Erik Poll
Title
Cited by
Cited by
Year
An overview of JML tools and applications
L Burdy, Y Cheon, DR Cok, MD Ernst, JR Kiniry, GT Leavens, KRM Leino, ...
International journal on software tools for technology transfer 7 (3), 212-232, 2005
8142005
An overview of JML tools and applications
L Burdy, Y Cheon, D Cok, MD Ernst, J Kiniry, GT Leavens, KRM Leino, ...
Electronic Notes in Theoretical Computer Science 80, 1-17, 2003
3282003
Beyond assertions: Advanced specification and verification with JML and ESC/Java2
P Chalin, JR Kiniry, GT Leavens, E Poll
International Symposium on Formal Methods for Components and Objects, 342-363, 2005
2902005
JML reference manual
GT Leavens, E Poll, C Clifton, Y Cheon, C Ruby, D Cok, P Müller, J Kiniry, ...
2522008
JML: notations and tools supporting detailed design in Java
GT Leavens, C Ruby, KRM Leino, E Poll, B Jacobs
Addendum to the 2000 proceedings of the conference on Object-oriented …, 2000
2322000
Protocol State Fuzzing of TLS Implementations
J De Ruiter, E Poll
24th {USENIX} Security Symposium ({USENIX} Security 15), 193-206, 2015
1522015
A logic for the Java Modeling Language JML
B Jacobs, E Poll
International Conference on Fundamental Approaches to Software Engineering …, 2001
1332001
Java program verification at Nijmegen: Developments and perspective
B Jacobs, E Poll
International Symposium on Software Security, 134-153, 2003
1182003
Malicious code on Java Card smartcards: Attacks and countermeasures
W Mostowski, E Poll
International Conference on Smart Card Research and Advanced Applications, 1-16, 2008
962008
Pure type systems with definitions
P Severi, E Poll
International Symposium on Logical Foundations of Computer Science, 316-328, 1994
90*1994
Formal models of bank cards for free
F Aarts, J De Ruiter, E Poll
2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013
812013
Specification of the JavaCard API in JML
E Poll, J van den Berg, B Jacobs
Smart Card Research and Advanced Applications, 135-154, 2000
792000
A type-theoretic memory model for verification of sequential Java programs
J van den Berg, M Huisman, B Jacobs, E Poll
International Workshop on Algebraic Development Techniques, 1-21, 1999
741999
Analysis of secure key storage solutions on Android
T Cooijmans, J de Ruiter, E Poll
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
602014
Coalgebras and monads in the semantics of Java
B Jacobs, E Poll
Theoretical Computer Science 291 (3), 329-349, 2003
552003
From algebras and coalgebras to dialgebras
E Poll, J Zwanenburg
Electronic Notes in Theoretical Computer Science 44 (1), 289-307, 2001
552001
Formal analysis of the EMV protocol suite
J De Ruiter, E Poll
Joint Workshop on Theory of Security and Applications, 113-129, 2011
532011
An information-centric communication infrastructure for real-time state estimation of active distribution networks
WK Chai, N Wang, KV Katsaros, G Kamel, G Pavlou, S Melis, M Hoefling, ...
IEEE Transactions on Smart Grid 6 (4), 2134-2146, 2015
522015
EMV in a nutshell
J van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter
Technical Report, 2016
512016
Automated reverse engineering using Lego
G Chalupar, S Peherstorfer, E Poll, J De Ruiter
8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14), 2014
482014
The system can't perform the operation now. Try again later.
Articles 1–20