The KeY platform for verification and analysis of Java programs W Ahrendt, B Beckert, D Bruns, R Bubel, C Gladisch, S Grebing, R Hähnle, ... Verified Software: Theories, Tools and Experiments: 6th International …, 2014 | 92 | 2014 |
Verification of software product lines with delta-oriented slicing D Bruns, V Klebanov, I Schaefer International Conference on Formal Verification of Object-Oriented Software …, 2010 | 49 | 2010 |
A hybrid approach for proving noninterference of Java programs R Küsters, T Truderung, B Beckert, D Bruns, M Kirsten, M Mohr 2015 IEEE 28th Computer Security Foundations Symposium, 305-319, 2015 | 43 | 2015 |
Information Flow in Object-Oriented Software B Beckert, D Bruns, V Klebanov, C Scheben, PH Schmitt, M Ulbrich Logic-Based Program Synthesis and Transformation 2013, 2014 | 35 | 2014 |
Dynamic logic with trace semantics B Beckert, D Bruns International Conference on Automated Deduction, 315-329, 2013 | 24 | 2013 |
Non-interference with what-declassification in component-based systems S Greiner, D Grahl 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 253-267, 2016 | 20 | 2016 |
Implementation-level verification of algorithms with KeY D Bruns, W Mostowski, M Ulbrich International journal on software tools for technology transfer 17, 729-744, 2015 | 18 | 2015 |
Formal specification with the Java modeling language M Huisman, W Ahrendt, D Grahl, M Hentschel Deductive Software Verification–The KeY Book: From Theory to Practice, 193-241, 2016 | 16 | 2016 |
Formal Semantics for the Java Modeling Language. D Bruns Informatiktage, 15-18, 2010 | 15 | 2010 |
Formal Semantics for the Java Modeling Language D Bruns Karlsruhe Institute of Technology, 2009 | 15 | 2009 |
Mind the Gap: Formal Verification and the Common Criteria (Discussion Paper). B Beckert, D Bruns, S Grebing VERIFY@ IJCAR, 4-12, 2010 | 11 | 2010 |
Deductive verification of legacy code B Beckert, T Bormer, D Grahl Leveraging Applications of Formal Methods, Verification and Validation …, 2016 | 10 | 2016 |
Formal specification with JML M Huisman, W Ahrendt, D Bruns, M Hentschel Karlsruhe Institute of Technology, 2014 | 9 | 2014 |
Specification of red-black trees: Showcasing dynamic frames, model fields and sequences D Bruns 10th KeY Symposium, Nijmegen, the Netherlands, 296, 2011 | 8 | 2011 |
Deductive Verification of Concurrent Programs and its Application to Secure Information Flow for Java D Grahl Karlsruhe Institute of Technology, 2015 | 7 | 2015 |
A hybrid approach for proving noninterference and applications to the cryptographic verification of Java programs R Küsters, T Truderung, B Beckert, D Bruns, J Graf, C Scheben Grande Region Security and Reliability Day 15, 2013 | 6 | 2013 |
Modular specification and verification D Grahl, R Bubel, W Mostowski, PH Schmitt, M Ulbrich, B Weiß Deductive Software Verification–The KeY Book: From Theory to Practice, 289-351, 2016 | 5 | 2016 |
Deductive verification of concurrent programs D Bruns KIT, Fakultät für Informatik, 2015 | 5 | 2015 |
The KeY Approach for the Cryptographic Verification of JAVA Programs: A Case Study B Beckert, D Bruns, R Küsters, C Scheben, PH Schmitt, T Truderung | 5 | 2012 |
Poster: Security in E-Voting D Bruns, HQ Do, S Greiner, M Herda, M Mohr, E Scapin, T Truderung, ... Security & Privacy (Poster Session), 2015 | 4 | 2015 |