Author of the publication

Detecting Deadlock, Double-Free and Other Abuses in a Million Lines of Linux Kernel Source.

, , and . SEW, page 223-233. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decompilation: The Enumeration of Types and Grammars., and . ACM Trans. Program. Lang. Syst., 16 (5): 1613-1647 (1994)On the Security of Fully Homomorphic Encryption and Encrypted Computing: Is Division safe?, and . CoRR, (2014)Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name.. CoRR, (2019)Safe Compilation for Hidden Deterministic Hardware Aliasing., and . ISSRE Workshops, page 422-427. IEEE, (2019)High Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret Computer.. DSC, page 1-8. IEEE, (2022)Formal Methods Communities of Practice: A Survey of Personal Experience., and . SEFM Workshops, volume 13230 of Lecture Notes in Computer Science, page 287-301. Springer, (2021)Verification in the Light and Large: Large-Scale Verification for Fast-Moving Open Source C Projects., and . SEW, page 246-255. IEEE Computer Society, (2007)Soundness and Completeness of the NRB Verification Logic., and . SEFM Workshops, volume 8368 of Lecture Notes in Computer Science, page 389-404. Springer, (2013)An Analysis/Synthesis Language with Learning Strategies.. JTASPEFT/WSA, volume 74 of Series Bigre, page 202-209. Atelier Irisa, IRISA, Campus de Beaulieu, (1991)Decompilation is the Efficient Enumeration of Types., and . WSA, volume 81-82 of Series Bigre, page 255-273. Atelier Irisa, IRISA, Campus de Beaulieu, (1992)