Mihai Herda
Cited by
Cited by
The KeY platform for verification and analysis of Java programs
W Ahrendt, B Beckert, D Bruns, R Bubel, C Gladisch, S Grebing, R Hähnle, ...
Verified Software: Theories, Tools and Experiments: 6th International …, 2014
Formal Specification and Verification of Hyperledger Fabric Chaincode
B Beckert, M Herda, M Kirsten, J Schiffl
The 3rd Symposium on Distributed Ledger Technology, 2018
Proof-based Test Case Generation
W Ahrendt, C Gladisch, M Herda
Deductive Software Verification–The KeY Book, 415-451, 2016
A uniform information-flow security benchmark suite for source code and bytecode
T Hamann, M Herda, H Mantel, M Mohr, D Schneider, M Tasch
Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway …, 2018
First-order transitive closure axiomatization via iterative invariant injections
AA El Ghazi, M Taghdiri, M Herda
NASA Formal Methods Symposium, 143-157, 2015
Towards a Notion of Coverage for Incomplete Program-correctness Proofs
B Beckert, M Herda, S Kobischke, M Ulbrich
International Symposium on Leveraging Applications of Formal Methods, 53-63, 2018
SemSlice: Exploiting Relational Verification for Automatic Program Slicing
B Beckert, T Bormer, S Gocht, M Herda, D Lentzsch, M Ulbrich
Integrated Formal Methods: 13th International Conference, IFM 2017, Turin …, 2017
RIFL 1.1: A Common Specification Language for Information-flow Requirements
T Bauereiß, S Greiner, M Herda, M Kirsten, X Li, H Mantel, M Mohr, ...
Technical report TUD-CS-2017-0225, TU Darmstadt, 2017
Generating Bounded Counterexamples for KeY Proof Obligations
M Herda
Karlsruhe Institute of Technology, 2014
Using theorem provers to increase the precision of dependence analysis for information flow control
B Beckert, S Bischof, M Herda, M Kirsten, M Kleine Büning
Formal Methods and Software Engineering: 20th International Conference on …, 2018
Using Dependence Graphs to Assist Verification and Testing of Information-flow Properties
M Herda, S Tyszberowicz, B Beckert
International Conference on Tests and Proofs, 83-102, 2018
CoCoME with Security
S Greiner, M Herda
Poster: Security in E-voting
D Bruns, HQ Do, S Greiner, M Herda, M Mohr, E Scapin, T Truderung, ...
36th IEEE Symposium on Security and Privacy, Poster Session 18, 15, 2015
Understanding counterexamples for relational properties with DIbugger
M Herda, M Kirsten, E Brunner, J Plewnia, U Scheler, C Staudenmaier, ...
arXiv preprint arXiv:1907.03996, 2019
Verification-based Test Case Generation for Information-flow Properties
M Herda, S Tyszberowicz, J Müssig, B Beckert
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2231-2238, 2019
Using relational verification for program slicing
B Beckert, T Bormer, S Gocht, M Herda, D Lentzsch, M Ulbrich
Software Engineering and Formal Methods: 17th International Conference, SEFM …, 2019
Combining Graph-based and Deduction-based Information-flow Analysis
B Beckert, S Bischof, M Herda, M Kirsten, MK Büning
Security Principles and Trust Hotspot 2017, 2017
Computing specification-sensitive abstractions for program verification
T Liu, S Tyszberowicz, M Herda, B Beckert, D Grahl, M Taghdiri
International Symposium on Dependable Software Engineering: Theories, Tools …, 2016
Reducing the Complexity of Quantified Formulas via Variable Elimination
AAE Ghazi, M Ulbrich, M Taghdiri, M Herda
arXiv preprint arXiv:1408.0700, 2014
Integration of Static and Dynamic Analysis Techniques for Checking Noninterference
B Beckert, M Herda, M Kirsten, S Tyszberowicz
Deductive Software Verification: Future Perspectives: Reflections on the …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20