Abstract Environment Trimming
Theory and Practice of Logic Programming. Cambridge U. Press, October 2024.
-
ACM SIGACT Symposium on Principles of Programming Languages 8 (POPL). Association for Computing Machinery, January 2024.
-
Cecilia Boschini,
Dario Fiore, Elena Pagnin, Luca Torresetti, Andrea Visconti.
Journal of Cryptographic Engineering 14 (3), 551–575. 2024.
-
Agustín Nolasco,
Facundo Molina, Renzo Degiovanni,
Alessandra Gorla, Diego Garbervetsky, Mike Papadakis, Sebastián Uchitel, Nazareno Aguirre, Marcelo F. Frias.
Proc. ACM Softw. Eng. 1 ({FSE}), 450–472. 2024.
-
Mariano Politano, Valeria S. Bengolea,
Facundo Molina, Nazareno Aguirre, Marcelo F. Frias, Pablo Ponzio.
Science of Computer Programming 238, 103153. 2024.
Liveness and latency of Byzantine state-machine replication
Distributed Computing 37 (2), 177–205. Springer, 2024.
-
Data Compression Conference. July 2023.
-
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications 144, 74-89. July 2023.
-
ACM SIGPLAN Conference on Programming Language Design and Implementation 7 (PLDI). Association for Computing Machinery, June 2023.
-
Security and Communication Networks 2023. January 2023.
-
IEEE Internet Computing 27 (2), 13–19. 2023.
-
Pooja Rani, Arianna Blasi, Nataliia Stulova, Sebastiano Panichella,
Alessandra Gorla, Oscar Nierstrasz.
Journal of Systems and Software 195, 111515. 2023.
-
Formal Methods for Systems Design. 2023.
-
ACM Transactions on Computational Logic. 2023.
-
Proceedings of the ACM on Programming Languages 6 (ICFP), 596–624. Association for Computing Machinery, August 2022.
-
Philipp Körner, Michael Leuschel, João Barbosa, Vítor Santos-Costa, Verónica Dahl,
Manuel V. Hermenegildo,
Jose F. Morales, Jan Wielemaker, Daniel Diaz, Salvador Abreu, Giovanni Ciatto.
Theory and Practice of Logic Programming 22 (6), 776–858. Cambridge U. Press, May 2022.
-
Theory and Practice of Logic Programming 22 (6), 905–973. Cambridge U. Press, March 2022.
-
Proceedings of the ACM on Programming Languages 6 (POPL), 1–30. Association for Computing Machinery, January 2022.
-
José Carlos Bacelar Almeida, Manuel Barbosa,
Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela.
J. Log. Algebraic Methods Program. 125, 100736. 2022.
-
ACM Transactions on Computational Logic 23 (1), 5:1–5:42. 2022.
-
Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso.
Journal of Computer Security 30 (1), 109–165. IOS Press, 2022.
-
ACM Transactions on Software Engineering and Methodology 32 (1), 1–44. Association for Computing Machinery, 2022.
-
Distributed Computing 35 (6), 503–532. Springer, 2022.
-
Theory and Practice of Logic Programming 22 (5), 723–738. 2022.
-
Zachary Grannan,
Niki Vazou, Eva Darulova, Alexander J. Summers.
Dagstuhl Artifacts Series 8 (2), 12:1–12:2. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022.
-
Theory and Practice of Logic Programming 22 (4), 499–504. 2022.
-
Theory and Practice of Logic Programming 22 (5), 640–640. 2022.
-
Journal of Systems and Software 182. December 2021.
-
Journal of Systems and Software 181. November 2021.
-
ACM Transactions on Computational Logic 22 (4). Association for Computing Machinery, September 2021.
-
Theory and Practice of Logic Programming 21 (6), 768–784. Cambridge U. Press, September 2021.
-
International Conference on Functional Programming 5 (ICFP). Association for Computing Machinery, August 2021.
-
ACM Computing Surveys 54 (3). April 2021.
Incremental and Modular Context-sensitive Analysis
Theory and Practice of Logic Programming 21 (2), 196–243. January 2021.
-
Olivier Blazy, Laura Brouilhet, Celine Chevalier, Patrick Towa,
Ida Tucker, Damien Vergnaud.
Electronic Notes in Theoretical Computer Science 895, 178-211. 2021.
-
Journal of Mathematical Cryptology 15 (1), 284–297. 2021.
-
ACM SIGACT Symposium on Principles of Programming Languages 5 ({POPL}), 1–28. 2021.
-
Proceedings of the ACM on Programming Languages 5 ({ICFP}), 1–30. 2021.
-
ACM SIGACT Symposium on Principles of Programming Languages 5 ({POPL}), 1–32. 2021.
-
Gilles Barthe, Marc Gourjon, Benjamin Grégoire, Maximilian Orlt, Clara Paglialonga, Lars Porth.
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021 (2), 189–228. 2021.
-
Theory and Practice of Logic Programming First view, 1–69. Cambridge University Press, 2021.
-
Science of Computer Programming 202, 102577. 2021.
-
Privacy Enhancing Technologies Symposium 2021 (1), 21 - 42. Sciendo, 2021.
-
Foundations and Trends® in Programming Languages 6 (3–4), 159-317. 2021.
-
Somayeh Dolatnezhad Samarin,
Dario Fiore, Daniele Venturi, Morteza Amini.
Electronic Notes in Theoretical Computer Science 889, 145-170. 2021.
-
Theory and Practice of Logic Programming, 1–30. Cambridge University Press, 2021.
-
Distributed Computing 34 (4), 301–318. Springer, 2021.
-
Hagit Attiya, Sebastian Burckhardt,
Alexey Gotsman, Adam Morrison, Hongseok Yang, Marek Zawirski.
Electronic Notes in Theoretical Computer Science 855, 141–160. Elsevier, 2021.
-
International Journal on Software Tools for Technology Transfer 23, 157–183. 2021.
Symbolic AI for XAI: Evaluating LFIT Inductive Programming for Explaining Biases in Machine Learning
Alfonso Ortega, Julian Fierrez, Aythami Morales,
Zilong Wang, Marina de la Cruz, César Luis Alonso, Tony Ribeiro.
Computers 10 (11), 154. Multidisciplinary Digital Publishing Institute, 2021.
-
Electronic Notes in Theoretical Computer Science 352, 5–27. 2020.
-
Finite Fields and Their Applications 62. 2020.
-
Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat,
Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira.
IEEE Data Engineering Bulletin 43 (2), 36–66. 2020.
-
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie.
Journal of Automated Reasoning 64 (8), 1685–1729. 2020.
-
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub.
Journal of Cryptographic Engineering 10 (1), 17–26. 2020.
-
Journal of Privacy and Confidentiality 10 (1). 2020.
-
Gilles Barthe, Sandrine Blazy, Benjamin Grégoire, Rémi Hutin, Vincent Laporte, David Pichardie, Alix Trieu.
ACM SIGACT Symposium on Principles of Programming Languages 4 ({POPL}), 7:1–7:30. 2020.
-
ACM SIGACT Symposium on Principles of Programming Languages 4 ({POPL}), 55:1–55:30. 2020.
-
ACM SIGACT Symposium on Principles of Programming Languages 4 ({POPL}), 21:1–21:29. 2020.
-
ACM SIGACT Symposium on Principles of Programming Languages 4 ({POPL}), 24:1–24:27. 2020.
-
Fundam. Inform. 173 (4). 2020.
Stream Runtime Verification of Real-Time Event-Streams with the Striver Language
International Journal on Software Tools for Technology Transfer. 2020.
-
Martin Leucker,
César Sánchez, Torben Scheffel, Malte Schmitz, Alexander Schramm.
Software Quality Journal 28 (2), 745–787. 2020.
Verifying replicated data types with typeclass refinements in Liquid Haskell
Yiyun Liu, James Parker, Patrick Redmond, Lindsey Kuper, Michael Hicks,
Niki Vazou.
ACM Conference on Object Oriented Programming Systems Languages and Applications 4 (OOPSLA), 1–30. ACM New York, NY, USA, 2020.
Fireplug: Efficient and Robust Geo-Replication of Graph Databases
R. Neiheiser, L. Rech,
M. Bravo, L. Rodrigues, M. Correia.
IEEE Transactions on Parallel and Distributed Systems 31 (8), 1942–1953. 2020.
Proving Highly-Concurrent Traversals Correct
Yotam M. Y. Feldman, Artem Khyzha, Constantin Enea, Adam Morrison,
Aleksandar Nanevski, Noam Rinetzky, Sharon Shoham.
ACM Conference on Object Oriented Programming Systems Languages and Applications 4 ({OOPSLA}), 128:1–128:29. 2020.
-
Sandro Stucki,
César Sánchez, Gerardo Schneider, Borzoo Bonarkdarpour.
Formal Methods in Systems Desing, 1–36. 2020.
-
IEEE Transactions on Information Forensics and Security 14 (12), 3175-3190. IEEE, December 2019.
-
César Sánchez, Gerardo Schneider, Wolfgang Ahrendt, Ezio Bartocci, Domenico Bianculli, Christian Colombo, Yliès Falcone, Adrian Francalanza, Srdan Krstic, João M. Lourenço, Dejan Nickovic, Gordon J. Pace, José Rufino, Julien Signoles, Dmitriy Traytel, Alexander Weiss.
Formal Methods in System Design 54 (3), 279–335. November 2019.
-
ACM Conference on Object Oriented Programming Systems Languages and Applications 3 ({OOPSLA}), 1–30. ACM, October 2019.
-
Theory and Practice of Logic Programming 19 (5-6), 990–1005. Cambridge University Press, September 2019.
-
Theory and Practice of Logic Programming 19 (5-6), 1107–1123. September 2019.
-
IET Information Security 13 (6), 618–638. Institution of Engineering and Technology, April 2019.
-
Journal of Cryptology 32 (2), 324–360. April 2019.
-
Logical Methods in Computer Science 15 (1). March 2019.
-
ACM SIGACT Symposium on Principles of Programming Languages 3 ({POPL}), 1–31. ACM, January 2019.
-
IET Information Security 13 (1), 27–35. IET, January 2019.
-
Electronic Notes in Theoretical Computer Science 777, 3–31. 2019.
-
Journal of Logical and Algebraic Methods in Programming 106, 78–106. 2019.
-
Logical Methods in Computer Science 15 (4). 2019.
-
Journal of Automated Reasoning 63 (4), 813–855. 2019.
-
Journal of Automated Reasoning 63 (1), 1–51. 2019.
-
Journal of Functional Programming 29, e16. 2019.
-
Gilles Barthe, Christos Dimitrakakis, Marco Gaboardi, Andreas Haeberlen, Aaron Roth, Aleksandra B. Slavkovic.
Journal of Privacy and Confidentiality 9 (1). 2019.
-
Gilles Barthe, Thomas Espitau, Justin Hsu, Tetsuya Sato, Pierre-Yves Strub.
Logical Methods in Computer Science 15 (4). 2019.
-
ACM SIGACT Symposium on Principles of Programming Languages 3 ({POPL}), 1–30. 2019.
-
ACM SIGACT Symposium on Principles of Programming Languages 3 ({POPL}), 38:1–38:30. 2019.
-
Software and Systems Modeling 18 (1), 71–105. 2019.
-
Journal of Functional Programming 29 (E7), 1–38. Cambridge University Press, 2019.
-
Gustavo Alonso,
Zsolt Istvan, Kaan Kara, Muhsen Owaida, David Sidler.
IEEE Data Engineering Bulletin 42 (2), 19–31. 2019.
-
IEEE Data Engineering Bulletin 42 (1), 49–60. 2019.
-
International Conference on Very Large Databases 12 (12), 1838–1841. VLDB Endowment, 2019.
-
Journal of Multiple-Valued Logic and Soft Computing 32 (3-4), 313–341. Old City Publishing, 2019.
-
Formal Aspects of Computing: applicable formal methods 30 (6), 685–711. November 2018.
-
Design, Codes and Cryptography 86 (10), 2197–2246. October 2018.
-
Computers and Security 78, 347–363. Elsevier, August 2018.
-
IEEE Internet Computing 22 (4), 6–14. July 2018.
-
ACM Transactions on Programming Languages and Systems 40 (2), 1–90. ACM, May 2018.
Some Trade-offs in Reducing the Overhead of Assertion Run-time Checks via Static Analysis
Science of Computer Programming 155, 3–26. Elsevier, April 2018.
Tree dimension in verification of constrained Horn clauses
Theory and Practice of Logic Programming 18 (2), 224–251. March 2018.
-
Theory and Practice of Logic Programming 18, 167–223. Cambridge U. Press, March 2018.
-
Journal of the ACM 65 (2), 1-41. ACM Press, March 2018.
-
Journal of Logical and Algebraic Methods in Programming 95, 1–16. February 2018.
-
ACM Transactions on Information and System Security 21 (2), 1–31. ACM, February 2018.
-
ACM SIGACT Symposium on Principles of Programming Languages 2 ({POPL}), 1–29. ACM, January 2018.
-
Journal of the ACM 65 (1), 1-44. ACM Press, January 2018.
-
Gilles Barthe, Thomas Espitau, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub.
ACM SIGACT Symposium on Principles of Programming Languages 2 ({POPL}), 1–29. 2018.
-
Ivan Radicek,
Gilles Barthe, Marco Gaboardi, Deepak Garg, Florian Zuleger.
ACM SIGACT Symposium on Principles of Programming Languages 2 (POPL), 1–32. 2018.
-
ACM Conference on Object Oriented Programming Systems Languages and Applications 2 ({OOPSLA}), 1–25. 2018.
-
Bishoksan Kafle,
John P. Gallagher, Graeme Gange, Peter Schachte, Harald Søndergaard, Peter J. Stuckey.
Theory and Practice of Logic Programming 18 (3-4), 553–570. 2018.
-
Journal of Cryptology 31 (1), 23–59. Springer, 2018.
-
Formal Methods in System Design 53 (1), 1–5. 2018.
-
Theory and Practice of Logic Programming. Cambridge U. Press, 2018.
Description, Implementation, and Evaluation of a Generic Design for Tabled CLP
Theory and Practice of Logic Programming. Cambridge U. Press, 2018.
-
Logic Journal of the IGPL 25 (6), 1006–1019. Oxford Academic Press, December 2017.
-
Proceedings of the ACM on Programming Languages 1, 1–29. ACM, August 2017.
-
Annals of Mathematics and Artificial Intelligence 80 (3–4), 249–282. August 2017.
-
International Journal of Intelligent Systems 16 (3), 327–343. Springer, June 2017.
-
Dario Fiore, María Isabel González Vasco, Claudio Soriente.
The Computer Journal 60 (12), 1912–1922. 2017.
-
Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti,
Pierre-Yves Strub, Jean Karim Zinzindohoue.
Communications of the ACM 60 (2), 99–107. 2017.
-
Computer Languages, Systems & Structures 47, 2–18. 2017.
-
Science of Computer Programming 137, 125–140. 2017.
-
Privacy Enhancing Technologies Symposium 2017 (4), 156–176. 2017.
Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy
ACM Transactions on Information and System Security 19 (4), 1–31. 2017.
-
Privacy Enhancing Technologies Symposium 2017 (4), 404–426. 2017.
-
K. Eder,
J.P. Gallagher,
P. Lopez-Garcia, H. Muller,
Z. Banković, K. Georgiou,
R. Haemmerlé,
M. V. Hermenegildo, B. Kafle, S. Kerrison, M. Kirkeby,
M. Klemen, X. Li,
U. Liqat, J. Morse, M. Rhiger, M. Rosendahl.
Microprocessors and Microsystems - Embedded Hardware Design 47, Part B, 278–286. Elsevier, November 2016.
-
Theory and Practice of Logic Programming 16 (5-6), 849–865. Cambridge U. Press, October 2016.
Mobile Collaborative Learning Systems with Augmented Reality
Revista Politécnica 38 (1), 71-80. Escuela Politécnica Nacional, September 2016.
-
Theory and Practice of Logic Programming 16 (5-6), 509-514. Cambridge University Press, September 2016.
Semantic Code Browsing
Theory and Practice of Logic Programming 16 (5-6), 721–737. CUP, September 2016.
-
Journal of Risk and Reliability, Proceedings of the Institution of Mechanical Engineers, Part O 230 (5), 457–472. Sage Publications, July 2016.
-
Mathematical Structures in Computer Science 26 (4), 658–701. Cambridge University Press, May 2016.
-
ACM Computing Surveys 48 (4), 1–35. ACM, May 2016.
-
Journal of the ACM 63 (1), 1–48. ACM, March 2016.
Building Resource Adaptive Software Systems (BRASS): Objectives and System Evaluation
J. Hughes, C. Sparks,
A. Stoughton, R. Parikh, A. Reuther, S. Jagannathan.
ACM SIGSOFT Software Engineering Notes 41 (1), 1–2. ACM, January 2016.
-
Theory and Practice of Logic Programming 16 (1), 1–58. Cambridge University Press, January 2016.
No solvable lambda-value term left behind
Logical Methods in Computer Science 12 (2), 1-43. 2016.
-
IEEE International Conference on Intelligent Systems 57, 88–110. 2016.
-
Journal of Logical and Algebraic Methods in Programming 85 (5), 847–859. 2016.
-
ACM SIGLOG News 3 (1), 34–53. 2016.
-
Antoine Durand-Gasselin, Javier Esparza,
Pierre Ganty, Rupak Majumdar.
Formal Methods in System Design, 1–28. 2016.
-
Javier Esparza,
Pierre Ganty, Jérôme Leroux, Rupak Majumdar.
Acta Informatica, 1–25. 2016.
Maximal incompleteness as obfuscation potency
Formal Aspects of Computing. 2016.
-
International Journal on Software Tools for Technology Transfer, 1–20. 2016.
-
Journal of Automated Reasoning 56 (3), 283–308. 2016.
-
Order - A Journal on the Theory of Ordered Sets and its Applications 33 (3), 503–516. 2016.
Design of Pool Mixes Against Profiling Attacks in Real Conditions
IEEE ACM Transactions on Networking 24 (6), 3662–3675. 2016.
-
Electronic Notes in Theoretical Computer Science 631, 118–138. 2016.
-
Acta Informatica 53 (4), 325–326. 2016.
-
Acta Informatica 53 (2), 87–88. 2016.
Practical Run-time Checking via Unobtrusive Property Caching
Theory and Practice of Logic Programming 15 (04-05), 726-741. CUP, September 2015.
-
ACM Transactions on Information and System Security 18 (1), 1–32. ACM, June 2015.
-
The Computer Journal. May 2015.
Quantifying information flow in cryptographic systems
Mathematical Structures in Computer Science 25 (2), 457–479. February 2015.
-
International Journal of Information Security 14 (1), 15-33. Springer Berlin Heidelberg, February 2015.
-
IEEE Transactions on Human-Machine Systems 45 (2), 276-290. February 2015.
Automatic Workarounds: Exploiting the Intrinsic Redundancy of Web Applications
ACM Transactions on Software Engineering and Methodology 24 (3), 1–42. 2015.
-
Electronic Notes in Theoretical Computer Science 317, 133–139. 2015.
-
Formal Methods in System Design 46 (2), 105–134. 2015.
-
IEEE Security and Privacy Magazine 13 (5), 86–89. 2015.
-
Software and Systems Modeling 14 (1), 3–4. 2015.
-
IEEE Transactions on Automatic Control 60 (12), 3210–3225. 2015.
-
Electronic Notes in Theoretical Computer Science 574, 1–17. 2015.
-
Electronic Notes in Theoretical Computer Science 577, 74–97. 2015.
Algebraic (trapdoor) one-way functions: Constructions and applications
Dario Catalano,
Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis.
Electronic Notes in Theoretical Computer Science 592, 143–165. Springer, 2015.
-
Acta Informatica 52 (6), 525–557. 2015.
Stochastic vs. Deterministic Evolutionary Algorithm-based Allocation and Scheduling for XMOS Chips
Neurocomputing 150, 82–89. Elsevier, 2015.
-
Guillermo Vigueras, Federico Sket, Cristóbal Samaniego, Ling Wu, Ludovic Noels, Denny Tjahjanto, Eva Casoni, Guillaume Houzeaux, Ahmed Makradi, Jon M. Molina-Aldareguia, Mariano Vázquez, Antoine Jérusalem.
Composite Structures 125 (0), 542-557. 2015.
Mtac: A Monad for Typed Tactic Programming in Coq
Beta Ziliani, Derek Dreyer, Neelakantan R. Krishnaswami,
Aleksandar Nanevski, Viktor Vafeiadis.
Journal of Functional Programming 25. 2015.
-
ACM Transactions on Programming Languages and Systems 36 (1), 1–35. ACM, March 2014.
-
IEEE Transactions on Software Engineering 40 (4), 324–337. 2014.
On Automation in the Verification of Software Barriers: Experience Report
Journal of Automated Reasoning 52 (3), 275–329. 2014.
-
Science of Computer Programming 95, 176–199. Elsevier, 2014.
Verifiable Random Functions: Relations to Identity-Based Key-Encapsulation and New Constructions
Journal of Cryptology 27 (3), 544–593. Springer, 2014.
Pushdown flow analysis with abstract garbage collection
J. Ian Johnson,
Ilya Sergey, Christopher Earl, Matthew Might, David Van Horn.
Journal of Functional Programming 24 (2-3), 218–283. 2014.
-
Acta Informatica 51 (1), 25–49. 2014.
-
Theory and Practice of Logic Programming 14 (4-5), 619-632. Cambridge U. Press, 2014.
-
ACM Transactions on Programming Languages and Systems 36 (3), 1–29. 2014.
-
Journal of Computer Security 22 (5), 823–866. IOS Press, 2014.
-
International Journal on Software Tools for Technology Transfer 16 (2), 127–146. 2014.
Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types
Theory and Practice of Logic Programming. 2014.
Accelerating collision detection for large-scale crowd simulation on multi-core and many-core architectures
International Journal of High Performance Computing Applications 28 (1). 2014.
-
Guillermo Vigueras, Ishani Roy, Andrew Cookson, Jack Lee, Nicolas Smith, David Nordsletten.
International Journal for Numerical Methods in Biomedical Engineering 30 (1), 117–134. 2014.
-
Mathematical Structures in Computer Science 23 (5), 1032–1081. Cambridge University Press, October 2013.
Sized Type Analysis for Logic Programs
Theory and Practice of Logic Programming 13 (4-5), 1-14. Cambridge U. Press, August 2013.
How to make ad hoc proof automation less ad hoc
Journal of Functional Programming 23 (4), 357–401. July 2013.
-
Journal of Functional Programming 23 (4), 452–514. Cambridge University Press, July 2013.
-
Science of Computer Programming 78 (6), 715–724. Elsevier North-Holland, Inc., June 2013.
-
Computing 95 (6), 453-492. Springer Wien, June 2013.
Denotation of syntax and metaprogramming in contextual modal type theory (CMTT)
Journal of Applied Logic (JAPPL) 11 (1), 1–29. March 2013.
-
Computer Networks 57 (2), 451-474. Elsevier, February 2013.
Local Reasoning for Global Invariants, Part II: Dynamic Boundaries
Journal of the ACM 60 (3), 1–73. ACM, 2013.
Local Reasoning for Global Invariants, Part I: Region Logic
Journal of the ACM 60 (3), 1–56. ACM, 2013.
Secure distributed programming with value-dependent types
Nikhil Swamy, Juan Chen, Cédric Fournet,
Pierre-Yves Strub, Karthikeyan Bhargavan, Jean Yang.
Journal of Functional Programming 23 (4), 402-451. 2013.
Dependent Type Theory for Verification of Information Flow and Access Control Policies
ACM Transactions on Programming Languages and Systems 35 (2), 1–41. ACM, 2013.
A Model-Driven Approach to Teaching Concurrency
ACM Transactions on Computing Education 13 (1). 2013.
Analysis of Recursively Parallel Programs
ACM Transactions on Programming Languages and Systems 35 (3), 1–49. 2013.
A Survey on Service Quality Description
Kyriakos Kritikos, Barbara Pernici, Pierluigi Plebani, Cinzia Cappiello, Marco Comuzzi, Salima Benbernou, Ivona Brandic, Attila Kertesz, Michael Parkin,
M. Carro.
ACM Computing Surveys 46 (1). 2013.
-
ACM Transactions on Embedded Computing Systems 12, 1–21. 2013.
A computationally efficient framework for the simulation of cardiac perfusion using a multi-compartment Darcy porous-media flow model
C. Michler, A. N. Cookson, R. Chabiniok, E. Hyde, J. Lee, M. Sinclair, T. Sochi, A. Goyal,
G. Vigueras, D. A. Nordsletten, N.P. Smith.
International Journal of Numerical Methods in Biomedical Engineering 29 (2). 2013.
-
Journal of Supercomputing 64 (1), 156–166. Springer US, 2013.
-
Marina Zapater,
César Sánchez, José L. Ayala, José M. Moya, José L. Risco-Martín.
Sensors 12 (8), 10659–10677. August 2012.
Understanding the Role of Malware in Cybercrime
ERCIM News 2012 (90), 15-16. July 2012.
Certificate Size Reduction in Abstraction-Carrying Code
Theory and Practice of Logic Programming 12 (3), 283–318. 2012.
Lightweight compilation of (C)LP to JavaScript
Theory and Practice of Logic Programming 12 (4-5), 755-773. Cambridge U. Press, 2012.
-
ACM Transactions on Programming Languages and Systems 34 (1), 1–48. ACM, 2012.
-
Formal Methods in System Design 40 (2), 206-231. 2012.
An Overview of Ciao and its Design Philosophy
Theory and Practice of Logic Programming 12 (1–2), 219–252. Cambridge Univ Press, 2012.
Quantitative Security Analysis (Dagstuhl Seminar 12481)
Boris Köpf, Pasquale Malacaria, Catuscia Palamidessi.
Dagstuhl Reports 2 (11), 135-154. 2012.
-
IEEE Transactions on Software Engineering 99. IEEE Computer Society, 2012.
Verification of Bounded Discrete Horizon Hybrid Automata
IEEE Transactions on Automatic Control 57 (6), 1445-1455. 2012.
Modelling Declassification Policies using Abstract Domain Completeness
Mathematical Structures in Computer Science 21 (6), 1253-1299. December 2011.
-
Mathematical Structures in Computer Science 21 (6), 1207-1252. Cambridge University Press, October 2011.
-
ACM Transactions on Programming Languages and Systems 33 (4), 1–13. ACM, July 2011.
Parallel Backtracking with Answer Memoing for Independent And-Parallelism
Theory and Practice of Logic Programming. Cambridge U. Press, July 2011.
Efficient Local Unfolding with Ancestor Stacks
Theory and Practice of Logic Programming 11 (1), 1–32. Cambridge U. Press, January 2011.
-
Javier Esparza,
Pierre Ganty, Stefan Kiefer, Michael Luttenberger.
Information Processing Letters 111, 614-619. 2011.
Automatically Deriving Information-theoretic Bounds for Adaptive Side-channel Attacks
Journal of Computer Security 1, 1–31. 2011.
Security of Multithreaded Programs by Compilation
ACM Transactions on Information and System Security 13 (3). 2010.
Formal Executable Semantics for Conformance in the MDE Framework
Innovations in Systems and Software Engineering 6, 73-81. Springer London, 2010.
Automatic Inference of Determinacy and Mutual Exclusion for Logic Programs Using Mode and Type Analyses
New Generation Computing: computing paradigms and computational intelligence 28 (2), 117–206. 2010.
-
Electronic Notes in Theoretical Computer Science 411 (38-39), 3444-3459. 2010.
-
Journal of Parallel and Distributed Computing 70 (8), 839-848. Elsevier, 2010.
-
Electronic Notes in Theoretical Computer Science 410 (46), 4704–4723. Elsevier Science, October 2009.
Type-based homeomorphic embedding for online termination
Information Processing Letters 109 (15), 879-886. Elsevier, July 2009.
Certificate Translation for Optimizing Compilers
ACM Transactions on Programming Languages and Systems 31 (5). ACM, July 2009.
User-Definable Resource Usage Bounds Analysis for Java Bytecode
ENTCS - BYTECODE'09 253 (5). Elsevier, March 2009.
-
Journal of Object Technology 8 (2), 137-161. March 2009.
Implementing Constructive Intensional Negation
New Generation Computing 27 (1), 25-56. January 2009.
Automated Analysis of Security-Design Models
Information and Software Technology 51 (5), 815-831. 2009.
Abstraction-Carrying Code: A Model for Mobile Code Safety
New Generation Computing: computing paradigms and computational intelligence 26 (2). 2008.
-
Proceedings of the Annual Computer Security Applications Conference (ACSAC). December 2024.
-
Proceedings of the 31st Static Analysis Symposium (SAS 2024). October 2024.
Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries
Lukas Aumayr, Esra Ceylan, Yannik Kopyciok, Matteo Maffei,
Pedro Moreno-Sanchez, Iosif Salem, Stefan Schmid.
IFIP Networking Conference. 2024.
Fully-Succinct Multi-key Homomorphic Signatures from Standard Assumptions
Advances in Cryptology (CRYPTO). 2024.
-
ACM Conference on Computer and Communications Security (CCS). 2024.
-
International Conference on Software Testing, Verification and Validation (ICST). 2024.
-
International Symposium on Software Testing and Analysis (ISSTA). 2024.
-
International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2024.
-
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2024.
-
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2024.
-
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2024.
A Myhill-Nerode Style Characterization for Timed Automata With Integer Resets
Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2024.
-
Taming the Infinities of Concurrency: Essays Dedicated to Javier Esparza on the Occasion of His 60th Birthday. 2024.
Succinctness of Cosafety Fragments of LTL via Combinatorial Proof Systems
Foundations of Software Science and Computational Structures (FOSSACS). 2024.
-
Reachability Problems (RP). 2024.
Learning the State Machine Behind a Modal Text Editor: The (Neo)Vim Case Study
International SPIN Symposium on Model Checking of Software (SPIN). 2024.
Synthesizing Hardware‐Software Leakage Contracts for RISC‐V Open‐Source Processors
Proceedings of the 27th Design, Automation and Test in Europe Conference and Exhibition. 2024.
Integer Programming with GCD Constraints
ACM/SIAM Symposium on Discrete Algorithms (SODA). 2024.
-
Symposium on Networked Systems, Design and Implementation (NSDI). 2024.
-
ACM SIGSOFT Software Engineering Notes. December 2023.
-
Annual Computer Security Applications Conference (ACSAC). December 2023.
-
ACM Conference on Computer and Communications Security (CCS). November 2023.
-
Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale,
Juan Caballero, Davide Balzarotti, Leyla Bilge.
ACM Conference on Computer and Communications Security (CCS). November 2023.
-
ACM Conference on Computer and Communications Security (CCS). November 2023.
-
Aniketh Girish, Tianrui Hu, Vijay Prakash, Daniel J. Dubois,
Srdjan Matic, Danny Yuxing Huang, Serge Egelman, Joel Reardon, Juan Tapiador, David R. Choffnes, Narseo Vallina-Rodriguez.
Internet Measurement Conference (IMC). October 2023.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). October 2023.
-
Usenix Annual Technical Conference (USENIX). August 2023.
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles
Usenix Security Symposium (USENIX-Security). August 2023.
-
Asia Conference on Information, Computer and Communications Security (AsiaCCS). July 2023.
-
Proceedings of the 7th Network Traffic Measurement and Analysis Conference (TMA). June 2023.
A Deep Dive into the VirusTotal File Feed
GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). 2023.
Efficient Reactive Synthesis Using Mode Decomposition
International Colloquium on Theoretical Aspects of Computing (ICTAC). 2023.
WhatsUpp with Sender Keys? Analysis, Improvements and Security Proofs
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2023.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2023.
-
International Conference on Applied Cryptography and Network Security (ACNS). 2023.
On the Impossibility of Algebraic NIZK in Pairing-Free Groups
Advances in Cryptology – CRYPTO 2023. 2023.
-
ACM Conference on Computer and Communications Security (CCS). 2023.
-
Australasian Conference on Information Security and Privacy (ACISP). 2023.
-
International Conference on Applied Cryptography and Network Security (ACNS). 2023.
-
International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2023.
-
Luiz Carvalho, Renzo Degiovanni,
Matías Brizzio, Maxime Cordy, Nazareno Aguirre, Yves Le Traon, Mike Papadakis.
Fundamental Approaches to Software Engineering (FASE). 2023.
-
Mariano Politano, Valeria S. Bengolea,
Facundo Molina, Nazareno Aguirre, Marcelo F. Frias, Pablo Ponzio.
Fundamental Approaches to Software Engineering (FASE). 2023.
-
Genetic and Evolutionary Computations (GECCO). 2023.
-
International Symposium on Software Reliability Engineering (ISSRE). 2023.
-
Aayush Garg, Renzo Degiovanni,
Facundo Molina, Maxime Cordy, Nazareno Aguirre, Mike Papadakis, Yves Le Traon.
International Symposium on Software Reliability Engineering (ISSRE). 2023.
-
International Symposium on Software Testing and Analysis (ISSTA). 2023.
-
Automated Software Engineering Conference (ASE). 2023.
-
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2023.
-
Antonio Faonio,
Dario Fiore, Markulf Kohlweiss, Luigi Russo, Michal Zajac.
Theory of Cryptography Conference (TCC). 2023.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2023.
Efficient and universally composable single secret leader election from pairings
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2023.
-
Theory of Cryptography Conference (TCC). 2023.
Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols
Theory of Cryptography Conference (TCC). 2023.
-
Financial Cryptography and Data Security Conference (FC). 2023.
-
International Conference on Principles of Distributed Systems (OPODIS). 2023.
-
International Conference on Concurrency Theory (CONCUR). 2023.
-
Network and Distributed System Security Symposium (NDSS). 2023.
-
Proceedings of the 2023 ACM Symposium on Cloud Computing. 2023.
Antichains Algorithms for the Inclusion Problem Between ω-VPL
International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2023.
-
International Symposium on Formal Methods (FM). 2023.
-
Tzu-Han Shu, Borzoo Bonakdarpour, Bernd Finkbeiner,
César Sánchez.
International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2023.
-
Tzu-Han Shu, Sarai Sheinvald,
César Sánchez, Borzoo Bonakdarpour.
International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2023.
The complexity of Presburger arithmetic with power or powers
International Colloquium on Automata Languages and Programming (ICALP). 2023.
LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures
ACM Conference on Computer and Communications Security (CCS). 2023.
On Polynomial-Time Decidability of k-Negations Fragments of FO Theories (extended abstract)
International Symposium on Mathematical Foundations of Computer Science (MFCS). 2023.
-
IEEE Symposium on Security and Privacy (SP). 2023.
-
Network and Distributed System Security Symposium (NDSS). 2023.
-
International Conference on Runtime Verification (RV). 2023.
-
Proc. of the 35th International Conference on Computer Aided Verification (CAV'23). 2023.
Efficient Modular SMT-Based Model Checking of Pointer Programs
Static Analysis Symposium (SAS). December 2022.
-
ACM Conference on Computer and Communications Security (CCS). November 2022.
Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Compliant with Temporal Constraints
International Conference on Automated Software Engineering (ASE). October 2022.
LISSA: Lazy Initialization with Specialized Solver Aid
International Conference on Automated Software Engineering (ASE). October 2022.
-
IEEE Working Conference on Source Code Analysis and Manipulation (SCAM). October 2022.
-
Said Jawad Saidi,
Srdjan Matic, Georgios Smaragdakis, Oliver Gasser, Anja Feldmann.
Internet Measurement Conference (IMC). October 2022.
-
Matthias Götze,
Srdjan Matic, Costas Iordanou, Georgios Smaragdakis, Nikolaos Laoutaris.
Web Science Conference (WebSci). June 2022.
-
International Conference on Mobile Software Engineering and Systems (MOBILESoft). May 2022.
-
International Conference on Software Engineering (ICSE). May 2022.
-
IEEE Symposium on Security and Privacy (SP). May 2022.
-
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2022.
-
ACM SIGPLAN International Symposium on Haskell (Haskell). 2022.
-
Henry Blanchette,
Niki Vazou, Leonidas Lampropoulos.
ACM SIGPLAN International Symposium on Haskell (Haskell). 2022.
-
ACM SIGPLAN International Symposium on Haskell (Haskell). 2022.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2022.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2022.
-
International Conference on Applied Cryptography and Network Security (ACNS). 2022.
-
ACM Conference on Computer and Communications Security (CCS). 2022.
-
ACM Conference on Computer and Communications Security (CCS). 2022.
-
Antonio Faonio,
Dario Fiore, Luca Nizzardo, Claudio Soriente.
The Cryptographer’s Track at RSA Conference (CT-RSA). 2022.
-
IEEE International Conference on Blockchain (Blockchain). 2022.
Transaction Monitoring of Smart Contracts
International Conference on Runtime Verification (RV). 2022.
-
Computer Aided Verification (CAV). 2022.
-
Asia Conference on Information, Computer and Communications Security (AsiaCCS). 2022.
-
Gilles Barthe, Ugo Dal Lago, Giulio Malavolta, Itsaka Rakotonirina.
ACM Conference on Computer and Communications Security (CCS). 2022.
-
Basavesh Ammanaghatta Shivakumar,
Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya.
ACM Conference on Computer and Communications Security (CCS). 2022.
-
European Symposium On Research In Computer Security (ESORICS). 2022.
-
IEEE Symposium on Logic in Computer Science (LICS). 2022.
-
Practical Aspects of Declarative Languages (PADL). 2022.
-
Gilles Barthe, Adrien Koutsos, Solène Mirliaz, David Pichardie, Peter Schwabe.
Static Analysis Symposium (SAS). 2022.
-
Sunjay Cauligi, Craig Disselkoen, Daniel Moghimi,
Gilles Barthe, Deian Stefan.
IEEE Symposium on Security and Privacy (SP). 2022.
-
Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe,
Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar.
IEEE Symposium on Security and Privacy (SP). 2022.
-
Static Analysis Symposium (SAS). 2022.
-
European Symposium On Research In Computer Security (ESORICS). 2022.
-
Financial Cryptography and Data Security Conference (FC). 2022.
-
ACM Symposium on Principles of Distributed Computing (PODC). 2022.
-
Conference on Security and Cryptography for Networks (SCN). 2022.
-
Thomas Attema,
Ignacio Cascudo, Ronald Cramer, Ivan Damgård, Daniel Escudero.
Theory of Cryptography Conference (TCC). 2022.
On the impossibility of algebraic vector commitments in pairing-free groups
Theory of Cryptography Conference (TCC). 2022.
-
Joseph Izraelevitz, Gaukas Wang, Rhett Hanscom, Kayli Silvers, Tamara Silbergleit Lehman, Gregory Chockler,
Alexey Gotsman.
International Conference on Parallel Processing (ICPP). 2022.
-
Conference on Advances in Financial Technologies (AFT). 2022.
-
International Conference on Concurrency Theory (CONCUR). 2022.
-
Noemi Glaeser, Matteo Maffei, Giulio Malavolta,
Pedro Moreno-Sanchez, Erkan Tairi, Sri Aravinda Krishnan Thyagarajan.
ACM Conference on Computer and Communications Security (CCS). 2022.
-
Computer Aided Verification (CAV). 2022.
-
ACM Conference on Computer and Communications Security (CCS). 2022.
-
International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2022.
Monitorability of Expressive Verdicts
NASA Formal Methods (NFM). 2022.
-
International Conference on Runtime Verification (RV). 2022.
-
International Symposium on Automated Technology for Verification and Analysis (ATVA). 2022.
-
International Symposium on Distributed Computing (DISC). 2022.
-
Lukas Aumayr, Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta,
Pedro Moreno-Sanchez, Matteo Maffei.
ACM Conference on Computer and Communications Security (CCS). 2022.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). December 2021.
-
Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei,
Pedro Moreno-Sanchez, Siavash Riahi.
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). December 2021.
-
Usenix Security Symposium (USENIX-Security). August 2021.
-
Nico Lehmann, Rose Kunkel, Jordan Brown, Jean Yang,
Niki Vazou, Nadia Polikarpova, Deian Stefan, Ranjit Jhala.
Usenix Symposium on Operating Systems Design and Implementation (OSDI). July 2021.
-
IEEE Symposium on Security and Privacy (SP). May 2021.
-
IEEE Symposium on Security and Privacy (SP). May 2021.
-
Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei,
Pedro Moreno-Sanchez, Siavash Riahi.
IEEE Symposium on Security and Privacy (SP). May 2021.
-
Manuel Barbosa,
Gilles Barthe, Xiong Fan, Benjamin Grégoire, Shih-Han Hung, Jonathan Katz, Pierre-Yves Strub, Xiaodi Wu, Li Zhou.
ACM Conference on Computer and Communications Security (CCS). 2021.
-
Manuel Barbosa,
Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub.
ACM Conference on Computer and Communications Security (CCS). 2021.
-
ACM Conference on Computer and Communications Security (CCS). 2021.
-
IEEE Computer Security Foundations Symposium (CSF). 2021.
-
IEEE Symposium on Logic in Computer Science (LICS). 2021.
-
Manuel Barbosa,
Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno.
IEEE Symposium on Security and Privacy (SP). 2021.
-
Gilles Barthe, Sunjay Cauligi, Benjamin Grégoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe.
IEEE Symposium on Security and Privacy (SP). 2021.
-
Financial Cryptography and Data Security Conference (FC). 2021.
-
International Conference on Cryptology and Network Security (CANS). 2021.
-
International Conference on Concurrency Theory (CONCUR). 2021.
-
Computing Research Repository (CoRR). 2021.
-
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2021.
-
Joaquín Arias, Mar Moreno-Rebato, Jose A. Rodriguez-García, Sascha Ossowski.
Advances in Artificial Intelligence, CAEPIA 20/21. 2021.
-
Enrico Bacis, Dario Facchinetti,
Marco Guarnieri, Marco Rosa, Matthew Rossi, Stefano Paraboschi.
International Conference on Availability, Reliability and Security (ARES). 2021.
-
Kinjal Basu, Sarat Varanasi, Farhad Shakerin,
Joaquin Arias, Gopal Gupta.
National Conference of the American Association for Artificial Intelligence (AAAI). 2021.
-
Jan Baumeister, Norine Coenen, Borzoo Bonakdarpour, Bernd Finkbeiner,
César Sánchez.
Computer Aided Verification (CAV). 2021.
-
IEEE Symposium on Logic in Computer Science (LICS). 2021.
UniStore: A fault-tolerant marriage of causal and strong consistency
Usenix Annual Technical Conference (USENIX). 2021.
An Experimental Framework for Improving the Performance of BFT Consensus for Future Permissioned Blockchains
Proceedings of the 15th ACM International Conference on Distributed and Event-Based Systems. 2021.
-
International Conference on Concurrency Theory (CONCUR). 2021.
-
Financial Cryptography and Data Security Conference (FC). 2021.
-
Financial Cryptography and Data Security Conference (FC). 2021.
-
Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Elefterios Kokoris-Kogias,
Pedro Moreno-Sanchez, Aggelos Kiayias, William Knottenbelt.
Financial Cryptography and Data Security Conference (FC). 2021.
HLola: a Very Functional Tool for Extensible Stream Runtime Verification
International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2021.
-
International Symposium on Formal Methods (FM). 2021.
-
International Conference on Runtime Verification (RV). 2021.
-
IEEE Symposium on Security and Privacy (SP). 2021.
-
Brendan Hall, Sarat Chandra Varanasi, Jan Fiedor,
Joaquín Arias, Kinjal Basu, Fang Li, Devesh Bhatt, Kevin Driscoll, Elmer Salazar, Gopal Gupta.
Computing Research Repository (CoRR). 2021.
-
International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2021.
-
ACM Conference on Computer and Communications Security (CCS). 2021.
-
International Symposium on Software Testing and Analysis (ISSTA). 2021.
-
Eurosys Conference (EuroSys). 2021.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2021.
-
IEEE International Conference on Robotics and Automation (ICRA). 2021.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). December 2020.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). December 2020.
-
Theory of Cryptography Conference (TCC). December 2020.
-
Annual Computer Security Applications Conference (ACSAC). December 2020.
-
ACM Conference on Computer and Communications Security (CCS). November 2020.
-
International Colloquium on Theoretical Aspects of Computing, ICTAC 2020. November 2020.
-
IEEE Working Conference on Source Code Analysis and Manipulation (SCAM). October 2020.
-
Automated Software Engineering Conference (ASE). September 2020.
-
IEEE International Working Conference on Mining Software Repositories (MSR). June 2020.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). April 2020.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR'19). April 2020.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). April 2020.
-
Network and Distributed System Security Symposium (NDSS). February 2020.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). January 2020.
-
International Conference on Applied Cryptography and Network Security (ACNS). 2020.
-
Borja Balle,
Gilles Barthe, Marco Gaboardi, Justin Hsu, Tetsuya Sato.
International Conference on Artificial Intelligence and Statistics (AISTATS). 2020.
-
International Conference on Artificial Intelligence and Statistics (AISTATS). 2020.
-
European Symposium on Programming (ESOP). 2020.
-
Genetic and Evolutionary Computations (GECCO). 2020.
-
José Bacelar Almeida, Manuel Barbosa,
Gilles Barthe, Vincent Laporte, Tiago Oliveira.
International Conference on Cryptology in India (INDOCRYPT). 2020.
-
Gilles Barthe, Rohit Chadha, Vishal Jagannath, A. Prasad Sistla, Mahesh Viswanathan.
IEEE Symposium on Logic in Computer Science (LICS). 2020.
-
IEEE Symposium on Logic in Computer Science (LICS). 2020.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2020.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2020.
-
International Symposium on Mathematical Foundations of Computer Science (MFCS). 2020.
-
Sunjay Cauligi, Craig Disselkoen, Klaus von Gleissenthall, Dean M. Tullsen, Deian Stefan, Tamara Rezk,
Gilles Barthe.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2020.
-
José Bacelar Almeida, Manuel Barbosa,
Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Vincent Laporte, Tiago Oliveira, Pierre-Yves Strub.
IEEE Symposium on Security and Privacy (SP). 2020.
-
Privacy Enhancing Technologies Symposium (PETS). 2020.
-
Computing Research Repository (CoRR). 2020.
-
Computing Research Repository (CoRR). 2020.
-
Dario Catalano, Mario Di Raimondo,
Dario Fiore, Irene Giacomelli.
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2020.
-
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2020.
Detecting and Diagnosing Energy Issues for Mobile Applications
International Symposium on Software Testing and Analysis (ISSTA). 2020.
-
Vitor Enes, Carlos Baquero, Tuanir França Rezende,
Alexey Gotsman, Matthieu Perrin, Pierre Sutra.
Eurosys Conference (EuroSys). 2020.
From big-step to small-step semantics and back with interpreter specialization
VPT 2020. 2020.
-
NASA Formal Methods (NFM). 2020.
Combining High Throughput and Low Migration Latency for Consistent Data Storage on the Edge
International Conference on Computer Communication and Networks (ICCCN). 2020.
-
ASIAN Symposium on Programming Languages and Systems (APLAS). 2020.
-
International Conference on Runtime Verification (RV). 2020.
-
IEEE Symposium on Security and Privacy (SP). 2020.
-
International Symposium on Mathematical Foundations of Computer Science (MFCS). 2020.
Incremental Analysis of Logic Programs with Assertions and Open Predicates
LOPSTR'19. 2020.
-
International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2020.
Cost Analysis of Smart Contracts via Parametric Resource Analysis
Static Analysis Symposium (SAS). 2020.
-
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2020.
-
Antonio Faonio,
Dario Fiore, Javier Herranz, Carla Ràfols.
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). November 2019.
-
ACM Conference on Computer and Communications Security (CCS). November 2019.
-
Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli.
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). November 2019.
-
Static Analysis Symposium (SAS). October 2019.
-
Martin Leucker,
César Sánchez, Torben Scheffel, Malte Schmitz, Daniel Thoma.
International Conference on Runtime Verification (RV). October 2019.
-
International Symposium on Distributed Computing (DISC). October 2019.
Towards Computing Abstract Distances in Logic Programs
ICLP Tech. Comms.. September 2019.
Towards a General Framework for Static Cost Analysis of Parallel Logic Programs
ICLP, Tech. Comms.. September 2019.
-
Iskander Sánchez-Rola, Matteo Dell'Amico,
Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, Igor Santos.
ACM Conference on Computer and Communications Security (CCS). July 2019.
White-box atomic multicast
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). June 2019.
-
IEEE Symposium on Security and Privacy (SP). May 2019.
-
Computing Research Repository (CoRR). April 2019.
-
Network and Distributed System Security Symposium (NDSS). February 2019.
Orion: A distributed file system for non-volatile main memory and RDMA-capable networks
Conference on File and Storage Technologies (FAST). February 2019.
-
Practical Aspects of Declarative Languages (PADL). January 2019.
Multivariant Assertion-based Guidance in Abstract Interpretation
28th Int’l. Symp. on Logic-based Program Synthesis and Transformation (LOPSTR'18). January 2019.
-
José Bacelar Almeida, Cecile Baritel-Ruet, Manuel Barbosa,
Gilles Barthe, François Dupressoir, Benjamin Grégoire,
Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub.
ACM Conference on Computer and Communications Security (CCS). 2019.
-
José Bacelar Almeida, Manuel Barbosa,
Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Grégoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran.
ACM Conference on Computer and Communications Security (CCS). 2019.
-
Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi.
ACM Conference on Computer and Communications Security (CCS). 2019.
-
Gilles Barthe, Benjamin Grégoire, Charlie Jacomme, Steve Kremer, Pierre-Yves Strub.
IEEE Computer Security Foundations Symposium (CSF). 2019.
-
Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert.
European Symposium On Research In Computer Security (ESORICS). 2019.
-
Gilles Barthe, Renate Eilers, Pamina Georgiou, Bernhard Gleiss, Laura Kovács, Matteo Maffei.
Formal Methods in Computer-Aided Design (FMCAD). 2019.
-
Tetsuya Sato,
Gilles Barthe, Marco Gaboardi, Justin Hsu, Shin-ya Katsumata.
IEEE Symposium on Logic in Computer Science (LICS). 2019.
-
International Symposium on Mathematical Foundations of Computer Science (MFCS). 2019.
-
Advances in Neural Information Processing Systems (NeurIPS). 2019.
-
Sunjay Cauligi, Gary Soeller, Brian Johannesmeyer, Fraser Brown, Riad S. Wahby, John Renner, Benjamin Grégoire,
Gilles Barthe, Ranjit Jhala, Deian Stefan.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2019.
-
Ezgi Çiçek, Weihao Qu,
Gilles Barthe, Marco Gaboardi, Deepak Garg.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2019.
-
Milod Kazerounian, Sankha Narayan Guria,
Niki Vazou, Jeffrey S. Foster, David Van Horn.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2019.
-
International Conference on Runtime Verification (RV). 2019.
-
Static Analysis Symposium (SAS). 2019.
-
International Conference on Principles of Distributed Systems (OPODIS). 2019.
Design Patterns for Code Reuse in HLS Packet Processing Pipelines
IEEE Symposium on Field Programmable Custom Computing Machines (FCCM). 2019.
-
International Conference on Field-Programmable Logic and Applications (FPL). 2019.
Reconfigurable Atomic Transaction Commit
ACM Symposium on Principles of Distributed Computing (PODC). 2019.
-
Computer Aided Verification (CAV). 2019.
-
Data Compression Conference (DCC). 2019.
-
Marco Guarnieri, Musard Balliu, Daniel Schoepe, David Basin, Andrei Sabelfeld.
IEEE European Symposium on Security and Privacy (EuroS&P). 2019.
Hourglass: Leveraging Transient Resources for Time-Constrained Graph Processing in the Cloud
Eurosys Conference (EuroSys). 2019.
-
Sandro Stucki,
César Sánchez, Gerardo Schneider, Borzoo Bonakdarpour.
International Symposium on Formal Methods (FM). 2019.
-
International Conference on Runtime Verification (RV). November 2018.
-
ACM Conference on Computer and Communications Security (CCS). October 2018.
-
Qingrui Liu,
Joseph Izraelevitz, Se Kwon Lee, Michael L. Scott, Sam H. Noh, Changhee Jung.
International Symposium on Microarchitecture (MICRO). October 2018.
-
Internet Measurement Conference (IMC). October 2018.
-
Conference on Security and Cryptography for Networks (SCN). September 2018.
Static Performance Guarantees for Programs with Run-time Checks
International Conference on Principles and Practice of Declarative Programming (PPDP). September 2018.
-
Michel Abdalla, Dario Catalano,
Dario Fiore, Romain Gay, Bogdan Ursu.
Advances in Cryptology (CRYPTO). August 2018.
-
International Conference on Field-Programmable Logic and Applications (FPL). August 2018.
-
International Conference on Field-Programmable Logic and Applications (FPL). August 2018.
Translating Code Comments to Procedure Specifications
International Symposium on Software Testing and Analysis (ISSTA). July 2018.
-
IEEE International Conference on Web Services (ICWS). July 2018.
Towards Incremental and Modular Context-sensitive Analysis
International Conference on Logic Programming (ICLP). July 2018.
-
International Conference on Applied Cryptography and Network Security (ACNS). June 2018.
-
Vishal Karande, Swarup Chandra, Zhiqiang Lin,
Juan Caballero, Latifur Khan, Kevin Hamlen.
Asia Conference on Information, Computer and Communications Security (AsiaCCS). June 2018.
-
IEEE International Conference on Program Comprehension (ICPC). May 2018.
-
IEEE International Working Conference on Mining Software Repositories (MSR). May 2018.
-
International Conference on Mobile Software Engineering and Systems (MOBILESoft). May 2018.
-
Chen Chen, Daniele E. Asoni, Adrian Perrig, David Barrera, George Danezis,
Carmela Troncoso.
IEEE European Symposium on Security and Privacy (EuroS&P). April 2018.
-
Principles and Practice of Parallel Programming (PPoPP). February 2018.
Exploiting Term Hiding to Reduce Run-time Checking Overhead
Practical Aspects of Declarative Languages (PADL). January 2018.
-
IEEE Symposium on Logic in Computer Science (LICS). 2018.
-
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2018.
-
Computer Aided Verification (CAV). 2018.
-
Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi.
ACM Conference on Computer and Communications Security (CCS). 2018.
-
José Bacelar Almeida, Manuel Barbosa,
Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela.
IEEE Computer Security Foundations Symposium (CSF). 2018.
-
IEEE Computer Security Foundations Symposium (CSF). 2018.
-
European Symposium on Programming (ESOP). 2018.
-
Gilles Barthe, Thomas Espitau, Marco Gaboardi, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub.
European Symposium on Programming (ESOP). 2018.
-
Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi.
International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2018.
-
International Colloquium on Automata Languages and Programming (ICALP). 2018.
-
Advances in Neural Information Processing Systems (NeurIPS). 2018.
-
Conference on Security and Cryptography for Networks (SCN). 2018.
i2kit: A Deployment Tool with the Simplicity of Containers and the Security of Virtual Machines
International Conference on Web Information Systems Engineering (WISE). 2018.
-
Network and Distributed System Security Symposium (NDSS). 2018.
-
International Conference on Hybrid Systems: Computation and Control (HSCC). 2018.
-
Logic-Based Program Synthesis and Transformation - 27th International Symposium. 2018.
-
International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2018.
Fine-Grained Secure Computation
Theory of Cryptography Conference (TCC). 2018.
-
Christian Colombo, Yliés Falcone, Martin Leucker, Giles Reger,
César Sánchez, Gerardo Schneider, Volker Stolz.
International Conference on Runtime Verification (RV). 2018.
-
International Symposium on Distributed Computing (DISC). 2018.
Compositional verification of compiler optimisations on relaxed memory
European Symposium on Programming (ESOP). 2018.
-
International Conference on Concurrency Theory (CONCUR). 2018.
-
Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2018.
-
Martin Leucker,
César Sánchez, Torben Scheffel, Malte Schmitz, Alexander Schramm.
ACM Symposium on Applied Computing (SAC). 2018.
-
International Symposium on Formal Methods (FM). 2018.
Paxos consensus, deconstructed and abstracted
European Symposium on Programming (ESOP). 2018.
-
Principles and Practice of Parallel Programming (PPoPP). 2018.
-
Cedric Baumann, Andrei Marian Dan,
Yuri Meshman, Torsten Hoefler, Martin T. Vechev.
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2018.
-
International Conference on Runtime Verification (RV). 2018.
-
International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2018.
Federated Byzantine quorum systems
International Conference on Principles of Distributed Systems (OPODIS). 2018.
Distributed Transactional Reads: The Strong, the Quick, the Fresh & the Impossible
ACM/IFIP/USENIX International Middleware Conference (Middleware). 2018.
-
International Symposium on Automated Technology for Verification and Analysis (ATVA). October 2017.
-
International Symposium on Automated Technology for Verification and Analysis (ATVA). October 2017.
-
G. Betarte, J. Campo, M. Cristiá,
F. Gorostiaga, C. Luna, C. Sanz.
Conferencia Latinoamericana En Informatica (CLEI). September 2017.
-
European Symposium On Research In Computer Security (ESORICS). September 2017.
-
International Symposium on Fundamentals of Computation Theory (FCT). September 2017.
-
Carmen Elisabetta Zaira Baltico, Dario Catalano,
Dario Fiore, Romain Gay.
Advances in Cryptology (CRYPTO). August 2017.
-
Vitalii Avdiienko, Konstantin Kuznetsov, Isabelle Rommelfanger, Andreas Rau,
Alessandra Gorla, Andreas Zeller.
International Conference on Software Engineering (ICSE). May 2017.
-
IEEE International Working Conference on Mining Software Repositories (MSR). May 2017.
-
IEEE Symposium on Security and Privacy (SP). May 2017.
-
Oliver Kennedy, D. Richard Hipp, Stratos Idreos, Amélie Marian, Arnab Nandi,
Carmela Troncoso, Eugene Wu.
International Conference on Data Engineering (ICDE). April 2017.
-
International Conference on Software Testing, Verification and Validation (ICST). March 2017.
-
IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). March 2017.
App Mining
Vitalii Avdiienko, Konstantin Kuznetsov,
Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, Eric Bodden.
Systems Engineering. February 2017.
Vergleich und Kombination von Techniken des Predictive Business Process Monitoring
Andreas Metzger, Philipp Leitner, Dragan Ivanovic, Eric Schmieders, Rod Franklin,
Manuel Carro, Schahram Dustdar, Klaus Pohl.
Systems Engineering. February 2017.
-
Network and Distributed System Security Symposium (NDSS). February 2017.
-
International Conference on Concurrency Theory (CONCUR). 2017.
A Fast and Verified Software Stack for Secure Function Evaluation
ACM Conference on Computer and Communications Security (CCS). 2017.
Jasmin: High-Assurance and High-Speed Cryptography
ACM Conference on Computer and Communications Security (CCS). 2017.
Zero-knowledge contingent payments revisited: Attacks and payments for services
Matteo Campanelli, Rosario Gennaro, Steven Goldfeder,
Luca Nizzardo.
ACM Conference on Computer and Communications Security (CCS). 2017.
Verified Translation Validation of Static Analyses
IEEE Computer Security Foundations Symposium (CSF). 2017.
-
ACM Conference on Computer and Communications Security (CCS). 2017.
-
Advances in Cryptology (CRYPTO). 2017.
-
Pedro R. D'Argenio,
Gilles Barthe, Sebastian Biewer, Bernd Finkbeiner, Holger Hermanns.
European Symposium on Programming (ESOP). 2017.
-
International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2017.
-
Martín Ochoa, Sebastian Banescu, Cynthia Disenfeld,
Gilles Barthe, Vijay Ganesh.
IEEE European Symposium on Security and Privacy (EuroS&P). 2017.
-
International Conference on Hybrid Systems: Computation and Control (HSCC). 2017.
-
International Colloquium on Automata Languages and Programming (ICALP). 2017.
-
Logic Programming and Automated Reasoning (LPAR). 2017.
-
International Conference on Model Driven Engineering Languages and Systems (MODELS). 2017.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2017.
-
Ezgi Çiçek,
Gilles Barthe, Marco Gaboardi, Deepak Garg, Jan Hoffmann.
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2017.
-
IEEE Symposium on Security and Privacy (SP). 2017.
Unilaterally-Authenticated Key Exchange
Financial Cryptography and Data Security Conference (FC). 2017.
Feature importance scores and lossless feature pruning using Banzhaf power indices
NIPS 2017 Symposium on Interpretable Machine Learning. 2017.
-
ACM Conference on Computer and Communications Security (CCS). 2017.
Security Analysis of Cache Replacement Policies
International Conference on Principles of Security and Trust (POST). 2017.
Concurrent Data Structures Linked in Time
European Conference on Object-Oriented Programming (ECOOP). 2017.
Rigorous Analysis of Software Countermeasures against Cache Attacks
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2017.
-
International Symposium on Distributed Computing (DISC). 2017.
-
European Symposium on Programming (ESOP). 2017.
Loophole: Timing Attacks on Shared Event Loops in Chrome
Usenix Security Symposium (USENIX-Security). 2017.
A Systematic Study of Cache Side Channels across AES Implementations
Engineering Secure Software and Systems (ESSoS). 2017.
Towards Run-time Checks Simplification via Term Hiding (extended abstract)
Tech. Comm. of ICLP'17. 2017.
-
International Conference on Concurrency Theory (CONCUR). 2017.
-
International Conference on Web and Internet Economics (WINE). December 2016.
-
Annual Computer Security Applications Conference (ACSAC). December 2016.
Description and Evaluation of a Generic Design to Integrate CLP and Tabled Execution
International Conference on Principles and Practice of Declarative Programming (PPDP). September 2016.
-
The International Symposium on Research in Attacks, Intrusions and Defenses (RAID). September 2016.
-
The International Symposium on Research in Attacks, Intrusions and Defenses (RAID). September 2016.
Reducing the Overhead of Assertion Run-time Checks via Static Analysis
International Conference on Principles and Practice of Declarative Programming (PPDP). September 2016.
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services
Usenix Security Symposium (USENIX-Security). August 2016.
-
International Symposium on Software Testing and Analysis (ISSTA). July 2016.
-
International Symposium on Functional and Logic Programming (FLOPS). March 2016.
Multi-Key Homomorphic Authenticators
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2016.
Relational Logic with Framing and Hypotheses
Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2016.
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data
Dario Fiore, Cédric Fournet, Esha Gosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno.
ACM Conference on Computer and Communications Security (CCS). 2016.
-
IEEE Computer Security Foundations Symposium (CSF). 2016.
-
Computer Aided Verification (CAV). 2016.
-
Computer Aided Verification (CAV). 2016.
-
ACM Conference on Computer and Communications Security (CCS). 2016.
-
ACM Conference on Computer and Communications Security (CCS). 2016.
-
ACM Conference on Computer and Communications Security (CCS). 2016.
-
International Conference on Certified Programs and Proofs (CPP). 2016.
-
ACM Conference on Embedded Software (EMSOFT). 2016.
-
International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2016.
A Theory of Slicing for Probabilistic Control Flow Graphs
Foundations of Software Science and Computational Structures (FOSSACS). 2016.
-
Christian Meurisch, Usman Naeem, Muhammad Awais Azam, Frederik Janssen,
Benedikt Schmidt, Max Mühlhäuser.
ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp). 2016.
A Program Logic for Union Bounds
International Colloquium on Automata Languages and Programming (ICALP). 2016.
-
International Conference on Information Systems (ICIS). 2016.
Facets of Software Doping
Gilles Barthe, Pedro R. D'Argenio, Bernd Finkbeiner, Holger Hermanns.
International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2016.
-
International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2016.
-
International Conference on Intelligent User Interfaces (IUI). 2016.
-
IEEE Symposium on Logic in Computer Science (LICS). 2016.
-
International Conference on Mobile and Ubiquitous Systems: Networks and Services (Mobiquitous). 2016.
-
International Conference on Model Driven Engineering Languages and Systems (MODELS). 2016.
-
Nikhil Swamy, Catalin Hritcu, Chantal Keller, Aseem Rastogi, Antoine Delignat-Lavaud, Simon Forest, Karthikeyan Bhargavan, Cédric Fournet,
Pierre-Yves Strub, Markulf Kohlweiss, Jean Karim Zinzindohoue, Santiago Zanella Béguelin.
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2016.
-
Static Analysis Symposium (SAS). 2016.
-
IEEE Symposium on Security and Privacy (SP). 2016.
-
International Symposium on Games, Automata, Logics and Formal Verification (GandALF). 2016.
-
International Conference on Functional Programming (ICFP). 2016.
A Source-level Energy Optimization Framework for Mobile Applications
IEEE Working Conference on Source Code Analysis and Manipulation (SCAM). 2016.
Nearly Optimal Verifiable Data Streaming
Johannes Krupp, Dominique Schroeder, Mark Simkin,
Dario Fiore, Giuseppe Ateniese, Stefan Nuernberger.
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2016.
On the (In)security of SNARKs in the Presence of Oracles
Theory of Cryptography Conference (TCC). 2016.
-
(HIP3ES'16). 2016.
-
Computer Aided Verification (CAV). 2016.
'Cause I'm strong enough: reasoning about consistency choices in distributed systems
Alexey Gotsman, Hongseok Yang, Carla Ferreira, Mahsa Najafzadeh, Marc Shapiro.
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2016.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2016.
Verifying Constant-Time Implementations
Usenix Security Symposium (USENIX-Security). 2016.
Specification and Complexity of Collaborative Text Editing
Hagit Attiya, Sebastian Burckhardt,
Alexey Gotsman, Adam Morrison, Hongseok Yang, Marek Zawirski.
ACM Symposium on Principles of Distributed Computing (PODC). 2016.
-
Javier Esparza,
Pierre Ganty, Jérôme Leroux, Rupak Majumdar.
Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2016.
A General Framework for Static Profiling of Parametric Resource Usage
ICLP. 2016.
-
International Conference on Hybrid Systems: Computation and Control (HSCC). 2016.
-
Proc. of FOPARA. 2016.
-
International Symposium on Temporal Representation and Reasoning (TIME). 2016.
Robustness against Consistency Models with Atomic Visibility
International Conference on Concurrency Theory (CONCUR). 2016.
Hoare-style Specifications As Correctness Conditions for Non-linearizable Concurrent Objects
ACM Conference on Object Oriented Programming Systems Languages and Applications (OOPSLA). 2016.
Analysing Snapshot Isolation
ACM Symposium on Principles of Distributed Computing (PODC). 2016.
A Generic Logic for Proving Linearizability
International Symposium on Formal Methods (FM). 2016.
Automated Test Input Generation for Android: Are We There Yet?
International Conference on Automated Software Engineering (ASE). November 2015.
-
ACM Conference on Computer and Communications Security (CCS). October 2015.
-
ACM Conference on Computer and Communications Security (CCS). October 2015.
A Haskell Implementation of a Rule-Based Program Transformation for C Programs
Practical Aspects of Declarative Languages (PADL). June 2015.
Mining Apps for Abnormal Usage of Sensitive Data
Vitalii Avdiienko, Konstantin Kuznetsov,
Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, Eric Bodden.
International Conference on Software Engineering (ICSE). May 2015.
-
Kurt Thomas, Elie Bursztein, Nav Jagpal, Moheeb Abu, Niels Provos, Paul Pearce, Grant Hoand Damon McCoy, Chris Grier, Vern Paxson,
Antonio Nappa, Alexandros Kapravelos.
IEEE Symposium on Security and Privacy (SP). May 2015.
-
IEEE Symposium on Security and Privacy (SP). May 2015.
-
ACM Conference on Computer and Communications Security (CCS). 2015.
-
International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2015.
-
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2015.
Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
Advances in Cryptology (CRYPTO). 2015.
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
ACM Conference on Computer and Communications Security (CCS). 2015.
-
Manuel Clavel, Francisco Durán, Steven Eker, Santiago Escobar, Patrick Lincoln, Narciso Martí-Oliet, Carolyn L. Talcott.
Logic, Rewriting, and Concurrency - Essays dedicated to José Meseguer on the Occasion of His 65th Birthday. 2015.
-
International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2015.
-
International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS). 2015.
-
Logic Programming and Automated Reasoning (LPAR). 2015.
-
Logic Programming and Automated Reasoning (LPAR). 2015.
-
Antoine Durand-Gasselin, Javier Esparza,
Pierre Ganty, Rupak Majumdar.
Computer Aided Verification (CAV). 2015.
-
Fundamental Approaches to Software Engineering (FASE). 2015.
-
Asia-Pacific Conference on Conceptual Modelling (APCCM). 2015.
Verification of Population Protocols
Javier Esparza,
Pierre Ganty, Jérôme Leroux, Rupak Majumdar.
International Conference on Concurrency Theory (CONCUR). 2015.
From Non-Zenoness Verification to Termination
International Conference on Formal Methods and Models for Co-Design (MEMOCODE). 2015.
Interprocedural Reachability for Flat Integer Programs
International Symposium on Fundamentals of Computation Theory (FCT). 2015.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2015.
-
Carlos Cotrini Jiménez, Thilo Weghorn, David A. Basin,
Manuel Clavel.
IEEE Computer Security Foundations Symposium (CSF). 2015.
-
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2015.
Synthesis of Equivalent Method Calls in Guava
International Symposium on Search Based Software Engineering (SSBSE). 2015.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2015.
Bounded error flowpipe computation of parameterized linear systems
ACM Conference on Embedded Software (EMSOFT). 2015.
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
Michael Backes, Manuel Barbosa,
Dario Fiore, Raphael M. Reischuk.
IEEE Symposium on Security and Privacy (SP). 2015.
-
IFIP TC12 Publications (IFIP12). 2015.
-
Soft Computing Models in Industrial and Environmental Applications (SOCO). 2015.
Energy Efficient Allocation and Scheduling for DVFS-enabled Multicore Environments using a Multiobjective Evolutionary Algorithm
Genetic and Evolutionary Computations (GECCO). 2015.
-
Hybrid Artificial Intelligent Systems (HAIS 2015). 2015.
Transaction chopping for parallel snapshot isolation
International Symposium on Distributed Computing (DISC). 2015.
Composite replicated data types
European Symposium on Programming (ESOP). 2015.
-
Computer Aided Verification (CAV). 2015.
-
European Symposium on Programming (ESOP). 2015.
-
International Colloquium on Automata Languages and Programming (ICALP). 2015.
-
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2015.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2015.
-
Arvind Haran, Montgomery Carter,
Michael Emmi, Akash Lal, Shaz Qadeer, Zvonimir Rakamaric.
International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2015.
Rational Protection Against Timing Attacks
IEEE Computer Security Foundations Symposium (CSF). 2015.
Towards Energy Consumption Verification via Static Analysis
WS on High Perf. Energy Efficient Embedded Sys. (HIP3ES). 2015.
-
Proc. of the 27th Int’l Conf. on Computer Aided Verification (CAV'15). 2015.
A framework for transactional consistency models with atomic visibility
International Conference on Concurrency Theory (CONCUR). 2015.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2015.
Reasoning about the Trade-off between Security and Performance
Proc. 12th International Conference on Quantitative Evaluation of Systems (QEST ‘15). 2015.
Symbolic Polytopes for Quantitative Interpolation and Verification
Klaus von Gleissenthall,
Boris Köpf, Andrey Rybalchenko.
Computer Aided Verification (CAV). 2015.
-
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2015.
Specifying and Verifying Concurrent Algorithms with Histories and Subjectivity
European Symposium on Programming (ESOP). 2015.
Mechanized Verification of Fine-grained Concurrent Programs
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2015.
A Model-driven Methodology for Generating and Verifying CSP-based Java Code
Communicating Process Architectures 2015, Proceedings of the 37th WoTUG Conference on Concurrent and Parallel Systems. 2015.
An XFEM/CZM implementation for massively parallel simulations of composites fracture
Antoine Jerusalem,
Guillermo Vigueras, Federico Sket, Cristobal Samaniego, Ling Wu, Ludovic Noels, Denny Tjahjanto, Eva Casoni, Guillaume Houzeaux, Ahmed Makradi, Jon M. Molina-Aldareguia, Mariano Vazquez.
European Solid Mechanics Conference, ESMC 2015. 2015.
-
Annual Computer Security Applications Conference (ACSAC). December 2014.
-
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie.
ACM Conference on Computer and Communications Security (CCS). November 2014.
-
ACM Conference on Computer and Communications Security (CCS). November 2014.
-
ACM Conference on Computer and Communications Security (CCS). November 2014.
-
International Conference on Service Oriented Computing (ICSOC). November 2014.
-
International Conference on Service Oriented Computing (ICSOC). November 2014.
-
Internet Measurement Conference (IMC). November 2014.
On Combining Backward and Forward Chaining in Constraint Logic Programming
International Conference on Principles and Practice of Declarative Programming (PPDP). September 2014.
Assertion-based Debugging of Higher-Order (C)LP Programs
International Conference on Principles and Practice of Declarative Programming (PPDP). September 2014.
-
European Symposium On Research In Computer Security (ESORICS). September 2014.
Certified Synthesis of Efficient Batch Verifiers
IEEE Computer Security Foundations Symposium (CSF). July 2014.
-
IEEE Computer Security Foundations Symposium (CSF). July 2014.
-
Network and Distributed System Security Symposium (NDSS). February 2014.
-
International Conference on Model Driven Engineering Languages and Systems (MODELS). 2014.
Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy
Computer Security Foundations Symposium (CSF 2014). 2014.
-
Achim D. Brucker, Tony Clark,
Carolina Dania, Geri Georg, Martin Gogolla, Frédéric Jouault, Ernest Teniente, Burkhart Wolff.
International Conference on Model Driven Engineering Languages and Systems (MODELS). 2014.
Homomorphic Signatures with Efficient Verification for Polynomial Functions
Advances in Cryptology (CRYPTO). 2014.
Efficiently Verifiable Computation on Encrypted Data
ACM Conference on Computer and Communications Security (CCS). 2014.
-
International Conference on Concurrency Theory (CONCUR). 2014.
-
Advances in Cryptology (CRYPTO). 2014.
-
Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti,
Pierre-Yves Strub, Santiago Zanella Béguelin.
Advances in Cryptology (CRYPTO). 2014.
-
IEEE International Conference on Robotics and Automation (ICRA). 2014.
-
Conference on Interactive Theorem Proving (ITP). 2014.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
-
Nikhil Swamy, Cédric Fournet, Aseem Rastogi, Karthikeyan Bhargavan, Juan Chen,
Pierre-Yves Strub, Gavin M. Bierman.
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
A Logical Analysis of Framing for Specifications with Pure Method Calls
Verified Software: Theories (VSTTE). 2014.
-
International Symposium on Theoretical Aspects of Software Engineering (TASE). 2014.
Generalizing Homomorphic MACs for Arithmetic Circuits
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2014.
Interactive Encryption and Message Authentication
Conference on Security and Cryptography for Networks (SCN). 2014.
-
Proceedings of the 2014 IEEE Symposium on Security and Privacy. 2014.
Modular, higher-order cardinality analysis in theory and practice
Ilya Sergey, Dimitrios Vytiniotis, Simon L. Peyton Jones.
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
Characterising Testing Preorders for Broadcasting Distributed Systems
Trustworthy Global Computing (TGC). 2014.
Leakage Resilience against Concurrent Cache Attacks
International Conference on Principles of Security and Trust (POST). 2014.
-
International Joint Conference on Automated Reasoning (IJCAR). 2014.
-
International Conference on Runtime Verification (RV). 2014.
-
Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe,
César Sánchez.
International Conference on Principles of Security and Trust (POST). 2014.
-
Computer Aided Verification (CAV). 2014.
-
Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Alfredo Pironti,
Pierre-Yves Strub.
IEEE Symposium on Security and Privacy (SP). 2014.
-
International SPIN Symposium on Model Checking of Software (SPIN). 2014.
Replicated data types: specification, verification, optimality
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
Ordered Counter Abstraction (Refinable Subword Relations for Parameterized Verification)
International Conference on Language and Automata Theory and Applications (LATA). 2014.
Energy Consumption Analysis of Programs based on XMOS ISA-Level Models
LOPSTR. 2014.
Modular Reasoning about Heap Paths via Effectively Propositional Formulas
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
Parameterised linearisability
International Colloquium on Automata Languages and Programming (ICALP). 2014.
Communicating State Transition Systems for Fine-Grained Concurrent Resources
European Symposium on Programming (ESOP). 2014.
-
American Control Conference (ACC). 2014.
-
International Symposium on Automated Technology for Verification and Analysis (ATVA). 2014.
-
Computer Aided Verification (CAV). 2014.
-
International Symposium on Temporal Representation and Reasoning (TIME). 2014.
-
Trustworthy Global Computing (TGC). 2014.
Safety of live transactions in transactional memory: TMS is necessary and sufficient
International Symposium on Distributed Computing (DISC). 2014.
-
ACM Conference on Computer and Communications Security (CCS). November 2013.
-
Martina Lindorfer, Matthias Neumayr,
Juan Caballero, Christian Platzer.
ACM Conference on Computer and Communications Security (CCS). November 2013.
-
The International Symposium on Research in Attacks, Intrusions and Defenses (RAID). October 2013.
Sized Type Analysis for Logic Programs
International Conference on Logic Programming (ICLP). August 2013.
-
GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). July 2013.
Supporting Pruning in Tabled LP
Practical Aspects of Declarative Languages (PADL). January 2013.
Reversible Language Extensions and their Application in Debugging
Practical Aspects of Declarative Languages (PADL). January 2013.
-
ACM Conference on Computer and Communications Security (CCS). 2013.
Verified Computational Differential Privacy with Applications to Smart Metering
Gilles Barthe, George Danezis, Benjamin Grégoire, César Kunz, Santiago Zanella Béguelin.
IEEE Computer Security Foundations Symposium (CSF). 2013.
-
Logical Foundations of Computer Science (LFCS). 2013.
-
Cédric Fournet, Nikhil Swamy, Juan Chen, Pierre-Évariste Dagand,
Pierre-Yves Strub, Benjamin Livshits.
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2013.
-
Principles and Practice of Parallel Programming (PPoPP). 2013.
-
Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti,
Pierre-Yves Strub.
IEEE Symposium on Security and Privacy (SP). 2013.
OCL2FOL+: Coping with Undefinedness
International Conference on Model Driven Engineering Languages and Systems (MODELS). 2013.
-
International Conference on Functional Programming (ICFP). 2013.
-
International Conference on Principles and Practice of Declarative Programming (PPDP). 2013.
-
Computer Aided Verification - 25th International Conference, CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings. 2013.
Monadic abstract interpreters
Ilya Sergey, Dominique Devriese, Matthew Might, Jan Midtgaard, David Darais, Dave Clarke, Frank Piessens.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2013.
-
International Conference on Hybrid Artificial Intelligence Systems (HAIS). 2013.
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach
Network and Distributed System Security Symposium (NDSS). 2013.
Verifying Concurrent Programs Against Sequential Specifications
European Symposium on Programming (ESOP). 2013.
Library abstraction for C/C++ concurrency
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2013.
CacheAudit: A Tool for the Static Analysis of Cache Side Channels
Usenix Security Symposium (USENIX-Security). 2013.
Parameterized Verification of Asynchronous Shared-Memory Systems
Computer Aided Verification (CAV). 2013.
Proving Termination Starting from the End
Computer Aided Verification (CAV). 2013.
Underapproximation of Procedure Summaries for Integer Programs
International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2013.
Effectively-Propositional Reasoning about Reachability in Linked Data Structures
Computer Aided Verification (CAV). 2013.
Automation of Quantitative Information-Flow Analysis
School on Formal Methods for the Design of Computer, Communication and Software Systems (SFM). 2013.
Subjective Auxiliary State for Coarse-Grained Concurrency
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2013.
Abstraction Based Model-Checking of Stability of Hybrid Systems
Computer Aided Verification (CAV). 2013.
Pre-orders for reasoning about stability properties with respect to input of hybrid systems
ACM Conference on Embedded Software (EMSOFT). 2013.
On the decidability of stability of hybrid systems
International Conference on Hybrid Systems: Computation and Control (HSCC). 2013.
Patching task-level robot controllers based on a local -calculus formula
IEEE International Conference on Robotics and Automation (ICRA). 2013.
Hybrid Automata based CEGAR for Rectangular Hybrid Automata
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2013.
Verifying Information Flow Properties of Hybrid Systems
High Confidence Networked Systems (HiCoNS). 2013.
Verifying concurrent memory reclamation algorithms with grace
European Symposium on Programming (ESOP). 2013.
Dependent Types for Enforcement of Information Flow and Erasure Policies in Heterogeneous Data Structures
International Conference on Principles and Practice of Declarative Programming (PPDP). 2013.
A programming language perspective on transactional memory consistency
ACM Symposium on Principles of Distributed Computing (PODC). 2013.
An XFEM Implementation for Fracture Simulations of Composites
Guillermo Vigueras, Cristobal Samaniego, Guillaume Houzeau, Mariano Vazquez, Antoine Jerusalem.
International Conference on Computational Plasticity. Fundamentals and Applications. COMPLAS 2013. 2013.
An XFEM-CZM Implementation for Large-Scale Fracture Simulations of Composites Laminates
Guillermo Vigueras, Cristobal Samaniego, Eva Casoni, Guillaume Houzeau, Federico Sket, Jon Molina-Aldareguia, Ahmed Makradi, Mariano Vazquez, Antoine Jerusalem.
European Congress and Exhibition on Advanced Materials and Processes. EUROMAT 2013. 2013.
Mtac: A Monad for Typed Tactic Programming in Coq
Beta Ziliani, Derek Dreyer, Neelakantan R. Krishnaswami,
Aleksandar Nanevski, Viktor Vafeiadis.
International Conference on Functional Programming (ICFP). 2013.
A Constraint-Based Approach to Quality Assurance in Service Choreographies
International Conference on Service Oriented Computing (ICSOC). November 2012.
-
Chris Grier, Lucas Ballard,
Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy,
Antonio Nappa, Andreas Pitsillidis, Niels Provos,
M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker.
ACM Conference on Computer and Communications Security (CCS). October 2012.
Deriving Specifications for Composite Web Services
George Bariannys,
M. Carro, Dimitris Plexousakis.
International Computer Software and Applications Conference (COMPSAC). July 2012.
-
International Symposium on Software Testing and Analysis (ISSTA). July 2012.
A General Implementation Framework for Tabled CLP
International Symposium on Functional and Logic Programming (FLOPS). May 2012.
A Segment-Swapping Approach for Executing Trapped Computations
Practical Aspects of Declarative Languages (PADL). January 2012.
-
8th Scandinavian Logic Symposium, 20-21 August 2012, Roskilde University, Denmark. 2012.
A Formally Verified SSA-Based Middle-End - Static Single Assignment Meets CompCert
European Symposium on Programming (ESOP). 2012.
Programming Paradigm Driven Heap Analysis
International Conference on Compiler Construction (CC). 2012.
Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols
José Bacelar Almeida, Manuel Barbosa, Endre Bangerter,
Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin.
ACM Conference on Computer and Communications Security (CCS). 2012.
Verified Security of Redundancy-Free Encryption from Rabin and RSA
ACM Conference on Computer and Communications Security (CCS). 2012.
Automation in Computer-Aided Cryptography: Proofs, Attacks and Designs
International Conference on Certified Programs and Proofs (CPP). 2012.
Verified Security of Merkle-Damgård
Michael Backes,
Gilles Barthe, Matthias Berg, Benjamin Grégoire,
César Kunz, Malte Skoruppa, Santiago Zanella Béguelin.
IEEE Computer Security Foundations Symposium (CSF). 2012.
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization
IEEE Computer Security Foundations Symposium (CSF). 2012.
Secure Multi-Execution through Static Program Transformation
IFIP WG 6.1 International Conference on Formal Techniques for (Networked and) Distributed Systems (FORTE). 2012.
Probabilistic Relational Hoare Logics for Computer-Aided Security Proofs
Mathematics of Program Construction (MPC). 2012.
Verification of Software Barriers
Principles and Practice of Parallel Programming (PPoPP). 2012.
Computer-Aided Cryptographic Proofs
Static Analysis Symposium (SAS). 2012.
Decision Procedures for Region Logic
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2012.
Verified Indifferentiable Hashing into Elliptic Curves
International Conference on Principles of Security and Trust (POST). 2012.
Probabilistic Relational Reasoning for Differential Privacy
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2012.
Automatic Quantification of Cache Side-Channels
Computer Aided Verification (CAV). 2012.
-
Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2012.
-
IEEE Symposium on Logic in Computer Science (LICS). 2012.
Non-Monotonic Self-Adjusting Computation
European Symposium on Programming (ESOP). 2012.
Linearizability with ownership transfer
International Conference on Concurrency Theory (CONCUR). 2012.
Concurrent library correctness on the TSO memory model
Sebastian Burckhardt,
Alexey Gotsman, Madanlal Musuvathi, Hongseok Yang.
European Symposium on Programming (ESOP). 2012.
Foundations for Approximation Based Analysis of Stability Properties of Hybrid Systems
Allerton Conference on Communication, Control, and Computing (Allerton). 2012.
Conformance Testing of Boolean Programs with Multiple Faults
IFIP WG 6.1 International Conference on Formal Techniques for (Networked and) Distributed Systems (FORTE). 2012.
Pre-orders for reasoning about stability
International Conference on Hybrid Systems: Computation and Control (HSCC). 2012.
-
International Symposium on Temporal Representation and Reasoning (TIME). 2012.
-
International Colloquium on Theoretical Aspects of Computing (ICTAC). 2012.
-
Static Analysis Symposium (SAS). 2012.
Show no weakness: sequentially consistent specifications of TSO libraries
International Symposium on Distributed Computing (DISC). 2012.
Constraint-Based Runtime Prediction of SLA Violations in Service Orchestrations
International Conference on Service Oriented Computing (ICSOC). December 2011.
A Machine-Checked Framework for Relational Separation Logic
International Conference on Software Engineering and Formal Methods (SEFM). November 2011.
Verifiable Security of Boneh-Franklin Identity-Based Encryption
International Conference on Provable Security (ProvSec). October 2011.
Computer-Aided Security Proofs for the Working Cryptographer
Advances in Cryptology (CRYPTO). August 2011.
Measuring Pay-per-Install: The Commoditization of Malware Distribution
Usenix Security Symposium (USENIX-Security). August 2011.
CLP Projection for Constraint Handling Rules
International Conference on Principles and Practice of Declarative Programming (PPDP). July 2011.
Modular Extensions for Modular (Logic) Languages
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). July 2011.
Automated Attribute Inference in Complex Service Workflows Based on Sharing Analysis
IEEE International Conference on Services Computing (IEEE SCC). July 2011.
Formally Verifying Isolation and Availability in an Idealized Model of Virtualization
International Symposium on Formal Methods (FM). June 2011.
Relational Verification Using Product Programs
International Symposium on Formal Methods (FM). June 2011.
A decade of model-driven security
ACM Symposium on Access Control Models and Technologies (SACMAT). June 2011.
Applicative Shortcut Fusion
Symposium on Trends in Functional Programming (TFP). May 2011.
-
Noah M. Johnson,
Juan Caballero, Kevin Chen, Stephen McCamant, Pongsin Poosankam, Daniel Reynaud, Dawn Song.
IEEE Symposium on Security and Privacy (SP). May 2011.
Beyond Provable Security Verifiable IND-CCA Security of OAEP
The Cryptographer’s Track at RSA Conference (CT-RSA). February 2011.
Approximating Petri Net Reachability Along Context-free Traces
Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2011.
Complexity Analysis of the Backward Coverability Algorithm for VASS
Reachability Problems (RP). 2011.
Non-Uniform Distributions in Quantitative Information-Flow
ACM Conference on Computer and Communications Security (CCS). 2011.
Static Enforcement of Information Flow Policies for a Concurrent JVM-like Language
Trustworthy Global Computing (TGC). 2011.
Information-theoretic Bounds for Differentially Private Mechanisms
IEEE Computer Security Foundations Symposium (CSF). 2011.
Model-Driven Development of Security-Aware GUIs for Data-Centric Applications
Foundations of Security Analysis and Design (FOSAD). 2011.
Third International Workshop on Principles of Engineering Service-Oriented Systems (PESOS 2011)
M. Carro, D. Karastoyanova, G. A. Lewis, A. Liu.
ICSE. 2011.
Precision and the conjunction rule in concurrent separation logic
Electronic Notes in Theoretical Computer Science (ENTCS). 2011.
Complexity of Pattern-based Verification for Multithreaded Programs
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2011.
How to make ad hoc proof automation less ad hoc
International Conference on Functional Programming (ICFP). 2011.
The Ciao Approach to the Dynamic vs. Static Language Dilemma
Proc. Int’l. WS on Scripts to Programs, STOP'11. 2011.
Liveness-Preserving Atomicity Abstraction
International Colloquium on Automata Languages and Programming (ICALP). 2011.
On the Strength of Owicki-Gries for Resources
ASIAN Symposium on Programming Languages and Systems (APLAS). 2011.
Verification of Information Flow and Access Control Policies with Dependent Types
IEEE Symposium on Security and Privacy (SP). 2011.
Profiling for Run-Time Checking of Computational Properties and Performance Debugging in Logic Programs
Practical Aspects of Declarative Languages (PADL). 2011.
-
NASA Formal Methods (NFM). 2011.
Modular verification of preemptive OS kernels
International Conference on Functional Programming (ICFP). 2011.
Partiality, State and Dependent Types
International Conference on Typed Lambda Calculi and Applications (TLCA). 2011.
Towards Fuzzy Granularity Control in Parallel/Distributed Computing
International Conference on Fuzzy Computation (ICFC 2010). October 2010.
A Framework for Verification and Debugging of Resource Usage Properties: Resource Usage Verification
International Conference on Logic Programming (ICLP). July 2010.
Automatic Generation of Smart, Security-Aware GUI Models
Engineering Secure Software and Systems (ESSoS). 2010.
Constraint-Based Abstract Semantics for Temporal Logic: A Direct Approach to Design and Implementation
Logic Programming and Automated Reasoning (LPAR). 2010.
A Machine-Checked Formalization of Sigma-Protocols
IEEE Computer Security Foundations Symposium (CSF). 2010.
Programming Language Techniques for Cryptographic Proofs
Conference on Interactive Theorem Proving (ITP). 2010.
A Functional Framework for Result Checking
International Symposium on Functional and Logic Programming (FLOPS). 2010.
Perspectives in Certificate Translation
Trustworthy Global Computing (TGC). 2010.
Computational Indistinguishability Logic
Gilles Barthe, Marion Daubignard, Bruce M. Kapron, Yassine Lakhnech.
ACM Conference on Computer and Communications Security (CCS). 2010.
Robustness Guarantees for Anonymity
Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tamara Rezk, Bogdan Warinschi.
IEEE Computer Security Foundations Symposium (CSF). 2010.
Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions
European Symposium on Programming (ESOP). 2010.
A Practical Generic Privacy Language
International Conference on Information Systems Security (ICISS). 2010.
On the Equality of Probabilistic Terms
Gilles Barthe, Marion Daubignard, Bruce M. Kapron, Yassine Lakhnech, Vincent Laporte.
Logic Programming and Automated Reasoning (LPAR). 2010.
Thread-Modular Counterexample-Guided Abstraction Refinement
Static Analysis Symposium (SAS). 2010.
Local Reasoning and Dynamic Framing for the Composite Pattern and Its Clients
Verified Software: Theories (VSTTE). 2010.
SSG: a Model-Based Development Environment for Smart, Security-Aware GUIs
International Conference on Software Engineering (ICSE). 2010.
Certificate Translation for the Verification of Concurrent Programs
Trustworthy Global Computing (TGC). 2010.
Speaker Recognition in Encrypted Voice Streams
Michael Backes, Goran Doychev, Markus Dürmuth,
Boris Köpf.
European Symposium On Research In Computer Security (ESORICS). 2010.
-
Krishnendu Chatterjee, Luca de Alfaro, Vishwanath Raman,
César Sánchez.
Fundamental Approaches to Software Engineering (FASE). 2010.
-
Computer Aided Verification (CAV). 2010.
Towards Data-Aware QoS-Driven Adaptation for Service Orchestrations
IEEE International Conference on Web Services (ICWS). 2010.
Automatic Fragment Identification in Workflows Based on Sharing Analysis
International Conference on Service Oriented Computing (ICSOC). 2010.
Approximation and Randomization for Quantitative Information-Flow Analysis
IEEE Computer Security Foundations Symposium (CSF). 2010.
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
IEEE Computer Security Foundations Symposium (CSF). 2010.
-
International Symposium on Temporal Representation and Reasoning (TIME). 2010.
Shape Analysis with Reference Set Relations
Mark Marron, Rupak Majumdar, Darko Stefanovic, Deepak Kapur.
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2010.
Structuring the verification of heap-manipulating programs
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2010.
Program Parallelization using Synchronized Pipelining
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2010.
Traceable data types for self-adjusting computation
Umut A. Acar, Guy E. Blelloch,
Ruy Ley-Wild, Kanat Tangwongsan, Duru Türkoglu.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2010.
-
International Conference on Formal Engineering Methods (ICFEM). 2010.
-
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2010.
A Coding Rule Conformance Checker Integrated into GCC
Electronic Notes in Theoretical Computer Science (ENTCS). August 2009.
Integrating Software Testing and Run-Time Checking in an Assertion Verification Framework
International Conference on Logic Programming (ICLP). July 2009.
Merlin: specification inference for explicit information flow problems
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). June 2009.
Identification of Logically Related Heap Regions
International Symposium on Memory Management (ISMM). June 2009.
Towards a Complete Scheme for Tabled Execution Based on Program Transformation
Practical Aspects of Declarative Languages (PADL). January 2009.
Constraint-Based Abstraction of a Model Checker for Infinite State Systems
(Constraint) Logic Programming (WLP). 2009.
Formal Certification of Code-Based Cryptographic Proofs
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2009.
Implementing a Direct Method for Certificate Translation
International Conference on Formal Engineering Methods (ICFEM). 2009.
Unification and Narrowing in Maude 2.4
M. Clavel, F. Durán, S. Eker, S. Escobar, P. Lincoln, N. Martí-Oliet, J. Meseguer, C. L. Talcott.
International Conference on Rewriting Techniques and Applications (RTA). 2009.
Non-discriminating Arguments and Their Uses
International Conference on Logic Programming (ICLP). 2009.
A language for information flow: dynamic tracking in multiple interdependent dimensions
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2009.
Vérification d'invariants pour des systèmes spécifiés en logique de réécriture
Journées francophones des langages applicatifs (JFLA). 2009.
Formally Certifying the Security of Digital Signature Schemes
IEEE Symposium on Security and Privacy (SP). 2009.
-
International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS). 2009.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2009.
-
International Conference on Implementation and Application of Automata (CIAA). 2009.
A Tabling Implementation Based on Variables with Multiple Bindings
International Conference on Logic Programming (ICLP). 2009.
A Sketch of a Complete Scheme for Tabled Execution Based on Program Transformation
International Conference on Logic Programming (ICLP). December 2008.
A High-Level Implementation of Non-Deterministic, Unrestricted, Independent And-Parallelism
International Conference on Logic Programming (ICLP). December 2008.
Negative Ternary Set-Sharing
International Conference on Logic Programming (ICLP). December 2008.
-
International Conference on Principles and Practice of Declarative Programming (PPDP). July 2008.
Comparing Tag Scheme Variations Using an Abstract Machine Generator
International Conference on Principles and Practice of Declarative Programming (PPDP). July 2008.
Safe Upper-bounds Inference of Energy Consumption for Java Bytecode Applications
NASA LFM'08. April 2008.
Efficient Context-Sensitive Shape Analysis with Graph-Based Heap Models
International Conference on Compiler Construction (CC). April 2008.
Towards a High-Level Implementation of Execution Primitives for Unrestricted, Independent And-parallelism
Practical Aspects of Declarative Languages (PADL). January 2008.
An Improved Continuation Call-Based Implementation of Tabling
Practical Aspects of Declarative Languages (PADL). January 2008.
Automatic Coding Rule Conformance Checking Using Logic Programming
Practical Aspects of Declarative Languages (PADL). January 2008.
Precise Set Sharing Analysis for Java-style Programs
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). January 2008.
Certificate Translation in Abstract Interpretation
European Symposium on Programming (ESOP). 2008.
Certified Reasoning in Memory Hierarchies
ASIAN Symposium on Programming Languages and Systems (APLAS). 2008.
Model-Driven Security in Practice: An Industrial Experience
European Conference on Model Driven Architecture - Foundations and Applications (ECMDA-FA). 2008.
Preservation of Proof Obligations from Java to the Java Virtual Machine
International Conference on Automated Deduction (CADE). 2008.
Tractable Enforcement of Declassification Policies
IEEE Computer Security Foundations Symposium (CSF). 2008.
Type-Based Termination with Sized Products
Annual Conference on Computer Science Logic (CSL). 2008.
Preservation of Proof Pbligations for Hybrid Verification Methods
International Conference on Software Engineering and Formal Methods (SEFM). 2008.
-
Proceedings of the Workshop on Forming an Ecosystem Around Software Transformation (FEAST). October 2024.
-
International Conference on Logic Programming (ICLP). October 2024.
-
Proceedings of the 2024 Workshop on AI For Systems. 2024.
-
Proceedings of the 4th Workshop on Machine Learning and Systems. 2024.
-
Proceedings of the 4th Workshop on Machine Learning and Systems. 2024.
-
Workshop on Distributed Algorithms (WDAG). 2024.
-
International Workshop on Fast Software Encryption (FSE). December 2023.
Towards a rule-based approach for deriving abstract domains
Technical Communications of the 39th International Conference on Logic Programming (ICLP 2023). July 2023.
-
Computing Research Repository (CoRR). July 2023.
-
Computing Research Repository (CoRR). July 2023.
-
Proceedings of the 3rd Workshop on Machine Learning and Systems. 2023.
-
Aniketh Girish, Vijay Prakash, Serge Egelman, Joel Reardon, Juan Tapiador, Danny Yuxing Huang,
Srdjan Matic, Narseo Vallina-Rodriguez.
ACM International Conference on Emerging Networking Experiments and Technologies Student Workshop (CoNEXT-SW). December 2022.
A SAT-based Efficient Method for the Synthesis from numerical LTL spefications
Jornadas de PROgramación y LEnguajes (PROLE) 2022. September 2022.
Reactive Synthesis of LTL specifications with Rich Theories
11th Workshop in Synthesis. August 2022.
An s(CASP) In-Browser Playground based on Ciao Prolog
International Conference on Logic Programming (ICLP). August 2022.
-
Jornadas Nacionales de Investigación en Ciberseguridad (JNIC). June 2022.
-
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers. 2022.
Analysis and Improvements of the Sender Keys Protocol for Group Messaging
Reunión española sobre criptología y seguridad de la información (RECSI). 2022.
-
6th Workshop on Formal Integrated Development Environment (F-IDE 2021, part of NASA NFM'21). May 2021.
-
Workshop on Horn Clauses for Verification and Synthesis (HCVS 2021). March 2021.
-
International Conference on Logic Programming (ICLP). 2021.
-
International Conference on Logic Programming (ICLP). 2021.
An application of KLEE to aerospace industrial software
XX Jornadas de Programación y Lenguajes (PROLE 2021). 2021.
Testing Your (Static Analysis) Truths
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2020.
-
Computing Research Repository (CoRR). 2020.
Making Byzantine Consensus Live
Workshop on Distributed Algorithms (WDAG). 2020.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). November 2019.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). November 2019.
An Integrated Approach to Assertion-Based Random Testing in Prolog
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). November 2019.
-
10th Workshop on Tools for Automatic Program Analysis (TAPAS'19). October 2019.
Incremental Analysis of Logic Programs with Assertions and Open Predicates
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). October 2019.
-
Technical Communications of the 35th International Conference on Logic Programming (ICLP 2019). September 2019.
Modeling and Reasoning in Event Calculus Using Goal-Directed Constraint Answer Set Programming
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2019.
-
Technical Communications of the 35th International Conference on Logic Programming (ICLP 2019). September 2019.
-
Datalog (Datalog). June 2019.
-
Italian Conference on Cybersecurity (ITASEC). 2019.
-
International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ). 2019.
-
International Workshop on App Market Analytics (WAMA). 2019.
Specialize in Moderation - Building Application-aware Storage Services using FPGAs in the Datacenter
Hot Topics in Storage and File Systems (HotStorage). 2019.
25 Years of Ciao (abstract of invited tutorial)
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2018.
Multivariant Assertion-based Guidance in Abstract Interpretation
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2018.
Knowledge Problems in Equational Extensions of Subterm Convergent Theories
32nd International Workshop on Unification. July 2018.
A General Framework for Static Profiling of Parametric Resource Usage (extended abstract)
19th International Workshop on Logic and Computational Complexity (LCC 2018). July 2018.
Towards Incremental and Modular Context-sensitive Analysis
International Conference on Logic Programming (ICLP). July 2018.
Towards Static Performance Guarantees for Programs with Run-time Checks
International Conference on Logic Programming (ICLP). July 2018.
-
ACM/IFIP/USENIX International Middleware Conference (Middleware). 2018.
-
Automated Software Engineering Conference (ASE). 2018.
A certified reference validation mechanism for the permission model of Android
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). October 2017.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). October 2017.
Towards a Semantics-Aware Code Transformation Toolchain for Heterogeneous Systems
Proceedings of XIV Jornadas sobre Programación y Lenguajes (PROLE 2016). September 2017.
An Analysis of Pay-per-Install Economics Using Entity Graphs
Workshop on the Economics of Information Security (WEIS). June 2017.
-
Workshop on Distributed Algorithms (WDAG). 2017.
-
Workshop on Privacy in the Electronic Society (WPES). 2017.
-
Logic Programming Doctoral Consortium (DC-ICLP). 2017.
-
International Conference on Logic Programming (ICLP). 2017.
-
International Workshop on App Market Analytics (WAMA). November 2016.
-
International Workshop on App Market Analytics (WAMA). November 2016.
Tabled CLP for Reasoning over Stream Data
Logic Programming Doctoral Consortium (DC-ICLP). October 2016.
Program Transformations in the POLCA Project
Jan Kuper, Lutz Schubert, Kilian Kempf, Colin Glas, Daniel Rubio Bonilla,
Manuel Carro.
Design, Automation and Test in Europe Conference (DATE). March 2016.
-
Proceedings of the First International Workshop on Program Transformation for Programmability in Heterogeneous Architectures (PROHA 2016). March 2016.
-
Computing Research Repository (CoRR). March 2016.
-
Computing Research Repository (CoRR). 2016.
-
Workshop on Horn Clauses for Verification and Synthesis (HCVS). 2016.
TASP: Towards Anonymity Sets that Persist
Workshop on Privacy in the Electronic Society (WPES). 2016.
-
Workshop on High Performance Energy Efficient Embedded Systems (HIP3ES). 2016.
-
Mahsa Najafzadeh,
Alexey Gotsman, Hongseok Yang, Carla Ferreira, Marc Shapiro.
Eurosys Conference (EuroSys). 2016.
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
International Workshop on Fast Software Encryption (FSE). 2016.
-
International Workshop on Dynamic Analysis (WODA). October 2015.
Energy Analysis and Verification by Translation to Horn Clauses and Abstract Interpretation
Workshop on Horn Clauses for Verification and Synthesis (HCVS). July 2015.
-
International Conference on Logic Programming (ICLP). 2015.
-
International Workshop on Verification and Program Transformation (VPT). 2015.
-
ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). 2015.
An Algorithmic Approach to Stability Verification of Hybrid Systems: A Summary
Computer Aided Verification (CAV). 2015.
-
Workshop on High Performance Energy Efficient Embedded Systems (HIP3ES). 2015.
-
September 2014.
Pre-Indexed Terms for Prolog
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2014.
-
International Conference on Logic Programming (ICLP). July 2014.
Towards Pre-Indexed Terms
14th International Colloquium on Implementation of Constraint and LOgic Programming Systems (CICLOPS-WLPE 2014). July 2014.
-
Workshop on Cryptographic Hardware and Embedded Systems (CHES). 2014.
-
ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). 2014.
-
Computing Research Repository (CoRR). 2014.
Towards an EasyCrypt Formalization of Garbling Schemes
The Workshop on Language Support for Privacy-Enhancing Technology (PETShop). November 2013.
-
September 2013.
Energy Consumption Analysis of Programs based on XMOS ISA-Level Models
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2013.
Implementing Constraint Handling Rules as a Domain-Specific Language Embedded in Java
Proceedings of the 23rd Workshop on Logic-based methods in Programming Environments (WLPE 2013). August 2013.
-
23rd Workshop on Logic-based Methods in Programming Environments (WLPE 2013). August 2013.
Towards QoS Prediction Based on Composition Structure Analysis and Probabilistic Environment Models
International Conference on Software Engineering (ICSE). May 2013.
-
ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). 2013.
Fixing idioms: a recursion primitive for applicative DSLs
Dominique Devriese,
Ilya Sergey, Dave Clarke, Frank Piessens.
ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). 2013.
Acceleration of Communication-Aware Task Mapping Techniques through GPU Computing
International Conference on Advanced Information Networking and Applications (AINA). 2013.
Bounded Model Checking for Regular Linear Temporal Logic (extended abstract)
Proceedings of the 24th Nordic Workshop on Programming Theory (NWPT'12). October 2012.
-
September 2012.
The Ciao CLP(FD) Library: A Modular CLP Extension for Prolog
12th International Colloquium on Implementation of Constraint and LOgic Programming Systems (CICLOPS 2012). September 2012.
Reversible Language Extensions and their Application in Debugging
12th International Colloquium on Implementation of Constraint and LOgic Programming Systems (CICLOPS 2012). September 2012.
Proving Computational Security with a General-Purpose C Verifier
Workshops on Formal and Computational Cryptography (FCC) and Analysis of Security APIs (ASA). July 2012.
Analyzing Service-Oriented Systems Using Their Data and Structure
International Conference on Software Engineering (ICSE). July 2012.
Research Challenges on Service Technology Foundations
D. Karastoyanova, Z. Nemeth,
M. Carro, D. Ivanovic, C. Pautasso, C. Di Napoli, M. Giordano.
International Conference on Software Engineering (ICSE). July 2012.
Exploring the Impact of Inaccuracy and Imprecision of QoS Assumptions on Proactive Constraint-Based QoS Prediction for Service Orchestrations
International Conference on Software Engineering (ICSE). June 2012.
Modeling Social Networking Privacy
ESSoS-DS 2012. Doctoral Symposium. 2012.
A General Implementation Framework for Tabled CLP
Jornadas sobre Programación y Lenguajes (PROLE). 2012.
Constraint-Based Runtime Prediction of SLA Violations in Service Orchestrations
Jornadas sobre Programación y Lenguajes (PROLE). 2012.
Lightweight compilation of (C)LP to JavaScript
Jornadas sobre Programación y Lenguajes (PROLE). 2012.
Behavior Based Service Composition
Web Services and Formal Methods - 8th International Workshop, WS-FM 2011, Clermont-Ferrand, France, September 1-2, 2011, Revised Selected Papers. 2012.
-
September 2011.
-
MiniZinc Workshop (MZN'11). September 2011.
Interval-based Resource Usage Verification: Formalization and Prototype
International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA). May 2011.
The Ciao Approach to the Dynamic vs. Static Language Dilemma
Proceedings for the International Workshop on Scripts to Programs (STOP'11). 2011.
-
September 2010.
An Initial Proposal for Data-Aware Resource Analysis of Orchestrations with Applications to Predictive Monitoring
International Workshops, ICSOC/ServiceWave 2009, Revised Selected Papers. September 2010.
-
Proceedings of the 1st International Workshop on Strategies in Rewriting, Proving, and Programming (IWS'10). July 2010.
MySQL4OCL: A Stored Procedure-Based MySQL Code Generator for OCL
Proceedings of the Workshop on OCL and Textual Modelling (OCL 2010). 2010.
Modeling Concurrent Systems with Shared Resources
Int. Workshop on Formal Methods for Industrial Critical Systems (FMICS). November 2009.
An Initial Proposal for Data-Aware Resource Analysis of Orchestrations with Applications to Proactive Monitoring
Pre-proceedings of the 2nd Workshop on Monitoring, Adaptation and Beyond (MONA+). November 2009.
Program Parallelization using Synchronized Pipelining
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2009.
Towards Structured State Threading in Prolog
CICLOPS 2009. July 2009.
-
Electronic Notes in Theoretical Computer Science – Proceedings of the Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE'09). March 2009.
Checking Unsatisfiability for OCL Constraints
Proceedings of the Workshop The Pragmatics of OCL and Other Textual Specification Languages at MoDELS 2009. 2009.
A Program Transformation for Continuation Call-Based Tabled Execution
Colloquium on Implementation of Constraint and LOgic Programming Systems (ICLP associated workshop). December 2008.
Sharing Analysis of Arrays, Collections, and Recursive Structures
Workshop on Program Analysis For Software Tools and Engineering (PASTE). November 2008.
A Coding Rule Conformance Checker Integrated into GCC
Electronic Notes in Theoretical Computer Science (ENTCS). October 2008.
Modelling Mash-Up Resources
Jornadas de Ingeniería del Software y Bases de Datos (JISBD). October 2008.
-
ACM SIGPLAN Workshop on Generic Programming (WGP) (WGP). September 2008.
Identification of Heap-Carried Data Dependence Via Explicit Store Heap Models
International Workshop on Languages and Compilers for Parallel Computing (LCPC). August 2008.
Efficient Set Sharing using ZBDDs
International Workshop on Languages and Compilers for Parallel Computing (LCPC). August 2008.
Two Efficient Representations for Set-Sharing Analysis in Logic Programs
17th International Workshop on Functional and (Constraint) Logic Programming, WFLP'08. July 2008.
Safe Upper-bounds Inference of Energy Consumption for Java Bytecode Applications
The Sixth NASA Langley Formal Methods Workshop (LFM 08). April 2008.
A Practical Type Analysis for Verification of Modular Prolog Programs
ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). January 2008.
Certificate Translation for Specification-Preserving Advices
Workshop on Foundations of Aspect-Oriented Languages (FOAL). 2008.
ECEASST Building an Efficient Component for OCL Evaluation
Proceedings of the 8th International Workshop on OCL Concepts and Tools (OCL 2008) at MoDELS 2008. 2008.
In-depth analysis of the Android supply chain:Vendor customizations on critical networking components
Rathnayaka Mudiyanselage Vinuri Gayanthika Bandara.
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Srdjan Matic, Narseo Vallina-Rodriguez. July 2023.
Covre: Implementation of Code Coverage in a Black-Box CPU Fuzzer for Speculative Leakage Study
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Marco Guarnieri, Jorge Blasco Arias. June 2023.
Analysis of the Impact of the Collateral Funds in Payment Channel Networks
MSc Thesis. University of Zagreb (UniZG). Supervisors: Pedro Moreno-Sanchez, Marina Bagic Babac. July 2022.
Hunting for New Threats in a Feed of Malicious Samples
MSc Thesis. Universidad de Alcalá (UAH). Supervisors: Juan Caballero, Javier Junquera Sánchez. July 2022.
Forecasting Cloud Resource Utilization Using Machine Learning and Computer Vision
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Thaleia Dimitra Doudali. June 2022.
Hadesius: Una soluzione per il controllo e il monitoraggio del perimetro cibernetico nazionale
Andrea Colato.
MSc Thesis. Universita degli Studi di Milano (UNIMI). Supervisors: Stelvio Cimato, Dario Fiore. October 2021.
Empirical Analysis of Trace-ability in the Lightning Network
MSc Thesis. Sapienza University of Rome (Sapienza). Supervisors: Pedro Moreno-Sanchez, Angelo Spognardi. October 2021.
The Temporal Booleanization Theorem: realizability checking over numerical-LTL industrial requirements
MSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Cesar Sanchez. September 2021.
Analysis of Proof of Assets for Different Cryptocurrencies
MSc Thesis. Universidad Complutense Madrid (UCM). Supervisors: Ignacio Cascudo, Pedro Moreno-Sanchez, Ignacio Luengo Velasco. September 2021.
An Integrated Approach to Assertion-Based Random Testing in Logic Languages
MSc Thesis. Universidad Politécnica de Madrid, ETSIInf. July 2021.
Improvements to Parametric Cost Analysis and its Application to Smart Contracts
MSc Thesis. Universidad Politécnica de Madrid, ETSIInf. July 2021.
Adaptor Signature Based Atomic Swaps Between Bitcoin and a Mimblewimble Based Cryptocurrency
Jakob Abfalter.
MSc Thesis. Technical University of Vienna (TUW). Supervisors: Pedro Moreno-Sanchez, Matteo Maffei. June 2021.
Auxiliary Oracle IOP and secure, fast reductions of R1CS over binary field.
MSc Thesis. Università degli Studi di Catania (UNICT). Supervisors: Dario Catalano, Ignacio Cascudo, Dario Catalano. September 2020.
Simulation-based Inclusion Checking Algorithms for ω-Languages
Francesco Parolini.
MSc Thesis. Università degli Studi di Padova (U. Padua). Supervisors: Francesco Ranzato, Pierre Ganty, Francesco Ranzato. July 2020.
Threshold decryption protocols for (replayable) chosen ciphertext secure public key encryption
MSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Dario Fiore, Antonio Faonio. September 2019.
Homomorphic Signatures over Lattices
MSc Thesis. Universita degli Studi di Genova (UNIGE). Supervisors: Dario Fiore, Giovanni Lagorio. September 2019.
Automatic Detection of Outdated Comments in Open-Source Java Projects
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Ana Moreno, Barbara Russo. July 2019.
A Proposal of Automatic Quality Evaluator for GIT Commit Messages
Harry Alberto Carpio Salvatierra.
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Sira Vegas. July 2019.
An Automated Analysis of the What's New Descriptions of Android Apps
Daniel Toniuc.
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Antti Siirtola, Julio Mariño. June 2019.
A Framework for Testing Web Applications for Cross-Origin State Inference (COSI) Attacks
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Avinash Sudhodanan, Juan Caballero, Manuel Carro. June 2019.
Checking Android Applications Behaviour against Google Play Descriptions at Scale
Daniel Domínguez Álvarez.
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Julio Mariño Carballo. January 2019.
Sistemas criptográficos de voto electrónico basados en mix-servers y proceso de implementación
Mario V. García Roqué.
MSc Thesis. Universidad Carlos III de Madrid (UC3M). Supervisors: Dario Fiore, Antonio Faonio, Juan Manuel Estevez Tapiador. September 2018.
Towards a Stream-Based Monitoring Language for Asynchronous Systems
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Cesar Sanchez, Lars-Ake Fredlund. July 2018.
Detecting and Classifying Malicious TLS Network Traffic using Machine Learning
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. July 2018.
Decentralised Stream Runtime Verification
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Cesar Sanchez, Clara Benac Earle. July 2018.
Microarchitecture Simulation for Security
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Boris Koepf, Clara Benac. July 2018.
Security of Cache Replacement Policies under Side-Channel Attacks
MSc Thesis. Technical University Berlin (TU Berlin). Supervisors: Boris Koepf, Martin Skutella. March 2018.
Using Semantic Similarity Analysis of Javadoc Comments to Automatically Generate Test Oracles
MSc Thesis. Universitá degli Studi di Milano Bicocca (UNIMIB). Supervisors: Alessandra Gorla, Mauro Pezze. October 2017.
Study on Privacy of Parental Control Mobile Applications
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Carmela Troncoso, Manuel Carro. July 2017.
ClaimChain: Decentralized Public Key Infrastructure
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Carmela Troncoso, Manuel Carro. July 2017.
Enhancing Online Banking Authentication Using Keystroke Dynamics
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. July 2017.
Code Search: A Semantic, Abstract-Interpretation Based Approach
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Jose Francisco Morales, Manuel Hermenegildo, Manuel Hermenegildo. April 2017.
On Fully Homomorphic Encryption from the Learning with Errors Problem
MSc Thesis. Universitá degli Studi di Milano Bicocca (UNIMIB). Supervisors: Dario Fiore, Luca Nizzardo, Francesca Dalla Volta. March 2017.
An Asynchronous Evaluation Engine for Stream Based Specifications
MSc Thesis. Universität zu Lübeck (Luebeck University). Supervisors: Cesar Sanchez, Martin Leucker. November 2016.
Code Search: A Semantic, Abstract Interpretation-Based Approach
MSc Thesis. Technical University of Madrid, School of Computer Science. July 2016.
Privacy Implications of Open Data
Hasser Veramendi Salazar.
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Carmela Troncoso. July 2016.
Implementing a Term Rewriting Engine for the EasyCrypt Framework
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pierre-Yves Strub, Manuel Carro. July 2015.
Design and Implementation of a Modular Interface to integrate CLP and Tabled Execution
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro. July 2015.
Improved Static Analysis and Verification of Energy Consumption and Other Resources via Abstract Interpretation
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pedro Lopez, Manuel Carro. July 2015.
A Framework for Implementing Outsourcing Schemes
Rosario Sebastiano Russo.
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Dario Fiore, Manuel Carro. July 2015.
Testing of Android Testing Tools: Development of a Benchmark for the Evaluation
Tahir Javaid.
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Ricardo Imbert. July 2015.
Concurrent Library Abstraction Without Information Hiding
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alexey Gotsman, Manuel Carro. July 2014.
An Empirical Study of Techniques to Detect Reverse Proxies and Load Balancers in HTTP Traffic
Irfan Khan Tanoli.
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Ricardo Imbert. June 2014.
Análisis de Características Estáticas de Ficheros Ejecutables para la Clasificación de Malware
Richard Rivera Guevara.
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero. June 2014.
Relational Domains for the Quantification of Cache Side Channels
MSc Thesis. Saarland University (Saarland University). Supervisors: Boris Koepf, Jan Reineke. September 2013.
Dynamic Checking of Assertions for Higher-order Predicates
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Jose Francisco Morales, Manuel Hermenegildo, Manuel Hermenegildo. July 2013.
Integrated Versioning and Collaboration Process Management of Automotive Production Lines Based on an Artifact-Centric Collaboration Environment
Olena Kutsenko.
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Michael Unterkalmsteiner, Manuel Carro. October 2012.
Probabilistic Analysis of Quality of Service
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Stefanie Betz, Manuel Carro. October 2012.
Developing Secure Business Applications From Secure BPMN Models
MSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Manuel Clavel. September 2012.
Sistema de Soporte a la Decisión de Programas de Intercambio
Manuel José Llamas Rodríguez.
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro. September 2012.
Typegrapher: Inferring the Type Graph of a Binary Program
MSc Thesis. Universidad Nacional de Rosario (UNR). Supervisors: Juan Caballero. August 2012.
Diseño de un Configurador de Productos
Santiago Alfaro Tornero.
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro. July 2012.
Valuation: Developer Support for By-References to By-Value Type Conversion
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Mark Marron, Manuel Carro. July 2012.
Analysis and Mitigation of Information Leaks in Web Browsing Traffic
MSc Thesis. Saarland University (Saarland University). Supervisors: Boris Koepf, Michael Backes. June 2012.
MySQL4OCL:un compilador de OCL a MySQL
MSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Marina Egea, Manuel Clavel. November 2011.
Two Algorithms for Model Checking of Regular Linear Temporal Logic
MSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Cesar Sanchez, Miguel Palomino Tarjuelo. September 2011.
Decision Procedures for the Temporal Verification of Concurrent Data Structures
MSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Cesar Sanchez, Miguel Palomino Tarjuelo. July 2011.
Fuzzy Granularity Control in Parallel/Distributed Computing
MSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pedro Lopez. September 2010.
Exploring the beta-hypercube
MSc Thesis. Facultad de Informática, Universidad Politécnica de Madrid. September 2009.