Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Le temps des cerises: efficient temporal stack safety on capability machines using directed capabilities., , and . Proc. ACM Program. Lang., 6 (OOPSLA1): 1-30 (2022)A Generic Framework to Develop and Verify Security Mechanisms at the Microarchitectural Level: Application to Control-Flow Integrity., , , , and . CSF, page 372-387. IEEE, (2023)Proving full-system security properties under multiple attacker models on capability machines., , , , , , , and . CSF, page 80-95. IEEE, (2022)Efficient and provable local capability revocation using uninitialized capabilities., , , , , , , and . Proc. ACM Program. Lang., 5 (POPL): 1-30 (2021)Verifying Constant-Time Implementations by Abstract Interpretation., , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 260-277. Springer, (2017)Verifying constant-time implementations by abstract interpretation., , and . J. Comput. Secur., 27 (1): 137-163 (2019)Formal verification of control-flow graph flattening., and . CPP, page 176-187. ACM, (2016)Verified Translation Validation of Static Analyses., , , , and . CSF, page 405-419. IEEE Computer Society, (2017)Formal Verification of a Constant-Time Preserving C Compiler., , , , , , and . IACR Cryptology ePrint Archive, (2019)Formal verification of a constant-time preserving C compiler., , , , , , and . Proc. ACM Program. Lang., 4 (POPL): 7:1-7:30 (2020)