Somesh Jha

According to our database1, Somesh Jha authored at least 201 papers between 1992 and 2019.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2016, "For contributions to verification, programming languages, and software engineering".

IEEE Fellow

IEEE Fellow 2018, "For contributions to the application of formal methods to security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Attribution-driven Causal Analysis for Detection of Adversarial Examples.
CoRR, 2019

Outis: Crypto-Assisted Differential Privacy on Untrusted Servers.
CoRR, 2019

2018
Privacy-Preserving Collaborative Prediction using Random Forests.
CoRR, 2018

Model Extraction and Active Learning.
CoRR, 2018

Adversarial Learning and Explainability in Structured Datasets.
CoRR, 2018

Explainable Black-Box Attacks Against Model-based Authentication.
CoRR, 2018

Adversarial Binaries for Authorship Identification.
CoRR, 2018

Neural-Augmented Static Analysis of Android Communication.
CoRR, 2018

Improving Adversarial Robustness by Data-Specific Discretization.
CoRR, 2018

Semantic Adversarial Deep Learning.
CoRR, 2018

OEI: Operation Execution Integrity for Embedded Devices.
CoRR, 2018

Malware lineage in the wild.
Computers & Security, 2018

Kernel-Supported Cost-Effective Audit Logging for Causality Tracking.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Locally Differentially Private Frequent Itemset Mining.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Neural-augmented static analysis of Android communication.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Privacy at Scale: Local Differential Privacy in Practice.
Proceedings of the 2018 International Conference on Management of Data, 2018

MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Detecting Adversarial Examples Using Data Manifolds.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Smart Contracts and Opportunities for Formal Methods.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, 2018

Analyzing the Robustness of Nearest Neighbors to Adversarial Examples.
Proceedings of the 35th International Conference on Machine Learning, 2018

Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training.
Proceedings of the 35th International Conference on Machine Learning, 2018

Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Semantic Adversarial Deep Learning.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018

Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Privacy-Preserving Ridge Regression on Distributed Data.
IACR Cryptology ePrint Archive, 2017

Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2017

Program synthesis for interactive-security systems.
Formal Methods in System Design, 2017

Manifold Assumption and Defenses Against Adversarial Perturbations.
CoRR, 2017

Malware Lineage in the Wild.
CoRR, 2017

The Unintended Consequences of Overfitting: Training Data Inference Attacks.
CoRR, 2017

Locally Differentially Private Heavy Hitter Identification.
CoRR, 2017

Analyzing the Robustness of Nearest Neighbors to Adversarial Examples.
CoRR, 2017

Optimizing Locally Differentially Private Protocols.
CoRR, 2017

ROSA: R Optimizations with Static Analysis.
CoRR, 2017

Policy by Example: An Approach for Security Policy Specification.
CoRR, 2017

Locally Differentially Private Protocols for Frequency Estimation.
Proceedings of the 26th USENIX Security Symposium, 2017

Cimplifier: automatically debloating containers.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Bolt-on Differential Privacy for Scalable Stochastic Gradient Descent-based Analytics.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Enhancing Android Security Through App Splitting.
Proceedings of the Security and Privacy in Communication Networks, 2017

Kali: Scalable encryption fingerprinting in dynamic malware traces.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Botnet protocol inference in the presence of encrypted traffic.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

New Directions for Container Debloating.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

Practical Black-Box Attacks against Machine Learning.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Composite Constant Propagation and its Application to Android Program Analysis.
IEEE Trans. Software Eng., 2016

Towards Least Privilege Containers with Cimplifier.
CoRR, 2016

Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples.
CoRR, 2016

Differentially Private Stochastic Gradient Descent for in-RDBMS Analytics.
CoRR, 2016

Practical DIFC Enforcement on Android.
Proceedings of the 25th USENIX Security Symposium, 2016

Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

The Limitations of Deep Learning in Adversarial Settings.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

A Methodology for Formalizing Model-Inversion Attacks.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.
CoRR, 2015

The Limitations of Deep Learning in Adversarial Settings.
CoRR, 2015

Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences.
CoRR, 2015

Composite Constant Propagation: Application to Android Inter-Component Communication Analysis.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Efficient runtime-enforcement techniques for policy weaving.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Deep packet inspection with DFA-trees and parametrized language overapproximation.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Satisfiability modulo counting: a new approach for analyzing privacy properties.
Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 2014

Formatted Encryption Beyond Regular Languages.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
Inf. Sec. Techn. Report, 2013

Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Declarative, Temporal, and Practical Programming with Capabilities.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Synthesizing near-optimal malware specifications from suspicious behaviors.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

Secure programs via game-based synthesis.
Proceedings of the Formal Methods in Computer-Aided Design, 2013

Security challenges in automotive hardware/software architecture design.
Proceedings of the Design, Automation and Test in Europe, 2013

Validating Library Usage Interactively.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

2012
Guest Editorial: Special Issue on Computer and Communications Security.
ACM Trans. Inf. Syst. Secur., 2012

Retargeting Android applications to Java bytecode.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Static analysis and compiler design for idempotent processing.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012

CrowdMine: towards crowdsourced human-assisted verification.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

Secure Programming via Visibly Pushdown Safety Games.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

2011
End-to-End Software Diversification of Internet Services.
Proceedings of the Moving Target Defense, 2011

Speculative Parallel Pattern Matching.
IEEE Trans. Information Forensics and Security, 2011

Towards Secure Bioinformatics Services (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2011

Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms.
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011

2010
Analysis Techniques for Information Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2010

A Declarative Framework for Intrusion Analysis.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cyber SA: Situational Awareness for Cyber Defense.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Semantic integrity in large-scale online simulations.
ACM Trans. Internet Techn., 2010

Secure Computations on Non-Integer Values.
IACR Cryptology ePrint Archive, 2010

Secure computations on non-integer values.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Automatic Generation of Remediation Procedures for Malware Infections.
Proceedings of the 19th USENIX Security Symposium, 2010

Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Automating Security Mediation Placement.
Proceedings of the Programming Languages and Systems, 2010

DIFC programs by automatic instrumentation.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Retrofitting Legacy Code for Security.
Proceedings of the Computer Aided Verification, 22nd International Conference, 2010

Design and implementation of the PLUG architecture for programmable and efficient network lookups.
Proceedings of the 19th International Conference on Parallel Architectures and Compilation Techniques, 2010

2009
Multi-byte Regular Expression Matching with Speculation.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Verifying Information Flow Control over Unbounded Processes.
Proceedings of the FM 2009: Formal Methods, 2009

Protocol Normalization Using Attribute Grammars.
Proceedings of the Computer Security, 2009

2008
A semantics-based approach to malware detection.
ACM Trans. Program. Lang. Syst., 2008

Towards Formal Verification of Role-Based Access Control Policies.
IEEE Trans. Dependable Sec. Comput., 2008

Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.
IEEE Trans. Dependable Sec. Comput., 2008

XFA: Faster Signature Matching with Extended Automata.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

Towards Practical Privacy for Genomic Computation.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

Effective blame for information-flow violations.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Deflating the big bang: fast and scalable deep packet inspection with extended finite automata.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

A Layered Architecture for Detecting Malicious Behaviors.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Mining specifications of malicious behavior.
Proceedings of the Proceeding of the 1st Annual India Software Engineering Conference, 2008

Fast Signature Matching Using Extended Finite Automaton (XFA).
Proceedings of the Information Systems Security, 4th International Conference, 2008

The design and implementation of microdrivers.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2007
Software transformations to improve malware detection.
Journal in Computer Virology, 2007

Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
IACR Cryptology ePrint Archive, 2007

Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Mining specifications of malicious behavior.
Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007

A semantics-based approach to malware detection.
Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2007

Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Microdrivers: A New Architecture for Device Drivers.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

Creating Vulnerability Signatures Using Weakest Preconditions.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

OmniUnpack: Fast, Generic, and Safe Unpacking of Malware.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Weighted Pushdown Systems and Trust-Management Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2006

Retrofitting Legacy Code for Authorization Policy Enforcement.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Towards Automatic Generation of Vulnerability-Based Signatures.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Automated Discovery of Mimicry Attacks.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Reducing the Dependence of SPKI/SDSI on PKI.
Proceedings of the Computer Security, 2006

On the Completeness of Attack Mutation Algorithms.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Protomatching network traffic for high throughputnetwork intrusion detection.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Secure function evaluation with ordered binary decision diagrams.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

NetSpy: Automatic Generation of Spyware Signatures for NIDS.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

Backtracking Algorithmic Complexity Attacks against a NIDS.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Weighted pushdown systems and their application to interprocedural dataflow analysis.
Sci. Comput. Program., 2005

An Iterative Framework for Simulation Conformance.
J. Log. Comput., 2005

An Architecture for Generating Semantic Aware Signatures.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Language-Based Generation and Evaluation of NIDS Signatures.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Semantics-Aware Malware Detection.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Environment-Sensitive Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

Automatic discovery of API-level exploits.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

A Logic of File Systems.
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005

Privacy Preserving Clustering.
Proceedings of the Computer Security, 2005

Automatic placement of authorization hooks in the linux security modules framework.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Modular Verification of Software Components in C.
IEEE Trans. Software Eng., 2004

Model checking SPKI/SDSI.
Journal of Computer Security, 2004

Formalizing Sensitivity in Static Analysis for Intrusion Detection.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Security Policy Reconciliation in Distributed Computing Environments.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Global Intrusion Detection in the DOMINO Overlay System.
Proceedings of the Network and Distributed System Security Symposium, 2004

Efficient Context-Sensitive Intrusion Detection.
Proceedings of the Network and Distributed System Security Symposium, 2004

Testing malware detectors.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2004

Automatic Generation and Analysis of NIDS Attacks.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Efficient verification of security protocols using partial-order reductions.
STTT, 2003

Counterexample-guided abstraction refinement for symbolic model checking.
J. ACM, 2003

Static Analysis of Executables to Detect Malicious Patterns.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Integrating Publish/Subscribe into a Mobile Teamwork Support Platform.
Proceedings of the Fifteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2003), 2003

Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis.
Proceedings of the Static Analysis, 10th International Symposium, 2003

Modular Verification of Software Components in C.
Proceedings of the 25th International Conference on Software Engineering, 2003

On Generalized Authorization Problems.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

Buffer overrun detection using linear programming and static analysis.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Detecting Manipulated Remote Call Streams.
Proceedings of the 11th USENIX Security Symposium, 2002

Automated Generation and Analysis of Attack Graphs.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Tree-Like Counterexamples in Model Checking.
Proceedings of the 17th IEEE Symposium on Logic in Computer Science (LICS 2002), 2002

Efficient Type Matching.
Proceedings of the Foundations of Software Science and Computation Structures, 2002

Two Formal Analys s of Attack Graphs.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

Analysis of SPKI/SDSI Certificates Using Model Checking.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Survivability Analysis of Network Systems.
Proceedings of the 23rd International Conference on Software Engineering, 2001

Efficient Filtering in Publish-Subscribe Systems Using Binary Decision.
Proceedings of the 23rd International Conference on Software Engineering, 2001

Non-linear Quantification Scheduling in Image Computation.
Proceedings of the 2001 IEEE/ACM International Conference on Computer-Aided Design, 2001

Progress on the State Explosion Problem in Model Checking.
Proceedings of the Informatics - 10 Years Back. 10 Years Ahead., 2001

Markov Chains, Classifiers, and Intrusion Detection.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

Using Combinatorial Optimization Methods for Quantification Scheduling.
Proceedings of the Correct Hardware Design and Verification Methods, 2001

2000
Verifying security protocols with Brutus.
ACM Trans. Softw. Eng. Methodol., 2000

Partial Order Reductions for Security Protocol Verification.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 2000

Survivability Analysis of Network Specifications.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

Counterexample-Guided Abstraction Refinement.
Proceedings of the Computer Aided Verification, 12th International Conference, 2000

Model checking algorithms for the µ-calculus.
Proceedings of the Proof, Language, and Interaction, Essays in Honour of Robin Milner, 2000

1999
Approximate Option Pricing.
Algorithmica, 1999

Generalized Stuttering Equivalence.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Abstract BDDs: A Technique for Using Abstraction in Model Checking.
Proceedings of the Correct Hardware Design and Verification Methods, 1999

1998
Isomorph-Free Model Enumeration: A New Method for Checking Relational Specifications.
ACM Trans. Program. Lang. Syst., 1998

Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning.
Formal Asp. Comput., 1998

Reasoning about Implicit Invocation.
Proceedings of the SIGSOFT '98, 1998

Using state space exploration and a natural deduction style message derivation engine to verify security protocols.
Proceedings of the Programming Concepts and Methods, 1998

Agent Cloning.
Proceedings of the Third International Conference on Multiagent Systems, 1998

Strategies for Querying Information Agents.
Proceedings of the Cooperative Information Agents II, 1998

Symmetry Reductions inModel Checking.
Proceedings of the Computer Aided Verification, 10th International Conference, 1998

Increasing Resource Utilization and Task Performance by Agent Cloning.
Proceedings of the Intelligent Agents V, 1998

A Formal Treatment of Distributed Matchmaking.
Proceedings of the Second International Conference on Autonomous Agents, 1998

Query Restart Strategies for Web Agent.
Proceedings of the Second International Conference on Autonomous Agents, 1998

1997
Verifying Parameterized Networks.
ACM Trans. Program. Lang. Syst., 1997

An Improved Algorithm for the Evaluation of Fixpoint Expressions.
Theor. Comput. Sci., 1997

Combining Partial Order and Symmetry Reductions.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1997

Equivalence Checking Using Abstract BDDs.
Proceedings of the Proceedings 1997 International Conference on Computer Design: VLSI in Computers & Processors, 1997

Multi-Agent Coordination through Coalition Formation.
Proceedings of the Intelligent Agents IV, 1997

1996
Exploiting Symmetry in Temporal Logic Model Checking.
Formal Methods in System Design, 1996

Checking Relational Specifications With Binary Decision Diagrams.
Proceedings of the SIGSOFT '96, 1996

Faster Checking of Software Specifications by Eliminating Isomorphs.
Proceedings of the Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1996

Approximate Option Pricing.
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996

1995
Verification of the Futurebus+ Cache Coherence Protocol.
Formal Methods in System Design, 1995

Veryfying Parameterized Networks using Abstraction and Regular Languages.
Proceedings of the CONCUR '95: Concurrency Theory, 1995

Symmetry and Induction in Model Checking.
Proceedings of the Computer Science Today: Recent Trends and Developments, 1995

1994
An Improved Algorithm for the Evaluation of Fixpoint Expressions.
Proceedings of the Computer Aided Verification, 6th International Conference, 1994

1993
Verification of the Futurebus+ Cache Coherence Protocol.
Proceedings of the Computer Hardware Description Languages and their Applications, Proceedings of the 11th IFIP WG10.2 International Conference on Computer Hardware Description Languages and their Applications, 1993

Exploiting Symmetry In Temporal Logic Model Checking.
Proceedings of the Computer Aided Verification, 5th International Conference, 1993

1992
Complexity of uniqueness and local search in quadratic 0-1 programming.
Oper. Res. Lett., 1992


  Loading...