Volgen
Thorsten Tarrach
Thorsten Tarrach
Amazon Web Services
Geverifieerd e-mailadres voor amazon.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Efficient synthesis for concurrency by semantics-preserving transformations
P Černı, TA Henzinger, A Radhakrishna, L Ryzhyk, T Tarrach
International Conference on Computer Aided Verification, 951-967, 2013
542013
Model-based, mutation-driven test-case generation via heuristic-guided branching search
A Fellner, W Krenn, R Schlick, T Tarrach, G Weissenbacher
ACM Transactions on Embedded Computing Systems (TECS) 18 (1), 1-28, 2019
422019
Succinct representation of concurrent trace sets
A Gupta, TA Henzinger, A Radhakrishna, R Samanta, T Tarrach
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2015
292015
From non-preemptive to preemptive scheduling using synchronization synthesis
P Černı, EM Clarke, TA Henzinger, A Radhakrishna, L Ryzhyk, ...
Formal methods in system design 50, 97-139, 2017
262017
Regression-free synthesis for concurrency
P Černı, TA Henzinger, A Radhakrishna, L Ryzhyk, T Tarrach
International conference on computer aided verification, 568-584, 2014
262014
Automatically verifying typing constraints for a data processing language
M Backes, C Hriţcu, T Tarrach
Certified Programs and Proofs: First International Conference, CPP 2011 …, 2011
192011
Type-checking implementations of protocols based on zero-knowledge proofs
M Backes, C Hritcu, M Maffei, T Tarrach
11th International Workshop on Foundations of Computer Security (FCS), 2009
182009
The analysis approach of ThreatGet
K Christl, T Tarrach
arXiv preprint arXiv:2107.09986, 2021
82021
Spi2F# – A prototype code generator for security protocols
T Tarrach
Bachelor's thesis, Saarland University, 2008
72008
Language inclusion for finite prime event structures
A Fellner, T Tarrach, G Weissenbacher
Verification, Model Checking, and Abstract Interpretation: 21st …, 2020
42020
Behaviour-driven formal model development of the etcs hybrid level 3
M Butler, D Dghaym, TS Hoang, T Omitola, C Snook, A Fellner, R Schlick, ...
2019 24th International Conference on Engineering of Complex Computer …, 2019
42019
A Rational Secret Sharing Scheme Robust Against Malicious Players
N Altabari, A Krohmer, H Molter, T Tarrach
32009
Towards detecting trigger-based behavior in binaries: Uncovering the correct environment
D Papp, T Tarrach, L Buttyán
Software Engineering and Formal Methods: 17th International Conference, SEFM …, 2019
22019
Threat repair with optimization modulo theories
T Tarrach, M Ebrahimi, S König, C Schmittner, R Bloem, D Nickovic
arXiv preprint arXiv:2210.03207, 2022
12022
Language Inclusion for Finite Prime Event Structures
A Fellner, T Tarrach, G Weissenbacher
arXiv preprint arXiv:1911.06355, 2019
12019
Automatically Verifying" M" Modelling Language Constraints
T Tarrach
1*
Attribute Repair for Threat Prevention
T Tarrach, M Ebrahimi, S König, C Schmittner, R Bloem, D Ničković
International Conference on Computer Safety, Reliability, and Security, 135-148, 2023
2023
A Vision for Enhancing Security of Cryptography in Executables
O Brechelmacher, W Krenn, T Tarrach
Engineering Secure Software and Systems: 10th International Symposium, ESSoS …, 2018
2018
Automatic synthesis of synchronisation primitives for concurrent programs
T Tarrach
2016
Optimizing Solution Quality in Synchronization Synthesis
P Černı, EM Clarke, TA Henzinger, A Radhakrishna, L Ryzhyk, ...
arXiv preprint arXiv:1511.07163, 2015
2015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20