Author of the publication

Formalizing Lightweight Verification of Software Component Composition

, and . Proceedings of SAVCBS 2004: Specification and Verification of Component-Based Systems, page 47-54. Newport Beach, CA, USA), (October 2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finding Substitutable Binary Code By Synthesizing Adapters., , and . IEEE Trans. Software Eng., 47 (8): 1626-1643 (2021)Emulating emulation-resistant malware., , , , and . VMSec@CCS, page 11-22. ACM, (2009)Counterexample-Guided Inductive Repair of Reactive Contracts., , , , and . FormaliSE@ICSE, page 46-57. ACM, (2022)Java Ranger at SV-COMP 2020 (Competition Contribution)., , , , and . TACAS (2), volume 12079 of Lecture Notes in Computer Science, page 393-397. Springer, (2020)PREDATOR: A Cache Side-Channel Attack Detector Based on Precise Event Monitoring., , , and . SEED, page 25-36. IEEE, (2022)Formalizing Lightweight Verification of Software Component Composition, and . Proceedings of SAVCBS 2004: Specification and Verification of Component-Based Systems, page 47-54. Newport Beach, CA, USA), (October 2004)Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning., , , and . NDSS, The Internet Society, (2021)Structural Bit-vector Model Counting., and . SMT, volume 2854 of CEUR Workshop Proceedings, page 26-36. CEUR-WS.org, (2020)Program-mandering: Quantitative Privilege Separation., , , , , , and . CCS, page 1023-1040. ACM, (2019)New Attacks and Defenses for Randomized Caches., , , and . CoRR, (2019)