Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations., , , and . SP, page 107-124. IEEE, (2022)First-order Gradual Information Flow Types with Gradual Guarantees., , and . CoRR, (2020)Tainted Secure Multi-Execution to Restrict Attacker Influence., , and . CCS, page 1732-1745. ACM, (2023)DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code., , , , , , and . EuroS&P, page 523-542. IEEE, (2021)Automating Audit with Policy Inference., , and . CSF, page 1-16. IEEE, (2021)An In-Depth Symbolic Security Analysis of the ACME Standard., , , , , , and . CCS, page 2601-2617. ACM, (2021)Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations (Long Version)., , , and . IACR Cryptol. ePrint Arch., (2022)Layered Symbolic Security Analysis in DY$^\star$., , , , , , , and . IACR Cryptol. ePrint Arch., (2023)Compositional Information Flow Monitoring for Reactive Programs., , and . EuroS&P, page 467-486. IEEE, (2022)Layered Symbolic Security Analysis in $DY^$., , , , , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 3-21. Springer, (2023)