Filter
Articles in Refereed Journals (219)
-
Journal of Systems and Software 195, 111515. 2023.
-
ACM Transactions on Computational Logic. 2023.
-
Proceedings of the ACM on Programming Languages 6 (ICFP). Association for Computing Machinery, August 2022.
-
Notiweb, 12-16. June 2022.
-
Theory and Practice of Logic Programming FirstView, 1–86. Cambridge U. Press, May 2022.
-
Theory and Practice of Logic Programming FirstView, 1–69. Cambridge U. Press, March 2022.
-
Proceedings of the ACM on Programming Languages 6 (POPL). Association for Computing Machinery, January 2022.
-
ACM SIGACT Symposium on Principles of Programming Languages abs/2207.11350. 2022.
-
J. Log. Algebraic Methods Program. 125, 100736. 2022.
-
ACM Transactions on Computational Logic 23 (1), 5:1–5:42. 2022.
-
Journal of Computer Security 30 (1), 109–165. IOS Press, 2022.
-
ACM Transactions on Software Engineering and Methodology 32 (1), 1–44. Association for Computing Machinery, 2022.
-
Distributed Computing 35 (6), 503–532. Springer, 2022.
-
Theory and Practice of Logic Programming 22 (5), 723–738. 2022.
-
Dagstuhl Artifacts Series 8 (2), 12:1–12:2. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022.
-
Information and Computation. 2022.
-
Theory and Practice of Logic Programming 22 (4), 499–504. 2022.
-
Theory and Practice of Logic Programming 22 (5), 640–640. 2022.
-
Journal of Systems and Software 182. December 2021.
-
Journal of Systems and Software 181. November 2021.
-
ACM Transactions on Computational Logic 22 (4). Association for Computing Machinery, September 2021.
-
Theory and Practice of Logic Programming 21 (6), 768–784. Cambridge U. Press, September 2021.
-
International Conference on Functional Programming 5 (ICFP). Association for Computing Machinery, August 2021.
-
ACM Computing Surveys 54 (3). April 2021.
- Incremental and Modular Context-sensitive AnalysisTheory and Practice of Logic Programming 21 (2), 196–243. January 2021.
-
Electronic Notes in Theoretical Computer Science 895, 178-211. 2021.
-
Journal of Mathematical Cryptology 15 (1), 284–297. 2021.
-
ACM SIGACT Symposium on Principles of Programming Languages 5 ({POPL}), 1–28. 2021.
-
Proceedings of the ACM on Programming Languages 5 ({ICFP}), 1–30. 2021.
-
ACM SIGACT Symposium on Principles of Programming Languages 5 ({POPL}), 1–32. 2021.
-
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021 (2), 189–228. 2021.
-
Theory and Practice of Logic Programming First view, 1–69. Cambridge University Press, 2021.
-
Science of Computer Programming 202, 102577. 2021.
-
Privacy Enhancing Technologies Symposium 2021 (1), 21 - 42. Sciendo, 2021.
-
Foundations and Trends® in Programming Languages 6 (3–4), 159-317. 2021.
-
Electronic Notes in Theoretical Computer Science 889, 145-170. 2021.
-
Theory and Practice of Logic Programming, 1–30. Cambridge University Press, 2021.
-
Distributed Computing 34 (4), 301–318. Springer, 2021.
-
Electronic Notes in Theoretical Computer Science 855, 141–160. Elsevier, 2021.
-
International Journal on Software Tools for Technology Transfer 23, 157–183. 2021.
- Symbolic AI for XAI: Evaluating LFIT Inductive Programming for Explaining Biases in Machine LearningComputers 10 (11), 154. Multidisciplinary Digital Publishing Institute, 2021.
-
Mathematical Structures in Computer Science 352, 5–27. 2020.
-
Finite Fields and Their Applications 62. 2020.
-
IEEE Data Engineering Bulletin 43 (2), 36–66. 2020.
-
Journal of Automated Reasoning 64 (8), 1685–1729. 2020.
-
Journal of Cryptographic Engineering 10 (1), 17–26. 2020.
-
Journal of Privacy and Confidentiality 10 (1). 2020.
-
ACM SIGACT Symposium on Principles of Programming Languages 4 ({POPL}), 7:1–7:30. 2020.
-
ACM SIGACT Symposium on Principles of Programming Languages 4 ({POPL}), 55:1–55:30. 2020.
-
ACM SIGACT Symposium on Principles of Programming Languages 4 ({POPL}), 21:1–21:29. 2020.
-
ACM SIGACT Symposium on Principles of Programming Languages 4 ({POPL}), 24:1–24:27. 2020.
-
Fundam. Inform. 173 (4). 2020.
- Stream Runtime Verification of Real-Time Event-Streams with the Striver LanguageInternational Journal on Software Tools for Technology Transfer. 2020.
-
Software Quality Journal 28 (2), 745–787. 2020.
- Verifying replicated data types with typeclass refinements in Liquid HaskellACM Conference on Object Oriented Programming Systems Languages and Applications 4 (OOPSLA), 1–30. ACM New York, NY, USA, 2020.
- Fireplug: Efficient and Robust Geo-Replication of Graph DatabasesIEEE Transactions on Parallel and Distributed Systems 31 (8), 1942–1953. 2020.
- Proving Highly-Concurrent Traversals CorrectACM Conference on Object Oriented Programming Systems Languages and Applications 4 ({OOPSLA}), 128:1–128:29. 2020.
-
Formal Methods in System Design, 1–36. 2020.
-
IEEE Transactions on Information Forensics and Security 14 (12), 3175-3190. IEEE, December 2019.
-
Formal Methods in System Design 54 (3), 279–335. November 2019.
-
ACM Conference on Object Oriented Programming Systems Languages and Applications 3 ({OOPSLA}), 1–30. ACM, October 2019.
-
Theory and Practice of Logic Programming 19 (5-6), 990–1005. Cambridge University Press, September 2019.
-
Theory and Practice of Logic Programming 19 (5-6), 1107–1123. September 2019.
-
IET Information Security 13 (6), 618–638. Institution of Engineering and Technology, April 2019.
-
Journal of Cryptology 32 (2), 324–360. April 2019.
-
Logical Methods in Computer Science 15 (1). March 2019.
-
ACM SIGACT Symposium on Principles of Programming Languages 3 ({POPL}), 1–31. ACM, January 2019.
-
IET Information Security 13 (1), 27–35. IET, January 2019.
-
Electronic Notes in Theoretical Computer Science 777, 3–31. 2019.
- Logical characterisations, rule formats and compositionality for input-output conformance simulationJournal of Logical and Algebraic Methods in Programming 106, 78–106. 2019.
-
Logical Methods in Computer Science 15 (4). 2019.
-
Journal of Automated Reasoning 63 (4), 813–855. 2019.
-
Journal of Automated Reasoning 63 (1), 1–51. 2019.
-
Journal of Functional Programming 29, e16. 2019.
-
Journal of Privacy and Confidentiality 9 (1). 2019.
-
Logical Methods in Computer Science 15 (4). 2019.
-
ACM SIGACT Symposium on Principles of Programming Languages 3 ({POPL}), 1–30. 2019.
-
ACM SIGACT Symposium on Principles of Programming Languages 3 ({POPL}), 38:1–38:30. 2019.
-
Software and Systems Modeling 18 (1), 71–105. 2019.
-
Journal of Functional Programming 29 (E7), 1–38. Cambridge University Press, 2019.
-
IEEE Data Engineering Bulletin 42 (2), 19–31. 2019.
-
IEEE Data Engineering Bulletin 42 (1), 49–60. 2019.
-
International Conference on Very Large Databases 12 (12), 1838–1841. VLDB Endowment, 2019.
-
Journal of Multiple-Valued Logic and Soft Computing 32 (3-4), 313–341. Old City Publishing, 2019.
-
Formal Aspects of Computing: applicable formal methods 30 (6), 685–711. November 2018.
-
Design, Codes and Cryptography 86 (10), 2197–2246. October 2018.
-
Computers and Security 78, 347–363. Elsevier, August 2018.
-
IEEE Internet Computing 22 (4), 6–14. July 2018.
-
ACM Transactions on Programming Languages and Systems 40 (2), 1–90. ACM, May 2018.
- Some Trade-offs in Reducing the Overhead of Assertion Run-time Checks via Static AnalysisScience of Computer Programming 155, 3–26. Elsevier, April 2018.
- Tree dimension in verification of constrained Horn clausesTheory and Practice of Logic Programming 18 (2), 224–251. March 2018.
-
Theory and Practice of Logic Programming 18, 167–223. Cambridge U. Press, March 2018.
-
Journal of the ACM 65 (2), 1-41. ACM Press, March 2018.
-
Journal of Logical and Algebraic Methods in Programming 95, 1–16. February 2018.
-
ACM Transactions on Information and System Security 21 (2), 1–31. ACM, February 2018.
-
ACM SIGACT Symposium on Principles of Programming Languages 2 ({POPL}), 1–29. ACM, January 2018.
-
Journal of the ACM 65 (1), 1-44. ACM Press, January 2018.
-
ACM SIGACT Symposium on Principles of Programming Languages 2 ({POPL}), 1–29. 2018.
-
ACM SIGACT Symposium on Principles of Programming Languages 2 (POPL), 1–32. 2018.
-
ACM Conference on Object Oriented Programming Systems Languages and Applications 2 ({OOPSLA}), 1–25. 2018.
-
Theory and Practice of Logic Programming 18 (3-4), 553–570. 2018.
-
Journal of Cryptology 31 (1), 23–59. Springer, 2018.
-
Formal Methods in System Design 53 (1), 1–5. 2018.
-
Theory and Practice of Logic Programming. Cambridge U. Press, 2018.
- Description, Implementation, and Evaluation of a Generic Design for Tabled CLPTheory and Practice of Logic Programming. Cambridge U. Press, 2018.
-
Logic Journal of the IGPL 25 (6), 1006–1019. Oxford Academic Press, December 2017.
-
Proceedings of the ACM on Programming Languages 1, 1–29. ACM, August 2017.
-
Annals of Mathematics and Artificial Intelligence 80 (3–4), 249–282. August 2017.
-
International Journal of Intelligent Systems 16 (3), 327–343. Springer, June 2017.
-
The Computer Journal 60 (12), 1912–1922. 2017.
-
Communications of the ACM 60 (2), 99–107. 2017.
-
Computer Languages, Systems & Structures 47, 2–18. 2017.
-
Science of Computer Programming 137, 125–140. 2017.
-
Privacy Enhancing Technologies Symposium 2017 (4), 156–176. 2017.
- Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location PrivacyACM Transactions on Information and System Security 19 (4), 1–31. 2017.
-
Privacy Enhancing Technologies Symposium 2017 (4), 404–426. 2017.
-
Microprocessors and Microsystems - Embedded Hardware Design 47, Part B, 278–286. Elsevier, November 2016.
-
Theory and Practice of Logic Programming 16 (5-6), 849–865. Cambridge U. Press, October 2016.
- Mobile Collaborative Learning Systems with Augmented RealityRevista Politécnica 38 (1), 71-80. Escuela Politécnica Nacional, September 2016.
-
Theory and Practice of Logic Programming 16 (5-6), 509-514. Cambridge University Press, September 2016.
- Semantic Code BrowsingTheory and Practice of Logic Programming 16 (5-6), 721–737. CUP, September 2016.
-
Journal of Risk and Reliability, Proceedings of the Institution of Mechanical Engineers, Part O 230 (5), 457–472. Sage Publications, July 2016.
-
Mathematical Structures in Computer Science 26 (4), 658–701. Cambridge University Press, May 2016.
-
ACM Computing Surveys 48 (4), 1–35. ACM, May 2016.
-
Journal of the ACM 63 (1), 1–48. ACM, March 2016.
- Building Resource Adaptive Software Systems (BRASS): Objectives and System EvaluationACM SIGSOFT Software Engineering Notes 41 (1), 1–2. ACM, January 2016.
-
Theory and Practice of Logic Programming 16 (1), 1–58. Cambridge University Press, January 2016.
- No solvable lambda-value term left behindLogical Methods in Computer Science 12 (2), 1-43. 2016.
-
IEEE International Conference on Intelligent Systems 57, 88–110. 2016.
-
Journal of Logical and Algebraic Methods in Programming 85 (5), 847–859. 2016.
-
ACM SIGLOG News 3 (1), 34–53. 2016.
-
Formal Methods in System Design, 1–28. 2016.
-
Acta Informatica, 1–25. 2016.
- Maximal incompleteness as obfuscation potencyFormal Aspects of Computing: applicable formal methods. 2016.
-
International Journal on Software Tools for Technology Transfer, 1–20. 2016.
-
Journal of Automated Reasoning 56 (3), 283–308. 2016.
-
Order - A Journal on the Theory of Ordered Sets and its Applications 33 (3), 503–516. 2016.
- Design of Pool Mixes Against Profiling Attacks in Real ConditionsIEEE ACM Transactions on Networking 24 (6), 3662–3675. 2016.
-
Electronic Notes in Theoretical Computer Science 631, 118–138. 2016.
-
Acta Informatica 53 (4), 325–326. 2016.
-
Acta Informatica 53 (2), 87–88. 2016.
- Practical Run-time Checking via Unobtrusive Property CachingTheory and Practice of Logic Programming 15 (04-05), 726-741. CUP, September 2015.
-
ACM Transactions on Information and System Security 18 (1), 1–32. ACM, June 2015.
-
The Computer Journal. May 2015.
- Quantifying information flow in cryptographic systemsMathematical Structures in Computer Science 25 (2), 457–479. February 2015.
-
International Journal of Information Security 14 (1), 15-33. Springer Berlin Heidelberg, February 2015.
-
IEEE Transactions on Human-Machine Systems 45 (2), 276-290. February 2015.
- Automatic Workarounds: Exploiting the Intrinsic Redundancy of Web ApplicationsACM Transactions on Software Engineering and Methodology 24 (3), 1–42. 2015.
-
Electronic Notes in Theoretical Computer Science 317, 133–139. 2015.
-
Formal Methods in System Design 46 (2), 105–134. 2015.
-
IEEE Security and Privacy Magazine 13 (5), 86–89. 2015.
-
Software and Systems Modeling 14 (1), 3–4. 2015.
-
IEEE Transactions on Automatic Control 60 (12), 3210–3225. 2015.
-
Electronic Notes in Theoretical Computer Science 574, 1–17. 2015.
-
Electronic Notes in Theoretical Computer Science 577, 74–97. 2015.
- Algebraic (trapdoor) one-way functions: Constructions and applicationsElectronic Notes in Theoretical Computer Science 592, 143–165. Springer, 2015.
-
Acta Informatica 52 (6), 525–557. 2015.
- Stochastic vs. Deterministic Evolutionary Algorithm-based Allocation and Scheduling for XMOS ChipsNeurocomputing 150, 82–89. Elsevier, 2015.
-
Composite Structures 125 (0), 542-557. 2015.
- Mtac: A Monad for Typed Tactic Programming in CoqJournal of Functional Programming 25. 2015.
-
ACM Transactions on Programming Languages and Systems 36 (1), 1–35. ACM, March 2014.
-
IEEE Transactions on Software Engineering 40 (4), 324–337. 2014.
- On Automation in the Verification of Software Barriers: Experience ReportJournal of Automated Reasoning 52 (3), 275–329. 2014.
-
Science of Computer Programming 95, 176–199. Elsevier, 2014.
- Verifiable Random Functions: Relations to Identity-Based Key-Encapsulation and New ConstructionsJournal of Cryptology 27 (3), 544–593. Springer, 2014.
- Pushdown flow analysis with abstract garbage collectionJournal of Functional Programming 24 (2-3), 218–283. 2014.
-
Acta Informatica 51 (1), 25–49. 2014.
-
Theory and Practice of Logic Programming 14 (4-5), 619-632. Cambridge U. Press, 2014.
-
ACM Transactions on Programming Languages and Systems 36 (3), 1–29. 2014.
-
Journal of Computer Security 22 (5), 823–866. IOS Press, 2014.
-
International Journal on Software Tools for Technology Transfer 16 (2), 127–146. 2014.
- Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized TypesTheory and Practice of Logic Programming 14 (4-5), 739-754. CUP, 2014.
- Accelerating collision detection for large-scale crowd simulation on multi-core and many-core architecturesInternational Journal of High Performance Computing Applications 28 (1). 2014.
-
International Journal for Numerical Methods in Biomedical Engineering 30 (1), 117–134. 2014.
-
Mathematical Structures in Computer Science 23 (5), 1032–1081. Cambridge University Press, October 2013.
- How to make ad hoc proof automation less ad hocJournal of Functional Programming 23 (4), 357–401. July 2013.
-
Journal of Functional Programming 23 (4), 452–514. Cambridge University Press, July 2013.
-
Science of Computer Programming 78 (6), 715–724. Elsevier North-Holland, Inc., June 2013.
-
Computing 95 (6), 453-492. Springer Wien, June 2013.
-
Computer Networks 57 (2), 451-474. Elsevier, February 2013.
- Local Reasoning for Global Invariants, Part II: Dynamic BoundariesJournal of the ACM 60 (3), 1–73. ACM, 2013.
- Local Reasoning for Global Invariants, Part I: Region LogicJournal of the ACM 60 (3), 1–56. ACM, 2013.
- Secure distributed programming with value-dependent typesJournal of Functional Programming 23 (4), 402-451. 2013.
- Dependent Type Theory for Verification of Information Flow and Access Control PoliciesACM Transactions on Programming Languages and Systems 35 (2), 1–41. ACM, 2013.
- A Model-Driven Approach to Teaching ConcurrencyACM Transactions on Computing Education 13 (1). 2013.
- Analysis of Recursively Parallel ProgramsACM Transactions on Programming Languages and Systems 35 (3), 1–49. 2013.
- A Survey on Service Quality DescriptionACM Computing Surveys 46 (1). 2013.
-
ACM Transactions on Embedded Computing Systems 12, 1–21. 2013.
- A computationally efficient framework for the simulation of cardiac perfusion using a multi-compartment Darcy porous-media flow modelInternational Journal of Numerical Methods in Biomedical Engineering 29 (2). 2013.
-
Journal of Supercomputing 64 (1), 156–166. Springer US, 2013.
-
Sensors 12 (8), 10659–10677. August 2012.
- Understanding the Role of Malware in CybercrimeERCIM News 2012 (90), 15-16. July 2012.
- Certificate Size Reduction in Abstraction-Carrying CodeTheory and Practice of Logic Programming 12 (3), 283–318. 2012.
- Lightweight compilation of (C)LP to JavaScriptTheory and Practice of Logic Programming 12 (4-5), 755-773. Cambridge U. Press, 2012.
-
ACM Transactions on Programming Languages and Systems 34 (1), 1–48. ACM, 2012.
-
Formal Methods in System Design 40 (2), 206-231. 2012.
- An Overview of Ciao and its Design PhilosophyTheory and Practice of Logic Programming 12 (1–2), 219–252. Cambridge Univ Press, 2012.
- Quantitative Security Analysis (Dagstuhl Seminar 12481)Dagstuhl Reports 2 (11), 135-154. 2012.
-
IEEE Transactions on Software Engineering 99. IEEE Computer Society, 2012.
- Verification of Bounded Discrete Horizon Hybrid AutomataIEEE Transactions on Automatic Control 57 (6), 1445-1455. 2012.
- Modelling Declassification Policies using Abstract Domain CompletenessMathematical Structures in Computer Science 21 (6), 1253-1299. December 2011.
-
Mathematical Structures in Computer Science 21 (6), 1207-1252. Cambridge University Press, October 2011.
-
ACM Transactions on Programming Languages and Systems 33 (4), 1–13. ACM, July 2011.
- Parallel Backtracking with Answer Memoing for Independent And-ParallelismTheory and Practice of Logic Programming. Cambridge U. Press, July 2011.
- Efficient Local Unfolding with Ancestor StacksTheory and Practice of Logic Programming 11 (1), 1–32. Cambridge U. Press, January 2011.
-
Information Processing Letters 111, 614-619. 2011.
- Automatically Deriving Information-theoretic Bounds for Adaptive Side-channel AttacksJournal of Computer Security 1, 1–31. 2011.
- Security of Multithreaded Programs by CompilationACM Transactions on Information and System Security 13 (3). 2010.
- Formal Executable Semantics for Conformance in the MDE FrameworkInnovations in Systems and Software Engineering 6, 73-81. Springer London, 2010.
- Automatic Inference of Determinacy and Mutual Exclusion for Logic Programs Using Mode and Type AnalysesNew Generation Computing: computing paradigms and computational intelligence 28 (2), 117–206. 2010.
-
Electronic Notes in Theoretical Computer Science 411 (38-39), 3444-3459. 2010.
-
Journal of Parallel and Distributed Computing 70 (8), 839-848. Elsevier, 2010.
-
Electronic Notes in Theoretical Computer Science 410 (46), 4704–4723. Elsevier Science, October 2009.
- Type-based homeomorphic embedding for online terminationInformation Processing Letters 109 (15), 879-886. Elsevier, July 2009.
- Certificate Translation for Optimizing CompilersACM Transactions on Programming Languages and Systems 31 (5). ACM, July 2009.
-
Journal of Object Technology 8 (2), 137-161. March 2009.
- Implementing Constructive Intensional NegationNew Generation Computing: computing paradigms and computational intelligence 27 (1), 25-56. January 2009.
- Automated Analysis of Security-Design ModelsInformation and Software Technology 51 (5), 815-831. 2009.
- Abstraction-Carrying Code: A Model for Mobile Code SafetyNew Generation Computing: computing paradigms and computational intelligence 26 (2). 2008.
Articles in Refereed Conferences (622)
- One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User ProfilesUsenix Security Symposium (USENIX-Security). August 2023.
- ACoRe: Automated Goal-Conflict ResolutionFundamental Approaches to Software Engineering: 26th International Conference, FASE 2023, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2023, Paris, France, April 22–27, 2023, Proceedings. 2023.
-
Fundamental Approaches to Software Engineering (FASE). 2023.
- Get Me Out of This Payment! Bailout: An HTLC Re-routing ProtocolFinancial Cryptography and Data Security Conference (FC). 2023.
- Breaking and Fixing Virtual Channels: Domino Attack and DonnerNetwork and Distributed System Security Symposium (NDSS). 2023.
- Antichains Algorithms for the Inclusion Problem Between ω-VPLInternational Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2023.
-
International Symposium on Formal Methods (FM). 2023.
- The complexity of Presburger arithmetic with power or powersAutomata, Languages and Programming – ICALP. 2023.
-
Proceedings of the 44th IEEE Symposium on Security and Privacy. 2023.
- Cryptographic Oracle-Based Conditional PaymentsNetwork and Distributed System Security Symposium (NDSS). 2023.
- Efficient Modular SMT-Based Model Checking of Pointer ProgramsStatic Analysis Symposium (SAS). December 2022.
-
ACM Conference on Computer and Communications Security (CCS). November 2022.
- Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Compliant with Temporal ConstraintsInternational Conference on Automated Software Engineering (ASE). October 2022.
- LISSA: Lazy Initialization with Specialized Solver AidInternational Conference on Automated Software Engineering (ASE). October 2022.
- On the Usage of Programming Languages in the iOS EcosystemIEEE Working Conference on Source Code Analysis and Manipulation (SCAM). October 2022.
-
Internet Measurement Conference (IMC). October 2022.
-
Web Science Conference (WebSci). June 2022.
-
International Conference on Mobile Software Engineering and Systems (MOBILESoft). May 2022.
-
International Conference on Software Engineering (ICSE). May 2022.
-
IEEE Symposium on Security and Privacy (SP). May 2022.
-
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2022.
-
ACM SIGPLAN International Symposium on Haskell (Haskell). 2022.
-
ACM SIGPLAN International Symposium on Haskell (Haskell). 2022.
-
ACM SIGPLAN International Symposium on Haskell (Haskell). 2022.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2022.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2022.
-
International Conference on Applied Cryptography and Network Security (ACNS). 2022.
-
ACM Conference on Computer and Communications Security (CCS). 2022.
-
ACM Conference on Computer and Communications Security (CCS). 2022.
-
The Cryptographer’s Track at RSA Conference (CT-RSA). 2022.
-
Asia Conference on Information, Computer and Communications Security (AsiaCCS). 2022.
-
ACM Conference on Computer and Communications Security (CCS). 2022.
-
ACM Conference on Computer and Communications Security (CCS). 2022.
-
European Symposium On Research In Computer Security (ESORICS). 2022.
-
IEEE Symposium on Logic in Computer Science (LICS). 2022.
-
Practical Aspects of Declarative Languages (PADL). 2022.
-
Static Analysis Symposium (SAS). 2022.
-
IEEE Symposium on Security and Privacy (SP). 2022.
-
IEEE Symposium on Security and Privacy (SP). 2022.
-
Static Analysis Symposium (SAS). 2022.
-
European Symposium On Research In Computer Security (ESORICS). 2022.
-
Financial Cryptography and Data Security Conference (FC). 2022.
-
ACM Symposium on Principles of Distributed Computing (PODC). 2022.
-
Conference on Security and Cryptography for Networks (SCN). 2022.
-
Theory of Cryptography Conference (TCC). 2022.
-
Theory of Cryptography Conference (TCC). 2022.
- Acuerdo: Fast atomic broadcast over RDMAInternational Conference on Parallel Processing (ICPP). 2022.
-
Conference on Advances in Financial Technologies (AFT). 2022.
-
International Conference on Concurrency Theory (CONCUR). 2022.
-
IEEE International Conference on Blockchain (Blockchain). 2022.
-
International Conference on Runtime Verification (RV). 2022.
- Foundations of Coin Mixing ServicesACM Conference on Computer and Communications Security (CCS). 2022.
-
Computer Aided Verification (CAV). 2022.
-
ACM Conference on Computer and Communications Security (CCS). 2022.
-
Foundations of Software Science and Computational Structures (FOSSACS). 2022.
-
Foundations of Software Science and Computational Structures (FOSSACS). 2022.
-
International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2022.
- Monitorability of Expressive VerdictsNASA Formal Methods (NFM). 2022.
-
International Conference on Runtime Verification (RV). 2022.
-
International Symposium on Automated Technology for Verification and Analysis (ATVA). 2022.
-
IEEE Symposium on Logic in Computer Science (LICS). 2022.
-
CoRR. 2022.
-
International Symposium on Mathematical Foundations of Computer Science (MFCS). 2022.
- Liveness and latency of Byzantine state-machine replicationInternational Symposium on Distributed Computing (DISC). 2022.
- Sleepy Channels: Bi-directional Payment Channels without WatchtowersACM Conference on Computer and Communications Security (CCS). 2022.
- Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove ExtensionsInternational Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). December 2021.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). December 2021.
-
Usenix Security Symposium (USENIX-Security). August 2021.
-
Usenix Symposium on Operating Systems Design and Implementation (OSDI). July 2021.
-
IEEE Symposium on Security and Privacy (SP). May 2021.
-
IEEE Symposium on Security and Privacy (SP). May 2021.
-
IEEE Symposium on Security and Privacy (SP). May 2021.
-
ACM Conference on Computer and Communications Security (CCS). 2021.
-
ACM Conference on Computer and Communications Security (CCS). 2021.
-
ACM Conference on Computer and Communications Security (CCS). 2021.
-
IEEE Computer Security Foundations Symposium (CSF). 2021.
-
IEEE Symposium on Logic in Computer Science (LICS). 2021.
-
IEEE Symposium on Security and Privacy (SP). 2021.
-
IEEE Symposium on Security and Privacy (SP). 2021.
-
Financial Cryptography and Data Security Conference (FC). 2021.
-
International Conference on Cryptology and Network Security (CANS). 2021.
-
International Conference on Concurrency Theory (CONCUR). 2021.
-
Computing Research Repository (CoRR). 2021.
-
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2021.
-
International Conference on Logic Programming (ICLP). 2021.
-
International Conference on Availability, Reliability and Security (ARES). 2021.
-
National Conference of the American Association for Artificial Intelligence (AAAI). 2021.
-
Computer Aided Verification (CAV). 2021.
-
IEEE Symposium on Logic in Computer Science (LICS). 2021.
- UniStore: A fault-tolerant marriage of causal and strong consistencyUsenix Annual Technical Conference (USENIX). 2021.
- An Experimental Framework for Improving the Performance of BFT Consensus for Future Permissioned BlockchainsProceedings of the 15th ACM International Conference on Distributed and Event-Based Systems. 2021.
-
International Conference on Concurrency Theory (CONCUR). 2021.
-
Financial Cryptography and Data Security Conference (FC). 2021.
-
Financial Cryptography and Data Security Conference (FC). 2021.
-
Financial Cryptography and Data Security Conference (FC). 2021.
- An application of KLEE to aerospace industrial software2021.
- HLola: a Very Functional Tool for Extensible Stream Runtime VerificationInternational Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2021.
-
International Symposium on Formal Methods (FM). 2021.
-
International Conference on Runtime Verification (RV). 2021.
-
IEEE Symposium on Security and Privacy (SP). 2021.
- Knowledge-Assisted Reasoning of Model-Augmented System Requirements with Event Calculus and Goal-Directed Answer Set ProgrammingComputing Research Repository (CoRR). 2021.
-
International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2021.
-
ACM Conference on Computer and Communications Security (CCS). 2021.
-
International Symposium on Software Testing and Analysis (ISSTA). 2021.
- Efficient replication via timestamp stabilityEurosys Conference (EuroSys). 2021.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2021.
-
IEEE International Conference on Robotics and Automation (ICRA). 2021.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). December 2020.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). December 2020.
-
Theory of Cryptography Conference (TCC). December 2020.
-
Annual Computer Security Applications Conference (ACSAC). December 2020.
-
ACM Conference on Computer and Communications Security (CCS). November 2020.
-
International Colloquium on Theoretical Aspects of Computing, ICTAC 2020. November 2020.
-
IEEE Working Conference on Source Code Analysis and Manipulation (SCAM). October 2020.
-
Automated Software Engineering Conference (ASE). September 2020.
-
IEEE International Working Conference on Mining Software Repositories (MSR). June 2020.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). April 2020.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). April 2020.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). April 2020.
-
Network and Distributed System Security Symposium (NDSS). February 2020.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). January 2020.
-
International Conference on Applied Cryptography and Network Security (ACNS). 2020.
-
International Conference on Artificial Intelligence and Statistics (AISTATS). 2020.
-
International Conference on Artificial Intelligence and Statistics (AISTATS). 2020.
-
European Symposium on Programming (ESOP). 2020.
-
Genetic and Evolutionary Computations (GECCO). 2020.
-
International Conference on Cryptology in India (INDOCRYPT). 2020.
-
IEEE Symposium on Logic in Computer Science (LICS). 2020.
-
IEEE Symposium on Logic in Computer Science (LICS). 2020.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2020.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2020.
-
International Symposium on Mathematical Foundations of Computer Science (MFCS). 2020.
-
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2020.
-
IEEE Symposium on Security and Privacy (SP). 2020.
-
Privacy Enhancing Technologies Symposium (PETS). 2020.
-
Computing Research Repository (CoRR). 2020.
-
Computing Research Repository (CoRR). 2020.
- Unifying the Time-Event Spectrum for Stream Runtime VerificationInternational Conference on Runtime Verification (RV). 2020.
-
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2020.
-
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2020.
- Detecting and Diagnosing Energy Issues for Mobile ApplicationsInternational Symposium on Software Testing and Analysis (ISSTA). 2020.
- State-machine replication for planet-scale systemsEurosys Conference (EuroSys). 2020.
- From big-step to small-step semantics and back with interpreter specializationVPT 2020. 2020.
-
NASA Formal Methods (NFM). 2020.
- Combining High Throughput and Low Migration Latency for Consistent Data Storage on the EdgeInternational Conference on Computer Communication and Networks (ICCCN). 2020.
-
ASIAN Symposium on Programming Languages and Systems (APLAS). 2020.
-
IEEE Symposium on Security and Privacy (SP). 2020.
-
International Symposium on Mathematical Foundations of Computer Science (MFCS). 2020.
- Incremental Analysis of Logic Programs with Assertions and Open PredicatesInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2020.
-
International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2020.
-
Static Analysis Symposium (SAS). 2020.
-
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2020.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). November 2019.
-
ACM Conference on Computer and Communications Security (CCS). November 2019.
-
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). November 2019.
-
Static Analysis Symposium (SAS). October 2019.
-
International Conference on Runtime Verification (RV). October 2019.
-
International Symposium on Distributed Computing (DISC). October 2019.
- Towards Computing Abstract Distances in Logic ProgramsICLP Tech. Comms.. September 2019.
- Towards a General Framework for Static Cost Analysis of Parallel Logic ProgramsICLP, Tech. Comms.. September 2019.
-
ACM Conference on Computer and Communications Security (CCS). July 2019.
- White-box atomic multicastIEEE/IFIP International Conference on Dependable Systems and Networks (DSN). June 2019.
-
IEEE Symposium on Security and Privacy (SP). May 2019.
-
Computing Research Repository (CoRR). April 2019.
-
Network and Distributed System Security Symposium (NDSS). February 2019.
- Orion: A distributed file system for non-volatile main memory and RDMA-capable networksConference on File and Storage Technologies (FAST). February 2019.
-
Practical Aspects of Declarative Languages (PADL). January 2019.
- Multivariant Assertion-based Guidance in Abstract InterpretationInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). January 2019.
-
ACM Conference on Computer and Communications Security (CCS). 2019.
-
ACM Conference on Computer and Communications Security (CCS). 2019.
-
ACM Conference on Computer and Communications Security (CCS). 2019.
-
IEEE Computer Security Foundations Symposium (CSF). 2019.
-
European Symposium On Research In Computer Security (ESORICS). 2019.
-
Formal Methods in Computer-Aided Design (FMCAD). 2019.
-
IEEE Symposium on Logic in Computer Science (LICS). 2019.
-
International Symposium on Mathematical Foundations of Computer Science (MFCS). 2019.
-
Advances in Neural Information Processing Systems (NeurIPS). 2019.
-
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2019.
-
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2019.
-
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2019.
-
International Conference on Runtime Verification (RV). 2019.
-
Static Analysis Symposium (SAS). 2019.
-
International Conference on Principles of Distributed Systems (OPODIS). 2019.
- Design Patterns for Code Reuse in HLS Packet Processing PipelinesIEEE Symposium on Field Programmable Custom Computing Machines (FCCM). 2019.
-
International Conference on Field-Programmable Logic and Applications (FPL). 2019.
- Reconfigurable Atomic Transaction CommitACM Symposium on Principles of Distributed Computing (PODC). 2019.
-
Computer Aided Verification (CAV). 2019.
-
Data Compression Conference (DCC). 2019.
-
IEEE European Symposium on Security and Privacy (EuroS&P). 2019.
- Hourglass: Leveraging Transient Resources for Time-Constrained Graph Processing in the CloudEurosys Conference (EuroSys). 2019.
-
International Symposium on Formal Methods (FM). 2019.
-
International Conference on Runtime Verification (RV). November 2018.
-
ACM Conference on Computer and Communications Security (CCS). October 2018.
-
International Symposium on Microarchitecture (MICRO). October 2018.
-
Internet Measurement Conference (IMC). October 2018.
-
Conference on Security and Cryptography for Networks (SCN). September 2018.
- Static Performance Guarantees for Programs with Run-time ChecksInternational Conference on Principles and Practice of Declarative Programming (PPDP). September 2018.
-
Advances in Cryptology (CRYPTO). August 2018.
-
International Conference on Field-Programmable Logic and Applications (FPL). August 2018.
-
International Conference on Field-Programmable Logic and Applications (FPL). August 2018.
- Translating Code Comments to Procedure SpecificationsInternational Symposium on Software Testing and Analysis (ISSTA). July 2018.
-
IEEE International Conference on Web Services (ICWS). July 2018.
- Towards Incremental and Modular Context-sensitive AnalysisInternational Conference on Logic Programming (ICLP). July 2018.
-
International Conference on Applied Cryptography and Network Security (ACNS). June 2018.
-
Asia Conference on Information, Computer and Communications Security (AsiaCCS). June 2018.
-
IEEE International Conference on Program Comprehension (ICPC). May 2018.
-
IEEE International Working Conference on Mining Software Repositories (MSR). May 2018.
-
International Conference on Mobile Software Engineering and Systems (MOBILESoft). May 2018.
-
IEEE European Symposium on Security and Privacy (EuroS&P). April 2018.
-
Principles and Practice of Parallel Programming (PPoPP). February 2018.
- Exploiting Term Hiding to Reduce Run-time Checking OverheadPractical Aspects of Declarative Languages (PADL). January 2018.
-
IEEE Symposium on Logic in Computer Science (LICS). 2018.
-
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2018.
-
Computer Aided Verification (CAV). 2018.
-
ACM Conference on Computer and Communications Security (CCS). 2018.
-
IEEE Computer Security Foundations Symposium (CSF). 2018.
-
IEEE Computer Security Foundations Symposium (CSF). 2018.
-
European Symposium on Programming (ESOP). 2018.
-
European Symposium on Programming (ESOP). 2018.
-
International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2018.
-
International Colloquium on Automata Languages and Programming (ICALP). 2018.
-
Advances in Neural Information Processing Systems (NeurIPS). 2018.
-
Conference on Security and Cryptography for Networks (SCN). 2018.
- i2kit: A Deployment Tool with the Simplicity of Containers and the Security of Virtual MachinesInternational Conference on Web Information Systems Engineering (WISE). 2018.
-
Network and Distributed System Security Symposium (NDSS). 2018.
-
International Conference on Hybrid Systems: Computation and Control (HSCC). 2018.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2018.
-
International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2018.
- Fine-Grained Secure ComputationTheory of Cryptography Conference (TCC). 2018.
-
International Conference on Runtime Verification (RV). 2018.
-
International Symposium on Distributed Computing (DISC). 2018.
- Compositional verification of compiler optimisations on relaxed memoryEuropean Symposium on Programming (ESOP). 2018.
-
International Conference on Concurrency Theory (CONCUR). 2018.
-
Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2018.
-
ACM Symposium on Applied Computing (SAC). 2018.
-
International Symposium on Formal Methods (FM). 2018.
- Paxos consensus, deconstructed and abstractedEuropean Symposium on Programming (ESOP). 2018.
-
Principles and Practice of Parallel Programming (PPoPP). 2018.
-
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2018.
-
International Conference on Runtime Verification (RV). 2018.
-
International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2018.
- Federated Byzantine quorum systemsInternational Conference on Principles of Distributed Systems (OPODIS). 2018.
- Distributed Transactional Reads: The Strong, the Quick, the Fresh & the ImpossibleACM/IFIP/USENIX International Middleware Conference (Middleware). 2018.
-
International Symposium on Automated Technology for Verification and Analysis (ATVA). October 2017.
-
International Symposium on Automated Technology for Verification and Analysis (ATVA). October 2017.
-
Conferencia Latinoamericana En Informatica (CLEI). September 2017.
-
European Symposium On Research In Computer Security (ESORICS). September 2017.
-
International Symposium on Fundamentals of Computation Theory (FCT). September 2017.
-
Advances in Cryptology (CRYPTO). August 2017.
-
International Conference on Software Engineering (ICSE). May 2017.
-
IEEE International Working Conference on Mining Software Repositories (MSR). May 2017.
-
IEEE Symposium on Security and Privacy (SP). May 2017.
-
International Conference on Data Engineering (ICDE). April 2017.
-
International Conference on Software Testing, Verification and Validation (ICST). March 2017.
-
IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). March 2017.
- App MiningSystems Engineering. February 2017.
- Vergleich und Kombination von Techniken des Predictive Business Process MonitoringSystems Engineering. February 2017.
-
Network and Distributed System Security Symposium (NDSS). February 2017.
-
International Conference on Concurrency Theory (CONCUR). 2017.
- A Fast and Verified Software Stack for Secure Function EvaluationACM Conference on Computer and Communications Security (CCS). 2017.
- Jasmin: High-Assurance and High-Speed CryptographyACM Conference on Computer and Communications Security (CCS). 2017.
- Zero-knowledge contingent payments revisited: Attacks and payments for servicesACM Conference on Computer and Communications Security (CCS). 2017.
- Verified Translation Validation of Static AnalysesIEEE Computer Security Foundations Symposium (CSF). 2017.
-
ACM Conference on Computer and Communications Security (CCS). 2017.
-
Advances in Cryptology (CRYPTO). 2017.
-
European Symposium on Programming (ESOP). 2017.
-
International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2017.
-
IEEE European Symposium on Security and Privacy (EuroS&P). 2017.
-
International Symposium on Fundamentals of Computation Theory (FCT). 2017.
-
International Conference on Hybrid Systems: Computation and Control (HSCC). 2017.
-
International Colloquium on Automata Languages and Programming (ICALP). 2017.
-
Logic Programming and Automated Reasoning (LPAR). 2017.
-
International Conference on Model Driven Engineering Languages and Systems (MODELS). 2017.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2017.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2017.
-
IEEE Symposium on Security and Privacy (SP). 2017.
- Unilaterally-Authenticated Key ExchangeFinancial Cryptography and Data Security Conference (FC). 2017.
- Feature importance scores and lossless feature pruning using Banzhaf power indicesNIPS 2017 Symposium on Interpretable Machine Learning. 2017.
-
ACM Conference on Computer and Communications Security (CCS). 2017.
- Security Analysis of Cache Replacement PoliciesInternational Conference on Principles of Security and Trust (POST). 2017.
- Concurrent Data Structures Linked in TimeEuropean Conference on Object-Oriented Programming (ECOOP). 2017.
- Rigorous Analysis of Software Countermeasures against Cache AttacksACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2017.
-
International Symposium on Distributed Computing (DISC). 2017.
-
European Symposium on Programming (ESOP). 2017.
- Loophole: Timing Attacks on Shared Event Loops in ChromeUsenix Security Symposium (USENIX-Security). 2017.
- A Systematic Study of Cache Side Channels across AES ImplementationsEngineering Secure Software and Systems (ESSoS). 2017.
- Towards Run-time Checks Simplification via Term Hiding (extended abstract)Tech. Comm. of ICLP'17. 2017.
-
International Conference on Concurrency Theory (CONCUR). 2017.
-
International Conference on Web and Internet Economics (WINE). December 2016.
-
Annual Computer Security Applications Conference (ACSAC). December 2016.
- Description and Evaluation of a Generic Design to Integrate CLP and Tabled ExecutionInternational Conference on Principles and Practice of Declarative Programming (PPDP). September 2016.
-
The International Symposium on Research in Attacks, Intrusions and Defenses (RAID). September 2016.
-
The International Symposium on Research in Attacks, Intrusions and Defenses (RAID). September 2016.
- Reducing the Overhead of Assertion Run-time Checks via Static AnalysisInternational Conference on Principles and Practice of Declarative Programming (PPDP). September 2016.
- Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install ServicesUsenix Security Symposium (USENIX-Security). August 2016.
-
International Symposium on Software Testing and Analysis (ISSTA). July 2016.
-
International Symposium on Functional and Logic Programming (FLOPS). March 2016.
- Multi-Key Homomorphic AuthenticatorsInternational Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2016.
- Relational Logic with Framing and HypothesesFoundations of Software Technology and Theoretical Computer Science (FST&TCS). 2016.
- Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced DataACM Conference on Computer and Communications Security (CCS). 2016.
-
IEEE Computer Security Foundations Symposium (CSF). 2016.
-
Computer Aided Verification (CAV). 2016.
-
Computer Aided Verification (CAV). 2016.
-
ACM Conference on Computer and Communications Security (CCS). 2016.
-
ACM Conference on Computer and Communications Security (CCS). 2016.
-
ACM Conference on Computer and Communications Security (CCS). 2016.
-
International Conference on Certified Programs and Proofs (CPP). 2016.
-
ACM Conference on Embedded Software (EMSOFT). 2016.
-
International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2016.
- A Theory of Slicing for Probabilistic Control Flow GraphsFoundations of Software Science and Computational Structures (FOSSACS). 2016.
-
ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp). 2016.
- A Program Logic for Union BoundsInternational Colloquium on Automata Languages and Programming (ICALP). 2016.
-
International Conference on Information Systems (ICIS). 2016.
- Facets of Software DopingInternational Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2016.
-
International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA). 2016.
-
International Conference on Intelligent User Interfaces (IUI). 2016.
-
IEEE Symposium on Logic in Computer Science (LICS). 2016.
-
International Conference on Mobile and Ubiquitous Systems: Networks and Services (Mobiquitous). 2016.
-
International Conference on Model Driven Engineering Languages and Systems (MODELS). 2016.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2016.
-
Static Analysis Symposium (SAS). 2016.
-
IEEE Symposium on Security and Privacy (SP). 2016.
-
International Symposium on Games, Automata, Logics and Formal Verification (GandALF). 2016.
-
International Conference on Functional Programming (ICFP). 2016.
- A Source-level Energy Optimization Framework for Mobile ApplicationsIEEE Working Conference on Source Code Analysis and Manipulation (SCAM). 2016.
- Nearly Optimal Verifiable Data StreamingInternational Conference on Practice and Theory in Public Key Cryptography (PKC). 2016.
- On the (In)security of SNARKs in the Presence of OraclesTheory of Cryptography Conference (TCC). 2016.
-
(HIP3ES'16). 2016.
-
Computer Aided Verification (CAV). 2016.
- 'Cause I'm strong enough: reasoning about consistency choices in distributed systemsACM SIGACT Symposium on Principles of Programming Languages (POPL). 2016.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2016.
- Verifying Constant-Time ImplementationsUsenix Security Symposium (USENIX-Security). 2016.
- Specification and Complexity of Collaborative Text EditingACM Symposium on Principles of Distributed Computing (PODC). 2016.
-
Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2016.
-
International Conference on Hybrid Systems: Computation and Control (HSCC). 2016.
-
International Symposium on Temporal Representation and Reasoning (TIME). 2016.
- Robustness against Consistency Models with Atomic VisibilityInternational Conference on Concurrency Theory (CONCUR). 2016.
- Hoare-style Specifications As Correctness Conditions for Non-linearizable Concurrent ObjectsACM Conference on Object Oriented Programming Systems Languages and Applications (OOPSLA). 2016.
- Analysing Snapshot IsolationACM Symposium on Principles of Distributed Computing (PODC). 2016.
- A Generic Logic for Proving LinearizabilityInternational Symposium on Formal Methods (FM). 2016.
- Automated Test Input Generation for Android: Are We There Yet?International Conference on Automated Software Engineering (ASE). November 2015.
-
ACM Conference on Computer and Communications Security (CCS). October 2015.
-
ACM Conference on Computer and Communications Security (CCS). October 2015.
- A Haskell Implementation of a Rule-Based Program Transformation for C ProgramsPractical Aspects of Declarative Languages (PADL). June 2015.
- Mining Apps for Abnormal Usage of Sensitive DataInternational Conference on Software Engineering (ICSE). May 2015.
-
IEEE Symposium on Security and Privacy (SP). May 2015.
-
IEEE Symposium on Security and Privacy (SP). May 2015.
-
ACM Conference on Computer and Communications Security (CCS). 2015.
-
International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2015.
-
International Conference on Practice and Theory in Public Key Cryptography (PKC). 2015.
- Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public KeysAdvances in Cryptology (CRYPTO). 2015.
- Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted DataACM Conference on Computer and Communications Security (CCS). 2015.
-
Logic, Rewriting, and Concurrency - Essays dedicated to José Meseguer on the Occasion of His 65th Birthday. 2015.
-
International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt). 2015.
-
International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS). 2015.
-
Logic Programming and Automated Reasoning (LPAR). 2015.
-
Logic Programming and Automated Reasoning (LPAR). 2015.
-
Computer Aided Verification (CAV). 2015.
-
Fundamental Approaches to Software Engineering (FASE). 2015.
-
Asia-Pacific Conference on Conceptual Modelling (APCCM). 2015.
- Verification of Population ProtocolsInternational Conference on Concurrency Theory (CONCUR). 2015.
- From Non-Zenoness Verification to TerminationInternational Conference on Formal Methods and Models for System Design (MEMOCODE). 2015.
- Interprocedural Reachability for Flat Integer ProgramsInternational Symposium on Fundamentals of Computation Theory (FCT). 2015.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2015.
-
IEEE Computer Security Foundations Symposium (CSF). 2015.
-
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2015.
- Synthesis of Equivalent Method Calls in GuavaInternational Symposium on Search Based Software Engineering (SSBSE). 2015.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2015.
- Bounded error flowpipe computation of parameterized linear systemsACM Conference on Embedded Software (EMSOFT). 2015.
- ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated DataIEEE Symposium on Security and Privacy (SP). 2015.
-
IFIP TC12 Publications (IFIP12). 2015.
-
Soft Computing Models in Industrial and Environmental Applications (SOCO). 2015.
- Energy Efficient Allocation and Scheduling for DVFS-enabled Multicore Environments using a Multiobjective Evolutionary AlgorithmGenetic and Evolutionary Computations (GECCO). 2015.
-
Hybrid Artificial Intelligent Systems (HAIS 2015). 2015.
- Transaction chopping for parallel snapshot isolationInternational Symposium on Distributed Computing (DISC). 2015.
- Composite replicated data typesEuropean Symposium on Programming (ESOP). 2015.
-
Computer Aided Verification (CAV). 2015.
-
European Symposium on Programming (ESOP). 2015.
-
International Colloquium on Automata Languages and Programming (ICALP). 2015.
-
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2015.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2015.
-
International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2015.
- Rational Protection Against Timing AttacksIEEE Computer Security Foundations Symposium (CSF). 2015.
- Towards Energy Consumption Verification via Static AnalysisWS on High Perf. Energy Efficient Embedded Sys. (HIP3ES). 2015.
-
Proc. of the 27th Int’l Conf. on Computer Aided Verification (CAV'15). 2015.
- A framework for transactional consistency models with atomic visibilityInternational Conference on Concurrency Theory (CONCUR). 2015.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2015.
- Reasoning about the Trade-off between Security and PerformanceProc. 12th International Conference on Quantitative Evaluation of Systems (QEST ‘15). 2015.
- Symbolic Polytopes for Quantitative Interpolation and VerificationComputer Aided Verification (CAV). 2015.
-
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2015.
- Specifying and Verifying Concurrent Algorithms with Histories and SubjectivityEuropean Symposium on Programming (ESOP). 2015.
- Mechanized Verification of Fine-grained Concurrent ProgramsACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2015.
- A Model-driven Methodology for Generating and Verifying CSP-based Java CodeCommunicating Process Architectures 2015, Proceedings of the 37th WoTUG Conference on Concurrent and Parallel Systems. 2015.
- An XFEM/CZM implementation for massively parallel simulations of composites fractureEuropean Solid Mechanics Conference, ESMC 2015. 2015.
-
Annual Computer Security Applications Conference (ACSAC). December 2014.
-
ACM Conference on Computer and Communications Security (CCS). November 2014.
-
ACM Conference on Computer and Communications Security (CCS). November 2014.
-
ACM Conference on Computer and Communications Security (CCS). November 2014.
-
International Conference on Service Oriented Computing (ICSOC). November 2014.
-
International Conference on Service Oriented Computing (ICSOC). November 2014.
-
Internet Measurement Conference (IMC). November 2014.
- On Combining Backward and Forward Chaining in Constraint Logic ProgrammingInternational Conference on Principles and Practice of Declarative Programming (PPDP). September 2014.
- Assertion-based Debugging of Higher-Order (C)LP ProgramsInternational Conference on Principles and Practice of Declarative Programming (PPDP). September 2014.
-
European Symposium On Research In Computer Security (ESORICS). September 2014.
- Certified Synthesis of Efficient Batch VerifiersIEEE Computer Security Foundations Symposium (CSF). July 2014.
-
IEEE Computer Security Foundations Symposium (CSF). July 2014.
-
Network and Distributed System Security Symposium (NDSS). February 2014.
-
International Conference on Model Driven Engineering Languages and Systems (MODELS). 2014.
- Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential PrivacyACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
-
International Conference on Model Driven Engineering Languages and Systems (MODELS). 2014.
- Homomorphic Signatures with Efficient Verification for Polynomial FunctionsAdvances in Cryptology (CRYPTO). 2014.
- Efficiently Verifiable Computation on Encrypted DataACM Conference on Computer and Communications Security (CCS). 2014.
-
International Conference on Concurrency Theory (CONCUR). 2014.
-
Advances in Cryptology (CRYPTO). 2014.
-
Advances in Cryptology (CRYPTO). 2014.
-
IEEE International Conference on Robotics and Automation (ICRA). 2014.
-
Conference on Interactive Theorem Proving (ITP). 2014.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
- A Logical Analysis of Framing for Specifications with Pure Method CallsVerified Software: Theories (VSTTE). 2014.
-
International Symposium on Theoretical Aspects of Software Engineering (TASE). 2014.
- Generalizing Homomorphic MACs for Arithmetic CircuitsInternational Conference on Practice and Theory in Public Key Cryptography (PKC). 2014.
- Interactive Encryption and Message AuthenticationConference on Security and Cryptography for Networks (SCN). 2014.
-
IEEE Symposium on Security and Privacy (SP). 2014.
- Modular, higher-order cardinality analysis in theory and practiceACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
- Characterising Testing Preorders for Broadcasting Distributed SystemsTrustworthy Global Computing (TGC). 2014.
- Leakage Resilience against Concurrent Cache AttacksInternational Conference on Principles of Security and Trust (POST). 2014.
-
International Joint Conference on Automated Reasoning (IJCAR). 2014.
-
International Conference on Runtime Verification (RV). 2014.
-
International Conference on Principles of Security and Trust (POST). 2014.
-
Computer Aided Verification (CAV). 2014.
-
IEEE Symposium on Security and Privacy (SP). 2014.
-
International SPIN Symposium on Model Checking of Software (SPIN). 2014.
- Replicated data types: specification, verification, optimalityACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
- Ordered Counter Abstraction (Refinable Subword Relations for Parameterized Verification)International Conference on Language and Automata Theory and Applications (LATA). 2014.
- Energy Consumption Analysis of Programs based on XMOS ISA-Level ModelsInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2014.
- Modular Reasoning about Heap Paths via Effectively Propositional FormulasACM SIGACT Symposium on Principles of Programming Languages (POPL). 2014.
- Parameterised linearisabilityInternational Colloquium on Automata Languages and Programming (ICALP). 2014.
- Communicating State Transition Systems for Fine-Grained Concurrent ResourcesEuropean Symposium on Programming (ESOP). 2014.
-
American Control Conference (ACC). 2014.
-
International Symposium on Automated Technology for Verification and Analysis (ATVA). 2014.
-
Computer Aided Verification (CAV). 2014.
-
International Symposium on Temporal Representation and Reasoning (TIME). 2014.
-
Trustworthy Global Computing (TGC). 2014.
- Safety of live transactions in transactional memory: TMS is necessary and sufficientInternational Symposium on Distributed Computing (DISC). 2014.
-
ACM Conference on Computer and Communications Security (CCS). November 2013.
-
ACM Conference on Computer and Communications Security (CCS). November 2013.
-
The International Symposium on Research in Attacks, Intrusions and Defenses (RAID). October 2013.
- Sized Type Analysis for Logic ProgramsTPLP (29th ICLP'13 Special Issue), on-line supplement (technical communication). August 2013.
-
GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). July 2013.
- Supporting Pruning in Tabled LPPractical Aspects of Declarative Languages (PADL). January 2013.
- Reversible Language Extensions and their Application in DebuggingPractical Aspects of Declarative Languages (PADL). January 2013.
-
ACM Conference on Computer and Communications Security (CCS). 2013.
- Verified Computational Differential Privacy with Applications to Smart MeteringIEEE Computer Security Foundations Symposium (CSF). 2013.
-
Logical Foundations of Computer Science (LFCS). 2013.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2013.
-
Principles and Practice of Parallel Programming (PPoPP). 2013.
-
IEEE Symposium on Security and Privacy (SP). 2013.
- OCL2FOL+: Coping with UndefinednessInternational Conference on Model Driven Engineering Languages and Systems (MODELS). 2013.
-
International Conference on Functional Programming (ICFP). 2013.
- Deriving the Full-reducing Krivine Machine from the Small-step Operational Semantics of Normal OrderInternational Conference on Principles and Practice of Declarative Programming (PPDP). 2013.
-
Computer Aided Verification (CAV). 2013.
- Monadic abstract interpretersACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2013.
-
International Conference on Hybrid Artificial Intelligence Systems (HAIS). 2013.
- Preventing Side-Channel Leaks in Web Traffic: A Formal ApproachNetwork and Distributed System Security Symposium (NDSS). 2013.
- Verifying Concurrent Programs Against Sequential SpecificationsEuropean Symposium on Programming (ESOP). 2013.
- Library abstraction for C/C++ concurrencyACM SIGACT Symposium on Principles of Programming Languages (POPL). 2013.
- CacheAudit: A Tool for the Static Analysis of Cache Side ChannelsUsenix Security Symposium (USENIX-Security). 2013.
- Parameterized Verification of Asynchronous Shared-Memory SystemsComputer Aided Verification (CAV). 2013.
- Proving Termination Starting from the EndComputer Aided Verification (CAV). 2013.
- Underapproximation of Procedure Summaries for Integer ProgramsInternational Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS). 2013.
- Effectively-Propositional Reasoning about Reachability in Linked Data StructuresComputer Aided Verification (CAV). 2013.
- Automation of Quantitative Information-Flow AnalysisSchool on Formal Methods for the Design of Computer, Communication and Software Systems (SFM). 2013.
- Subjective Auxiliary State for Coarse-Grained ConcurrencyACM SIGACT Symposium on Principles of Programming Languages (POPL). 2013.
- Abstraction Based Model-Checking of Stability of Hybrid SystemsComputer Aided Verification (CAV). 2013.
- Pre-orders for reasoning about stability properties with respect to input of hybrid systemsACM Conference on Embedded Software (EMSOFT). 2013.
- On the decidability of stability of hybrid systemsInternational Conference on Hybrid Systems: Computation and Control (HSCC). 2013.
- Patching task-level robot controllers based on a local -calculus formulaIEEE International Conference on Robotics and Automation (ICRA). 2013.
- Hybrid Automata based CEGAR for Rectangular Hybrid AutomataInternational Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2013.
- Verifying Information Flow Properties of Hybrid SystemsHigh Confidence Networked Systems (HiCoNS). 2013.
- Verifying concurrent memory reclamation algorithms with graceEuropean Symposium on Programming (ESOP). 2013.
- Dependent Types for Enforcement of Information Flow and Erasure Policies in Heterogeneous Data StructuresInternational Conference on Principles and Practice of Declarative Programming (PPDP). 2013.
- A programming language perspective on transactional memory consistencyACM Symposium on Principles of Distributed Computing (PODC). 2013.
- An XFEM Implementation for Fracture Simulations of CompositesInternational Conference on Computational Plasticity. Fundamentals and Applications. COMPLAS 2013. 2013.
- An XFEM-CZM Implementation for Large-Scale Fracture Simulations of Composites LaminatesEuropean Congress and Exhibition on Advanced Materials and Processes. EUROMAT 2013. 2013.
- Mtac: A Monad for Typed Tactic Programming in CoqInternational Conference on Functional Programming (ICFP). 2013.
- A Constraint-Based Approach to Quality Assurance in Service ChoreographiesInternational Conference on Service Oriented Computing (ICSOC). November 2012.
-
ACM Conference on Computer and Communications Security (CCS). October 2012.
- Deriving Specifications for Composite Web ServicesInternational Computer Software and Applications Conference (COMPSAC). July 2012.
-
International Symposium on Software Testing and Analysis (ISSTA). July 2012.
- A General Implementation Framework for Tabled CLPInternational Symposium on Functional and Logic Programming (FLOPS). May 2012.
- A Segment-Swapping Approach for Executing Trapped ComputationsPractical Aspects of Declarative Languages (PADL). January 2012.
-
8th Scandinavian Logic Symposium, 20-21 August 2012, Roskilde University, Denmark. 2012.
- A Formally Verified SSA-Based Middle-End - Static Single Assignment Meets CompCertEuropean Symposium on Programming (ESOP). 2012.
- Programming Paradigm Driven Heap AnalysisInternational Conference on Compiler Construction (CC). 2012.
- Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge ProtocolsACM Conference on Computer and Communications Security (CCS). 2012.
- Verified Security of Redundancy-Free Encryption from Rabin and RSAACM Conference on Computer and Communications Security (CCS). 2012.
- Automation in Computer-Aided Cryptography: Proofs, Attacks and DesignsInternational Conference on Certified Programs and Proofs (CPP). 2012.
- Verified Security of Merkle-DamgårdIEEE Computer Security Foundations Symposium (CSF). 2012.
- Cache-Leakage Resilient OS Isolation in an Idealized Model of VirtualizationIEEE Computer Security Foundations Symposium (CSF). 2012.
- Secure Multi-Execution through Static Program TransformationIFIP WG 6.1 International Conference on Formal Techniques for (Networked and) Distributed Systems (FORTE). 2012.
- Probabilistic Relational Hoare Logics for Computer-Aided Security ProofsMathematics of Program Construction (MPC). 2012.
- Verification of Software BarriersPrinciples and Practice of Parallel Programming (PPoPP). 2012.
- Computer-Aided Cryptographic ProofsStatic Analysis Symposium (SAS). 2012.
- Decision Procedures for Region LogicInternational Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2012.
- Verified Indifferentiable Hashing into Elliptic CurvesInternational Conference on Principles of Security and Trust (POST). 2012.
- Probabilistic Relational Reasoning for Differential PrivacyACM SIGACT Symposium on Principles of Programming Languages (POPL). 2012.
- Automatic Quantification of Cache Side-ChannelsComputer Aided Verification (CAV). 2012.
-
Foundations of Software Technology and Theoretical Computer Science (FST&TCS). 2012.
-
IEEE Symposium on Logic in Computer Science (LICS). 2012.
- Non-Monotonic Self-Adjusting ComputationEuropean Symposium on Programming (ESOP). 2012.
- Linearizability with ownership transferInternational Conference on Concurrency Theory (CONCUR). 2012.
- Concurrent library correctness on the TSO memory modelEuropean Symposium on Programming (ESOP). 2012.
- Foundations for Approximation Based Analysis of Stability Properties of Hybrid SystemsAllerton Conference on Communication, Control, and Computing (Allerton). 2012.
- Conformance Testing of Boolean Programs with Multiple FaultsIFIP WG 6.1 International Conference on Formal Techniques for (Networked and) Distributed Systems (FORTE). 2012.
- Pre-orders for reasoning about stabilityInternational Conference on Hybrid Systems: Computation and Control (HSCC). 2012.
-
International Symposium on Temporal Representation and Reasoning (TIME). 2012.
-
International Colloquium on Theoretical Aspects of Computing (ICTAC). 2012.
-
Static Analysis Symposium (SAS). 2012.
- Show no weakness: sequentially consistent specifications of TSO librariesInternational Symposium on Distributed Computing (DISC). 2012.
- Constraint-Based Runtime Prediction of SLA Violations in Service OrchestrationsInternational Conference on Service Oriented Computing (ICSOC). December 2011.
- A Machine-Checked Framework for Relational Separation LogicInternational Conference on Software Engineering and Formal Methods (SEFM). November 2011.
- Verifiable Security of Boneh-Franklin Identity-Based EncryptionInternational Conference on Provable Security (ProvSec). October 2011.
- Computer-Aided Security Proofs for the Working CryptographerAdvances in Cryptology (CRYPTO). August 2011.
- Measuring Pay-per-Install: The Commoditization of Malware DistributionUsenix Security Symposium (USENIX-Security). August 2011.
- CLP Projection for Constraint Handling RulesInternational Conference on Principles and Practice of Declarative Programming (PPDP). July 2011.
- Modular Extensions for Modular (Logic) LanguagesInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). July 2011.
- Automated Attribute Inference in Complex Service Workflows Based on Sharing AnalysisIEEE International Conference on Services Computing (IEEE SCC). July 2011.
- Formally Verifying Isolation and Availability in an Idealized Model of VirtualizationInternational Symposium on Formal Methods (FM). June 2011.
- Relational Verification Using Product ProgramsInternational Symposium on Formal Methods (FM). June 2011.
- A decade of model-driven securityACM Symposium on Access Control Models and Technologies (SACMAT). June 2011.
- Applicative Shortcut FusionSymposium on Trends in Functional Programming (TFP). May 2011.
-
IEEE Symposium on Security and Privacy (SP). May 2011.
- Beyond Provable Security Verifiable IND-CCA Security of OAEPThe Cryptographer’s Track at RSA Conference (CT-RSA). February 2011.
- Approximating Petri Net Reachability Along Context-free TracesFoundations of Software Technology and Theoretical Computer Science (FST&TCS). 2011.
- Complexity Analysis of the Backward Coverability Algorithm for VASSReachability Problems (RP). 2011.
- Non-Uniform Distributions in Quantitative Information-FlowACM Conference on Computer and Communications Security (CCS). 2011.
- Static Enforcement of Information Flow Policies for a Concurrent JVM-like LanguageTrustworthy Global Computing (TGC). 2011.
- Information-theoretic Bounds for Differentially Private MechanismsIEEE Computer Security Foundations Symposium (CSF). 2011.
- Model-Driven Development of Security-Aware GUIs for Data-Centric ApplicationsFoundations of Security Analysis and Design (FOSAD). 2011.
- Third International Workshop on Principles of Engineering Service-Oriented Systems (PESOS 2011)ICSE. 2011.
- Precision and the conjunction rule in concurrent separation logicElectronic Notes in Theoretical Computer Science (ENTCS). 2011.
- Complexity of Pattern-based Verification for Multithreaded ProgramsACM SIGACT Symposium on Principles of Programming Languages (POPL). 2011.
- How to make ad hoc proof automation less ad hocInternational Conference on Functional Programming (ICFP). 2011.
- The Ciao Approach to the Dynamic vs. Static Language DilemmaProc. Int’l. WS on Scripts to Programs, STOP'11. 2011.
- Liveness-Preserving Atomicity AbstractionInternational Colloquium on Automata Languages and Programming (ICALP). 2011.
- On the Strength of Owicki-Gries for ResourcesASIAN Symposium on Programming Languages and Systems (APLAS). 2011.
- Verification of Information Flow and Access Control Policies with Dependent TypesIEEE Symposium on Security and Privacy (SP). 2011.
- Profiling for Run-Time Checking of Computational Properties and Performance Debugging in Logic ProgramsPractical Aspects of Declarative Languages (PADL). 2011.
-
NASA Formal Methods (NFM). 2011.
- Modular verification of preemptive OS kernelsInternational Conference on Functional Programming (ICFP). 2011.
- Partiality, State and Dependent TypesInternational Conference on Typed Lambda Calculi and Applications (TLCA). 2011.
- Towards Fuzzy Granularity Control in Parallel/Distributed ComputingInternational Conference on Fuzzy Computation (ICFC 2010). October 2010.
- A Framework for Verification and Debugging of Resource Usage Properties: Resource Usage VerificationInternational Conference on Logic Programming (ICLP). July 2010.
- Automatic Generation of Smart, Security-Aware GUI ModelsEngineering Secure Software and Systems (ESSoS). 2010.
- Constraint-Based Abstract Semantics for Temporal Logic: A Direct Approach to Design and ImplementationLogic Programming and Automated Reasoning (LPAR). 2010.
- A Machine-Checked Formalization of Sigma-ProtocolsIEEE Computer Security Foundations Symposium (CSF). 2010.
- Programming Language Techniques for Cryptographic ProofsConference on Interactive Theorem Proving (ITP). 2010.
- A Functional Framework for Result CheckingInternational Symposium on Functional and Logic Programming (FLOPS). 2010.
- Perspectives in Certificate TranslationTrustworthy Global Computing (TGC). 2010.
- Computational Indistinguishability LogicACM Conference on Computer and Communications Security (CCS). 2010.
- Robustness Guarantees for AnonymityIEEE Computer Security Foundations Symposium (CSF). 2010.
- Dynamic Boundaries: Information Hiding by Second Order Framing with First Order AssertionsEuropean Symposium on Programming (ESOP). 2010.
- A Practical Generic Privacy LanguageInternational Conference on Information Systems Security (ICISS). 2010.
- On the Equality of Probabilistic TermsLogic Programming and Automated Reasoning (LPAR). 2010.
- Thread-Modular Counterexample-Guided Abstraction RefinementStatic Analysis Symposium (SAS). 2010.
- Local Reasoning and Dynamic Framing for the Composite Pattern and Its ClientsVerified Software: Theories (VSTTE). 2010.
- SSG: a Model-Based Development Environment for Smart, Security-Aware GUIsInternational Conference on Software Engineering (ICSE). 2010.
- Certificate Translation for the Verification of Concurrent ProgramsTrustworthy Global Computing (TGC). 2010.
- Speaker Recognition in Encrypted Voice StreamsEuropean Symposium On Research In Computer Security (ESORICS). 2010.
-
Fundamental Approaches to Software Engineering (FASE). 2010.
-
Computer Aided Verification (CAV). 2010.
- Towards Data-Aware QoS-Driven Adaptation for Service OrchestrationsIEEE International Conference on Web Services (ICWS). 2010.
- Automatic Fragment Identification in Workflows Based on Sharing AnalysisInternational Conference on Service Oriented Computing (ICSOC). 2010.
- Approximation and Randomization for Quantitative Information-Flow AnalysisIEEE Computer Security Foundations Symposium (CSF). 2010.
- Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing AttacksIEEE Computer Security Foundations Symposium (CSF). 2010.
-
International Symposium on Temporal Representation and Reasoning (TIME). 2010.
- Shape Analysis with Reference Set RelationsInternational Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2010.
- Structuring the verification of heap-manipulating programsACM SIGACT Symposium on Principles of Programming Languages (POPL). 2010.
- Program Parallelization using Synchronized PipeliningInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2010.
- Traceable data types for self-adjusting computationACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2010.
-
International Conference on Formal Engineering Methods (ICFEM). 2010.
-
International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). 2010.
- A Coding Rule Conformance Checker Integrated into GCCElectronic Notes in Theoretical Computer Science (ENTCS). August 2009.
- Integrating Software Testing and Run-Time Checking in an Assertion Verification FrameworkInternational Conference on Logic Programming (ICLP). July 2009.
- Merlin: specification inference for explicit information flow problemsACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). June 2009.
- Identification of Logically Related Heap RegionsInternational Symposium on Memory Management (ISMM). June 2009.
- User-Definable Resource Usage Bounds Analysis for Java BytecodeElectronic Notes in Theoretical Computer Science (ENTCS). March 2009.
- Towards a Complete Scheme for Tabled Execution Based on Program TransformationPractical Aspects of Declarative Languages (PADL). January 2009.
- Constraint-Based Abstraction of a Model Checker for Infinite State Systems(Constraint) Logic Programming (WLP). 2009.
- Formal Certification of Code-Based Cryptographic ProofsACM SIGACT Symposium on Principles of Programming Languages (POPL). 2009.
- Implementing a Direct Method for Certificate TranslationInternational Conference on Formal Engineering Methods (ICFEM). 2009.
- Unification and Narrowing in Maude 2.4International Conference on Rewriting Techniques and Applications (RTA). 2009.
- Non-discriminating Arguments and Their UsesInternational Conference on Logic Programming (ICLP). 2009.
- A language for information flow: dynamic tracking in multiple interdependent dimensionsACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). 2009.
- Vérification d'invariants pour des systèmes spécifiés en logique de réécritureJournées francophones des langages applicatifs (JFLA). 2009.
- Formally Certifying the Security of Digital Signature SchemesIEEE Symposium on Security and Privacy (SP). 2009.
-
International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS). 2009.
-
ACM SIGACT Symposium on Principles of Programming Languages (POPL). 2009.
-
International Conference on Implementation and Application of Automata (CIAA). 2009.
- A Tabling Implementation Based on Variables with Multiple BindingsInternational Conference on Logic Programming (ICLP). 2009.
- A Sketch of a Complete Scheme for Tabled Execution Based on Program TransformationInternational Conference on Logic Programming (ICLP). December 2008.
- A High-Level Implementation of Non-Deterministic, Unrestricted, Independent And-ParallelismInternational Conference on Logic Programming (ICLP). December 2008.
- Negative Ternary Set-SharingInternational Conference on Logic Programming (ICLP). December 2008.
-
International Conference on Principles and Practice of Declarative Programming (PPDP). July 2008.
- Comparing Tag Scheme Variations Using an Abstract Machine GeneratorInternational Conference on Principles and Practice of Declarative Programming (PPDP). July 2008.
- Safe Upper-bounds Inference of Energy Consumption for Java Bytecode ApplicationsNASA LFM'08. April 2008.
- Efficient Context-Sensitive Shape Analysis with Graph-Based Heap ModelsInternational Conference on Compiler Construction (CC). April 2008.
- Towards a High-Level Implementation of Execution Primitives for Unrestricted, Independent And-parallelismPractical Aspects of Declarative Languages (PADL). January 2008.
- An Improved Continuation Call-Based Implementation of TablingPractical Aspects of Declarative Languages (PADL). January 2008.
- Automatic Coding Rule Conformance Checking Using Logic ProgrammingPractical Aspects of Declarative Languages (PADL). January 2008.
- Precise Set Sharing Analysis for Java-style ProgramsInternational Conference on Verification, Model Checking and Abstract Interpretation (VMCAI). January 2008.
- Analysis of Linear Hybrid Systems in CLPInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2008.
- Certificate Translation in Abstract InterpretationEuropean Symposium on Programming (ESOP). 2008.
- Certified Reasoning in Memory HierarchiesASIAN Symposium on Programming Languages and Systems (APLAS). 2008.
- Model-Driven Security in Practice: An Industrial ExperienceEuropean Conference on Model Driven Architecture - Foundations and Applications (ECMDA-FA). 2008.
- Preservation of Proof Obligations from Java to the Java Virtual MachineInternational Conference on Automated Deduction (CADE). 2008.
- Tractable Enforcement of Declassification PoliciesIEEE Computer Security Foundations Symposium (CSF). 2008.
- Type-Based Termination with Sized ProductsAnnual Conference on Computer Science Logic (CSL). 2008.
- Approximating Term Rewriting Systems: A Horn Clause Specification and Its ImplementationLogic Programming and Automated Reasoning (LPAR). 2008.
- From Monomorphic to Polymorphic Well-Typings and BeyondInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). 2008.
- Preservation of Proof Pbligations for Hybrid Verification MethodsInternational Conference on Software Engineering and Formal Methods (SEFM). 2008.
Publications in Refereed Workshops (119)
-
ACM International Conference on Emerging Networking Experiments and Technologies Student Workshop (CoNEXT-SW). December 2022.
- A SAT-based Efficient Method for the Synthesis from numerical LTL speficationsJornadas de PROgramación y LEnguajes (PROLE) 2022. September 2022.
- Reactive Synthesis of LTL specifications with Rich Theories11th Workshop in Synthesis. August 2022.
- An s(CASP) In-Browser Playground based on Ciao PrologInternational Conference on Logic Programming (ICLP). August 2022.
-
Jornadas Nacionales de Investigación en Ciberseguridad (JNIC). June 2022.
- Analysis and Improvements of the Sender Keys Protocol for Group MessagingReunión española sobre criptología y seguridad de la información (RECSI). 2022.
-
International Workshop on Formal Methods for Blockchains (FMBC). 2022.
-
6th Workshop on Formal Integrated Development Environment (F-IDE 2021). May 2021.
-
Workshop on Horn Clauses for Verification and Synthesis (HCVS 2021). March 2021.
-
International Conference on Logic Programming (ICLP). 2021.
-
International Conference on Logic Programming (ICLP). 2021.
- An application of KLEE to aerospace industrial software2nd International KLEE Workshop on Symbolic Execution. 2021.
- Testing Your (Static Analysis) TruthsInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2020.
-
Computing Research Repository (CoRR). 2020.
- Making Byzantine Consensus LiveWorkshop on Distributed Algorithms (WDAG). 2020.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). November 2019.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). November 2019.
- An Integrated Approach to Assertion-Based Random Testing in PrologInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). November 2019.
-
10th Workshop on Tools for Automatic Program Analysis (TAPAS'19). October 2019.
- Incremental Analysis of Logic Programs with Assertions and Open PredicatesInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). October 2019.
-
Technical Communications of the 35th International Conference on Logic Programming (ICLP 2019). September 2019.
- Modeling and Reasoning in Event Calculus Using Goal-Directed Constraint Answer Set ProgrammingInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2019.
-
Technical Communications of the 35th International Conference on Logic Programming (ICLP 2019). September 2019.
-
Datalog (Datalog). June 2019.
-
Italian Conference on Cybersecurity (ITASEC). 2019.
-
International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ). 2019.
-
International Workshop on App Market Analytics (WAMA). 2019.
- Specialize in Moderation - Building Application-aware Storage Services using FPGAs in the DatacenterHot Topics in Storage and File Systems (HotStorage). 2019.
- 25 Years of Ciao (abstract of invited tutorial)International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2018.
- Multivariant Assertion-based Guidance in Abstract InterpretationInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2018.
- Knowledge Problems in Equational Extensions of Subterm Convergent Theories32nd International Workshop on Unification. July 2018.
- A General Framework for Static Profiling of Parametric Resource Usage (extended abstract)19th International Workshop on Logic and Computational Complexity (LCC 2018). July 2018.
- Towards Incremental and Modular Context-sensitive AnalysisInternational Conference on Logic Programming (ICLP). July 2018.
- Towards Static Performance Guarantees for Programs with Run-time ChecksInternational Conference on Logic Programming (ICLP). July 2018.
-
ACM/IFIP/USENIX International Middleware Conference (Middleware). 2018.
-
Automated Software Engineering Conference (ASE). 2018.
- A certified reference validation mechanism for the permission model of AndroidInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). October 2017.
-
International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). October 2017.
- Towards a Semantics-Aware Code Transformation Toolchain for Heterogeneous SystemsComputing Research Repository (CoRR). September 2017.
- An Analysis of Pay-per-Install Economics Using Entity GraphsWorkshop on the Economics of Information Security (WEIS). June 2017.
-
Workshop on Distributed Algorithms (WDAG). 2017.
-
Workshop on Privacy in the Electronic Society (WPES). 2017.
-
Logic Programming Doctoral Consortium (DC-ICLP). 2017.
-
International Conference on Logic Programming (ICLP). 2017.
-
International Workshop on App Market Analytics (WAMA). November 2016.
-
International Workshop on App Market Analytics (WAMA). November 2016.
- Tabled CLP for Reasoning over Stream DataLogic Programming Doctoral Consortium (DC-ICLP). October 2016.
- Program Transformations in the POLCA ProjectDesign, Automation and Test in Europe Conference (DATE). March 2016.
-
Proceedings of the First International Workshop on Program Transformation for Programmability in Heterogeneous Architectures (PROHA 2016). March 2016.
-
Computing Research Repository (CoRR). March 2016.
-
Computing Research Repository (CoRR). 2016.
-
Workshop on Horn Clauses for Verification and Synthesis (HCVS). 2016.
- TASP: Towards Anonymity Sets that PersistWorkshop on Privacy in the Electronic Society (WPES). 2016.
-
Workshop on High Performance Energy Efficient Embedded Systems (HIP3ES). 2016.
-
Eurosys Conference (EuroSys). 2016.
-
International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA). 2016.
- Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBCInternational Workshop on Fast Software Encryption (FSE). 2016.
-
International Workshop on Dynamic Analysis (WODA). October 2015.
- Energy Analysis and Verification by Translation to Horn Clauses and Abstract InterpretationWorkshop on Horn Clauses for Verification and Synthesis (HCVS). July 2015.
-
International Conference on Logic Programming (ICLP). 2015.
-
International Workshop on Verification and Program Transformation (VPT). 2015.
-
ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). 2015.
- An Algorithmic Approach to Stability Verification of Hybrid Systems: A SummaryComputer Aided Verification (CAV). 2015.
-
Workshop on High Performance Energy Efficient Embedded Systems (HIP3ES). 2015.
-
September 2014.
- Pre-Indexed Terms for PrologInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2014.
-
International Conference on Logic Programming (ICLP). July 2014.
- Towards Pre-Indexed Terms14th International Colloquium on Implementation of Constraint and LOgic Programming Systems (CICLOPS-WLPE 2014). July 2014.
-
Workshop on Cryptographic Hardware and Embedded Systems (CHES). 2014.
-
ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). 2014.
-
Computing Research Repository (CoRR). 2014.
- Towards an EasyCrypt Formalization of Garbling SchemesThe Workshop on Language Support for Privacy-Enhancing Technology (PETShop). November 2013.
-
September 2013.
- Energy Consumption Analysis of Programs based on XMOS ISA-Level ModelsInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2013.
- Implementing Constraint Handling Rules as a Domain-Specific Language Embedded in JavaProceedings of the 23rd Workshop on Logic-based methods in Programming Environments (WLPE 2013). August 2013.
-
23rd Workshop on Logic-based Methods in Programming Environments (WLPE 2013). August 2013.
- Towards QoS Prediction Based on Composition Structure Analysis and Probabilistic Environment ModelsInternational Conference on Software Engineering (ICSE). May 2013.
-
ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). 2013.
- Fixing idioms: a recursion primitive for applicative DSLsACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). 2013.
- Acceleration of Communication-Aware Task Mapping Techniques through GPU ComputingInternational Conference on Advanced Information Networking and Applications (AINA). 2013.
- Bounded Model Checking for Regular Linear Temporal Logic (extended abstract)Proceedings of the 24th Nordic Workshop on Programming Theory (NWPT'12). October 2012.
-
September 2012.
- The Ciao CLP(FD) Library: A Modular CLP Extension for Prolog12th International Colloquium on Implementation of Constraint and LOgic Programming Systems (CICLOPS 2012). September 2012.
- Reversible Language Extensions and their Application in DebuggingPractical Aspects of Declarative Languages (PADL). September 2012.
- Proving Computational Security with a General-Purpose C VerifierWorkshops on Formal and Computational Cryptography (FCC) and Analysis of Security APIs (ASA). July 2012.
- Analyzing Service-Oriented Systems Using Their Data and StructureInternational Conference on Software Engineering (ICSE). July 2012.
- Research Challenges on Service Technology FoundationsInternational Conference on Software Engineering (ICSE). July 2012.
- Exploring the Impact of Inaccuracy and Imprecision of QoS Assumptions on Proactive Constraint-Based QoS Prediction for Service OrchestrationsInternational Conference on Software Engineering (ICSE). June 2012.
- Modeling Social Networking PrivacyInternational Symposium on Theoretical Aspects of Software Engineering (TASE). 2012.
- A General Implementation Framework for Tabled CLPJornadas sobre Programación y Lenguajes (PROLE). 2012.
- Constraint-Based Runtime Prediction of SLA Violations in Service OrchestrationsJornadas sobre Programación y Lenguajes (PROLE). 2012.
- Lightweight compilation of (C)LP to JavaScriptJornadas sobre Programación y Lenguajes (PROLE). 2012.
- Behavior Based Service CompositionInternational Workshop on Web Services and Formal Methods (WS-FM). 2012.
-
September 2011.
-
MiniZinc Workshop (MZN'11). September 2011.
- Interval-based Resource Usage Verification: Formalization and PrototypeInternational Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA). May 2011.
- The Ciao Approach to the Dynamic vs. Static Language DilemmaProceedings for the International Workshop on Scripts to Programs (STOP'11). 2011.
-
September 2010.
- An Initial Proposal for Data-Aware Resource Analysis of Orchestrations with Applications to Predictive MonitoringInternational Conference on Service Oriented Computing (ICSOC). September 2010.
-
Proceedings of the 1st International Workshop on Strategies in Rewriting, Proving, and Programming (IWS'10). July 2010.
- MySQL4OCL: A Stored Procedure-Based MySQL Code Generator for OCLProceedings of the Workshop on OCL and Textual Modelling (OCL 2010). 2010.
- Modeling Concurrent Systems with Shared ResourcesInt. Workshop on Formal Methods for Industrial Critical Systems (FMICS). November 2009.
- An Initial Proposal for Data-Aware Resource Analysis of Orchestrations with Applications to Proactive MonitoringPre-proceedings of the 2nd Workshop on Monitoring, Adaptation and Beyond (MONA+). November 2009.
- Program Parallelization using Synchronized PipeliningInternational Symposium on Logic-based Program Synthesis and Transformation (LOPSTR). September 2009.
- Towards Structured State Threading in PrologCICLOPS 2009. July 2009.
-
Electronic Notes in Theoretical Computer Science (ENTCS). March 2009.
- Checking Unsatisfiability for OCL ConstraintsProceedings of the Workshop The Pragmatics of OCL and Other Textual Specification Languages at MoDELS 2009. 2009.
- A Program Transformation for Continuation Call-Based Tabled ExecutionColloquium on Implementation of Constraint and LOgic Programming Systems (ICLP associated workshop). December 2008.
- Sharing Analysis of Arrays, Collections, and Recursive StructuresWorkshop on Program Analysis For Software Tools and Engineering (PASTE). November 2008.
- A Coding Rule Conformance Checker Integrated into GCCElectronic Notes in Theoretical Computer Science (ENTCS). October 2008.
- Modelling Mash-Up ResourcesJornadas de Ingeniería del Software y Bases de Datos (JISBD). October 2008.
-
ACM SIGPLAN Workshop on Generic Programming (WGP) (WGP). September 2008.
- Identification of Heap-Carried Data Dependence Via Explicit Store Heap ModelsInternational Workshop on Languages and Compilers for Parallel Computing (LCPC). August 2008.
- Efficient Set Sharing using ZBDDsInternational Workshop on Languages and Compilers for Parallel Computing (LCPC). August 2008.
- Two Efficient Representations for Set-Sharing Analysis in Logic Programs17th International Workshop on Functional and (Constraint) Logic Programming, WFLP'08. July 2008.
- Safe Upper-bounds Inference of Energy Consumption for Java Bytecode ApplicationsThe Sixth NASA Langley Formal Methods Workshop (LFM 08). April 2008.
- A Practical Type Analysis for Verification of Modular Prolog ProgramsACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM). January 2008.
- Certificate Translation for Specification-Preserving AdvicesWorkshop on Foundations of Aspect-Oriented Languages (FOAL). 2008.
- ECEASST Building an Efficient Component for OCL EvaluationProceedings of the 8th International Workshop on OCL Concepts and Tools (OCL 2008) at MoDELS 2008. 2008.
Ph.D. Theses (36)
- ARCHITECH:Advanced Research of Cryptographic Techniques to build efficient blockchains with privacy and securityPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Dario Fiore. September 2022.
- Theory and Practice of Stream Runtime Verification for Sequences and Real-Time Event Based SystemsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Cesar Sanchez. May 2022.
- A Scalable Static Analysis Framework for Reliable Program Development Exploiting Incrementality and ModularityPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Hermenegildo, Jose Francisco Morales. July 2021.
- Relational logics for higher-order effectful programsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Gilles Barthe. November 2020.
- A General Framework for Static Resource Analysis and Profiling of (Parallel) Programs and an Application to Runtime CheckingPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pedro Lopez-Garcia. November 2020.
- On the Use of Quasiorders in Formal Language TheoryPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pierre Ganty. July 2020.
- New Perspectives on Classical Automata ConstructionsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pierre Ganty. June 2020.
- Learning secrets and models from execution timePhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Boris Koepf. June 2020.
- Advanced Evaluation Techniques for (Non)-Monotonic Reasoning Using Rules with ConstraintsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro. December 2019.
- A Model Driven Methodology for the Construction of Reliable Concurrent SoftwarePhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Julio Mariño Carballo. November 2019.
- Lineage Inference of Packed Malware using Binary Code SimilarityPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero. September 2019.
- Understanding the Evolution of Android ApplicationsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla. September 2019.
- A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and EconomicsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero. May 2019.
- On the Security of Cache AlgorithmsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Boris Koepf. March 2019.
- Tools for the Detection and Analysis of Potentially Unwanted ProgramsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero. November 2018.
- Automated Analysis of Cryptographic ConstructionsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Gilles Barthe. September 2018.
- Proving Consistency of Concurrent Data Structures and Transactional Memory SystemsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alexey Gotsman. July 2018.
- A Multi-Language and Multi-Platform Framework for Resource Consumption Analysis and its Application to Energy-Efficient Software DevelopmentPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pedro Lopez. July 2018.
- Improving Run-time Checking in Dynamic Programming LanguagesPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Jose Francisco Morales, Manuel Hermenegildo. April 2018.
- Cryptographic Techniques for the Security of Cloud and Blockchain SystemsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Dario Fiore. March 2018.
- An Algorithmic Approach for Stability Verification of Hybrid SystemsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pravithra Prabhakar. August 2017.
- Hoare-style Reasoning with Higher-order Control: Continuations and ConcurrencyPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Aleks Nanevski. July 2017.
- Mapping OCL as a Query and Constraint LanguagePhD Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Manuel Clavel, Marina Egea. June 2017.
- Active Techniques for Revealing and Analyzing the Security of Hidden ServersPhD Thesis. Universitá degli Studi de Milano (UNIMI). Supervisors: Danilo Bruschi, Juan Caballero. February 2017.
- Tools for the Evaluation and Choice of Countermeasures against Side-channel AttacksPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Boris Koepf. May 2016.
- Defending Against Cybercrime: Advances in the Detection of Malicious Servers and the Analysis of Client-Side VulnerabilitiesPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero. February 2016.
- Formal Verification of Temporal Properties for Parametrized Concurrent Programs and Concurrent Data StructuresPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Cesar Sanchez. September 2015.
- Model-driven Development of Secure Data-Management ApplicationsPhD Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Manuel Clavel. April 2015.
- Operational Aspects of Full-Reduction in Lambda CalculiPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Jose Moreno, Pablo Nogueira. September 2014.
- Approximate Relational Reasoning for Probabilistic ProgramsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Gilles Barthe. January 2014.
- Analysis of Service-Oriented Computing SystemsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro. January 2013.
- Advanced Evaluation Strategies for Tabling and Parallelism in Logic ProgramsPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro, Manuel Hermenegildo. November 2012.
- Formal Certification of Game-Based Cryptographic ProofsPhD Thesis. École Nationale Supérieure des Mines de Paris (Mines ParisTech). Supervisors: Gilles Barthe. December 2010.
- Advanced Compilation Techniques for Logic ProgrammingPhD Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro, Manuel Hermenegildo. July 2010.
- Técnicas Avanzadas de Compilación para Programación LógicaPhD Thesis. Universidad Politécnica de Madrid (UPM). July 2010.
- Certificate Translation alongside Program TransformationsPhD Thesis. École Nationale Supérieure des Mines de Paris (Mines ParisTech). Supervisors: Gilles Barthe. February 2009.
Master's Theses (47)
- Analysis of the Impact of the Collateral Funds in Payment Channel NetworksMSc Thesis. University of Zagreb (UniZG). Supervisors: Pedro Moreno-Sanchez, Marina Bagic Babac. July 2022.
- Hunting for New Threats in a Feed of Malicious SamplesMSc Thesis. Universidad de Alcalá (UAH). Supervisors: Juan Caballero, Javier Junquera Sánchez. July 2022.
- Forecasting Cloud Resource Utilization Using Machine Learning and Computer VisionMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Thaleia Dimitra Doudali. June 2022.
- Empirical Analysis of Trace-ability in the Lightning NetworkMSc Thesis. Sapienza University of Rome (Sapienza). Supervisors: Pedro Moreno-Sanchez, Angelo Spognardi. October 2021.
- The Temporal Booleanization Theorem: realizability checking over numerical-LTL industrial requirementsMSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Cesar Sanchez. September 2021.
- Analysis of Proof of Assets for Different CryptocurrenciesMSc Thesis. Universidad Complutense Madrid (UCM). Supervisors: Ignacio Cascudo, Pedro Moreno-Sanchez, Ignacio Luengo Velasco. September 2021.
- An Integrated Approach to Assertion-Based Random Testing in Logic LanguagesMSc Thesis. Universidad Politécnica de Madrid, ETSIInf. July 2021.
- Improvements to Parametric Cost Analysis and its Application to Smart ContractsMSc Thesis. Universidad Politécnica de Madrid, ETSIInf. July 2021.
- Auxiliary Oracle IOP and secure, fast reductions of R1CS over binary field.MSc Thesis. Università degli Studi di Catania (UNICT). Supervisors: Dario Catalano, Ignacio Cascudo, Dario Catalano. September 2020.
- Threshold decryption protocols for (replayable) chosen ciphertext secure public key encryptionMSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Dario Fiore, Antonio Faonio. September 2019.
- Homomorphic Signatures over LatticesMSc Thesis. Universita degli Studi di Genova (UNIGE). Supervisors: Dario Fiore, Giovanni Lagorio. September 2019.
- Automatic Detection of Outdated Comments in Open-Source Java ProjectsMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Ana Moreno, Barbara Russo. July 2019.
- A Proposal of Automatic Quality Evaluator for GIT Commit MessagesMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Sira Vegas. July 2019.
- An Automated Analysis of the What's New Descriptions of Android AppsMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Antti Siirtola, Julio Mariño. June 2019.
- A Framework for Testing Web Applications for Cross-Origin State Inference (COSI) AttacksMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Avinash Sudhodanan, Juan Caballero, Manuel Carro. June 2019.
- Checking Android Applications Behaviour against Google Play Descriptions at ScaleMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Julio Mariño Carballo. January 2019.
- Sistemas criptográficos de voto electrónico basados en mix-servers y proceso de implementaciónMSc Thesis. Universidad Carlos III de Madrid (UC3M). Supervisors: Dario Fiore, Antonio Faonio, Juan Manuel Estevez Tapiador. September 2018.
- Towards a Stream-Based Monitoring Language for Asynchronous SystemsMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Cesar Sanchez, Lars-Ake Fredlund. July 2018.
- Detecting and Classifying Malicious TLS Network Traffic using Machine LearningMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. July 2018.
- Decentralised Stream Runtime VerificationMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Cesar Sanchez, Clara Benac Earle. July 2018.
- Microarchitecture Simulation for SecurityMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Boris Koepf, Clara Benac. July 2018.
- Security of Cache Replacement Policies under Side-Channel AttacksMSc Thesis. Technical University Berlin (TU Berlin). Supervisors: Boris Koepf, Martin Skutella. March 2018.
- Using Semantic Similarity Analysis of Javadoc Comments to Automatically Generate Test OraclesMSc Thesis. Universitá degli Studi di Milano Bicocca (UNIMIB). Supervisors: Alessandra Gorla, Mauro Pezze. October 2017.
- Study on Privacy of Parental Control Mobile ApplicationsMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Carmela Troncoso, Manuel Carro. July 2017.
- ClaimChain: Decentralized Public Key InfrastructureMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Carmela Troncoso, Manuel Carro. July 2017.
- Enhancing Online Banking Authentication Using Keystroke DynamicsMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. July 2017.
- Code Search: A Semantic, Abstract-Interpretation Based ApproachMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Jose Francisco Morales, Manuel Hermenegildo, Manuel Hermenegildo. April 2017.
- On Fully Homomorphic Encryption from the Learning with Errors ProblemMSc Thesis. Universitá degli Studi di Milano Bicocca (UNIMIB). Supervisors: Dario Fiore, Luca Nizzardo, Francesca Dalla Volta. March 2017.
- An Asynchronous Evaluation Engine for Stream Based SpecificationsMSc Thesis. Universität zu Lübeck (Luebeck University). Supervisors: Cesar Sanchez, Martin Leucker. November 2016.
- Code Search: A Semantic, Abstract Interpretation-Based ApproachMSc Thesis. Technical University of Madrid, School of Computer Science. July 2016.
- Implementing a Term Rewriting Engine for the EasyCrypt FrameworkMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pierre-Yves Strub, Manuel Carro. July 2015.
- Design and Implementation of a Modular Interface to integrate CLP and Tabled ExecutionMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Carro. July 2015.
- Improved Static Analysis and Verification of Energy Consumption and Other Resources via Abstract InterpretationMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pedro Lopez, Manuel Carro. July 2015.
- A Framework for Implementing Outsourcing SchemesMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Dario Fiore, Manuel Carro. July 2015.
- Concurrent Library Abstraction Without Information HidingMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alexey Gotsman, Manuel Carro. July 2014.
- Relational Domains for the Quantification of Cache Side ChannelsMSc Thesis. Saarland University (Saarland University). Supervisors: Boris Koepf, Jan Reineke. September 2013.
- Dynamic Checking of Assertions for Higher-order PredicatesMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Jose Francisco Morales, Manuel Hermenegildo, Manuel Hermenegildo. July 2013.
- Probabilistic Analysis of Quality of ServiceMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Stefanie Betz/Blekinge Institute of Technology, Manuel Carro. October 2012.
- Developing Secure Business Applications From Secure BPMN ModelsMSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Manuel Clavel. September 2012.
- Typegrapher: Inferring the Type Graph of a Binary ProgramMSc Thesis. Universidad Nacional de Rosario (UNR). Supervisors: Juan Caballero. August 2012.
- Valuation: Developer Support for By-References to By-Value Type ConversionMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Mark Marron, Manuel Carro. July 2012.
- Analysis and Mitigation of Information Leaks in Web Browsing TrafficMSc Thesis. Saarland University (Saarland University). Supervisors: Boris Koepf, Michael Backes. June 2012.
- MySQL4OCL:un compilador de OCL a MySQLMSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Marina Egea, Manuel Clavel. November 2011.
- Two Algorithms for Model Checking of Regular Linear Temporal LogicMSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Cesar Sanchez, Miguel Palomino Tarjuelo. September 2011.
- Decision Procedures for the Temporal Verification of Concurrent Data StructuresMSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Cesar Sanchez, Miguel Palomino Tarjuelo. July 2011.
- Fuzzy Granularity Control in Parallel/Distributed ComputingMSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Pedro Lopez. September 2010.
- Exploring the beta-hypercubeMSc Thesis. Facultad de Informática, Universidad Politécnica de Madrid. September 2009.
Baclelor's Theses (20)
- Browser Fingerprinting Detection and Mitigation FrameworkBSc Thesis. Manipal Institute of Technology (MIT). Supervisors: Srdjan Matic, Juan Caballero, Sudheesh P G. July 2022.
- Sistemas de restricciones algebraicas para pruebas criptográficas aplicado a SHA-256BSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Ignacio Cascudo, Dario Fiore, Ignacio Luengo Velasco. June 2022.
- A Platform for Automating the Preparation of iOS Apps for Binary AnalysisBSc Thesis. Universidad Carlos III de Madrid (UC3M). Supervisors: Juan Caballero, Ana Isabel González-Tablas Ferreres. June 2021.
- Mejora de un Sistema de Autodocumentación Basado en Comentarios Legibles Mecánicamente y Aserciones.: LPDownerBSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Manuel Hermenegildo, Jose Francisco Morales, Pedro López, Manuel Hermenegildo. June 2020.
- Analysis of Smart Contracts using Horn ClausesBSc Thesis. Universidad Politécnica de Madrid, ETSII. June 2020.
- Detecting Speculative Information-Flows in Large Code BasesBSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Marco Guarnieri, José Francisco Morales, Manuel Carro. June 2019.
- Análisis de las características de las herramientas de testing automático de aplicaciones Android de la plataforma Androtest on DockerBSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Angel Herranz Nieva. January 2019.
- Herramienta de Actualización Automática de Tests para AndroidBSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Angel Herranz Nieva. January 2019.
- Towards Computing Distances Among Abstract InterpretationsBSc Thesis. Universidad Complutense de Madrid (UCM). Supervisors: Manuel Hermenegildo, Francisco J. López Fraguas. September 2018.
- Monitorización y Detección de Ataques en Redes CorporativasBSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. July 2018.
- Cryptographic Methods for Secure Delegation of Computation in Electronic Voting ApplicationsBSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Dario Fiore, Manuel Carro. June 2017.
- Diseño e Implementación de un Módulo para Identificar Código Compartido entre Ejecutables MaliciososBSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. June 2017.
- ToraDocu – Generacion Automática de Casos de Test con OráculosBSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Damiano Zanardini. June 2017.
- Automatic Testing Platform for Android AppsBSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Alessandra Gorla, Manuel Carro. June 2017.
- Diseño e Implementación de un Módulo para la Detección de Aplicaciones Móviles Maliciosas en Mercados OnlineBSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. June 2017.
- Pruebas de Primer Orden de Programas ConcurrentesBSc Thesis. Universidad Autónoma de Madrid (UAM). Supervisors: Cesar Sanchez, Juan de Lara. July 2016.
- Linearisation of k-Index Bounded Sets of Horn ClausesBSc Thesis. Universidad Autónoma de Madrid (UAM). Supervisors: Pierre Ganty, Jesús Munárriz Aldaz. May 2016.
- Languages and SecurityBSc Thesis. Universidad Autónoma de Madrid (UAM). Supervisors: Pierre Ganty, Eloy Anguiano Rey. May 2016.
- Implementing Fully Homomorphic Encryption Schemes in FPGA-based SystemsBSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Guillermo Vigueras, Dario Fiore, Manuel Carro. January 2016.
- Design and Implementation of an Endpoint Reputation ModuleBSc Thesis. Universidad Politécnica de Madrid (UPM). Supervisors: Juan Caballero, Manuel Carro. January 2015.
Books and Monographs (6)
- Prolog - The Next 50 YearsJuly 2023.
- Logic-Based Program Synthesis and Transformation (LOPSTR 2016): Revised Selected PapersJuly 2017.
-
March 2017.
-
Dagstuhl Reports. 2015.
- Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial LecturesFoundations of Security Analysis and Design. 2009.
-
Object-Oriented Technology. ECOOP 2008 Workshop Reader. 2009.
Sections of Chapters in a Book (5)
- Verifiable Computation and Succinct Arguments for NPIn Asymmetric Cryptography: Primitives and Protocols. Wiley. 2022.
- Analysis Based Verification and Debugging of Energy, Performance and Precision PropertiesENTRA Project: Whole-Systems Energy Transparency (FET project 318337). December 2015.
- Energy Optimization: Basic Static TechniquesENTRA Project: Whole-Systems Energy Transparency (FET project 318337). August 2014.
- Initial Energy Consumption AnalysisENTRA Project: Whole-Systems Energy Transparency (FET project 318337). April 2014.
- A General Framework for Resource Consumption Analysis and VerificationENTRA Project: Whole-Systems Energy Transparency (FET project 318337). November 2013.
Proceedings (53)
-
2023.
-
September 2022.
-
2021.
- Fundamenta Informaticae, Special Issue on the 26th International Symposium on Logic-Based Program Synthesis and Transformation: LOPSTR 2016December 2020.
-
June 2020.
-
November 2019.
-
October 2019.
-
2019.
-
December 2018.
- Functional and Logic Programming - 14th International Symposium, FLOPS 2018, Nagoya, Japan, May 9-11, 2018, Proceedings2018.
-
2018.
- Logic-Based Program Synthesis and Transformation - 27th International Symposium, LOPSTR 2017, Namur, Belgium, October 10-12, 2017, Revised Selected Papers2018.
-
2018.
- Proceedings Third Workshop on Models for Formal Analysis of Real Systems and Sixth International Workshop on Verification and Program Transformation, MARS/VPT-ETAPS 2018, and Sixth International Workshop on Verification and Program Transformation Thessaloniki, Greece, 20th April 20182018.
-
December 2017.
-
2017.
- 32nd International Conference on Logic ProgrammingSeptember 2016.
-
July 2016.
-
April 2016.
-
March 2016.
-
March 2016.
-
2016.
-
2016.
-
2016.
-
2016.
-
April 2015.
-
March 2015.
-
August 2014.
-
April 2014.
-
2014.
-
August 2013.
-
2013.
- Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings2012.
- Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers2012.
- Software Engineering and Formal Methods - 9th International Conference, SEFM 2011November 2011.
- Technical Communications of the 27th International Conference on Logic Programming (ICLP'11)July 2011.
- Theory and Practice of Logic Programming. 27th Int'l. Conference on Logic Programming (ICLP'11) Special IssueJuly 2011.
- Third International Workshop on Principles of Enginering Service-Oriented Systems (PESOS 2011)May 2011.
-
March 2011.
- ACM SIGPLAN Proceedings of the Workshop on Declarative Aspects of Multicore ProgrammingJanuary 2011.
- Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers2011.
- Technical Communications of the 26th Int'l. Conference on Logic Programming (ICLP'10)July 2010.
- Theory and Practice of Logic Programming. 26th Int'l. Conference on Logic Programming (ICLP'10) Special IssueJuly 2010.
-
January 2010.
- Verification, Model Checking, and Abstract Interpretation, 11th International Conference, VMCAI 2010January 2010.
- Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, PEPM 2010, Madrid, Spain, January 18-19, 20102010.
- Proceedings of the 19th Workshop on Logic-based methods in Programming Environments (WLPE 2009)2010.
- FTfJP '09: Proceedings of the 11th International Workshop on Formal Techniques for Java-like Programs2009.
- Functional and Logic Programming, 9th International Symposium, FLOPS'08April 2008.
- ACM SIGPLAN-Intel Workshop on Declarative Aspects of Multicore Programming, DAMP'08, Informal ProceedingsJanuary 2008.
-
2008.
- Formal Methods for Open Object-Based Distributed Systems, 10th IFIP WG 6.1 International Conference, FMOODS 2008, Oslo, Norway, June 4-6, 2008, Proceedings2008.
- Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers2008.
Technical Reports and Manuals (69)
-
Computing Research Repository. January 2023.
-
Computing Research Repository. 2023.
- A Rule-based Approach for Designing and Composing Abstract DomainsCLIP Lab, IMDEA Software Institute. December 2022.
-
Computing Research Repository. October 2022.
- Automated Approximate Recurrence Solving applied to Static Analysis of Energy ConsumptionCLIP Lab, IMDEA Software Institute. August 2022.
-
Computing Research Repository. 2022.
-
IACR Cryptology ePrint Archive. 2022.
-
IACR Cryptology ePrint Archive. 2022.
-
IACR Cryptology ePrint Archive. 2022.
-
Computing Research Repository. 2021.
-
Computing Research Repository. 2021.
-
IACR Cryptology ePrint Archive. 2021.
-
Computing Research Repository. 2021.
-
Technical University of Madrid (UPM) and IMDEA Software Institute. 2021.
-
arXiv. September 2020.
-
Computing Research Repository. 2020.
-
Computing Research Repository. 2020.
-
IACR Cryptology ePrint Archive. 2020.
-
Computing Research Repository. 2020.
-
Computing Research Repository. 2020.
- Incrementalizing Context-sensitive Analyses for Modularized ProgramsarXiv. July 2019.
-
Computing Research Repository. 2019.
-
Computing Research Repository. 2019.
-
Computing Research Repository. 2019.
-
Computing Research Repository. 2019.
-
IACR Cryptology ePrint Archive. 2019.
-
IACR Cryptology ePrint Archive. 2019.
-
Computing Research Repository. 2019.
-
The CLIP Lab, IMDEA Software Institute and T.U. Madrid. April 2018.
-
The CLIP Lab, IMDEA Software Institute and T.U. Madrid. April 2018.
-
Computing Research Repository. 2018.
-
The CLIP Lab. May 2017.
-
Computing Research Repository. 2016.
-
Computing Research Repository. April 2015.
- Parametric Static ProfilingThe CLIP Lab. April 2015.
-
Computing Research Repository. 2015.
-
Computing Research Repository. 2015.
-
Computing Research Repository. 2015.
-
Computing Research Repository. 2015.
- On the Confluence of the Analytical Semantics of CHRTechnical University of Madrid (UPM). July 2014.
- Inferring Energy Consumption at Different Software Levels: ISA vs. LLVM IRENTRA Project. April 2014.
- An Approach to Assertion-based Debugging of Higher-Order (C)LP ProgramsThe CLIP Lab. January 2014.
- Analysis and Transformation Tools for Constrained Horn Clause VerificationComputing Research Repository. 2014.
-
Computing Research Repository. 2014.
- Denotation of syntax and metaprogramming in contextual modal type theory (CMTT)Computing Research Repository. March 2013.
- ARTISTE: Automatic Generation of Hybrid Data Structure Signatures from Binary Code ExecutionsIMDEA Software Institute. August 2012.
- ActionUWE: Transformation of UWE to ActionGUI ModelsLudwig-Maximilians-Universität München. 2012.
- Structural Analysis: Shape Information via Points-To ComputationComputing Research Repository. 2012.
- Automated Analysis and Synthesis of Padding-Based Encryption SchemesCryptology ePrint Archive, Report 2012/695. 2012.
- The LPdoc Documentation Generator. Ref. Manual (V3.0)UPM. July 2011.
- Towards Modular Extensions for a Modular LanguageTechnical University of Madrid (UPM). January 2011.
- A Simulation Study on Parallel Backtracking with Solution Memoing for Independent And-ParallelismTechnical University of Madrid (UPM). January 2011.
- Towards Resource Usage Function Verification based on Input Data Size IntervalsUPM. 2011.
- Towards Data-Aware Cost-Driven Adaptation for Service OrchestrationsTechnical University of Madrid (UPM). March 2010.
- An Approach to Profiling for Run-Time Checking of Computational Properties and Performance DebuggingTechnical University of Madrid (UPM). March 2010.
- Towards a Framework for Resource Usage Verification and Debugging in the CiaoPP SystemTechnical University of Madrid (UPM). February 2010.
-
Computing Research Repository. 2010.
-
Computing Research Repository. 2010.
- Sharing-Based Independence-Driven Fragment Identification for Service OrchestrationsTechnical University of Madrid (UPM). December 2009.
- Towards Data-Aware Resource Analysis for Service OrchestrationsTechnical University of Madrid (UPM). June 2009.
- Towards Integrating Run-Time Checking and Software Testing in a Verification FrameworkT. U. Madrid (UPM). March 2009.
- Inferring Determinacy and Mutual Exclusion in Logic Programs Using Mode and Type AnalysisTechnical University of Madrid (UPM). February 2009.
- The Ciao System. Ref. Manual (V1.13)UPM. 2009.
- Bridge Program Transformation for the CCall Tabling SchemeTechnical University of Madrid (UPM). September 2008.
- Efficient Representations for Set-Sharing AnalysisUniversity of New Mexico and Technical University of Madrid. September 2008.
- Inference of User-Definable Resource Bounds Usage for Logic Programs and its ApplicationsTechnical University of Madrid (UPM). July 2008.
- Fast Set Sharing using ZBDDsUniversity of New Mexico. June 2008.
- Rigorous Methods for Mobile and Heterogeneous Software Systems – Second Year ReportTechnical University of Madrid (UPM). April 2008.
- Customizable Resource Usage Analysis for Java BytecodeUNM. 2008.
Articles in Books and Other Collections (28)
-
Prolog - The Next 50 Years. July 2023.
-
Prolog - The Next 50 Years. July 2023.
- Prolog: Past, Present, and FutureProlog - The Next 50 Years. July 2023.
-
Prolog - The Next 50 Years. July 2023.
-
Lectures on Runtime Verification – Introductory and Advanced Topics. 2018.
- Energy Consumption Analysis and Verification using CiaoPPSeptember 2017.
-
ICT - Energy Concepts for Energy Efficiency and Sustainability. March 2017.
-
ICT - Energy Concepts for Energy Efficiency and Sustainability. March 2017.
-
Present and Ulterior Software Engineering. 2017.
- Machine Learning-Driven Automatic Program Transformation to Increase Performance in Heterogeneous ArchitecturesTools for High Performance Computing 2016. 2017.
-
Semantics, Logics and Calculi—Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays. 2016.
- Computer-Aided Proofs in Cryptography: An OverviewAll about Proofs, Proofs for All (APPA). January 2015.
- Mining Android Apps for AnomaliesThe Art and Science of Analyzing Software Data. 2015.
-
July 2014.
-
Engineering Secure Future Internet Services and Systems - Current Research. 2014.
-
NANOENERGY Letters. August 2013.
- State Based Encapsulation for Modular Reasoning about Behavior-Preserving RefactoringsAliasing in Object-Oriented Programming. 2013.
- Ownership Types: A SurveyAliasing in Object-Oriented Programming. Types, Analysis and Verification. 2013.
- Content-Sniffing XSS Attacks: XSS with non-HTML ContentThe Death of the Internet. July 2012.
-
Computational Intelligence. 2012.
- Interval-Based Resource Usage Verification: Formalization and PrototypeProc. of FOPARA. 2012.
- Merlin: specification inference for explicit information flow problemsMining Software Specifications. May 2011.
- Parameterized Metareasoning in Membership Equational LogicFormal Modeling: Actors, Open Systems, Biological Systems - Essays Dedicated to Carolyn Talcott on the Occasion of Her 70th Birthday. 2011.
- Logic LanguagesEncyclopedia of Parallel Computing. 2011.
- An Overview of The Ciao Multiparadigm Language and Program Development Environment and its Design PhilosophyFestschrift for Ugo Montanari. June 2008.
- An Introduction to Certificate TranslationFoundations of Security Analysis and Design. 2008.
- A Tutorial on Type-Based TerminationEU LerNet ALFA Project. 2008.
-
Pillars of Computer Science: Essays Dedicated to Boris (Boaz) Trakhtenbrot on the Occasion of His 85th Birthday. 2008.
Invited Papers and Tutorials (22)
-
November 2022.
- Some reflections on Prolog's evolution, status, and future on the 50th anniversary of the birth of Prolog (abstract of invited talk)International Conference on Logic Programming. August 2022.
-
Fundamenta Informaticae. December 2020.
- Cost Analysis of Smart Contracts via Parametric Resource AnalysisStatic Analysis Symposium. November 2020.
- Multivariant Assertion-based Guidance of Top-down Horn Clause-based Analysis in CiaoPPWorkshop on Declarative Program Analysis (DPA 2019). July 2019.
- Horn Clause-based Program Analysis and Verification with CiaoPP1st International Workshop on Declarative Program Analysis (DPA 2018). July 2018.
-
March 2018.
-
ACM Symposium on Principles of Distributed Computing. 2018.
- Energy Consumption Analysis and Verification by Transformantion into Horn Clauses and Abstract InterpretationInternational Workshop on Verification and Program Transformation. April 2017.
-
Foundations of Security Analysis and Design. 2013.
-
Dagstuhl 12452: Publication Culture in Computing Research – Position Papers. November 2012.
- Constraint-Based Runtime Prediction of SLA Violations in Service Orchestrations22nd Workshop on Logic-based Methods in Programming Environments. September 2012.
- Program Analysis With Regular Tree LanguagesInternational Symposium on Logic-based Program Synthesis and Transformation. 2012.
-
Formal Aspects of Security and Trust (FAST). 2012.
-
International Conference on Logic Programming. July 2011.
-
International Conference on Logic Programming. July 2011.
- An Overview of the Ciao SystemInternational Web Rule Symposium. July 2011.
- Introduction to Technical Communications of the 26th Int'l. Conference on Logic Programming (ICLP'10)International Conference on Logic Programming. July 2010.
-
International Conference on Logic Programming. July 2010.
-
Formal Aspects in Security and Trust. 2010.
- Formal Certification of ElGamal Encryption. A Gentle Introduction to CertiCrypt5th International workshop on Formal Aspects in Security and Trust, FAST 2008. 2009.
- Certificate TranslationInternational Conference on Automated Deduction. 2008.