Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VERONICA: Expressive and Precise Concurrent Information Flow Security (Extended Version with Technical Appendices)., , and . CoRR, (2020)SecRSL: Security Separation Logic for C11 Release-Acquire Concurrency (Extended version with technical appendices)., and . CoRR, (2021)Proving the Absence of Microarchitectural Timing Channels., , , , , , and . CoRR, (2023)Legion: Best-First Concolic Testing (Competition Contribution)., , , and . FASE, volume 12076 of Lecture Notes in Computer Science, page 545-549. Springer, (2020)Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget., , , , , and . CoRR, (2024)LEGION: Best-First Concolic Testing., , , and . ASE, page 54-65. IEEE, (2020)VERONICA: Expressive and Precise Concurrent Information Flow Security., , and . CSF, page 79-94. IEEE, (2020)Formal Specifications Better Than Function Points for Code Sizing, , , , , , , and . International Conference on Software Engineering, page 1257--1260. (May 2013)SecRSL: security separation logic for C11 release-acquire concurrency., and . Proc. ACM Program. Lang., 5 (OOPSLA): 1-26 (2021)SecCSL: Security Concurrent Separation Logic., and . CAV (2), volume 11562 of Lecture Notes in Computer Science, page 208-230. Springer, (2019)