Richard Bubel
Richard Bubel
Department of Computer Science, TU Darmstadt
Geverifieerd e-mailadres voor cs.tu-darmstadt.de
Geciteerd door
Geciteerd door
The KeY Tool
R Hähnle, W Ahrendt, T Baar, B Beckert, R Bubel, M Giese, W Menzel, ...
Software and Systems Modeling 4 (1), 32-54, 2005
Deductive software verification-the key book
W Ahrendt, B Beckert, R Bubel, R Hähnle, PH Schmitt, M Ulbrich
Lecture notes in computer science 10001, 2016
OpenJDK’s Java. utils. Collection. sort () is broken: the good, the bad and the worst case
S Gouw, J Rot, FS Boer, R Bubel, R Hähnle
International Conference on Computer Aided Verification, 273-289, 2015
The KeY platform for verification and analysis of Java programs
W Ahrendt, B Beckert, D Bruns, R Bubel, C Gladisch, S Grebing, R Hähnle, ...
Working Conference on Verified Software: Theories, Tools, and Experiments, 55-71, 2014
KeY-ABS: A deductive verification tool for the concurrent modelling language ABS
CC Din, R Bubel, R Hähnle
International Conference on Automated Deduction, 517-526, 2015
Reuse in software verification by abstract method calls
R Hähnle, I Schaefer, R Bubel
International Conference on Automated Deduction, 300-314, 2013
A visual interactive debugger based on symbolic execution
R Hähnle, M Baum, R Bubel, M Rothe
Proceedings of the IEEE/ACM international conference on Automated software …, 2010
Abstract interpretation of symbolic execution with explicit state updates
R Bubel, R Hähnle, B Weiß
International Symposium on Formal Methods for Components and Objects, 247-277, 2008
Verified resource guarantees using COSTA and KeY
E Albert, R Bubel, S Genaim, R Hähnle, G Puebla, G Román-Díez
Proceedings of the 20th ACM SIGPLAN workshop on Partial evaluation and …, 2011
Verifying OpenJDK’s sort method for generic collections
S de Gouw, FS de Boer, R Bubel, R Hähnle, J Rot, D Steinhöfel
Journal of Automated Reasoning 62 (1), 93-126, 2019
Fully abstract operation contracts
R Bubel, R Hähnle, M Pelevina
International Symposium On Leveraging Applications of Formal Methods …, 2014
Exploit generation for information flow leaks in object-oriented programs
QH Do, R Bubel, R Hähnle
IFIP International Information Security and Privacy Conference, 401-415, 2015
Symbolic execution debugger (SED)
M Hentschel, R Bubel, R Hähnle
International Conference on Runtime Verification, 255-262, 2014
A general lattice model for merging symbolic execution branches
D Scheurer, R Hähnle, R Bubel
International Conference on Formal Engineering Methods, 57-73, 2016
Interleaving symbolic execution and partial evaluation
R Bubel, R Hähnle, R Ji
International Symposium on Formal Methods for Components and Objects, 125-146, 2009
Verification of smart contract business logic
W Ahrendt, R Bubel, J Ellul, GJ Pace, R Pardo, V Rebiscoul, G Schneider
International Conference on Fundamentals of Software Engineering, 228-243, 2019
Visualizing unbounded symbolic execution
M Hentschel, R Hähnle, R Bubel
International Conference on Tests and Proofs, 82-98, 2014
An interactive verification tool meets an IDE
M Hentschel, S Käsdorf, R Hähnle, R Bubel
International Conference on Integrated Formal Methods, 55-70, 2014
The Symbolic Execution Debugger (SED): a platform for interactive symbolic execution, debugging, verification and more
M Hentschel, R Bubel, R Hähnle
International Journal on Software Tools for Technology Transfer 21 (5), 485-513, 2019
Proof repositories for compositional verification of evolving software systems
R Bubel, F Damiani, R Hähnle, EB Johnsen, O Owe, I Schaefer, IC Yu
Transactions on Foundations for Mastering Change I, 130-156, 2016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20