Get my own profile
Public access
View all42 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Igor KonnovIndependent Security and Formal Methods ResearcherVerified email at konnov.phd
- Helmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienVerified email at forsyte.tuwien.ac.at
- Marijana LazićPostdoc, TU MünchenVerified email at in.tum.de
- Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
- Ayrat KhalimovTU ClausthalVerified email at tu-clausthal.de
- Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
- Martin BielyGoogleVerified email at google.com
- Jennifer Lundelius WelchProfessor, Department of Computer Science and Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
- Matthias FüggerCNRS, LMF, ENS Paris-Saclay, Université Paris-SaclayVerified email at lmf.cnrs.fr
- Florian ZulegerAssociate Professor, TU WienVerified email at forsyte.tuwien.ac.at
- Damien ZuffereyStatic Analysis Scientist, SonarSource S.A.Verified email at sonarsource.com
- Andre SchiperProfessor, School of Communication and Computer Science, EPFLVerified email at epfl.ch
- Thomas HenzingerIST AustriaVerified email at ist.ac.at
- Emmanuelle AnceaumeResearcher at CNRS - UMR 6074Verified email at irisa.fr
- Srikanth SastryGoogle IncVerified email at csail.mit.edu