Publications
Detection of Security Vulnerabilities Using Guided Model Checking,
, 24th International Conference on Logic Programming (ICLP), Udine, Italy, (2008)
Flexible Interpolation with Local Proof Transformations,
, International Conference of Computer Aided Design (ICCAD), San Jose, USA, (2010)
Loop Summarization and Termination Analysis,
, International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Volume 6605, Saarbrü Germany, p.81-95, (2011)
Loop Summarization using Abstract Transformers,
, 6th International Symposium on Automated Technology for Verification and Analysis (ATVA), Seoul, South Korea, (2008)
Loopfrog: A Static Analyzer for ANSI-C Programs,
, The 24th IEEE/ACM International Conference on Automated Software Engineering, Auckland, New Zealand, (2009)
The OpenSMT Solver,
, International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Volume 6015, Paphos, Cyprus, p.150-153, (2010)
The Synergy of Precise and Fast Abstractions for Program Verification,
, 24th Annual ACM Symposium on Applied Computing (SAC), Honolulu, USA, (2009)
Termination Analysis with Compositional Transition Invariants,
, International Conference on Computer-Aided Verification (CAV), Edinburgh, UK, (2010)
An abstraction refinement approach combining precise and approximated techniques,
, International Journal on Software Tools for Technology Transfer (STTT), Volume 14, p.1-14, (2012)
An abstraction refinement approach combining precise and approximated techniques,
, International Journal on Software Tools for Technology Transfer (STTT), Volume 14, (2012)
Loop summarization using state and transition invariants,
, Formal Methods in System Design, Volume 42, (2013)
Resolution Proof Transformation for Compression and Interpolation,
, CoRR, Volume July 2013, (2013)
Scalable Abstractions for Efficient Security Checks,
, Lugano, p.164, (2011)