Efficient synthesis for concurrency by semantics-preserving transformations P Černı, TA Henzinger, A Radhakrishna, L Ryzhyk, T Tarrach International Conference on Computer Aided Verification, 951-967, 2013 | 55 | 2013 |
Model-based, mutation-driven test-case generation via heuristic-guided branching search A Fellner, W Krenn, R Schlick, T Tarrach, G Weissenbacher ACM Transactions on Embedded Computing Systems (TECS) 18 (1), 1-28, 2019 | 44 | 2019 |
From non-preemptive to preemptive scheduling using synchronization synthesis P Černı, EM Clarke, TA Henzinger, A Radhakrishna, L Ryzhyk, ... Formal methods in system design 50, 97-139, 2017 | 30 | 2017 |
Succinct representation of concurrent trace sets A Gupta, TA Henzinger, A Radhakrishna, R Samanta, T Tarrach Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2015 | 30 | 2015 |
Regression-free synthesis for concurrency P Černı, TA Henzinger, A Radhakrishna, L Ryzhyk, T Tarrach International conference on computer aided verification, 568-584, 2014 | 27 | 2014 |
Automatically verifying typing constraints for a data processing language M Backes, C Hriţcu, T Tarrach Certified Programs and Proofs: First International Conference, CPP 2011 …, 2011 | 20 | 2011 |
Type-checking implementations of protocols based on zero-knowledge proofs M Backes, C Hritcu, M Maffei, T Tarrach 11th International Workshop on Foundations of Computer Security (FCS), 2009 | 18 | 2009 |
The analysis approach of ThreatGet K Christl, T Tarrach arXiv preprint arXiv:2107.09986, 2021 | 10 | 2021 |
Spi2F# – A prototype code generator for security protocols T Tarrach Bachelor's thesis, Saarland University, 2008 | 7 | 2008 |
Behaviour-driven formal model development of the etcs hybrid level 3 M Butler, D Dghaym, TS Hoang, T Omitola, C Snook, A Fellner, R Schlick, ... 2019 24th International Conference on Engineering of Complex Computer …, 2019 | 5 | 2019 |
Language inclusion for finite prime event structures A Fellner, T Tarrach, G Weissenbacher Verification, Model Checking, and Abstract Interpretation: 21st …, 2020 | 4 | 2020 |
A Rational Secret Sharing Scheme Robust Against Malicious Players N Altabari, A Krohmer, H Molter, T Tarrach | 3 | 2009 |
Towards detecting trigger-based behavior in binaries: Uncovering the correct environment D Papp, T Tarrach, L Buttyán Software Engineering and Formal Methods: 17th International Conference, SEFM …, 2019 | 2 | 2019 |
Attribute Repair for Threat Prevention T Tarrach, M Ebrahimi, S König, C Schmittner, R Bloem, D Ničković International Conference on Computer Safety, Reliability, and Security, 135-148, 2023 | 1 | 2023 |
Threat repair with optimization modulo theories T Tarrach, M Ebrahimi, S König, C Schmittner, R Bloem, D Nickovic arXiv preprint arXiv:2210.03207, 2022 | 1 | 2022 |
Language Inclusion for Finite Prime Event Structures A Fellner, T Tarrach, G Weissenbacher arXiv preprint arXiv:1911.06355, 2019 | 1 | 2019 |
Automatically Verifying" M" Modelling Language Constraints T Tarrach | 1* | |
A Vision for Enhancing Security of Cryptography in Executables O Brechelmacher, W Krenn, T Tarrach Engineering Secure Software and Systems: 10th International Symposium, ESSoS …, 2018 | | 2018 |
Automatic synthesis of synchronisation primitives for concurrent programs T Tarrach | | 2016 |
Optimizing Solution Quality in Synchronization Synthesis P Černı, EM Clarke, TA Henzinger, A Radhakrishna, L Ryzhyk, ... arXiv preprint arXiv:1511.07163, 2015 | | 2015 |