Cited By
View all- Wilson JAsplund M(2025)Analysing TLS Implementations Using Full-Message Symbolic ExecutionSecure IT Systems10.1007/978-3-031-79007-2_15(283-302)Online publication date: 29-Jan-2025
- Morio KKünnemann RLuo BLiao XXu JKirda ELie D(2024)SpecMon: Modular Black-Box Runtime Monitoring of Security ProtocolsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690197(2741-2755)Online publication date: 2-Dec-2024
- Timany AGregersen SStefanesco LHinrichsen JGondelman LNieto ABirkedal L(2024)Trillium: Higher-Order Concurrent and Distributed Separation Logic for Intensional RefinementProceedings of the ACM on Programming Languages10.1145/36328518:POPL(241-272)Online publication date: 5-Jan-2024
- Show More Cited By