Richard Bubel
Richard Bubel
Department of Computer Science, TU Darmstadt
Verified email at
Cited by
Cited by
The KeY Tool
R Hähnle, W Ahrendt, T Baar, B Beckert, R Bubel, M Giese, W Menzel, ...
Software and Systems Modeling 4 (1), 32-54, 2005
Deductive software verification–the key book
W Ahrendt, B Beckert, R Bubel, R Hähnle, PH Schmitt, M Ulbrich
Lecture notes in computer science 10001, 2016
OpenJDK’s Java. utils. Collection. sort () is broken: the good, the bad and the worst case
S De Gouw, J Rot, FS de Boer, R Bubel, R Hähnle
Computer Aided Verification: 27th International Conference, CAV 2015, San …, 2015
The KeY platform for verification and analysis of Java programs
W Ahrendt, B Beckert, D Bruns, R Bubel, C Gladisch, S Grebing, R Hähnle, ...
Verified Software: Theories, Tools and Experiments: 6th International …, 2014
KeY-ABS: A deductive verification tool for the concurrent modelling language ABS
CC Din, R Bubel, R Hähnle
Automated Deduction-CADE-25: 25th International Conference on Automated …, 2015
A visual interactive debugger based on symbolic execution
R Hähnle, M Baum, R Bubel, M Rothe
Proceedings of the IEEE/ACM international conference on Automated software …, 2010
Reuse in software verification by abstract method calls
R Hähnle, I Schaefer, R Bubel
Automated Deduction–CADE-24: 24th International Conference on Automated …, 2013
Abstract interpretation of symbolic execution with explicit state updates
R Bubel, R Hähnle, B Weiß
Formal Methods for Components and Objects: 7th International Symposium, FMCO …, 2009
Verifying OpenJDK’s sort method for generic collections
S de Gouw, FS de Boer, R Bubel, R Hähnle, J Rot, D Steinhöfel
Journal of Automated Reasoning 62, 93-126, 2019
Verification of smart contract business logic: exploiting a Java source code verifier
W Ahrendt, R Bubel, J Ellul, GJ Pace, R Pardo, V Rebiscoul, G Schneider
Fundamentals of Software Engineering: 8th International Conference, FSEN …, 2019
Verified resource guarantees using COSTA and KeY
E Albert, R Bubel, S Genaim, R Hähnle, G Puebla, G Román-Díez
Proceedings of the 20th ACM SIGPLAN workshop on Partial evaluation and …, 2011
Exploit generation for information flow leaks in object-oriented programs
QH Do, R Bubel, R Hähnle
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
Fully abstract operation contracts
R Bubel, R Hähnle, M Pelevina
Leveraging Applications of Formal Methods, Verification and Validation …, 2014
Symbolic execution debugger (SED)
M Hentschel, R Bubel, R Hähnle
Runtime Verification: 5th International Conference, RV 2014, Toronto, ON …, 2014
Interleaving symbolic execution and partial evaluation
R Bubel, R Hähnle, R Ji
Formal Methods for Components and Objects: 8th International Symposium, FMCO …, 2010
Visualizing unbounded symbolic execution
M Hentschel, R Hähnle, R Bubel
Tests and Proofs: 8th International Conference, TAP 2014, Held as Part of …, 2014
The Symbolic Execution Debugger (SED): a platform for interactive symbolic execution, debugging, verification and more
M Hentschel, R Bubel, R Hähnle
International Journal on Software Tools for Technology Transfer 21, 485-513, 2019
A general lattice model for merging symbolic execution branches
D Scheurer, R Hähnle, R Bubel
Formal Methods and Software Engineering: 18th International Conference on …, 2016
An interactive verification tool meets an IDE
M Hentschel, S Käsdorf, R Hähnle, R Bubel
Integrated Formal Methods: 11th International Conference, IFM 2014 …, 2014
Proof Repositories for Compositional Verification of Evolving Software Systems: Managing Change When Proving Software Correct
R Bubel, F Damiani, R Hähnle, EB Johnsen, O Owe, I Schaefer, IC Yu
Transactions on Foundations for Mastering Change I, 130-156, 2016
The system can't perform the operation now. Try again later.
Articles 1–20