Author of the publication

EBF 4.2: Black-Box Cooperative Verification for Concurrent Programs - (Competition Contribution).

, , , , and . TACAS (2), volume 13994 of Lecture Notes in Computer Science, page 541-546. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ESBMC: Scalable and Precise Test Generation based on the Floating-Point Theory - (Competition Contribution)., , , , and . FASE, volume 12076 of Lecture Notes in Computer Science, page 525-529. Springer, (2020)EBF 4.2: Black-Box Cooperative Verification for Concurrent Programs - (Competition Contribution)., , , , and . TACAS (2), volume 13994 of Lecture Notes in Computer Science, page 541-546. Springer, (2023)Map2Check: Using Symbolic Execution and Fuzzing - (Competition Contribution)., , , and . TACAS (2), volume 12079 of Lecture Notes in Computer Science, page 403-407. Springer, (2020)Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs., , , , , and . CoRR, (2022)ESBMC-Jimple: verifying Kotlin programs via jimple intermediate representation., , , , and . ISSTA, page 777-780. ACM, (2022)Map2Check Using LLVM and KLEE - (Competition Contribution)., , , and . TACAS (2), volume 10806 of Lecture Notes in Computer Science, page 437-441. Springer, (2018)ESBMC-CHERI: towards verification of C programs for CHERI platforms with ESBMC., , , , , , and . ISSTA, page 773-776. ACM, (2022)EBF: A Hybrid Verification Tool for Finding Software Vulnerabilities in IoT Cryptographic Protocols., , , and . CoRR, (2021)ESBMC v7.4: Harnessing the Power of Intervals., , , , , , , , , and 2 other author(s). CoRR, (2023)FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs., , , and . CoRR, (2020)