmann.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2017.
  329. Véronique Cortier, Constantin Catalin Dragan, François Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi.
    IEEE Symposium on Security and Privacy (SP). 2017.
  330. Unilaterally-Authenticated Key Exchange
    Yevgeniy Dodis, Dario Fiore.
    Financial Cryptography and Data Security Conference (FC). 2017.
  331. Feature importance scores and lossless feature pruning using Banzhaf power indices
    NIPS 2017 Symposium on Interpretable Machine Learning. 2017.
  332. Simon Oya, Carmela Troncoso, Fernando Pérez-González.
    ACM Conference on Computer and Communications Security (CCS). 2017.
  333. Security Analysis of Cache Replacement Policies
    International Conference on Principles of Security and Trust (POST). 2017.
  334. Concurrent Data Structures Linked in Time
    European Conference on Object-Oriented Programming (ECOOP). 2017.
  335. Rigorous Analysis of Software Countermeasures against Cache Attacks
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2017.
  336. Alexey Gotsman, Sebastian Burckhardt.
    International Symposium on Distributed Computing (DISC). 2017.
  337. Artem Khyzha, Mike Dodds, Alexey Gotsman, Matthew Parkinson.
    European Symposium on Programming (ESOP). 2017.
  338. Loophole: Timing Attacks on Shared Event Loops in Chrome
    Usenix Security Symposium (USENIX-Security). 2017.
  339. A Systematic Study of Cache Side Channels across AES Implementations
    Heiko Mantel, Alexandra Weber, Boris Köpf.
    Engineering Secure Software and Systems (ESSoS). 2017.
  340. Towards Run-time Checks Simplification via Term Hiding (extended abstract)
    Tech. Comm. of ICLP'17. 2017.
  341. Andrea Cerone, Alexey Gotsman, Hongseok Yang.
    International Conference on Concurrency Theory (CONCUR). 2017.
  342. Gilles Barthe, Marco Gaboardi, Emilio Jesús Gallego Arias, Justin Hsu, Aaron Roth, Pierre-Yves Strub.
    International Conference on Web and Internet Economics (WINE). December 2016.
  343. Antonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero.
    Annual Computer Security Applications Conference (ACSAC). December 2016.
  344. Description and Evaluation of a Generic Design to Integrate CLP and Tabled Execution
    International Conference on Principles and Practice of Declarative Programming (PPDP). September 2016.
  345. The International Symposium on Research in Attacks, Intrusions and Defenses (RAID). September 2016.
  346. Alejandro Calleja, Juan Tapiador, Juan Caballero.
    The International Symposium on Research in Attacks, Intrusions and Defenses (RAID). September 2016.
  347. Reducing the Overhead of Assertion Run-time Checks via Static Analysis
    International Conference on Principles and Practice of Declarative Programming (PPDP). September 2016.
  348. Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services
    Usenix Security Symposium (USENIX-Security). August 2016.
  349. Alberto Goffi, Alessandra Gorla, Michael D. Ernst, Mauro Pezzè.
    International Symposium on Software Testing and Analysis (ISSTA). July 2016.
  350. International Symposium on Functional and Logic Programming (FLOPS). March 2016.
  351. Multi-Key Homomorphic Authenticators
    Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin.
    International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2016.
  352. Relational Logic with Framing and Hypotheses
    Anindya Banerjee, David A. Schmidt, Mohammad Nikouei.
    Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2016.
  353. Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data
    Dario Fiore, Cédric Fournet, Esha Gosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno.
    ACM Conference on Computer and Communications Security (CCS). 2016.
  354. Cédric Fournet, Chantal Keller, Vincent Laporte.
    IEEE Computer Security Foundations Symposium (CSF). 2016.
  355. Gilles Barthe, Thomas Espitau, Luis María Ferrer Fioriti, Justin Hsu.
    Computer Aided Verification (CAV). 2016.
  356. Computer Aided Verification (CAV). 2016.
  357. Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini.
    ACM Conference on Computer and Communications Security (CCS). 2016.
  358. Gilles Barthe, Gian Pietro Farina, Marco Gaboardi, Emilio Jesús Gallego Arias, Andy Gordon, Justin Hsu, Pierre-Yves Strub.
    ACM Conference on Computer and Communications Security (CCS). 2016.
  359. Gilles Barthe, Noémie Fong, Marco Gaboardi, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub.
    ACM Conference on Computer and Communications Security (CCS). 2016.
  360. Sophie Bernard, Yves Bertot, Laurence Rideau, Pierre-Yves Strub.
    International Conference on Certified Programs and Proofs (CPP). 2016.
  361. ACM Conference on Embedded Software (EMSOFT). 2016.
  362. International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2016.
  363. A Theory of Slicing for Probabilistic Control Flow Graphs
    Torben Amtoft, Anindya Banerjee.
    Foundations of Software Science and Computational Structures (FOSSACS). 2016.
  364. Christian Meurisch, Usman Naeem, Muhammad Awais Azam, Frederik Janssen, Benedikt Schmidt, Max Mühlhäuser.
    ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp). 2016.
  365. A Program Logic for Union Bounds
    Gilles Barthe, Marco Gaboardi, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub.
    International Colloquium on Automata Languages and Programming (ICALP). 2016.
  366. Alexander Seeliger, Timo Nolle, Benedikt Schmidt, Max Mühlhäuser.
    International Conference on Information Systems (ICIS). 2016.
  367. Facets of Software Doping
    Gilles Barthe, Pedro R. D'Argenio, Bernd Finkbeiner, Holger Hermanns.
    International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2016.
  368. International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2016.
  369. Alexander Seeliger, Benedikt Schmidt, Immanuel Schweizer, Max Mühlhäuser.
    International Conference on Intelligent User Interfaces (IUI). 2016.
  370. Gilles Barthe, Marco Gaboardi, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub.
    IEEE Symposium on Logic in Computer Science (LICS). 2016.
  371. Xueliang Li, John P. Gallagher.
    International Conference on Mobile and Ubiquitous Systems: Networks and Services (Mobiquitous). 2016.
  372. International Conference on Model Driven Engineering Languages and Systems (MODELS). 2016.
  373. Nikhil Swamy, Catalin Hritcu, Chantal Keller, Aseem Rastogi, Antoine Delignat-Lavaud, Simon Forest, Karthikeyan Bhargavan, Cédric Fournet, Pierre-Yves Strub, Markulf Kohlweiss, Jean Karim Zinzindohoue, Santiago Zanella Béguelin.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2016.
  374. Mila Dalla Preda, Roberto Giacobazzi, Isabella Mastroeni.
    Static Analysis Symposium (SAS). 2016.
  375. Marc Fischlin, Felix Günther, Benedikt Schmidt, Bogdan Warinschi.
    IEEE Symposium on Security and Privacy (SP). 2016.
  376. International Symposium on Games, Automata, Logics and Formal Verification (GandALF). 2016.
  377. Sandrine Blazy, Vincent Laporte, David Pichardie.
    International Conference on Functional Programming (ICFP). 2016.
  378. A Source-level Energy Optimization Framework for Mobile Applications
    Xueliang Li, John P. Gallagher.
    IEEE Working Conference on Source Code Analysis and Manipulation (SCAM). 2016.
  379. Nearly Optimal Verifiable Data Streaming
    Johannes Krupp, Dominique Schroeder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nuernberger.
    International Conference on Practice and Theory in Public Key Cryptography (PKC). 2016.
  380. On the (In)security of SNARKs in the Presence of Oracles
    Theory of Cryptography Conference (TCC). 2016.
  381. (HIP3ES'16). 2016.
  382. Computer Aided Verification (CAV). 2016.
  383. 'Cause I'm strong enough: reasoning about consistency choices in distributed systems
    Alexey Gotsman, Hongseok Yang, Carla Ferreira, Mahsa Najafzadeh, Marc Shapiro.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2016.
  384. Michael Emmi, Constantin Enea.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2016.
  385. Verifying Constant-Time Implementations
    José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Michael Emmi.
    Usenix Security Symposium (USENIX-Security). 2016.
  386. Specification and Complexity of Collaborative Text Editing
    Hagit Attiya, Sebastian Burckhardt, Alexey Gotsman, Adam Morrison, Hongseok Yang, Marek Zawirski.
    ACM Symposium on Principles of Distributed Computing (PODC). 2016.
  387. Javier Esparza, Pierre Ganty, Jérôme Leroux, Rupak Majumdar.
    Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2016.
  388. A General Framework for Static Profiling of Parametric Resource Usage
    ICLP. 2016.
  389. International Conference on Hybrid Systems: Computation and Control (HSCC). 2016.
  390. U. Liqat, K. Georgiou, S. Kerrison, P. Lopez-Garcia, M. V. Hermenegildo, J. P. Gallagher, K. Eder.
    Proc. of FOPARA. 2016.
  391. Raúl Pardo, Ivana Kellyerova, César Sánchez, Gerardo Schneider.
    International Symposium on Temporal Representation and Reasoning (TIME). 2016.
  392. Robustness against Consistency Models with Atomic Visibility
    International Conference on Concurrency Theory (CONCUR). 2016.
  393. Hoare-style Specifications As Correctness Conditions for Non-linearizable Concurrent Objects
    ACM Conference on Object Oriented Programming Systems Languages and Applications (OOPSLA). 2016.
  394. Analysing Snapshot Isolation
    ACM Symposium on Principles of Distributed Computing (PODC). 2016.
  395. A Generic Logic for Proving Linearizability
    Artem Khyzha, Alexey Gotsman, Matthew J. Parkinson.
    International Symposium on Formal Methods (FM). 2016.
  396. Automated Test Input Generation for Android: Are We There Yet?
    Shauvik Roy Choudhary, Alessandra Gorla, Alessandro Orso.
    International Conference on Automated Software Engineering (ASE). November 2015.
  397. ACM Conference on Computer and Communications Security (CCS). October 2015.
  398. ACM Conference on Computer and Communications Security (CCS). October 2015.
  399. A Haskell Implementation of a Rule-Based Program Transformation for C Programs
    Salvador Tamarit, Guillermo Vigueras, Manuel Carro, Julio Mariño.
    Practical Aspects of Declarative Languages (PADL). June 2015.
  400. Mining Apps for Abnormal Usage of Sensitive Data
    Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, Eric Bodden.
    International Conference on Software Engineering (ICSE). May 2015.
  401. Kurt Thomas, Elie Bursztein, Nav Jagpal, Moheeb Abu, Niels Provos, Paul Pearce, Grant Hoand Damon McCoy, Chris Grier, Vern Paxson, Antonio Nappa, Alexandros Kapravelos.
    IEEE Symposium on Security and Privacy (SP). May 2015.
  402. Antonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, Tudor Dimitras.
    IEEE Symposium on Security and Privacy (SP). May 2015.
  403. Gilles Barthe, Benjamin Grégoire, Benedikt Schmidt.
    ACM Conference on Computer and Communications Security (CCS). 2015.
  404. International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2015.
  405. Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi.
    International Conference on Practice and Theory in Public Key Cryptography (PKC). 2015.
  406. Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
    Dario Catalano, Dario Fiore, Luca Nizzardo.
    Advances in Cryptology (CRYPTO). 2015.
  407. Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
    Dario Catalano, Dario Fiore.
    ACM Conference on Computer and Communications Security (CCS). 2015.
  408. Manuel Clavel, Francisco Durán, Steven Eker, Santiago Escobar, Patrick Lincoln, Narciso Martí-Oliet, Carolyn L. Talcott.
    Logic, Rewriting, and Concurrency - Essays dedicated to José Meseguer on the Occasion of His 65th Birthday. 2015.
  409. Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub.
    International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2015.
  410. Pavithra Prabhakar, Nima Roohi, Mahesh Viswanathan.
    International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS). 2015.
  411. Patrick Baillot, Gilles Barthe, Ugo Dal Lago.
    Logic Programming and Automated Reasoning (LPAR). 2015.
  412. Logic Programming and Automated Reasoning (LPAR). 2015.
  413. Antoine Durand-Gasselin, Javier Esparza, Pierre Ganty, Rupak Majumdar.
    Computer Aided Verification (CAV). 2015.
  414. Fundamental Approaches to Software Engineering (FASE). 2015.
  415. Asia-Pacific Conference on Conceptual Modelling (APCCM). 2015.
  416. Verification of Population Protocols
    Javier Esparza, Pierre Ganty, Jérôme Leroux, Rupak Majumdar.
    International Conference on Concurrency Theory (CONCUR). 2015.
  417. From Non-Zenoness Verification to Termination
    International Conference on Formal Methods and Models for Co-Design (MEMOCODE). 2015.
  418. Interprocedural Reachability for Flat Integer Programs
    Pierre Ganty, Radu Iosif.
    International Symposium on Fundamentals of Computation Theory (FCT). 2015.
  419. Roberto Giacobazzi, Francesco Logozzo, Francesco Ranzato.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2015.
  420. Carlos Cotrini Jiménez, Thilo Weghorn, David A. Basin, Manuel Clavel.
    IEEE Computer Security Foundations Symposium (CSF). 2015.
  421. Bishoksan Kafle, John P. Gallagher.
    International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2015.
  422. Synthesis of Equivalent Method Calls in Guava
    Andrea Mattavelli, Alberto Goffi, Alessandra Gorla.
    International Symposium on Search Based Software Engineering (SSBSE). 2015.
  423. Mila Dalla Preda, Roberto Giacobazzi, Arun Lakhotia, Isabella Mastroeni.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2015.
  424. Bounded error flowpipe computation of parameterized linear systems
    ACM Conference on Embedded Software (EMSOFT). 2015.
  425. ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
    Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk.
    IEEE Symposium on Security and Privacy (SP). 2015.
  426. IFIP TC12 Publications (IFIP12). 2015.
  427. Soft Computing Models in Industrial and Environmental Applications (SOCO). 2015.
  428. Energy Efficient Allocation and Scheduling for DVFS-enabled Multicore Environments using a Multiobjective Evolutionary Algorithm
    Genetic and Evolutionary Computations (GECCO). 2015.
  429. Hybrid Artificial Intelligent Systems (HAIS 2015). 2015.
  430. Transaction chopping for parallel snapshot isolation
    Andrea Cerone, Alexey Gotsman, Hongseok Yang.
    International Symposium on Distributed Computing (DISC). 2015.
  431. Composite replicated data types
    Alexey Gotsman, Hongseok Yang.
    European Symposium on Programming (ESOP). 2015.
  432. Computer Aided Verification (CAV). 2015.
  433. Michael Emmi, Pierre Ganty, Rupak Majumdar, Fernando Rosa-Velardo.
    European Symposium on Programming (ESOP). 2015.
  434. Ahmed Bouajjani, Michael Emmi, Constantin Enea, Jad Hamza.
    International Colloquium on Automata Languages and Programming (ICALP). 2015.
  435. Michael Emmi, Constantin Enea, Jad Hamza.
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2015.
  436. Ahmed Bouajjani, Michael Emmi, Constantin Enea, Jad Hamza.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2015.
  437. Arvind Haran, Montgomery Carter, Michael Emmi, Akash Lal, Shaz Qadeer, Zvonimir Rakamaric.
    International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2015.
  438. Rational Protection Against Timing Attacks
    IEEE Computer Security Foundations Symposium (CSF). 2015.
  439. Towards Energy Consumption Verification via Static Analysis
    WS on High Perf. Energy Efficient Embedded Sys. (HIP3ES). 2015.
  440. Bernd Finkbeiner, Markus N. Rabe, César Sánchez.
    Proc. of the 27th Int’l Conf. on Computer Aided Verification (CAV'15). 2015.
  441. A framework for transactional consistency models with atomic visibility
    International Conference on Concurrency Theory (CONCUR). 2015.
  442. International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2015.
  443. Reasoning about the Trade-off between Security and Performance
    Proc. 12th International Conference on Quantitative Evaluation of Systems (QEST ‘15). 2015.
  444. Symbolic Polytopes for Quantitative Interpolation and Verification
    Klaus von Gleissenthall, Boris Köpf, Andrey Rybalchenko.
    Computer Aided Verification (CAV). 2015.
  445. International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2015.
  446. Specifying and Verifying Concurrent Algorithms with Histories and Subjectivity
    European Symposium on Programming (ESOP). 2015.
  447. Mechanized Verification of Fine-grained Concurrent Programs
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2015.
  448. A Model-driven Methodology for Generating and Verifying CSP-based Java Code
    Julio Mariño, Raúl N.N. Alborodo.
    Communicating Process Architectures 2015, Proceedings of the 37th WoTUG Conference on Concurrent and Parallel Systems. 2015.
  449. An XFEM/CZM implementation for massively parallel simulations of composites fracture
    Antoine Jerusalem, Guillermo Vigueras, Federico Sket, Cristobal Samaniego, Ling Wu, Ludovic Noels, Denny Tjahjanto, Eva Casoni, Guillaume Houzeaux, Ahmed Makradi, Jon M. Molina-Aldareguia, Mariano Vazquez.
    European Solid Mechanics Conference, ESMC 2015. 2015.
  450. M. Zubair Rafique, Juan Caballero, Christophe Huygens, Wouter Joosen.
    Annual Computer Security Applications Conference (ACSAC). December 2014.
  451. Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie.
    ACM Conference on Computer and Communications Security (CCS). November 2014.
  452. Zhaoyan Xu, Antonio Nappa, Robert Baykov, Guangliang Yang, Juan Caballero, Guofei Gu.
    ACM Conference on Computer and Communications Security (CCS). November 2014.
  453. Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Jean-Christophe Zapalowicz.
    ACM Conference on Computer and Communications Security (CCS). November 2014.
  454. International Conference on Service Oriented Computing (ICSOC). November 2014.
  455. International Conference on Service Oriented Computing (ICSOC). November 2014.
  456. Liang Wang, Antonio Nappa, Juan Caballero, Thomas Ristenpart, Aditya Akella.
    Internet Measurement Conference (IMC). November 2014.
  457. On Combining Backward and Forward Chaining in Constraint Logic Programming
    International Conference on Principles and Practice of Declarative Programming (PPDP). September 2014.
  458. Assertion-based Debugging of Higher-Order (C)LP Programs
    International Conference on Principles and Practice of Declarative Programming (PPDP). September 2014.
  459. David Urbina, Yufei Gu, Juan Caballero, Zhiqiang Lin.
    European Symposium On Research In Computer Security (ESORICS). September 2014.
  460. Certified Synthesis of Efficient Batch Verifiers
    Joseph A. Akinyele, Gilles Barthe, Benjamin Grégoire, Benedikt Schmidt, Pierre-Yves Strub.
    IEEE Computer Security Foundations Symposium (CSF). July 2014.
  461. Gilles Barthe, Marco Gaboardi, Emilio Jesús Gallego Arias, Justin Hsu, César Kunz, Pierre-Yves Strub.
    IEEE Computer Security Foundations Symposium (CSF). July 2014.
  462. Antonio Nappa, Zhaoyan Xu, Juan Caballero, Guofei Gu.
    Network and Distributed System Security Symposium (NDSS). February 2014.
  463. Marcos Arjona, Carolina Dania, Marina Egea, Antonio Maña.
    International Conference on Model Driven Engineering Languages and Systems (MODELS). 2014.
  464. Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy
    Gilles Barthe, Marco Gaboardi, Emilio Jesús Gallego Arias, Justin Hsu, Aaron Roth, Pierre-Yves Strub.
    Computer Security Foundations Symposium (CSF 2014). 2014.
  465. Achim D. Brucker, Tony Clark, Carolina Dania, Geri Georg, Martin Gogolla, Frédéric Jouault, Ernest Teniente, Burkhart Wolff.
    International Conference on Model Driven Engineering Languages and Systems (MODELS). 2014.
  466. Homomorphic Signatures with Efficient Verification for Polynomial Functions
    Dario Catalano, Dario Fiore, Bogdan Warinschi.
    Advances in Cryptology (CRYPTO). 2014.
  467. Efficiently Verifiable Computation on Encrypted Data
    Dario Fiore, Rosario Gennaro, Valerio Pastro.
    ACM Conference on Computer and Communications Security (CCS). 2014.
  468. Giovanni Bernardi, Matthew Hennessy.
    International Conference on Concurrency Theory (CONCUR). 2014.
  469. Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt.
    Advances in Cryptology (CRYPTO). 2014.
  470. Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Santiago Zanella Béguelin.
    Advances in Cryptology (CRYPTO). 2014.
  471. IEEE International Conference on Robotics and Automation (ICRA). 2014.
  472. Evmorfia-Iro Bartzia, Pierre-Yves Strub.
    Conference on Interactive Theorem Proving (ITP). 2014.
  473. Gilles Barthe, Cédric Fournet, Benjamin Grégoire, Pierre-Yves Strub, Nikhil Swamy, Santiago Zanella Béguelin.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
  474. Nikhil Swamy, Cédric Fournet, Aseem Rastogi, Karthikeyan Bhargavan, Juan Chen, Pierre-Yves Strub, Gavin M. Bierman.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
  475. A Logical Analysis of Framing for Specifications with Pure Method Calls
    Anindya Banerjee, David A. Naumann.
    Verified Software: Theories (VSTTE). 2014.
  476. International Symposium on Theoretical Aspects of Software Engineering (TASE). 2014.
  477. Generalizing Homomorphic MACs for Arithmetic Circuits
    Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo.
    International Conference on Practice and Theory in Public Key Cryptography (PKC). 2014.
  478. Interactive Encryption and Message Authentication
    Yevgeniy Dodis, Dario Fiore.
    Conference on Security and Cryptography for Networks (SCN). 2014.
  479. Benedikt Schmidt, Ralf Sasse, Cas Cremers, David Basin.
    Proceedings of the 2014 IEEE Symposium on Security and Privacy. 2014.
  480. Modular, higher-order cardinality analysis in theory and practice
    Ilya Sergey, Dimitrios Vytiniotis, Simon L. Peyton Jones.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
  481. Characterising Testing Preorders for Broadcasting Distributed Systems
    Andrea Cerone, Matthew Hennessy.
    Trustworthy Global Computing (TGC). 2014.
  482. Leakage Resilience against Concurrent Cache Attacks
    Gilles Barthe, Boris Köpf, Laurent Mauborgne, Martín Ochoa.
    International Conference on Principles of Security and Trust (POST). 2014.
  483. Laura Bozzelli, César Sánchez.
    International Joint Conference on Automated Reasoning (IJCAR). 2014.
  484. Laura Bozzelli, César Sánchez.
    International Conference on Runtime Verification (RV). 2014.
  485. Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe, César Sánchez.
    International Conference on Principles of Security and Trust (POST). 2014.
  486. Zvonimir Rakamaric, Michael Emmi.
    Computer Aided Verification (CAV). 2014.
  487. Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Alfredo Pironti, Pierre-Yves Strub.
    IEEE Symposium on Security and Privacy (SP). 2014.
  488. International SPIN Symposium on Model Checking of Software (SPIN). 2014.
  489. Replicated data types: specification, verification, optimality
    Sebastian Burckhardt, Alexey Gotsman, Hongseok Yang, Marek Zawirski.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
  490. Ordered Counter Abstraction (Refinable Subword Relations for Parameterized Verification)
    Pierre Ganty, Ahmed Rezine.
    International Conference on Language and Automata Theory and Applications (LATA). 2014.
  491. Energy Consumption Analysis of Programs based on XMOS ISA-Level Models
    U. Liqat, S. Kerrison, A. Serrano, K. Georgiou, P. Lopez-Garcia, N. Grech, M. V. Hermenegildo, K. Eder.
    LOPSTR. 2014.
  492. Modular Reasoning about Heap Paths via Effectively Propositional Formulas
    Shachar Itzhaky, Anindya Banerjee, Neil Immerman, Ori Lahav, Aleksandar Nanevski, Mooly Sagiv.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
  493. Parameterised linearisability
    Andrea Cerone, Alexey Gotsman, Hongseok Yang.
    International Colloquium on Automata Languages and Programming (ICALP). 2014.
  494. Communicating State Transition Systems for Fine-Grained Concurrent Resources
    European Symposium on Programming (ESOP). 2014.
  495. American Control Conference (ACC). 2014.
  496. International Symposium on Automated Technology for Verification and Analysis (ATVA). 2014.
  497. Computer Aided Verification (CAV). 2014.
  498. International Symposium on Temporal Representation and Reasoning (TIME). 2014.
  499. Giovanni Bernardi, Ornela Dardha, Simon J. Gay, Dimitrios Kouzapas.
    Trustworthy Global Computing (TGC). 2014.
  500. Safety of live transactions in transactional memory: TMS is necessary and sufficient
    Hagit Attiya, Alexey Gotsman, Sandeep Hans, Noam Rinetzky.
    International Symposium on Distributed Computing (DISC). 2014.
  501. Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, Santiago Zanella Béguelin.
    ACM Conference on Computer and Communications Security (CCS). November 2013.
  502. Martina Lindorfer, Matthias Neumayr, Juan Caballero, Christian Platzer.
    ACM Conference on Computer and Communications Security (CCS). November 2013.
  503. The International Symposium on Research in Attacks, Intrusions and Defenses (RAID). October 2013.
  504. Sized Type Analysis for Logic Programs
    International Conference on Logic Programming (ICLP). August 2013.
  505. GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). July 2013.
  506. Supporting Pruning in Tabled LP
    P. Chico de Guzmán, M. Carro, M. V. Hermenegildo.
    Practical Aspects of Declarative Languages (PADL). January 2013.
  507. Reversible Language Extensions and their Application in Debugging
    Practical Aspects of Declarative Languages (PADL). January 2013.
  508. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir.
    ACM Conference on Computer and Communications Security (CCS). 2013.
  509. Verified Computational Differential Privacy with Applications to Smart Metering
    Gilles Barthe, George Danezis, Benjamin Grégoire, César Kunz, Santiago Zanella Béguelin.
    IEEE Computer Security Foundations Symposium (CSF). 2013.
  510. Logical Foundations of Computer Science (LFCS). 2013.
  511. Cédric Fournet, Nikhil Swamy, Juan Chen, Pierre-Évariste Dagand, Pierre-Yves Strub, Benjamin Livshits.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2013.
  512. Gilles Barthe, Juan Manuel Crespo, Sumit Gulwani, César Kunz, Mark Marron.
    Principles and Practice of Parallel Programming (PPoPP). 2013.
  513. Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub.
    IEEE Symposium on Security and Privacy (SP). 2013.
  514. OCL2FOL+: Coping with Undefinedness
    International Conference on Model Driven Engineering Languages and Systems (MODELS). 2013.
  515. International Conference on Functional Programming (ICFP). 2013.
  516. International Conference on Principles and Practice of Declarative Programming (PPDP). 2013.
  517. Simon Meier, Benedikt Schmidt, Cas Cremers, David A. Basin.
    Computer Aided Verification - 25th International Conference, CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings. 2013.
  518. Monadic abstract interpreters
    Ilya Sergey, Dominique Devriese, Matthew Might, Jan Midtgaard, David Darais, Dave Clarke, Frank Piessens.
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2013.
  519. International Conference on Hybrid Artificial Intelligence Systems (HAIS). 2013.
  520. Preventing Side-Channel Leaks in Web Traffic: A Formal Approach
    Michael Backes, Goran Doychev, Boris Köpf.
    Network and Distributed System Security Symposium (NDSS). 2013.
  521. Verifying Concurrent Programs Against Sequential Specifications
    Ahmed Bouajjani, Michael Emmi, Constantin Enea, Jad Hamza.
    European Symposium on Programming (ESOP). 2013.
  522. Library abstraction for C/C++ concurrency
    Mark Batty, Mike Dodds, Alexey Gotsman.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2013.
  523. CacheAudit: A Tool for the Static Analysis of Cache Side Channels
    Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke.
    Usenix Security Symposium (USENIX-Security). 2013.
  524. Parameterized Verification of Asynchronous Shared-Memory Systems
    Javier Esparza, Pierre Ganty, Rupak Majumdar.
    Computer Aided Verification (CAV). 2013.
  525. Proving Termination Starting from the End
    Pierre Ganty, Samir Genaim.
    Computer Aided Verification (CAV). 2013.
  526. Underapproximation of Procedure Summaries for Integer Programs
    Pierre Ganty, Radu Iosif, Filip Konečný.
    International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2013.
  527. Effectively-Propositional Reasoning about Reachability in Linked Data Structures
    Shachar Itzhaky, Anindya Banerjee, Neil Immerman, Aleksandar Nanevski, Mooly Sagiv.
    Computer Aided Verification (CAV). 2013.
  528. Automation of Quantitative Information-Flow Analysis
    Boris Köpf, Andrey Rybalchenko.
    School on Formal Methods for the Design of Computer, Communication and Software Systems (SFM). 2013.
  529. Subjective Auxiliary State for Coarse-Grained Concurrency
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2013.
  530. Abstraction Based Model-Checking of Stability of Hybrid Systems
    Computer Aided Verification (CAV). 2013.
  531. Pre-orders for reasoning about stability properties with respect to input of hybrid systems
    Pavithra Prabhakar, Jun Liu, Richard M. Murray.
    ACM Conference on Embedded Software (EMSOFT). 2013.
  532. On the decidability of stability of hybrid systems
    Pavithra Prabhakar, Mahesh Viswanathan.
    International Conference on Hybrid Systems: Computation and Control (HSCC). 2013.
  533. Patching task-level robot controllers based on a local -calculus formula
    Scott C. Livingston, Pavithra Prabhakar, Alex B. Jose, Richard M. Murray.
    IEEE International Conference on Robotics and Automation (ICRA). 2013.
  534. Hybrid Automata based CEGAR for Rectangular Hybrid Automata
    Pavithra Prabhakar, Parasara Sridhar Duggirala, Sayan Mitra, Mahesh Viswanathan.
    International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2013.
  535. Verifying Information Flow Properties of Hybrid Systems
    High Confidence Networked Systems (HiCoNS). 2013.
  536. Verifying concurrent memory reclamation algorithms with grace
    Alexey Gotsman, Noam Rinetzky, Hongseok Yang.
    European Symposium on Programming (ESOP). 2013.
  537. Dependent Types for Enforcement of Information Flow and Erasure Policies in Heterogeneous Data Structures
    International Conference on Principles and Practice of Declarative Programming (PPDP). 2013.
  538. A programming language perspective on transactional memory consistency
    Hagit Attiya, Alexey Gotsman, Sandeep Hans, Noam Rinetzky.
    ACM Symposium on Principles of Distributed Computing (PODC). 2013.
  539. An XFEM Implementation for Fracture Simulations of Composites
    Guillermo Vigueras, Cristobal Samaniego, Guillaume Houzeau, Mariano Vazquez, Antoine Jerusalem.
    International Conference on Computational Plasticity. Fundamentals and Applications. COMPLAS 2013. 2013.
  540. An XFEM-CZM Implementation for Large-Scale Fracture Simulations of Composites Laminates
    Guillermo Vigueras, Cristobal Samaniego, Eva Casoni, Guillaume Houzeau, Federico Sket, Jon Molina-Aldareguia, Ahmed Makradi, Mariano Vazquez, Antoine Jerusalem.
    European Congress and Exhibition on Advanced Materials and Processes. EUROMAT 2013. 2013.
  541. Mtac: A Monad for Typed Tactic Programming in Coq
    Beta Ziliani, Derek Dreyer, Neelakantan R. Krishnaswami, Aleksandar Nanevski, Viktor Vafeiadis.
    International Conference on Functional Programming (ICFP). 2013.
  542. A Constraint-Based Approach to Quality Assurance in Service Choreographies
    International Conference on Service Oriented Computing (ICSOC). November 2012.
  543. Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker.
    ACM Conference on Computer and Communications Security (CCS). October 2012.
  544. Deriving Specifications for Composite Web Services
    George Bariannys, M. Carro, Dimitris Plexousakis.
    International Computer Software and Applications Conference (COMPSAC). July 2012.
  545. International Symposium on Software Testing and Analysis (ISSTA). July 2012.
  546. A General Implementation Framework for Tabled CLP
    International Symposium on Functional and Logic Programming (FLOPS). May 2012.
  547. A Segment-Swapping Approach for Executing Trapped Computations
    Practical Aspects of Declarative Languages (PADL). January 2012.
  548. Mai Ajspur, John P. Gallagher.
    8th Scandinavian Logic Symposium, 20-21 August 2012, Roskilde University, Denmark. 2012.
  549. A Formally Verified SSA-Based Middle-End - Static Single Assignment Meets CompCert
    Gilles Barthe, Delphine Demange, David Pichardie.
    European Symposium on Programming (ESOP). 2012.
  550. Programming Paradigm Driven Heap Analysis
    Mark Marron, Ondrej Lhoták, Anindya Banerjee.
    International Conference on Compiler Construction (CC). 2012.
  551. Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols
    José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin.
    ACM Conference on Computer and Communications Security (CCS). 2012.
  552. Verified Security of Redundancy-Free Encryption from Rabin and RSA
    Gilles Barthe, David Pointcheval, Santiago Zanella Béguelin.
    ACM Conference on Computer and Communications Security (CCS). 2012.
  553. Automation in Computer-Aided Cryptography: Proofs, Attacks and Designs
    Gilles Barthe, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Santiago Zanella Béguelin.
    International Conference on Certified Programs and Proofs (CPP). 2012.
  554. Verified Security of Merkle-Damgård
    Michael Backes, Gilles Barthe, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa, Santiago Zanella Béguelin.
    IEEE Computer Security Foundations Symposium (CSF). 2012.
  555. Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization
    Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna.
    IEEE Computer Security Foundations Symposium (CSF). 2012.
  556. Secure Multi-Execution through Static Program Transformation
    Gilles Barthe, Juan Manuel Crespo, Dominique Devriese, Frank Piessens, Exequiel Rivas.
    IFIP WG 6.1 International Conference on Formal Techniques for (Networked and) Distributed Systems (FORTE). 2012.
  557. Probabilistic Relational Hoare Logics for Computer-Aided Security Proofs
    Gilles Barthe, Benjamin Grégoire, Santiago Zanella Béguelin.
    Mathematics of Program Construction (MPC). 2012.
  558. Verification of Software Barriers
    Principles and Practice of Parallel Programming (PPoPP). 2012.
  559. Computer-Aided Cryptographic Proofs
    Gilles Barthe, Benjamin Grégoire, Santiago Zanella Béguelin.
    Static Analysis Symposium (SAS). 2012.
  560. Decision Procedures for Region Logic
    Stan Rosenberg, Anindya Banerjee, David A. Naumann.
    International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2012.
  561. Verified Indifferentiable Hashing into Elliptic Curves
    Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Federico Olmedo, Santiago Zanella Béguelin.
    International Conference on Principles of Security and Trust (POST). 2012.
  562. Probabilistic Relational Reasoning for Differential Privacy
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2012.
  563. Automatic Quantification of Cache Side-Channels
    Boris Köpf, Laurent Mauborgne, Martín Ochoa.
    Computer Aided Verification (CAV). 2012.
  564. Laura Bozzelli, César Sánchez.
    Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2012.
  565. Javier Esparza, Pierre Ganty, Rupak Majumdar.
    IEEE Symposium on Logic in Computer Science (LICS). 2012.
  566. Non-Monotonic Self-Adjusting Computation
    Ruy Ley-Wild, Umut A. Acar, Guy Blelloch.
    European Symposium on Programming (ESOP). 2012.
  567. Linearizability with ownership transfer
    Alexey Gotsman, Hongseok Yang.
    International Conference on Concurrency Theory (CONCUR). 2012.
  568. Concurrent library correctness on the TSO memory model
    Sebastian Burckhardt, Alexey Gotsman, Madanlal Musuvathi, Hongseok Yang.
    European Symposium on Programming (ESOP). 2012.
  569. Foundations for Approximation Based Analysis of Stability Properties of Hybrid Systems
    Allerton Conference on Communication, Control, and Computing (Allerton). 2012.
  570. Conformance Testing of Boolean Programs with Multiple Faults
    Pavithra Prabhakar, Mahesh Viswanathan.
    IFIP WG 6.1 International Conference on Formal Techniques for (Networked and) Distributed Systems (FORTE). 2012.
  571. Pre-orders for reasoning about stability
    Pavithra Prabhakar, Geir E. Dullerud, Mahesh Viswanathan.
    International Conference on Hybrid Systems: Computation and Control (HSCC). 2012.
  572. International Symposium on Temporal Representation and Reasoning (TIME). 2012.
  573. International Colloquium on Theoretical Aspects of Computing (ICTAC). 2012.
  574. Alejandro Sánchez, Sriram Sankaranarayanan, César Sánchez, Bor-Yuh Evan Chang.
    Static Analysis Symposium (SAS). 2012.
  575. Show no weakness: sequentially consistent specifications of TSO libraries
    Alexey Gotsman, Madanlal Musuvathi, Hongseok Yang.
    International Symposium on Distributed Computing (DISC). 2012.
  576. Constraint-Based Runtime Prediction of SLA Violations in Service Orchestrations
    International Conference on Service Oriented Computing (ICSOC). December 2011.
  577. A Machine-Checked Framework for Relational Separation Logic
    International Conference on Software Engineering and Formal Methods (SEFM). November 2011.
  578. Verifiable Security of Boneh-Franklin Identity-Based Encryption
    Gilles Barthe, Federico Olmedo, Santiago Zanella Béguelin.
    International Conference on Provable Security (ProvSec). October 2011.
  579. Computer-Aided Security Proofs for the Working Cryptographer
    Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Santiago Zanella Béguelin.
    Advances in Cryptology (CRYPTO). August 2011.
  580. Measuring Pay-per-Install: The Commoditization of Malware Distribution
    Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.
    Usenix Security Symposium (USENIX-Security). August 2011.
  581. CLP Projection for Constraint Handling Rules
    International Conference on Principles and Practice of Declarative Programming (PPDP). July 2011.
  582. Modular Extensions for Modular (Logic) Languages
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). July 2011.
  583. Automated Attribute Inference in Complex Service Workflows Based on Sharing Analysis
    IEEE International Conference on Services Computing (IEEE SCC). July 2011.
  584. Formally Verifying Isolation and Availability in an Idealized Model of Virtualization
    Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna.
    International Symposium on Formal Methods (FM). June 2011.
  585. Relational Verification Using Product Programs
    International Symposium on Formal Methods (FM). June 2011.
  586. A decade of model-driven security
    David A. Basin, Manuel Clavel, Marina Egea.
    ACM Symposium on Access Control Models and Technologies (SACMAT). June 2011.
  587. Applicative Shortcut Fusion
    Germán Andrés Delbianco, Mauro Jaskelioff, Alberto Pardo.
    Symposium on Trends in Functional Programming (TFP). May 2011.
  588. Noah M. Johnson, Juan Caballero, Kevin Chen, Stephen McCamant, Pongsin Poosankam, Daniel Reynaud, Dawn Song.
    IEEE Symposium on Security and Privacy (SP). May 2011.
  589. Beyond Provable Security Verifiable IND-CCA Security of OAEP
    Gilles Barthe, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella Béguelin.
    The Cryptographer’s Track at RSA Conference (CT-RSA). February 2011.
  590. Approximating Petri Net Reachability Along Context-free Traces
    Mohamed Faouzi Atig, Pierre Ganty.
    Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2011.
  591. Complexity Analysis of the Backward Coverability Algorithm for VASS
    Laura Bozzelli, Pierre Ganty.
    Reachability Problems (RP). 2011.
  592. Non-Uniform Distributions in Quantitative Information-Flow
    Michael Backes, Matthias Berg, Boris Köpf.
    ACM Conference on Computer and Communications Security (CCS). 2011.
  593. Static Enforcement of Information Flow Policies for a Concurrent JVM-like Language
    Gilles Barthe, Exequiel Rivas.
    Trustworthy Global Computing (TGC). 2011.
  594. Information-theoretic Bounds for Differentially Private Mechanisms
    IEEE Computer Security Foundations Symposium (CSF). 2011.
  595. Model-Driven Development of Security-Aware GUIs for Data-Centric Applications
    Foundations of Security Analysis and Design (FOSAD). 2011.
  596. Third International Workshop on Principles of Engineering Service-Oriented Systems (PESOS 2011)
    M. Carro, D. Karastoyanova, G. A. Lewis, A. Liu.
    ICSE. 2011.
  597. Precision and the conjunction rule in concurrent separation logic
    Alexey Gotsman, Josh Berdine, Byron Cook.
    Electronic Notes in Theoretical Computer Science (ENTCS). 2011.
  598. Complexity of Pattern-based Verification for Multithreaded Programs
    Javier Esparza, Pierre Ganty.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2011.
  599. How to make ad hoc proof automation less ad hoc
    Georges Gonthier, Beta Ziliani, Aleksandar Nanevski, Derek Dreyer.
    International Conference on Functional Programming (ICFP). 2011.
  600. The Ciao Approach to the Dynamic vs. Static Language Dilemma
    M. V. Hermenegildo, F. Bueno, M. Carro, P. Lopez-Garcia, E. Mera, J.F. Morales, G. Puebla.
    Proc. Int’l. WS on Scripts to Programs, STOP'11. 2011.
  601. Liveness-Preserving Atomicity Abstraction
    Alexey Gotsman, Hongseok Yang.
    International Colloquium on Automata Languages and Programming (ICALP). 2011.
  602. On the Strength of Owicki-Gries for Resources
    Alexander Malkis, Laurent Mauborgne.
    ASIAN Symposium on Programming Languages and Systems (APLAS). 2011.
  603. Verification of Information Flow and Access Control Policies with Dependent Types
    IEEE Symposium on Security and Privacy (SP). 2011.
  604. Profiling for Run-Time Checking of Computational Properties and Performance Debugging in Logic Programs
    Practical Aspects of Declarative Languages (PADL). 2011.
  605. NASA Formal Methods (NFM). 2011.
  606. Modular verification of preemptive OS kernels
    Alexey Gotsman, Hongseok Yang.
    International Conference on Functional Programming (ICFP). 2011.
  607. Partiality, State and Dependent Types
    Kasper Svendsen, Lars Birkedal, Aleksandar Nanevski.
    International Conference on Typed Lambda Calculi and Applications (TLCA). 2011.
  608. Towards Fuzzy Granularity Control in Parallel/Distributed Computing
    T. Trigo, P. Lopez-Garcia, S. Muñoz-Hernandez.
    International Conference on Fuzzy Computation (ICFC 2010). October 2010.
  609. A Framework for Verification and Debugging of Resource Usage Properties: Resource Usage Verification
    International Conference on Logic Programming (ICLP). July 2010.
  610. Automatic Generation of Smart, Security-Aware GUI Models
    D. Basin, M. Clavel, M. Egea, M. Schläpfer.
    Engineering Secure Software and Systems (ESSoS). 2010.
  611. Constraint-Based Abstract Semantics for Temporal Logic: A Direct Approach to Design and Implementation
    Gourinath Banda, John P. Gallagher.
    Logic Programming and Automated Reasoning (LPAR). 2010.
  612. A Machine-Checked Formalization of Sigma-Protocols
    Gilles Barthe, Daniel Hedin, Santiago Zanella Béguelin, Benjamin Gregoire, Sylvain Heraud.
    IEEE Computer Security Foundations Symposium (CSF). 2010.
  613. Programming Language Techniques for Cryptographic Proofs
    Conference on Interactive Theorem Proving (ITP). 2010.
  614. A Functional Framework for Result Checking
    Gilles Barthe, Pablo Buiras, César Kunz.
    International Symposium on Functional and Logic Programming (FLOPS). 2010.
  615. Perspectives in Certificate Translation
    Trustworthy Global Computing (TGC). 2010.
  616. Computational Indistinguishability Logic
    Gilles Barthe, Marion Daubignard, Bruce M. Kapron, Yassine Lakhnech.
    ACM Conference on Computer and Communications Security (CCS). 2010.
  617. Robustness Guarantees for Anonymity
    Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tamara Rezk, Bogdan Warinschi.
    IEEE Computer Security Foundations Symposium (CSF). 2010.
  618. Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions
    David A. Naumann, Anindya Banerjee.
    European Symposium on Programming (ESOP). 2010.
  619. A Practical Generic Privacy Language
    Moritz Y. Becker, Alexander Malkis, Laurent Bussard.
    International Conference on Information Systems Security (ICISS). 2010.
  620. On the Equality of Probabilistic Terms
    Gilles Barthe, Marion Daubignard, Bruce M. Kapron, Yassine Lakhnech, Vincent Laporte.
    Logic Programming and Automated Reasoning (LPAR). 2010.
  621. Thread-Modular Counterexample-Guided Abstraction Refinement
    Alexander Malkis, Andreas Podelski, Andrey Rybalchenko.
    Static Analysis Symposium (SAS). 2010.
  622. Local Reasoning and Dynamic Framing for the Composite Pattern and Its Clients
    Stan Rosenberg, Anindya Banerjee, David A. Naumann.
    Verified Software: Theories (VSTTE). 2010.
  623. SSG: a Model-Based Development Environment for Smart, Security-Aware GUIs
    M. A. García de Dios, C. Dania, M. Schläpfer, D. Basin, M. Clavel, M. Egea.
    International Conference on Software Engineering (ICSE). 2010.
  624. Certificate Translation for the Verification of Concurrent Programs
    Trustworthy Global Computing (TGC). 2010.
  625. Speaker Recognition in Encrypted Voice Streams
    Michael Backes, Goran Doychev, Markus Dürmuth, Boris Köpf.
    European Symposium On Research In Computer Security (ESORICS). 2010.
  626. Krishnendu Chatterjee, Luca de Alfaro, Vishwanath Raman, César Sánchez.
    Fundamental Approaches to Software Engineering (FASE). 2010.
  627. Pierre Ganty, Benjamin Monmege, Rupak Majumdar.
    Computer Aided Verification (CAV). 2010.
  628. Towards Data-Aware QoS-Driven Adaptation for Service Orchestrations
    D. Ivanović, M. Carro, M. V. Hermenegildo.
    IEEE International Conference on Web Services (ICWS). 2010.
  629. Automatic Fragment Identification in Workflows Based on Sharing Analysis
    D. Ivanović, M. Carro, M. V. Hermenegildo.
    International Conference on Service Oriented Computing (ICSOC). 2010.
  630. Approximation and Randomization for Quantitative Information-Flow Analysis
    Boris Köpf, Andrey Rybalchenko.
    IEEE Computer Security Foundations Symposium (CSF). 2010.
  631. Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
    Boris Köpf, Geoffrey Smith.
    IEEE Computer Security Foundations Symposium (CSF). 2010.
  632. Martin Leucker, César Sánchez.
    International Symposium on Temporal Representation and Reasoning (TIME). 2010.
  633. Shape Analysis with Reference Set Relations
    Mark Marron, Rupak Majumdar, Darko Stefanovic, Deepak Kapur.
    International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2010.
  634. Structuring the verification of heap-manipulating programs
    Aleksandar Nanevski, Viktor Vafeiadis, Josh Berdine.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2010.
  635. Program Parallelization using Synchronized Pipelining
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2010.
  636. Traceable data types for self-adjusting computation
    Umut A. Acar, Guy E. Blelloch, Ruy Ley-Wild, Kanat Tangwongsan, Duru Türkoglu.
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2010.
  637. International Conference on Formal Engineering Methods (ICFEM). 2010.
  638. César Sánchez, Martin Leucker.
    International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2010.
  639. A Coding Rule Conformance Checker Integrated into GCC
    G. Marpons, J. Mariño, M. Carro, A. Herranz, L.Å. Fredlund, J.J. Moreno-Navarro, A. Polo.
    Electronic Notes in Theoretical Computer Science (ENTCS). August 2009.
  640. Integrating Software Testing and Run-Time Checking in an Assertion Verification Framework
    International Conference on Logic Programming (ICLP). July 2009.
  641. Merlin: specification inference for explicit information flow problems
    V. Benjamin Livshits, Aditya V. Nori, Sriram K. Rajamani, Anindya Banerjee.
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). June 2009.
  642. Identification of Logically Related Heap Regions
    International Symposium on Memory Management (ISMM). June 2009.
  643. Towards a Complete Scheme for Tabled Execution Based on Program Transformation
    P. Chico de Guzmán, M. Carro, M. V. Hermenegildo.
    Practical Aspects of Declarative Languages (PADL). January 2009.
  644. Constraint-Based Abstraction of a Model Checker for Infinite State Systems
    Gourinath Banda, John P. Gallagher.
    (Constraint) Logic Programming (WLP). 2009.
  645. Formal Certification of Code-Based Cryptographic Proofs
    G. Barthe, B. Grégoire, S. Zanella Béguelin.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2009.
  646. Implementing a Direct Method for Certificate Translation
    Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, César Kunz, Anne Pacalet.
    International Conference on Formal Engineering Methods (ICFEM). 2009.
  647. Unification and Narrowing in Maude 2.4
    M. Clavel, F. Durán, S. Eker, S. Escobar, P. Lincoln, N. Martí-Oliet, J. Meseguer, C. L. Talcott.
    International Conference on Rewriting Techniques and Applications (RTA). 2009.
  648. Non-discriminating Arguments and Their Uses
    Henning Christiansen, John P. Gallagher.
    International Conference on Logic Programming (ICLP). 2009.
  649. A language for information flow: dynamic tracking in multiple interdependent dimensions
    Avraham Shinnar, Marco Pistoia, Anindya Banerjee.
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2009.
  650. Vérification d'invariants pour des systèmes spécifiés en logique de réécriture
    Vlad Rusu, Manuel Clavel.
    Journées francophones des langages applicatifs (JFLA). 2009.
  651. Formally Certifying the Security of Digital Signature Schemes
    S. Zanella Béguelin, B. Grégoire, G. Barthe, F. Olmedo.
    IEEE Symposium on Security and Privacy (SP). 2009.
  652. Pierre Ganty, Rupak Majumdar.
    International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS). 2009.
  653. Pierre Ganty, Rupak Majumdar, Andrey Rybalchenko.
    ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2009.
  654. Pierre Ganty, Nicolas Maquet, Jean-François Raskin.
    International Conference on Implementation and Application of Automata (CIAA). 2009.
  655. A Tabling Implementation Based on Variables with Multiple Bindings
    P. Chico de Guzmán, M. Carro, M. V. Hermenegildo.
    International Conference on Logic Programming (ICLP). 2009.
  656. A Sketch of a Complete Scheme for Tabled Execution Based on Program Transformation
    P. Chico de Guzmán, M. Carro, M. V. Hermenegildo.
    International Conference on Logic Programming (ICLP). December 2008.
  657. A High-Level Implementation of Non-Deterministic, Unrestricted, Independent And-Parallelism
    A. Casas, M. Carro, M. V. Hermenegildo.
    International Conference on Logic Programming (ICLP). December 2008.
  658. Negative Ternary Set-Sharing
    E. Trias, J. Navas, E. S. Ackley, S. Forrest, M. V. Hermenegildo.
    International Conference on Logic Programming (ICLP). December 2008.
  659. E. Mera, P. Lopez-Garcia, M. Carro, M. V. Hermenegildo.
    International Conference on Principles and Practice of Declarative Programming (PPDP). July 2008.
  660. Comparing Tag Scheme Variations Using an Abstract Machine Generator
    J. Morales, M. Carro, M. V. Hermenegildo.
    International Conference on Principles and Practice of Declarative Programming (PPDP). July 2008.
  661. Safe Upper-bounds Inference of Energy Consumption for Java Bytecode Applications
    J. Navas, M. Méndez-Lojo, M. Hermenegildo.
    NASA LFM'08. April 2008.
  662. Efficient Context-Sensitive Shape Analysis with Graph-Based Heap Models
    Mark Marron, Manuel Hermenegildo, Darko Stefanovic, Deepak Kapur.
    International Conference on Compiler Construction (CC). April 2008.
  663. Towards a High-Level Implementation of Execution Primitives for Unrestricted, Independent And-parallelism
    A. Casas, M. Carro, M. V. Hermenegildo.
    Practical Aspects of Declarative Languages (PADL). January 2008.
  664. An Improved Continuation Call-Based Implementation of Tabling
    P. Chico de Guzmán, M. Carro, M. V. Hermenegildo, Claudio Silva, Ricardo Rocha.
    Practical Aspects of Declarative Languages (PADL). January 2008.
  665. Automatic Coding Rule Conformance Checking Using Logic Programming
    G. Marpons, J. Mariño, M. Carro, A. Herranz, J.J. Moreno-Navarro, L.Å. Fredlund.
    Practical Aspects of Declarative Languages (PADL). January 2008.
  666. Precise Set Sharing Analysis for Java-style Programs
    M. Méndez-Lojo, M. Hermenegildo.
    International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). January 2008.
  667. Certificate Translation in Abstract Interpretation
    Gilles Barthe, César Kunz.
    European Symposium on Programming (ESOP). 2008.
  668. Certified Reasoning in Memory Hierarchies
    Gilles Barthe, César Kunz, Jorge Luis Sacchini.
    ASIAN Symposium on Programming Languages and Systems (APLAS). 2008.
  669. Model-Driven Security in Practice: An Industrial Experience
    M. Clavel, V. Silva, C. Braga, M. Egea.
    European Conference on Model Driven Architecture - Foundations and Applications (ECMDA-FA). 2008.
  670. Preservation of Proof Obligations from Java to the Java Virtual Machine
    Gilles Barthe, Benjamin Grégoire, Mariela Pavlova.
    International Conference on Automated Deduction (CADE). 2008.
  671. Tractable Enforcement of Declassification Policies
    Gilles Barthe, Salvador Cavadini, Tamara Rezk.
    IEEE Computer Security Foundations Symposium (CSF). 2008.
  672. Type-Based Termination with Sized Products
    Gilles Barthe, Benjamin Grégoire, Colin Riba.
    Annual Conference on Computer Science Logic (CSL). 2008.
  673. Preservation of Proof Pbligations for Hybrid Verification Methods
    Gilles Barthe, César Kunz, David Pichardie, Julián Samborski-Forlese.
    International Conference on Software Engineering and Formal Methods (SEFM). 2008.

Publications in Refereed Workshops (129)

  1. Vidya Lakshmi Rajagopalan, Georgios Portokalidis.
    Proceedings of the Workshop on Forming an Ecosystem Around Software Transformation (FEAST). October 2024.
  2. International Conference on Logic Programming (ICLP). October 2024.
  3. Proceedings of the 2024 Workshop on AI For Systems. 2024.
  4. Proceedings of the 4th Workshop on Machine Learning and Systems. 2024.
  5. Proceedings of the 4th Workshop on Machine Learning and Systems. 2024.
  6. Manuel Bravo, Gregory Chockler, Alexey Gotsman, Alejandro Naser-Pastoriza, Christian Roldán.
    Workshop on Distributed Algorithms (WDAG). 2024.
  7. Daniel Dominguez Alvarez, Alejandro de la Cruz, Alessandra Gorla, Juan Caballero.
    International Workshop on Fast Software Encryption (FSE). December 2023.
  8. Towards a rule-based approach for deriving abstract domains
    Technical Communications of the 39th International Conference on Logic Programming (ICLP 2023). July 2023.
  9. D. Ferreiro, J.F. Morales, S. Abreu, M.V. Hermenegildo.
    Computing Research Repository (CoRR). July 2023.
  10. M. Klemen, M.Á. Carreira-Perpiñán, P. Lopez-Garcia.
    Computing Research Repository (CoRR). July 2023.
  11. Proceedings of the 3rd Workshop on Machine Learning and Systems. 2023.
  12. Aniketh Girish, Vijay Prakash, Serge Egelman, Joel Reardon, Juan Tapiador, Danny Yuxing Huang, Srdjan Matic, Narseo Vallina-Rodriguez.
    ACM International Conference on Emerging Networking Experiments and Technologies Student Workshop (CoNEXT-SW). December 2022.
  13. A SAT-based Efficient Method for the Synthesis from numerical LTL spefications
    Jornadas de PROgramación y LEnguajes (PROLE) 2022. September 2022.
  14. Reactive Synthesis of LTL specifications with Rich Theories
    11th Workshop in Synthesis. August 2022.
  15. An s(CASP) In-Browser Playground based on Ciao Prolog
    International Conference on Logic Programming (ICLP). August 2022.
  16. Jornadas Nacionales de Investigación en Ciberseguridad (JNIC). June 2022.
  17. Philipp Hoenisch, Subhra Mazumdar, Pedro Moreno-Sanchez, Sushmita Ruj.
    Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers. 2022.
  18. Analysis and Improvements of the Sender Keys Protocol for Group Messaging
    David Balbás, Daniel Collins, Phillip Gajland.
    Reunión española sobre criptología y seguridad de la información (RECSI). 2022.
  19. 6th Workshop on Formal Integrated Development Environment (F-IDE 2021, part of NASA NFM'21). May 2021.
  20. Workshop on Horn Clauses for Verification and Synthesis (HCVS 2021). March 2021.
  21. International Conference on Logic Programming (ICLP). 2021.
  22. Jan Wielemaker, Joaquín Arias, Gopal Gupta.
    International Conference on Logic Programming (ICLP). 2021.
  23. An application of KLEE to aerospace industrial software
    XX Jornadas de Programación y Lenguajes (PROLE 2021). 2021.
  24. Testing Your (Static Analysis) Truths
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2020.
  25. Joaquín Arias, Manuel Carro, Zhuo Chen, Gopal Gupta.
    Computing Research Repository (CoRR). 2020.
  26. Making Byzantine Consensus Live
    Manuel Bravo, Gregory Chockler, Alexey Gotsman.
    Workshop on Distributed Algorithms (WDAG). 2020.
  27. International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). November 2019.
  28. International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). November 2019.
  29. An Integrated Approach to Assertion-Based Random Testing in Prolog
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). November 2019.
  30. 10th Workshop on Tools for Automatic Program Analysis (TAPAS'19). October 2019.
  31. Incremental Analysis of Logic Programs with Assertions and Open Predicates
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). October 2019.
  32. Technical Communications of the 35th International Conference on Logic Programming (ICLP 2019). September 2019.
  33. Modeling and Reasoning in Event Calculus Using Goal-Directed Constraint Answer Set Programming
    J. Arias, Z. Chen, M. Carro, G. Gupta.
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2019.
  34. Technical Communications of the 35th International Conference on Logic Programming (ICLP 2019). September 2019.
  35. Joaquín Arias, Manuel Carro, Zhuo Chen, Gopal Gupta.
    Datalog (Datalog). June 2019.
  36. Claudio Ferretti, Alberto Leporati, Luca Mariot, Luca Nizzardo.
    Italian Conference on Cybersecurity (ITASEC). 2019.
  37. Arianna Blasi, Mauro Pezzè, Alessandra Gorla, Michael D. Ernst.
    International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ). 2019.
  38. Daniel Domínguez-Álvarez, Alessandra Gorla.
    International Workshop on App Market Analytics (WAMA). 2019.
  39. Specialize in Moderation - Building Application-aware Storage Services using FPGAs in the Datacenter
    Hot Topics in Storage and File Systems (HotStorage). 2019.
  40. 25 Years of Ciao (abstract of invited tutorial)
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2018.
  41. Multivariant Assertion-based Guidance in Abstract Interpretation
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2018.
  42. Knowledge Problems in Equational Extensions of Subterm Convergent Theories
    Serdar Erbatur, Andrew M. Marshall, Christophe Ringeissen.
    32nd International Workshop on Unification. July 2018.
  43. A General Framework for Static Profiling of Parametric Resource Usage (extended abstract)
    19th International Workshop on Logic and Computational Complexity (LCC 2018). July 2018.
  44. Towards Incremental and Modular Context-sensitive Analysis
    International Conference on Logic Programming (ICLP). July 2018.
  45. Towards Static Performance Guarantees for Programs with Run-time Checks
    International Conference on Logic Programming (ICLP). July 2018.
  46. Zsolt István, Alessandro Sorniotti, Marko Vukolić.
    ACM/IFIP/USENIX International Middleware Conference (Middleware). 2018.
  47. Niccolò Marastoni, Roberto Giacobazzi, Mila Dalla Preda.
    Automated Software Engineering Conference (ASE). 2018.
  48. A certified reference validation mechanism for the permission model of Android
    Gustavo Betarte, Juan Diego Campo, Felipe Gorostiaga, Carlos Luna.
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). October 2017.
  49. International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). October 2017.
  50. Towards a Semantics-Aware Code Transformation Toolchain for Heterogeneous Systems
    Salvador Tamarit, Julio Mariño, Guillermo Vigueras, Manuel Carro.
    Proceedings of XIV Jornadas sobre Programación y Lenguajes (PROLE 2016). September 2017.
  51. An Analysis of Pay-per-Install Economics Using Entity Graphs
    Workshop on the Economics of Information Security (WEIS). June 2017.
  52. Damien Imbs, Achour Mostéfaoui, Matthieu Perrin, Michel Raynal.
    Workshop on Distributed Algorithms (WDAG). 2017.
  53. Simon Oya, Carmela Troncoso, Fernando Pérez-González.
    Workshop on Privacy in the Electronic Society (WPES). 2017.
  54. Logic Programming Doctoral Consortium (DC-ICLP). 2017.
  55. International Conference on Logic Programming (ICLP). 2017.
  56. Vitalii Avdiienko, Konstantin Kuznetsov, Paolo Calciati, Juan Carlos Caiza Román, Alessandra Gorla, Andreas Zeller.
    International Workshop on App Market Analytics (WAMA). November 2016.
  57. Konstantin Kuznetsov, Vitalii Avdiienko, Alessandra Gorla, Andreas Zeller.
    International Workshop on App Market Analytics (WAMA). November 2016.
  58. Tabled CLP for Reasoning over Stream Data
    Logic Programming Doctoral Consortium (DC-ICLP). October 2016.
  59. Program Transformations in the POLCA Project
    Jan Kuper, Lutz Schubert, Kilian Kempf, Colin Glas, Daniel Rubio Bonilla, Manuel Carro.
    Design, Automation and Test in Europe Conference (DATE). March 2016.
  60. Salvador Tamarit, Julio Mariño, Guillermo Vigueras, Manuel Carro.
    Proceedings of the First International Workshop on Program Transformation for Programmability in Heterogeneous Architectures (PROHA 2016). March 2016.
  61. Guillermo Vigueras, Manuel Carro, Salvador Tamarit, Julio Mariño.
    Computing Research Repository (CoRR). March 2016.
  62. Bishoksan Kafle, John P. Gallagher.
    Computing Research Repository (CoRR). 2016.
  63. Bishoksan Kafle, John P. Gallagher, Pierre Ganty.
    Workshop on Horn Clauses for Verification and Synthesis (HCVS). 2016.
  64. TASP: Towards Anonymity Sets that Persist
    J. Hayes, C. Troncoso, G. Danezis.
    Workshop on Privacy in the Electronic Society (WPES). 2016.
  65. Workshop on High Performance Energy Efficient Embedded Systems (HIP3ES). 2016.
  66. Mahsa Najafzadeh, Alexey Gotsman, Hongseok Yang, Carla Ferreira, Marc Shapiro.
    Eurosys Conference (EuroSys). 2016.
  67. Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
    José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir.
    International Workshop on Fast Software Encryption (FSE). 2016.
  68. Irfan Ul Haq, Juan Caballero, Michael D. Ernst.
    International Workshop on Dynamic Analysis (WODA). October 2015.
  69. Energy Analysis and Verification by Translation to Horn Clauses and Abstract Interpretation
    Workshop on Horn Clauses for Verification and Synthesis (HCVS). July 2015.
  70. International Conference on Logic Programming (ICLP). 2015.
  71. Bishoksan Kafle, John P. Gallagher, Pierre Ganty.
    International Workshop on Verification and Program Transformation (VPT). 2015.
  72. Bishoksan Kafle, John P. Gallagher.
    ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). 2015.
  73. An Algorithmic Approach to Stability Verification of Hybrid Systems: A Summary
    Computer Aided Verification (CAV). 2015.
  74. Workshop on High Performance Energy Efficient Embedded Systems (HIP3ES). 2015.
  75. Álvaro García-Pérez, Pablo Nogueira.
    September 2014.
  76. Pre-Indexed Terms for Prolog
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2014.
  77. International Conference on Logic Programming (ICLP). July 2014.
  78. Towards Pre-Indexed Terms
    14th International Colloquium on Implementation of Constraint and LOgic Programming Systems (CICLOPS-WLPE 2014). July 2014.
  79. Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES). 2014.
  80. ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). 2014.
  81. Bishoksan Kafle, John P. Gallagher.
    Computing Research Repository (CoRR). 2014.
  82. Towards an EasyCrypt Formalization of Garbling Schemes
    José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Guillaume Davy, François Dupressoir, Benjamin Grégoire, Pierre-Yves Strub.
    The Workshop on Language Support for Privacy-Enhancing Technology (PETShop). November 2013.
  83. September 2013.
  84. Energy Consumption Analysis of Programs based on XMOS ISA-Level Models
    U. Liqat, S. Kerrison, A. Serrano, K. Georgiou, P. Lopez-Garcia, N. Grech, M. V. Hermenegildo, K. Eder.
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2013.
  85. Implementing Constraint Handling Rules as a Domain-Specific Language Embedded in Java
    Proceedings of the 23rd Workshop on Logic-based methods in Programming Environments (WLPE 2013). August 2013.
  86. 23rd Workshop on Logic-based Methods in Programming Environments (WLPE 2013). August 2013.
  87. Towards QoS Prediction Based on Composition Structure Analysis and Probabilistic Environment Models
    International Conference on Software Engineering (ICSE). May 2013.
  88. Álvaro García-Pérez, Pablo Nogueira.
    ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). 2013.
  89. Fixing idioms: a recursion primitive for applicative DSLs
    Dominique Devriese, Ilya Sergey, Dave Clarke, Frank Piessens.
    ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). 2013.
  90. Acceleration of Communication-Aware Task Mapping Techniques through GPU Computing
    Javier Reyes, Juan M. Orduña, Guillermo Vigueras, Rafael Tornero.
    International Conference on Advanced Information Networking and Applications (AINA). 2013.
  91. Bounded Model Checking for Regular Linear Temporal Logic (extended abstract)
    Proceedings of the 24th Nordic Workshop on Programming Theory (NWPT'12). October 2012.
  92. Álvaro García-Pérez, Pablo Nogueira.
    September 2012.
  93. The Ciao CLP(FD) Library: A Modular CLP Extension for Prolog
    E.J. Gallego-Arias, R. Haemmerlé, M. V. Hermenegildo, J.F. Morales.
    12th International Colloquium on Implementation of Constraint and LOgic Programming Systems (CICLOPS 2012). September 2012.
  94. Reversible Language Extensions and their Application in Debugging
    12th International Colloquium on Implementation of Constraint and LOgic Programming Systems (CICLOPS 2012). September 2012.
  95. Proving Computational Security with a General-Purpose C Verifier
    François Dupressoir, Cédric Fournet, Andrew D. Gordon.
    Workshops on Formal and Computational Cryptography (FCC) and Analysis of Security APIs (ASA). July 2012.
  96. Analyzing Service-Oriented Systems Using Their Data and Structure
    International Conference on Software Engineering (ICSE). July 2012.
  97. Research Challenges on Service Technology Foundations
    D. Karastoyanova, Z. Nemeth, M. Carro, D. Ivanovic, C. Pautasso, C. Di Napoli, M. Giordano.
    International Conference on Software Engineering (ICSE). July 2012.
  98. Exploring the Impact of Inaccuracy and Imprecision of QoS Assumptions on Proactive Constraint-Based QoS Prediction for Service Orchestrations
    International Conference on Software Engineering (ICSE). June 2012.
  99. Modeling Social Networking Privacy
    ESSoS-DS 2012. Doctoral Symposium. 2012.
  100. A General Implementation Framework for Tabled CLP
    Jornadas sobre Programación y Lenguajes (PROLE). 2012.
  101. Constraint-Based Runtime Prediction of SLA Violations in Service Orchestrations
    Jornadas sobre Programación y Lenguajes (PROLE). 2012.
  102. Lightweight compilation of (C)LP to JavaScript
    Jornadas sobre Programación y Lenguajes (PROLE). 2012.
  103. Behavior Based Service Composition
    Fangzhe Chang, Pavithra Prabhakar, Ramesh Viswanathan.
    Web Services and Formal Methods - 8th International Workshop, WS-FM 2011, Clermont-Ferrand, France, September 1-2, 2011, Revised Selected Papers. 2012.
  104. Álvaro García-Pérez, Pablo Nogueira.
    September 2011.
  105. F. Bueno, M. García de la Banda, M. V. Hermenegildo, P. Lopez-Garcia, E. Mera, P. J. Stuckey.
    MiniZinc Workshop (MZN'11). September 2011.
  106. Interval-based Resource Usage Verification: Formalization and Prototype
    International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA). May 2011.
  107. The Ciao Approach to the Dynamic vs. Static Language Dilemma
    M. V. Hermenegildo, F. Bueno, M. Carro, P. Lopez-Garcia, E. Mera, J.F. Morales, G. Puebla.
    Proceedings for the International Workshop on Scripts to Programs (STOP'11). 2011.
  108. September 2010.
  109. An Initial Proposal for Data-Aware Resource Analysis of Orchestrations with Applications to Predictive Monitoring
    D. Ivanović, M. Carro, M. V. Hermenegildo.
    International Workshops, ICSOC/ServiceWave 2009, Revised Selected Papers. September 2010.
  110. Álvaro García-Pérez, Pablo Nogueira, Emilio Jesús Gallego Arias.
    Proceedings of the 1st International Workshop on Strategies in Rewriting, Proving, and Programming (IWS'10). July 2010.
  111. MySQL4OCL: A Stored Procedure-Based MySQL Code Generator for OCL
    Proceedings of the Workshop on OCL and Textual Modelling (OCL 2010). 2010.
  112. Modeling Concurrent Systems with Shared Resources
    A. Herranz, J. Mariño, M. Carro, J.J. Moreno-Navarro.
    Int. Workshop on Formal Methods for Industrial Critical Systems (FMICS). November 2009.
  113. An Initial Proposal for Data-Aware Resource Analysis of Orchestrations with Applications to Proactive Monitoring
    D. Ivanović, M. Carro, M. V. Hermenegildo.
    Pre-proceedings of the 2nd Workshop on Monitoring, Adaptation and Beyond (MONA+). November 2009.
  114. Program Parallelization using Synchronized Pipelining
    International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2009.
  115. Towards Structured State Threading in Prolog
    D. Ivanović, J.F. Morales, M. Carro, M. V. Hermenegildo.
    CICLOPS 2009. July 2009.
  116. J. Navas, M. Méndez-Lojo, M. V. Hermenegildo.
    Electronic Notes in Theoretical Computer Science – Proceedings of the Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE'09). March 2009.
  117. Checking Unsatisfiability for OCL Constraints
    Proceedings of the Workshop The Pragmatics of OCL and Other Textual Specification Languages at MoDELS 2009. 2009.
  118. A Program Transformation for Continuation Call-Based Tabled Execution
    P. Chico de Guzmán, M. Carro, M. V. Hermenegildo.
    Colloquium on Implementation of Constraint and LOgic Programming Systems (ICLP associated workshop). December 2008.
  119. Sharing Analysis of Arrays, Collections, and Recursive Structures
    Mark Marron, Mario Méndez-Lojo, Manuel Hermenegildo, Darko Stefanovic, Deepak Kapur.
    Workshop on Program Analysis For Software Tools and Engineering (PASTE). November 2008.
  120. A Coding Rule Conformance Checker Integrated into GCC
    G. Marpons, J. Mariño, M. Carro, A. Herranz, L.Å. Fredlund, J.J. Moreno-Navarro, A. Polo.
    Electronic Notes in Theoretical Computer Science (ENTCS). October 2008.
  121. Modelling Mash-Up Resources
    Iván Pérez, Ángel Herranz, Susana Muñoz, Juan José Moreno-Navarro.
    Jornadas de Ingeniería del Software y Bases de Datos (JISBD). October 2008.
  122. Pablo Nogueira, Juan José Moreno-Navarro.
    ACM SIGPLAN Workshop on Generic Programming (WGP) (WGP). September 2008.
  123. Identification of Heap-Carried Data Dependence Via Explicit Store Heap Models
    Mark Marron, Darko Stefanovic, Deepak Kapur, Manuel Hermenegildo.
    International Workshop on Languages and Compilers for Parallel Computing (LCPC). August 2008.
  124. Efficient Set Sharing using ZBDDs
    M. Méndez-Lojo, O. Lhoták, M. V. Hermenegildo.
    International Workshop on Languages and Compilers for Parallel Computing (LCPC). August 2008.
  125. Two Efficient Representations for Set-Sharing Analysis in Logic Programs
    E. Trias, J. Navas, E. S. Ackley, S. Forrest, M. V. Hermenegildo.
    17th International Workshop on Functional and (Constraint) Logic Programming, WFLP'08. July 2008.
  126. Safe Upper-bounds Inference of Energy Consumption for Java Bytecode Applications
    J. Navas, M. Méndez-Lojo, M. Hermenegildo.
    The Sixth NASA Langley Formal Methods Workshop (LFM 08). April 2008.
  127. A Practical Type Analysis for Verification of Modular Prolog Programs
    P. Pietrzak, J. Correas, G. Puebla, M. V. Hermenegildo.
    ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). January 2008.
  128. Certificate Translation for Specification-Preserving Advices
    Gilles Barthe, César Kunz.
    Workshop on Foundations of Aspect-Oriented Languages (FOAL). 2008.
  129. ECEASST Building an Efficient Component for OCL Evaluation
    M. Clavel, M. Egea, M. A. García de Dios.
    Proceedings of the 8th International Workshop on OCL Concepts and Tools (OCL 2008) at MoDELS 2008. 2008.

Ph.D. Theses (51)

  1. ARCHITECH:Advanced Research of Cryptographic Techniques to build efficient blockchains with privacy and security
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Dario Fiore. September 2022.
  2. Theory and Practice of Stream Runtime Verification for Sequences and Real-Time Event Based Systems
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Cesar Sanchez. May 2022.
  3. A Scalable Static Analysis Framework for Reliable Program Development Exploiting Incrementality and Modularity
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Hermenegildo, Jose Francisco Morales. July 2021.
  4. Relational logics for higher-order effectful programs
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Gilles Barthe. November 2020.
  5. A General Framework for Static Resource Analysis and Profiling of (Parallel) Programs and an Application to Runtime Checking
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pedro Lopez-Garcia. November 2020.
  6. On the Interaction Between Linear Codes, Secret Sharing, and Multiparty Computation
    Jaron Skovsted Gundersen.
    PhD Thesis. Aalborg University (Denmark). Supervisors: Ignacio Cascudo, Diego Ruano, Horia Cornean, Olav Geil. October 2020.
  7. On the Use of Quasiorders in Formal Language Theory
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pierre Ganty. July 2020.
  8. New Perspectives on Classical Automata Constructions
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pierre Ganty. June 2020.
  9. Learning secrets and models from execution time
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Boris Koepf. June 2020.
  10. Advanced Evaluation Techniques for (Non)-Monotonic Reasoning Using Rules with Constraints
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro. December 2019.
  11. A Model Driven Methodology for the Construction of Reliable Concurrent Software
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Julio Mariño Carballo. November 2019.
  12. Lineage Inference of Packed Malware using Binary Code Similarity
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero. September 2019.
  13. Understanding the Evolution of Android Applications
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla. September 2019.
  14. A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero. May 2019.
  15. A tale of SNARKs: quantum resilience, knowledge extractability and data privacy
    Anca Nitulescu.
    PhD Thesis. Ecole Normale Superieure (France). Supervisors: David Pointcheval, Dario Fiore, Michel Abdalla. April 2019.
  16. On the Security of Cache Algorithms
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Boris Koepf. March 2019.
  17. Tools for the Detection and Analysis of Potentially Unwanted Programs
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero. November 2018.
  18. Be More and Be Merry: Enhancing Data and User Authentication in Collaborative Settings
    Elena Pagnin.
    PhD Thesis. Chalmers University of Technology (Sweden). Supervisors: Andrei Sabelfeld, Dario Fiore. September 2018.
  19. Automated Analysis of Cryptographic Constructions
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Gilles Barthe. September 2018.
  20. Proving Consistency of Concurrent Data Structures and Transactional Memory Systems
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alexey Gotsman. July 2018.
  21. A Multi-Language and Multi-Platform Framework for Resource Consumption Analysis and its Application to Energy-Efficient Software Development
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pedro Lopez. July 2018.
  22. Improving Run-time Checking in Dynamic Programming Languages
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Jose Francisco Morales, Manuel Hermenegildo. April 2018.
  23. Cryptographic Techniques for the Security of Cloud and Blockchain Systems
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Dario Fiore. March 2018.
  24. An Algorithmic Approach for Stability Verification of Hybrid Systems
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pravithra Prabhakar. August 2017.
  25. Hoare-style Reasoning with Higher-order Control: Continuations and Concurrency
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Aleks Nanevski. July 2017.
  26. Mapping OCL as a Query and Constraint Language
    PhD Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Manuel Clavel, Marina Egea. June 2017.
  27. Detecting, Diagnosing and Fixing Energy Issues for Mobile Applications
    Xueliang Li.
    PhD Thesis. Roskilde University (Roskilde U.). Supervisors: John Gallagher. June 2017.
  28. Active Techniques for Revealing and Analyzing the Security of Hidden Servers
    PhD Thesis. Universitá degli Studi de Milano (UNIMI). Supervisors: Danilo Bruschi, Juan Caballero. February 2017.
  29. Components for Automatic Horn Clause Verification
    Bishoksan Kafle.
    PhD Thesis. Roskilde University (Roskilde U.). Supervisors: John Gallagher. June 2016.
  30. Tools for the Evaluation and Choice of Countermeasures against Side-channel Attacks
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Boris Koepf. May 2016.
  31. Automation and Modularity of Cryptographic Proofs in the Computational Model
    Juan Manuel Crespo.
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Gilles Barthe. May 2016.
  32. Defending Against Cybercrime: Advances in the Detection of Malicious Servers and the Analysis of Client-Side Vulnerabilities
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero. February 2016.
  33. Formally Verified Countermeasures Against Cache Based Attacks in Virtualization Platforms
    Juan Campo.
    PhD Thesis. Universidad de la República (UDELAR). Supervisors: Gilles Barthe, Gustavo Betarte. October 2015.
  34. Formal Verification of Temporal Properties for Parametrized Concurrent Programs and Concurrent Data Structures
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Cesar Sanchez. September 2015.
  35. Model-driven Development of Secure Data-Management Applications
    PhD Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Manuel Clavel. April 2015.
  36. A Formalization of Elliptic Curves for Cryptography
    Evmorfia-Iro Bartzia.
    PhD Thesis. Université Paris-Saclay (Universite Paris-Saclay). Supervisors: M. Karthikeyan Bhargavan, Pierre-Yves Strub. February 2015.
  37. Operational Aspects of Full-Reduction in Lambda Calculi
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Jose Moreno, Pablo Nogueira. September 2014.
  38. Approximate Relational Reasoning for Probabilistic Programs
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Gilles Barthe. January 2014.
  39. Tableau-Based Decision Procedures for Epistemic and Temporal Epistemic Logics
    Mai Ajspur.
    PhD Thesis. Roskilde University (Roskilde U.). Supervisors: John Gallagher. October 2013.
  40. Analysis of Service-Oriented Computing Systems
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro. January 2013.
  41. Advanced Evaluation Strategies for Tabling and Parallelism in Logic Programs
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro, Manuel Hermenegildo. November 2012.
  42. Formal Certification of Game-Based Cryptographic Proofs
    PhD Thesis. École Nationale Supérieure des Mines de Paris (Mines ParisTech). Supervisors: Gilles Barthe. December 2010.
  43. A Unified Framework for Resource and Execution Time Analysis, Run-Time Checking and Unit-Testing
    Edison Fernando Mera Menéndez.
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pedro Lopez. November 2010.
  44. Modelling and Analysis of Real Time Systems with Logic Programming and Constraints
    Gourinath Banda.
    PhD Thesis. Roskilde University (Roskilde U.). Supervisors: John Gallagher. August 2010.
  45. Advanced Compilation Techniques for Logic Programming
    PhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro, Manuel Hermenegildo. July 2010.
  46. Técnicas Avanzadas de Compilación para Programación Lógica
    PhD Thesis. Universidad Politécnica de Madrid (UPM). July 2010.
  47. Certificate Translation alongside Program Transformations
    PhD Thesis. École Nationale Supérieure des Mines de Paris (Mines ParisTech). Supervisors: Gilles Barthe. February 2009.
  48. Automatic Unrestricted Independent And-Parallelism in Declarative Multiparadigm Languages
    Amadeo Casas.
    PhD Thesis. The University of New Mexico (UNM). Supervisors: Manuel Hermenegildo, Manuel Carro. December 2008.
  49. Analysis and Inference of Resource Usage Information
    Jorge A. Navas Laserna.
    PhD Thesis. The University of New Mexico (UNM). Supervisors: Manuel Hermenegildo. December 2008.
  50. A Generic Approach to Bytecode Analysis
    Mario Méndez-Lojo.
    PhD Thesis. The University of New Mexico (UNM). Supervisors: Manuel Hermenegildo. December 2008.
  51. Una Semántica Formal Ejecutable para OCL con Aplicaciones al Análisis y a la Validación de Modelos
    Marina Egea González.
    PhD Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Manuel Clavel. June 2008.

Master's Theses (59)

  1. In-depth analysis of the Android supply chain:Vendor customizations on critical networking components
    Rathnayaka Mudiyanselage Vinuri Gayanthika Bandara.
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Srdjan Matic, Narseo Vallina-Rodriguez. July 2023.
  2. Covre: Implementation of Code Coverage in a Black-Box CPU Fuzzer for Speculative Leakage Study
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Marco Guarnieri, Jorge Blasco Arias. June 2023.
  3. Analysis of the Impact of the Collateral Funds in Payment Channel Networks
    MSc Thesis. University of Zagreb (UniZG). Supervisors: Pedro Moreno-Sanchez, Marina Bagic Babac. July 2022.
  4. Hunting for New Threats in a Feed of Malicious Samples
    MSc Thesis. Universidad de Alcalá (UAH). Supervisors: Juan Caballero, Javier Junquera Sánchez. July 2022.
  5. Forecasting Cloud Resource Utilization Using Machine Learning and Computer Vision
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Thaleia Dimitra Doudali. June 2022.
  6. Hadesius: Una soluzione per il controllo e il monitoraggio del perimetro cibernetico nazionale
    Andrea Colato.
    MSc Thesis. Universita degli Studi di Milano (UNIMI). Supervisors: Stelvio Cimato, Dario Fiore. October 2021.
  7. Empirical Analysis of Trace-ability in the Lightning Network
    MSc Thesis. Sapienza University of Rome (Sapienza). Supervisors: Pedro Moreno-Sanchez, Angelo Spognardi. October 2021.
  8. The Temporal Booleanization Theorem: realizability checking over numerical-LTL industrial requirements
    MSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Cesar Sanchez. September 2021.
  9. Analysis of Proof of Assets for Different Cryptocurrencies
    MSc Thesis. Universidad Complutense Madrid (UCM). Supervisors: Ignacio Cascudo, Pedro Moreno-Sanchez, Ignacio Luengo Velasco. September 2021.
  10. An Integrated Approach to Assertion-Based Random Testing in Logic Languages
    MSc Thesis. Universidad Politécnica de Madrid, ETSIInf. July 2021.
  11. Improvements to Parametric Cost Analysis and its Application to Smart Contracts
    MSc Thesis. Universidad Politécnica de Madrid, ETSIInf. July 2021.
  12. Adaptor Signature Based Atomic Swaps Between Bitcoin and a Mimblewimble Based Cryptocurrency
    Jakob Abfalter.
    MSc Thesis. Technical University of Vienna (TUW). Supervisors: Pedro Moreno-Sanchez, Matteo Maffei. June 2021.
  13. Auxiliary Oracle IOP and secure, fast reductions of R1CS over binary field.
    MSc Thesis. Università degli Studi di Catania (UNICT). Supervisors: Dario Catalano, Ignacio Cascudo, Dario Catalano. September 2020.
  14. Simulation-based Inclusion Checking Algorithms for ω-Languages
    Francesco Parolini.
    MSc Thesis. Università degli Studi di Padova (U. Padua). Supervisors: Francesco Ranzato, Pierre Ganty, Francesco Ranzato. July 2020.
  15. Threshold decryption protocols for (replayable) chosen ciphertext secure public key encryption
    MSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Dario Fiore, Antonio Faonio. September 2019.
  16. Homomorphic Signatures over Lattices
    MSc Thesis. Universita degli Studi di Genova (UNIGE). Supervisors: Dario Fiore, Giovanni Lagorio. September 2019.
  17. Automatic Detection of Outdated Comments in Open-Source Java Projects
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Ana Moreno, Barbara Russo. July 2019.
  18. A Proposal of Automatic Quality Evaluator for GIT Commit Messages
    Harry Alberto Carpio Salvatierra.
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Sira Vegas. July 2019.
  19. An Automated Analysis of the What's New Descriptions of Android Apps
    Daniel Toniuc.
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Antti Siirtola, Julio Mariño. June 2019.
  20. A Framework for Testing Web Applications for Cross-Origin State Inference (COSI) Attacks
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Avinash Sudhodanan, Juan Caballero, Manuel Carro. June 2019.
  21. Checking Android Applications Behaviour against Google Play Descriptions at Scale
    Daniel Domínguez Álvarez.
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Julio Mariño Carballo. January 2019.
  22. Sistemas criptográficos de voto electrónico basados en mix-servers y proceso de implementación
    Mario V. García Roqué.
    MSc Thesis. Universidad Carlos III de Madrid (UC3M). Supervisors: Dario Fiore, Antonio Faonio, Juan Manuel Estevez Tapiador. September 2018.
  23. Towards a Stream-Based Monitoring Language for Asynchronous Systems
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Cesar Sanchez, Lars-Ake Fredlund. July 2018.
  24. Detecting and Classifying Malicious TLS Network Traffic using Machine Learning
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. July 2018.
  25. Decentralised Stream Runtime Verification
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Cesar Sanchez, Clara Benac Earle. July 2018.
  26. Microarchitecture Simulation for Security
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Boris Koepf, Clara Benac. July 2018.
  27. Security of Cache Replacement Policies under Side-Channel Attacks
    MSc Thesis. Technical University Berlin (TU Berlin). Supervisors: Boris Koepf, Martin Skutella. March 2018.
  28. Using Semantic Similarity Analysis of Javadoc Comments to Automatically Generate Test Oracles
    MSc Thesis. Universitá degli Studi di Milano Bicocca (UNIMIB). Supervisors: Alessandra Gorla, Mauro Pezze. October 2017.
  29. Study on Privacy of Parental Control Mobile Applications
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Carmela Troncoso, Manuel Carro. July 2017.
  30. ClaimChain: Decentralized Public Key Infrastructure
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Carmela Troncoso, Manuel Carro. July 2017.
  31. Enhancing Online Banking Authentication Using Keystroke Dynamics
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. July 2017.
  32. Code Search: A Semantic, Abstract-Interpretation Based Approach
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Jose Francisco Morales, Manuel Hermenegildo, Manuel Hermenegildo. April 2017.
  33. On Fully Homomorphic Encryption from the Learning with Errors Problem
    MSc Thesis. Universitá degli Studi di Milano Bicocca (UNIMIB). Supervisors: Dario Fiore, Luca Nizzardo, Francesca Dalla Volta. March 2017.
  34. An Asynchronous Evaluation Engine for Stream Based Specifications
    MSc Thesis. Universität zu Lübeck (Luebeck University). Supervisors: Cesar Sanchez, Martin Leucker. November 2016.
  35. Code Search: A Semantic, Abstract Interpretation-Based Approach
    MSc Thesis. Technical University of Madrid, School of Computer Science. July 2016.
  36. Privacy Implications of Open Data
    Hasser Veramendi Salazar.
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Carmela Troncoso. July 2016.
  37. Implementing a Term Rewriting Engine for the EasyCrypt Framework
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pierre-Yves Strub, Manuel Carro. July 2015.
  38. Design and Implementation of a Modular Interface to integrate CLP and Tabled Execution
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro. July 2015.
  39. Improved Static Analysis and Verification of Energy Consumption and Other Resources via Abstract Interpretation
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pedro Lopez, Manuel Carro. July 2015.
  40. A Framework for Implementing Outsourcing Schemes
    Rosario Sebastiano Russo.
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Dario Fiore, Manuel Carro. July 2015.
  41. Testing of Android Testing Tools: Development of a Benchmark for the Evaluation
    Tahir Javaid.
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Ricardo Imbert. July 2015.
  42. Concurrent Library Abstraction Without Information Hiding
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alexey Gotsman, Manuel Carro. July 2014.
  43. An Empirical Study of Techniques to Detect Reverse Proxies and Load Balancers in HTTP Traffic
    Irfan Khan Tanoli.
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Ricardo Imbert. June 2014.
  44. Análisis de Características Estáticas de Ficheros Ejecutables para la Clasificación de Malware
    Richard Rivera Guevara.
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero. June 2014.
  45. Relational Domains for the Quantification of Cache Side Channels
    MSc Thesis. Saarland University (Saarland University). Supervisors: Boris Koepf, Jan Reineke. September 2013.
  46. Dynamic Checking of Assertions for Higher-order Predicates
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Jose Francisco Morales, Manuel Hermenegildo, Manuel Hermenegildo. July 2013.
  47. Integrated Versioning and Collaboration Process Management of Automotive Production Lines Based on an Artifact-Centric Collaboration Environment
    Olena Kutsenko.
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Michael Unterkalmsteiner, Manuel Carro. October 2012.
  48. Probabilistic Analysis of Quality of Service
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Stefanie Betz, Manuel Carro. October 2012.
  49. Developing Secure Business Applications From Secure BPMN Models
    MSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Manuel Clavel. September 2012.
  50. Sistema de Soporte a la Decisión de Programas de Intercambio
    Manuel José Llamas Rodríguez.
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro. September 2012.
  51. Typegrapher: Inferring the Type Graph of a Binary Program
    MSc Thesis. Universidad Nacional de Rosario (UNR). Supervisors: Juan Caballero. August 2012.
  52. Diseño de un Configurador de Productos
    Santiago Alfaro Tornero.
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro. July 2012.
  53. Valuation: Developer Support for By-References to By-Value Type Conversion
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Mark Marron, Manuel Carro. July 2012.
  54. Analysis and Mitigation of Information Leaks in Web Browsing Traffic
    MSc Thesis. Saarland University (Saarland University). Supervisors: Boris Koepf, Michael Backes. June 2012.
  55. MySQL4OCL:un compilador de OCL a MySQL
    MSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Marina Egea, Manuel Clavel. November 2011.
  56. Two Algorithms for Model Checking of Regular Linear Temporal Logic
    MSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Cesar Sanchez, Miguel Palomino Tarjuelo. September 2011.
  57. Decision Procedures for the Temporal Verification of Concurrent Data Structures
    MSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Cesar Sanchez, Miguel Palomino Tarjuelo. July 2011.
  58. Fuzzy Granularity Control in Parallel/Distributed Computing
    MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pedro Lopez. September 2010.
  59. Exploring the beta-hypercube
    MSc Thesis. Facultad de Informática, Universidad Politécnica de Madrid. September 2009.

Bachelor's Theses (27)

  1. Fuzzing RISC-V Processors for Speculative Leaks
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Marco Guarnieri, Manuel Carro. June 2023.
  2. Enumeration and Classification of Subdomains for Security Research through the lens of Public Suffix List
    BSc Thesis. Sushant University (SU). Supervisors: Juan Caballero, Srdjan Matic, Latika Singh. May 2023.
  3. Browser Fingerprinting Detection and Mitigation Framework
    BSc Thesis. Manipal Institute of Technology (MIT). Supervisors: Srdjan Matic, Juan Caballero, Sudheesh Puthenveettil Gopi. July 2022.
  4. Sistemas de restricciones algebraicas para pruebas criptográficas aplicado a SHA-256
    BSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Ignacio Cascudo, Dario Fiore, Ignacio Luengo Velasco. June 2022.
  5. A Platform for Automating the Preparation of iOS Apps for Binary Analysis
    BSc Thesis. Universidad Carlos III de Madrid (UC3M). Supervisors: Juan Caballero, Ana Isabel González-Tablas Ferreres. June 2021.
  6. Mejora de un Sistema de Autodocumentación Basado en Comentarios Legibles Mecánicamente y Aserciones.: LPDowner
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Hermenegildo, Jose Francisco Morales, Pedro López, Manuel Hermenegildo. June 2020.
  7. Analysis of Smart Contracts using Horn Clauses
    BSc Thesis. Universidad Politécnica de Madrid, ETSII. June 2020.
  8. Detecting Speculative Information-Flows in Large Code Bases
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Marco Guarnieri, José Francisco Morales, Manuel Carro. June 2019.
  9. Análisis de las características de las herramientas de testing automático de aplicaciones Android de la plataforma Androtest on Docker
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Angel Herranz Nieva. January 2019.
  10. Herramienta de Actualización Automática de Tests para Android
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Angel Herranz Nieva. January 2019.
  11. Towards Computing Distances Among Abstract Interpretations
    BSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Manuel Hermenegildo, Francisco J. López Fraguas. September 2018.
  12. Implantación de un sistema de gestión de ventas en una compañía de venta al por menor
    Ivan Cosmen Gancedo.
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro, Manuel Carro. July 2018.
  13. Web Browser-Based Interactive Crawling for Security Testing
    José Luis Castañón Remy.
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Avinash Sudhodanan, Manuel Carro. July 2018.
  14. Monitorización y Detección de Ataques en Redes Corporativas
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. July 2018.
  15. Cryptographic Methods for Secure Delegation of Computation in Electronic Voting Applications
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Dario Fiore, Manuel Carro. June 2017.
  16. Implementación de un Algoritmo de Búsqueda Aleatoria en Programación Lógica
    Inés Blázquez Ballesteros.
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Jose Francisco Morales, Manuel Hermenegildo. June 2017.
  17. Diseño e Implementación de un Módulo para Identificar Código Compartido entre Ejecutables Maliciosos
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. June 2017.
  18. ToraDocu – Generacion Automática de Casos de Test con Oráculos
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Damiano Zanardini. June 2017.
  19. Automatic Testing Platform for Android Apps
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Manuel Carro. June 2017.
  20. Diseño e Implementación de un Módulo para la Detección de Aplicaciones Móviles Maliciosas en Mercados Online
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. June 2017.
  21. Study of Privacy in Social Network Plug-Ins
    Miguel Pozo Ruiz.
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Carmela Troncoso, Ángel Rodríguez. January 2017.
  22. Pruebas de Primer Orden de Programas Concurrentes
    BSc Thesis. Universidad Autónoma de Madrid (UAM). Supervisors: Cesar Sanchez, Juan de Lara. July 2016.
  23. Linearisation of k-Index Bounded Sets of Horn Clauses
    BSc Thesis. Universidad Autónoma de Madrid (UAM). Supervisors: Pierre Ganty, Jesús Munárriz Aldaz. May 2016.
  24. Languages and Security
    BSc Thesis. Universidad Autónoma de Madrid (UAM). Supervisors: Pierre Ganty, Eloy Anguiano Rey. May 2016.
  25. Implementing Fully Homomorphic Encryption Schemes in FPGA-based Systems
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Guillermo Vigueras, Dario Fiore, Manuel Carro. January 2016.
  26. Design and Implementation of an Endpoint Reputation Module
    BSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. January 2015.
  27. Chameleon Vector Commitments
    Johannes Krupp.
    BSc Thesis. Saarland University (Saarland University). Supervisors: Dario Fiore, Dominique Schröder. March 2014.

Books and Monographs (6)

  1. Prolog - The Next 50 Years
    David S. Warren, Veronica Dahl, Thomas Eiter, Manuel Hermenegildo, Robert Kowalski, Francesca Rossi.
    July 2023.
  2. Logic-Based Program Synthesis and Transformation (LOPSTR 2016): Revised Selected Papers
    July 2017.
  3. Giorgos Fagas, Luca Gammaitoni, John P. Gallagher, Douglas J. Paul.
    March 2017.
  4. Gilles Barthe, Andrew D. Gordon, Joost-Pieter Katoen, Annabelle McIver.
    Dagstuhl Reports. 2015.
  5. Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures
    Alessandro Aldini, Gilles Barthe, Roberto Gorrieri.
    Foundations of Security Analysis and Design. 2009.
  6. Elvira Albert, Anindya Banerjee, Sophia Drossopoulou, Marieke Huisman, Atsushi Igarashi, Gary Leavens, Peter Müller, Tobias Wrigstad.
    Object-Oriented Technology. ECOOP 2008 Workshop Reader. 2009.

Sections of Chapters in a Book (5)

  1. Verifiable Computation and Succinct Arguments for NP
    In Asymmetric Cryptography: Primitives and Protocols. Wiley. 2022.
  2. Analysis Based Verification and Debugging of Energy, Performance and Precision Properties
    ENTRA Project: Whole-Systems Energy Transparency (FET project 318337). December 2015.
  3. Energy Optimization: Basic Static Techniques
    ENTRA Project: Whole-Systems Energy Transparency (FET project 318337). August 2014.
  4. Initial Energy Consumption Analysis
    ENTRA Project: Whole-Systems Energy Transparency (FET project 318337). April 2014.
  5. A General Framework for Resource Consumption Analysis and Verification
    ENTRA Project: Whole-Systems Energy Transparency (FET project 318337). November 2013.

Proceedings (54)

  1. 2023.
  2. Accattoli B, M. V. Hermenegildo.
    September 2022.
  3. Yuliya Lierler, José F. Morales, Carmine Dodaro, Verónica Dahl, Martin Gebser, Tuncay Tekle.
    2022.
  4. José F. Morales, Dominic A. Orchard.
    2021.
  5. Fundamenta Informaticae, Special Issue on the 26th International Symposium on Logic-Based Program Synthesis and Transformation: LOPSTR 2016
    Manuel V. Hermenegildo, Pedro Lopez-Garcia, Alberto Pettorossi, Maurizio Proietti.
    December 2020.
  6. Alexey Gotsman, Ana Sokolova.
    June 2020.
  7. Piotr Mardziel, Niki Vazou.
    November 2019.
  8. Pierre Ganty, Mohamed Kaâniche.
    October 2019.
  9. Alessandra Gorla, José Miguel Rojas.
    2019.
  10. Juan Caballero, Guofei Gu.
    December 2018.
  11. Functional and Logic Programming - 14th International Symposium, FLOPS 2018, Nagoya, Japan, May 9-11, 2018, Proceedings
    John P. Gallagher, Martin Sulzmann.
    2018.
  12. Alessandra Gorla, Juan Pablo Galeotti.
    2018.
  13. Logic-Based Program Synthesis and Transformation - 27th International Symposium, LOPSTR 2017, Namur, Belgium, October 10-12, 2017, Revised Selected Papers
    John P. Gallagher, Fabio Fioravanti.
    2018.
  14. Gilles Barthe, Geoff Sutcliffe, Margus Veanes.
    2018.
  15. Proceedings Third Workshop on Models for Formal Analysis of Real Systems and Sixth International Workshop on Verification and Program Transformation, MARS/VPT-ETAPS 2018, and Sixth International Workshop on Verification and Program Transformation Thessaloniki, Greece, 20th April 2018
    John P. Gallagher, Rob van Glabbeek, Wendelin Serwe.
    2018.
  16. Davide Balzarotti, Juan Caballero.
    December 2017.
  17. 2017.
  18. 32nd International Conference on Logic Programming
    Manuel Carro, Andy King.
    September 2016.
  19. Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez.
    July 2016.
  20. Juan Caballero, Eric Bodden, Elias Athanasopoulos.
    April 2016.
  21. Manuel Carro, Salvador Tamarit, Guillermo Vigueras, Julio Mariño.
    March 2016.
  22. March 2016.
  23. Gilles Barthe, Evangelos P. Markatos, Pierangela Samarati.
    2016.
  24. Pierre Ganty, Michele Loreti.
    2016.
  25. John P. Gallagher, Philipp Rümmer.
    2016.
  26. Manuel Carro, Andy King, Neda Saeedloei, Marina De Vos.
    2016.
  27. Juan Caballero, Michalis Polychronakis.
    April 2015.
  28. Frank Piessens, Juan Caballero, Nataliia Bielova.
    March 2015.
  29. Juan Caballero, Simson Garfinkel.
    August 2014.
  30. Davide Balzarotti, Juan Caballero.
    April 2014.
  31. R. Haemmerlé, J. Sneyers.
    2014.
  32. Clay Shields, Juan Caballero.
    August 2013.
  33. R. Haemmerlé, J.F. Morales.
    2013.
  34. Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings
    Gilles Barthe, Benjamin Livshits, Riccardo Scandariato.
    2012.
  35. Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers
    Gilles Barthe, Anupam Datta, Sandro Etalle.
    2012.
  36. Software Engineering and Formal Methods - 9th International Conference, SEFM 2011
    Gilles Barthe, Alberto Pardo, Gerardo Schneider.
    November 2011.
  37. Technical Communications of the 27th International Conference on Logic Programming (ICLP'11)
    John P. Gallagher, Michael Gelfond.
    July 2011.
  38. Theory and Practice of Logic Programming. 27th Int'l. Conference on Logic Programming (ICLP'11) Special Issue
    John P. Gallagher, Michael Gelfond.
    July 2011.
  39. Third International Workshop on Principles of Enginering Service-Oriented Systems (PESOS 2011)
    M. Carro, D. Karastoyanova, G. A. Lewis, A. Liu.
    May 2011.
  40. March 2011.
  41. ACM SIGPLAN Proceedings of the Workshop on Declarative Aspects of Multicore Programming
    M. Carro, J.H. Reppy.
    January 2011.
  42. Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers
    Jorge Cuéllar, Javier Lopez, Gilles Barthe, Alexander Pretschner.
    2011.
  43. Technical Communications of the 26th Int'l. Conference on Logic Programming (ICLP'10)
    M. V. Hermenegildo, T. Schaub.
    July 2010.
  44. Theory and Practice of Logic Programming. 26th Int'l. Conference on Logic Programming (ICLP'10) Special Issue
    M. V. Hermenegildo, T. Schaub.
    July 2010.
  45. M. V. Hermenegildo, J. Palsberg.
    January 2010.
  46. Verification, Model Checking, and Abstract Interpretation, 11th International Conference, VMCAI 2010
    January 2010.
  47. Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, PEPM 2010, Madrid, Spain, January 18-19, 2010
    John P. Gallagher, Janis Voigtländer.
    2010.
  48. Proceedings of the 19th Workshop on Logic-based methods in Programming Environments (WLPE 2009)
    Rafael Caballero, John P. Gallagher.
    2010.
  49. FTfJP '09: Proceedings of the 11th International Workshop on Formal Techniques for Java-like Programs
    2009.
  50. Functional and Logic Programming, 9th International Symposium, FLOPS'08
    J. Garrigue, M. V. Hermenegildo.
    April 2008.
  51. ACM SIGPLAN-Intel Workshop on Declarative Aspects of Multicore Programming, DAMP'08, Informal Proceedings
    January 2008.
  52. Jacques Garrigue, Manuel V. Hermenegildo.
    2008.
  53. Formal Methods for Open Object-Based Distributed Systems, 10th IFIP WG 6.1 International Conference, FMOODS 2008, Oslo, Norway, June 4-6, 2008, Proceedings
    Gilles Barthe, Frank S. de Boer.
    2008.
  54. Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers
    Gilles Barthe, Cédric Fournet.
    2008.

Technical Reports and Manuals (72)

  1. Improvements to the Auxiliary Analyses for Cost Analysis
    CLIP Lab, IMDEA Software Institute. August 2024.
  2. CLIP Lab, UPM and IMDEA Software Institute. August 2023.
  3. Margarita Capretto, Martín Ceresa, Antonio Fernández Anta, Antonio Russo, César Sánchez.
    Computing Research Repository. 2023.
  4. IACR Cryptology ePrint Archive. 2023.
  5. Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen.
    IACR Cryptology ePrint Archive. 2023.
  6. Computing Research Repository. 2023.
  7. Kevin van Liebergen, Juan Caballero, Platon Kotzias, Chris Gates.
    Computing Research Repository. October 2022.
  8. CLIP Lab, IMDEA Software Institute. August 2022.
  9. Nico Lehmann, Adam Geller, Gilles Barthe, Niki Vazou, Ranjit Jhala.
    Computing Research Repository. 2022.
  10. Li Zhou, Gilles Barthe, Pierre-Yves Strub, Junyi Liu, Mingsheng Ying.
    Computing Research Repository. 2022.
  11. Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom.
    IACR Cryptology ePrint Archive. 2022.
  12. Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, Peter Schwabe, Lucas Tabary-Maujean.
    IACR Cryptology ePrint Archive. 2022.
  13. Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom.
    IACR Cryptology ePrint Archive. 2022.
  14. Li Zhou, Gilles Barthe, Justin Hsu, Mingsheng Ying, Nengkun Yu.
    Computing Research Repository. 2021.
  15. Sunjay Cauligi, Craig Disselkoen, Daniel Moghimi, Gilles Barthe, Deian Stefan.
    Computing Research Repository. 2021.
  16. Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar.
    IACR Cryptology ePrint Archive. 2021.
  17. Computing Research Repository. 2021.
  18. Technical University of Madrid (UPM) and IMDEA Software Institute. 2021.
  19. arXiv. September 2020.
  20. Gilles Barthe, Raphaëlle Crubillé, Ugo Dal Lago, Francesco Gavazzo.
    Computing Research Repository. 2020.
  21. Jean-Joseph Marty, Lucas Franceschino, Jean-Pierre Talpin, Niki Vazou.
    Computing Research Repository. 2020.
  22. Gilles Barthe, Sunjay Cauligi, Benjamin Grégoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe.
    IACR Cryptology ePrint Archive. 2020.
  23. Manuel Bravo, Gregory Chockler, Alexey Gotsman.
    Computing Research Repository. 2020.
  24. Computing Research Repository. 2020.
  25. Incrementalizing Context-sensitive Analyses for Modularized Programs
    arXiv. July 2019.
  26. Gilles Barthe, Justin Hsu, Mingsheng Ying, Nengkun Yu, Li Zhou.
    Computing Research Repository. 2019.
  27. Alejandro Aguirre, Gilles Barthe, Justin Hsu, Benjamin Lucien Kaminski, Joost-Pieter Katoen, Christoph Matheja.
    Computing Research Repository. 2019.
  28. Sunjay Cauligi, Craig Disselkoen, Klaus von Gleissenthall, Deian Stefan, Tamara Rezk, Gilles Barthe.
    Computing Research Repository. 2019.
  29. Gilles Barthe, Rohit Chadha, Vishal Jagannath, A. Prasad Sistla, Mahesh Viswanathan.
    Computing Research Repository. 2019.
  30. José Bacelar Almeida, Cecile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub.
    IACR Cryptology ePrint Archive. 2019.
  31. Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi.
    IACR Cryptology ePrint Archive. 2019.
  32. Computing Research Repository. 2019.
  33. The CLIP Lab, IMDEA Software Institute and T.U. Madrid. April 2018.
  34. The CLIP Lab, IMDEA Software Institute and T.U. Madrid. April 2018.
  35. Tetsuya Sato, Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Justin Hsu.
    Computing Research Repository. 2018.
  36. The CLIP Lab. May 2017.
  37. Giovanni Bernardi, Matthew Hennessy.
    Computing Research Repository. 2016.
  38. Giovanni Bernardi, Matthew Hennessy.
    Computing Research Repository. April 2015.
  39. Parametric Static Profiling
    The CLIP Lab. April 2015.
  40. Andrea Cerone, Matthew Hennessy, Massimo Merro.
    Computing Research Repository. 2015.
  41. Gilles Barthe, Marco Gaboardi, Emilio Jesús Gallego Arias, Justin Hsu, Aaron Roth, Pierre-Yves Strub.
    Computing Research Repository. 2015.
  42. John P. Gallagher, Mai Ajspur, Bishoksan Kafle.
    Computing Research Repository. 2015.
  43. Xueliang Li, John P. Gallagher.
    Computing Research Repository. 2015.
  44. On the Confluence of the Analytical Semantics of CHR
    Technical University of Madrid (UPM). July 2014.
  45. Inferring Energy Consumption at Different Software Levels: ISA vs. LLVM IR
    U. Liqat, K. Georgiou, S. Kerrison, P. Lopez-Garcia, M. V. Hermenegildo, J. P. Gallagher, K. Eder.
    ENTRA Project. April 2014.
  46. An Approach to Assertion-based Debugging of Higher-Order (C)LP Programs
    The CLIP Lab. January 2014.
  47. Analysis and Transformation Tools for Constrained Horn Clause Verification
    John P. Gallagher, Bishoksan Kafle.
    Computing Research Repository. 2014.
  48. Pierre Ganty, Radu Iosif.
    Computing Research Repository. 2014.
  49. ARTISTE: Automatic Generation of Hybrid Data Structure Signatures from Binary Code Executions
    Juan Caballero, Gustavo Grieco, Mark Marron, Zhiqiang Lin, David Urbina.
    IMDEA Software Institute. August 2012.
  50. ActionUWE: Transformation of UWE to ActionGUI Models
    Ludwig-Maximilians-Universität München. 2012.
  51. Structural Analysis: Shape Information via Points-To Computation
    Computing Research Repository. 2012.
  52. Automated Analysis and Synthesis of Padding-Based Encryption Schemes
    Cryptology ePrint Archive, Report 2012/695. 2012.
  53. The LPdoc Documentation Generator. Ref. Manual (V3.0)
    UPM. July 2011.
  54. Towards Modular Extensions for a Modular Language
    Technical University of Madrid (UPM). January 2011.
  55. A Simulation Study on Parallel Backtracking with Solution Memoing for Independent And-Parallelism
    P. Chico de Guzmán, A. Casas, M. Carro, M. V. Hermenegildo.
    Technical University of Madrid (UPM). January 2011.
  56. Towards Resource Usage Function Verification based on Input Data Size Intervals
    UPM. 2011.
  57. Towards Data-Aware Cost-Driven Adaptation for Service Orchestrations
    D. Ivanović, M. Carro, M. V. Hermenegildo, P. Lopez-Garcia, E. Mera.
    Technical University of Madrid (UPM). March 2010.
  58. An Approach to Profiling for Run-Time Checking of Computational Properties and Performance Debugging
    Technical University of Madrid (UPM). March 2010.
  59. Towards a Framework for Resource Usage Verification and Debugging in the CiaoPP System
    Technical University of Madrid (UPM). February 2010.
  60. Francisco Bueno, Jorge A. Navas, Manuel V. Hermenegildo.
    Computing Research Repository. 2010.
  61. Javier Esparza, Pierre Ganty, Stefan Kiefer, Michael Luttenberger.
    Computing Research Repository. 2010.
  62. Sharing-Based Independence-Driven Fragment Identification for Service Orchestrations
    D. Ivanović, M. Carro, M. V. Hermenegildo.
    Technical University of Madrid (UPM). December 2009.
  63. Towards Data-Aware Resource Analysis for Service Orchestrations
    D. Ivanović, M. Carro, M. V. Hermenegildo.
    Technical University of Madrid (UPM). June 2009.
  64. Towards Integrating Run-Time Checking and Software Testing in a Verification Framework
    T. U. Madrid (UPM). March 2009.
  65. Inferring Determinacy and Mutual Exclusion in Logic Programs Using Mode and Type Analysis
    Technical University of Madrid (UPM). February 2009.
  66. The Ciao System. Ref. Manual (V1.13)
    F. Bueno, D. Cabeza, M. Carro, M. V. Hermenegildo, P. Lopez-Garcia, G. Puebla.
    UPM. 2009.
  67. Bridge Program Transformation for the CCall Tabling Scheme
    P. Chico de Guzmán, M. Carro, M. V. Hermenegildo.
    Technical University of Madrid (UPM). September 2008.
  68. Efficient Representations for Set-Sharing Analysis
    E. Trias, J. Navas, E. S. Ackley, S. Forrest, M. V. Hermenegildo.
    University of New Mexico and Technical University of Madrid. September 2008.
  69. Inference of User-Definable Resource Bounds Usage for Logic Programs and its Applications
    J. Navas, E. Mera, P. Lopez-Garcia, M. Hermenegildo.
    Technical University of Madrid (UPM). July 2008.
  70. Fast Set Sharing using ZBDDs
    M. Méndez-Lojo, O. Lhoták, M. V. Hermenegildo.
    University of New Mexico. June 2008.
  71. Rigorous Methods for Mobile and Heterogeneous Software Systems – Second Year Report
    M. Hermenegildo, E. Albert, P. Arenas, F. Bueno, M. Carro, A. Casas, P. Chico de Guzmán, J. Correas, S. Genaim, J. Lipton, Pedro Lopez-Garcia, M. Méndez, E. Mera, J. Morales, J. Navas, R. Padilla, P. Pietrzak, G. Puebla, M. Zamalloa, D. Zanardini.
    Technical University of Madrid (UPM). April 2008.
  72. Customizable Resource Usage Analysis for Java Bytecode
    J. Navas, M. Méndez-Lojo, M. V. Hermenegildo.
    UNM. 2008.

Articles in Books and Other Collections (28)

  1. J.F. Morales, S. Abreu, D. Ferreiro, M.V. Hermenegildo.
    Prolog - The Next 50 Years. July 2023.
  2. Prolog - The Next 50 Years. July 2023.
  3. Prolog: Past, Present, and Future
    Gopal Gupta, Elmer Salazar, Joaquín Arias, Kinjal Basu, S Varanasi, M Carro.
    Prolog - The Next 50 Years. July 2023.
  4. Prolog - The Next 50 Years. July 2023.
  5. Adrian Francalanza, Jorge A. Perez, César Sánchez.
    Lectures on Runtime Verification – Introductory and Advanced Topics. 2018.
  6. Energy Consumption Analysis and Verification using CiaoPP
    September 2017.
  7. Kerstin Eder, John P. Gallagher.
    ICT - Energy Concepts for Energy Efficiency and Sustainability. March 2017.
  8. Giorgos Fagas, John P. Gallagher, Luca Gammaitoni, Douglas J. Paul.
    ICT - Energy Concepts for Energy Efficiency and Sustainability. March 2017.
  9. Alberto Goffi, Alessandra Gorla, Andrea Mattavelli, Mauro Pezzè.
    Present and Ulterior Software Engineering. 2017.
  10. Machine Learning-Driven Automatic Program Transformation to Increase Performance in Heterogeneous Architectures
    Salvador Tamarit, Guillermo Vigueras, Manuel Carro, Julio Mariño.
    Tools for High Performance Computing 2016. 2017.
  11. Luca Aceto, Álvaro García-Pérez, Anna Ingólfsdóttir.
    Semantics, Logics and Calculi—Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays. 2016.
  12. Computer-Aided Proofs in Cryptography: An Overview
    All about Proofs, Proofs for All (APPA). January 2015.
  13. Mining Android Apps for Anomalies
    Konstantin Kuznetsov, Alessandra Gorla, Ilaria Tavecchia, Florian Gross, Andreas Zeller.
    The Art and Science of Analyzing Software Data. 2015.
  14. K. Georgiou, U. Liqat.
    July 2014.
  15. Engineering Secure Future Internet Services and Systems - Current Research. 2014.
  16. Kerstin Eder, Steve Kerrison, John Gallagher, Pedro Lopez-Garcia.
    NANOENERGY Letters. August 2013.
  17. State Based Encapsulation for Modular Reasoning about Behavior-Preserving Refactorings
    Anindya Banerjee, David A. Naumann.
    Aliasing in Object-Oriented Programming. 2013.
  18. Ownership Types: A Survey
    Dave Clarke, Johan Östlund, Ilya Sergey, Tobias Wrigstad.
    Aliasing in Object-Oriented Programming. Types, Analysis and Verification. 2013.
  19. Content-Sniffing XSS Attacks: XSS with non-HTML Content
    Juan Caballero, Adam Barth, Dawn Song.
    The Death of the Internet. July 2012.
  20. T. Trigo, P. Lopez-Garcia, S. Muñoz-Hernandez.
    Computational Intelligence. 2012.
  21. Interval-Based Resource Usage Verification: Formalization and Prototype
    FOPARA. 2012.
  22. Merlin: specification inference for explicit information flow problems
    V. Benjamin Livshits, Aditya V. Nori, Sriram K. Rajamani, Anindya Banerjee.
    Mining Software Specifications. May 2011.
  23. Parameterized Metareasoning in Membership Equational Logic
    Manuel Clavel, Narciso Martí-Oliet, Miguel Palomino.
    Formal Modeling: Actors, Open Systems, Biological Systems - Essays Dedicated to Carolyn Talcott on the Occasion of Her 70th Birthday. 2011.
  24. Logic Languages
    Encyclopedia of Parallel Computing. 2011.
  25. An Overview of The Ciao Multiparadigm Language and Program Development Environment and its Design Philosophy
    M. V. Hermenegildo, F. Bueno, M. Carro, P. Lopez-Garcia, J.F. Morales, G. Puebla.
    Festschrift for Ugo Montanari. June 2008.
  26. An Introduction to Certificate Translation
    Gilles Barthe, César Kunz.
    Foundations of Security Analysis and Design. 2008.
  27. A Tutorial on Type-Based Termination
    Gilles Barthe, Benjamin Grégoire, Colin Riba.
    EU LerNet ALFA Project. 2008.
  28. César Sánchez, Matteo Slanina, Henny B. Sipma, Zohar Manna.
    Pillars of Computer Science: Essays Dedicated to Boris (Boaz) Trakhtenbrot on the Occasion of His 85th Birthday. 2008.

Invited Papers and Tutorials (24)

  1. On-the-fly Verification via (Incremental, Interactive) Abstract Interpretation with CiaoPP and Verifly
    M.V. Hermenegildo, I. Garcia-Contreras, J.F. Morales, P. Lopez-Garcia, L. Rustenholz, D. Ferreiro, D. Jurjo.
    October 2023.
  2. How to Best Teach Prolog
    July 2023.
  3. November 2022.
  4. Some reflections on Prolog's evolution, status, and future on the 50th anniversary of the birth of Prolog (abstract of invited talk)
    International Conference on Logic Programming. August 2022.
  5. Manuel V. Hermenegildo, Pedro Lopez-Garcia, Alberto Pettorossi, Maurizio Proietti.
    Fundamenta Informaticae. December 2020.
  6. Cost Analysis of Smart Contracts via Parametric Resource Analysis
    Static Analysis Symposium. November 2020.
  7. Multivariant Assertion-based Guidance of Top-down Horn Clause-based Analysis in CiaoPP
    Workshop on Declarative Program Analysis (DPA 2019). July 2019.
  8. Horn Clause-based Program Analysis and Verification with CiaoPP
    1st International Workshop on Declarative Program Analysis (DPA 2018). July 2018.
  9. Floriana Esposito, Carlo Ghezzi, Manuel V. Hermenegildo, Helene Kirchner, Luke Ong.
    March 2018.
  10. ACM Symposium on Principles of Distributed Computing. 2018.
  11. Energy Consumption Analysis and Verification by Transformantion into Horn Clauses and Abstract Interpretation
    International Workshop on Verification and Program Transformation. April 2017.
  12. Foundations of Security Analysis and Design. 2013.
  13. Dagstuhl 12452: Publication Culture in Computing Research – Position Papers. November 2012.
  14. Constraint-Based Runtime Prediction of SLA Violations in Service Orchestrations
    22nd Workshop on Logic-based Methods in Programming Environments. September 2012.
  15. Program Analysis With Regular Tree Languages
    International Symposium on Logic-based Program Synthesis and Transformation. 2012.
  16. Mihhail Aizatulin, François Dupressoir, Andrew D. Gordon, Jan Jürjens.
    Formal Aspects of Security and Trust (FAST). 2012.
  17. John P. Gallagher, Michael Gelfond.
    International Conference on Logic Programming. July 2011.
  18. John P. Gallagher, Michael Gelfond.
    International Conference on Logic Programming. July 2011.
  19. An Overview of the Ciao System
    M. V. Hermenegildo, F. Bueno, M. Carro, P. Lopez-Garcia, R. Haemmerlé, E. Mera, J. F. Morales, G. Puebla.
    International Web Rule Symposium. July 2011.
  20. Introduction to Technical Communications of the 26th Int'l. Conference on Logic Programming (ICLP'10)
    M. V. Hermenegildo, T. Schaub.
    International Conference on Logic Programming. July 2010.
  21. M. V. Hermenegildo, T. Schaub.
    International Conference on Logic Programming. July 2010.
  22. Formal Aspects in Security and Trust. 2010.
  23. Formal Certification of ElGamal Encryption. A Gentle Introduction to CertiCrypt
    Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Santiago Zanella Béguelin.
    5th International workshop on Formal Aspects in Security and Trust, FAST 2008. 2009.
  24. Certificate Translation
    International Conference on Automated Deduction. 2008.