Modularising Verification Of Durable Opacity.Eleni Bila, John Derrick, Simon Doherty, Brijesh Dongol, Gerhard Schellhorn, and Heike Wehrheim. Logical Methods in Computer Science, July 28, 2022, Volume 18, Issue 3. 2022
A Formalization of SQL with Nulls.Wilmer Ricciotti and James Cheney. Journal of Automated Reasoning 66, 989–1030. 2022
PISTIS: An Event-Triggered Real-Time Byzantine-Resilient Protocol Suite.David Kozhaya, Jérémie Decouchant, Vincent Rahli, and Paulo Esteves-Verissimo. IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 9, 2277-2290. 2021
Verifying correctness of persistent concurrent data structures: a sound and complete method.John Derrick, Simon Doherty, Brijesh Dongol, Gerhard Schellhorn, and Heike Wehrheim. Formal Aspects of Computing, Volume 33, Issue 4-5, 547–573. 2021
Protocol combinators for modeling, testing, and execution of distributed systems.Kristoffer Just Arndal Andersen and Ilya Sergey. Journal of Functional Programming, 31, E3, 2021. 2021
Connecting software build with maintaining consistency between models: towards sound, optimal, and flexible building from megamodels.Perdita Stevens. Softw Syst Model 19, 935–958, 2020. 2020
Proof-Producing Synthesis of CakeML from Monadic HOL Functions. Oskar Abrahamsson, Son Ho, Hrutvik Kanabar, Ramana Kumar, Magnus O. Myreen, Michael Norrish, and Yong Kiam Tan. Journal of Automated Reasoning, 64, 1287–1306, 2020. 2020
Program Verification in the Presence of I/O.Hugo Férée, Johannes Å. Pohjola, Ramana Kumar, Scott Owens, Magnus O. Myreen, and Son Ho. In: Piskac, R., Rümmer, P. (eds) Verified Software. Theories, Tools, and Experiments. VSTTE 2018. Lecture Notes in Computer Science, vol 11294. 2018
Checking cryptographic API usage with composable annotations (short paper).Duncan Mitchell, L. Thomas van Binsbergen, Blake Loring, and Johannes Kinder. PEPM ’18: Proceedings of the ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, December 2017, 53–59. 2018
Semantics of Remote Direct Memory Access: Operational and Declarative Models of RDMA on TSO Architectures.Guillaume Ambal, Brijesh Dongol, Haggai Eran, Vasileios Klimis, Ori Lahav, Azalea Raad. Proceedings of the ACM on Programming Languages, Volume 8, Issue OOPSLA2 Article No.: 341, Pages 1982 – 2009. OOPSLA 2024.
Compositional Security Analysis of Dynamic Component-based Systems.Narges Khakpour, Charilaos Skandylas. ASE ’24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, Pages 1232 – 1244. 2024.
History-deterministic Timed Automata.Sougata Bose, Thomas A. Henzinger, Karoliina Lehtinen, Sven Schewe, Patrick Totzke. History-deterministic Timed Automata. 2024. In Logical Methods in Computer Science, 20(4:1). 2024.
Partially-Observable Security Games for Attack-Defence Analysis in Software Systems.Narges Khakpour, David Parker. 22nd International Conference on Software Engineering and Formal Methods (SEFM 2024). 2024.
Omega-Regular Decision Processes.Ernst Moritz Hahn, Mateo Perez, Sven Schewe, Fabio Somenzi, Ashutosh Trivedi, Dominik Wojtczak. In Proc. Thirty-Eighth Conference on Artificial Intelligence (AAAI 2024), pp. 21125–21133. 2024.
Mining minimal separating DFAs from labelled samples.Daniele Dell’Erba, Yong Li, Sven Schewe. In Proceedings of the 37th International Symposium on Formal Methods (FM 2024), pp. 48–66. 2024.