Erik Poll
Cited by
Cited by
An overview of JML tools and applications
L Burdy, Y Cheon, DR Cok, MD Ernst, JR Kiniry, GT Leavens, KRM Leino, ...
International journal on software tools for technology transfer 7 (3), 212-232, 2005
An overview of JML tools and applications
L Burdy, Y Cheon, D Cok, MD Ernst, J Kiniry, GT Leavens, K Rustan, ...
Electronic Notes in Theoretical Computer Science 80, 75-91, 2003
Beyond assertions: Advanced specification and verification with JML and ESC/Java2
P Chalin, JR Kiniry, GT Leavens, E Poll
International Symposium on Formal Methods for Components and Objects, 342-363, 2005
JML reference manual
GT Leavens, E Poll, C Clifton, Y Cheon, C Ruby, D Cok, P Müller, J Kiniry, ...
JML: notations and tools supporting detailed design in Java
GT Leavens, C Ruby, KRM Leino, E Poll, B Jacobs
Addendum to the 2000 proceedings of the conference on Object-oriented …, 2000
Protocol State Fuzzing of TLS Implementations
J De Ruiter, E Poll
24th {USENIX} Security Symposium ({USENIX} Security 15), 193-206, 2015
A logic for the Java Modeling Language JML
B Jacobs, E Poll
International Conference on Fundamental Approaches to Software Engineering …, 2001
Java program verification at Nijmegen: Developments and perspective
B Jacobs, E Poll
International Symposium on Software Security, 134-153, 2003
Malicious code on Java Card smartcards: Attacks and countermeasures
W Mostowski, E Poll
International Conference on Smart Card Research and Advanced Applications, 1-16, 2008
EMV in a nutshell
J van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter
Technical Report, 1-37, 2016
Formal models of bank cards for free
F Aarts, J De Ruiter, E Poll
2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013
Pure type systems with definitions
P Severi, E Poll
International Symposium on Logical Foundations of Computer Science, 316-328, 1994
Specification of the JavaCard API in JML
E Poll, J van den Berg, B Jacobs
Smart Card Research and Advanced Applications, 135-154, 2000
SmartCards and RFID
L Batina, E Poll
Course PowerPoint Presentation for IPA Security Course, Digital Security at …, 0
A type-theoretic memory model for verification of sequential Java programs
J van den Berg, M Huisman, B Jacobs, E Poll
International Workshop on Algebraic Development Techniques, 1-21, 1999
Analysis of secure key storage solutions on Android
T Cooijmans, J de Ruiter, E Poll
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
What blockchain alternative do you need?
T Koens, E Poll
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 113-129, 2018
Formal analysis of the EMV protocol suite
J De Ruiter, E Poll
Joint Workshop on Theory of Security and Applications, 113-129, 2011
An information-centric communication infrastructure for real-time state estimation of active distribution networks
WK Chai, N Wang, KV Katsaros, G Kamel, G Pavlou, S Melis, M Hoefling, ...
IEEE Transactions on Smart Grid 6 (4), 2134-2146, 2015
Automated reverse engineering using Lego
G Chalupar, S Peherstorfer, E Poll, J De Ruiter
8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14), 2014
The system can't perform the operation now. Try again later.
Articles 1–20