Modular Relaxed Dependencies in Weak Memory Concurrency.Marco Paviotti, Simon Cooksey, Anouk Paradis, Daniel Wright, Scott Owens, and Mark Batty. In: Müller, P. (eds) Programming Languages and Systems. ESOP 2020. Lecture Notes in Computer Science, vol 12075. 2020
The Taint Rabbit: Optimizing Generic Taint Analysis with Dynamic Fast Path Generation.John Galea and Daniel Kroening. ASIA CCS ’20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, October 2020, 622–636. 2020
Proof-Producing Synthesis of CakeML from Monadic HOL Functions. Oskar Abrahamsson, Son Ho, Hrutvik Kanabar, Ramana Kumar, Magnus O. Myreen, Michael Norrish, and Yong Kiam Tan. Journal of Automated Reasoning, 64, 1287–1306, 2020. 2020
Mind the Gap: Bit-vector Interpolation recast over Linear Integer Arithmetic.Takamasa Okudono and Andy King. In: Biere, A., Parker, D. (eds) Tools and Algorithms for the Construction and Analysis of Systems. TACAS 2020. Lecture Notes in Computer Science, vol 12078. 2020
Program Verification in the Presence of I/O.Hugo Férée, Johannes Å. Pohjola, Ramana Kumar, Scott Owens, Magnus O. Myreen, and Son Ho. In: Piskac, R., Rümmer, P. (eds) Verified Software. Theories, Tools, and Experiments. VSTTE 2018. Lecture Notes in Computer Science, vol 11294. 2018
Checking cryptographic API usage with composable annotations (short paper).Duncan Mitchell, L. Thomas van Binsbergen, Blake Loring, and Johannes Kinder. PEPM ’18: Proceedings of the ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, December 2017, 53–59. 2018
Semantics of Remote Direct Memory Access: Operational and Declarative Models of RDMA on TSO Architectures.Guillaume Ambal, Brijesh Dongol, Haggai Eran, Vasileios Klimis, Ori Lahav, Azalea Raad. Proceedings of the ACM on Programming Languages, Volume 8, Issue OOPSLA2 Article No.: 341, Pages 1982 – 2009. OOPSLA 2024.
Compositional Security Analysis of Dynamic Component-based Systems.Narges Khakpour, Charilaos Skandylas. ASE ’24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, Pages 1232 – 1244. 2024.
History-deterministic Timed Automata.Sougata Bose, Thomas A. Henzinger, Karoliina Lehtinen, Sven Schewe, Patrick Totzke. History-deterministic Timed Automata. 2024. In Logical Methods in Computer Science, 20(4:1). 2024.
Partially-Observable Security Games for Attack-Defence Analysis in Software Systems.Narges Khakpour, David Parker. 22nd International Conference on Software Engineering and Formal Methods (SEFM 2024). 2024.
Omega-Regular Decision Processes.Ernst Moritz Hahn, Mateo Perez, Sven Schewe, Fabio Somenzi, Ashutosh Trivedi, Dominik Wojtczak. In Proc. Thirty-Eighth Conference on Artificial Intelligence (AAAI 2024), pp. 21125–21133. 2024.
Mining minimal separating DFAs from labelled samples.Daniele Dell’Erba, Yong Li, Sven Schewe. In Proceedings of the 37th International Symposium on Formal Methods (FM 2024), pp. 48–66. 2024.
Omega-Regular Decision Processes.Ernst Moritz Hahn, Mateo Perez, Sven Schewe, Fabio Somenzi, Ashutosh Trivedi, Dominik Wojtczak. In Proc. Thirty-Eighth Conference on Artificial Intelligence (AAAI 2024), pp. 21125–21133. 2024.