Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Flow Analysis for Detecting Non-Determinism in Blockchain (Artifact)., , , , , , and . Dagstuhl Artifacts Ser., 9 (2): 23:1-23:3 (2023)Ensuring determinism in blockchain software with GoLiSA: an industrial experience report., , , , , , , , and . SOAP@PLDI, page 23-29. ACM, (2022)Cross-Programming Language Taint Analysis for the IoT Ecosystem., , , and . Electron. Commun. Eur. Assoc. Softw. Sci. Technol., (2019)From CIL to Java bytecode: Semantics-based translation for static analysis leveraging., , and . Sci. Comput. Program., (2020)Certifying machine learning models against evasion attacks by program analysis., , and . J. Comput. Secur., 31 (1): 57-84 (2023)Static analysis for dummies: experiencing LiSA., , , and . SOAP@PLDI, page 1-6. ACM, (2021)Twinning Automata and Regular Expressions for String Static Analysis., , , and . VMCAI, volume 12597 of Lecture Notes in Computer Science, page 267-290. Springer, (2021)Static Analysis of Android Apps Interaction with Automotive CAN., , , , and . SmartCom, volume 11344 of Lecture Notes in Computer Science, page 114-123. Springer, (2018)BackFlow: Backward Context-Sensitive Flow Reconstruction of Taint Analysis Results., , and . VMCAI, volume 11990 of Lecture Notes in Computer Science, page 23-43. Springer, (2020)Cross-program taint analysis for IoT systems., , , , and . SAC, page 1944-1952. ACM, (2020)