Abstract is missing.
- Formal Verification of Cyber-Physical Systems Using Domain-Specific AbstractionsPaula Herber, Julius Adelt, Philip Tasche. 3-21 [doi]
- Paraconsistency for the Working Software Engineer (Extended Abstract)Luís Soares Barbosa. 22-30 [doi]
- User-Guided Verification of Security Protocols via Sound AnimationKangfeng Ye, Roberto Metere, Poonam Yadav. 33-51 [doi]
- A Policy Framework for Regulating External Calls in Smart ContractsMargherita Renieri, Letterio Galletta. 52-69 [doi]
- Exploiting Assumptions for Effective Monitoring of Real-Time Properties Under Partial ObservabilityAlessandro Cimatti, Thomas Møller Grosen, Kim G. Larsen, Stefano Tonetta, Martin Zimmermann 0002. 70-88 [doi]
- A Formal Modeling Language for Smart ContractsAdele Veschetti, Richard Bubel, Reiner Hähnle. 89-106 [doi]
- Symbolic Execution for Precise Information Flow Analysis of Timed Concurrent SystemsJonas Becker-Kupczok, Paula Herber. 107-125 [doi]
- + SpecificationsHoratiu Cirstea, Markus A. Kuppe, Benjamin Loillier, Stephan Merz. 126-143 [doi]
- Partially-Observable Security Games for Attack-Defence Analysis in Software SystemsNarges Khakpour, David Parker 0001. 144-161 [doi]
- Secure Smart Contracts with Isabelle/SolidityDiego Marmsoler, Asad Ahmed, Achim D. Brucker. 162-181 [doi]
- Deductive Verification of SYCL in VerCorsEllen Wittingen, Marieke Huisman, Ömer Sakar. 182-199 [doi]
- Minuska: Towards a Formally Verified Programming Language FrameworkJan Tusil, Jan Obdrzálek. 200-214 [doi]
- Hierarchical Learning of Generative Automaton Models from Sequential DataBenjamin von Berg, Bernhard K. Aichernig, Maximilian Rindler, Darko Stern, Martin Tappler. 215-233 [doi]
- Composing Run-Time Variability ModelsSalman Farhat, Simon Bliudze, Laurence Duchien, Olga Kouchnarenko. 234-252 [doi]
- Model-Checking the Implementation of ConsentRaúl Pardo, Daniel Le Métayer. 253-271 [doi]
- GrammarForge: Learning Program Input Grammars for Fuzz TestingHannes Sochor, Flavio Ferrarotti, Robert Wille. 272-289 [doi]
- Verified Configuration and Deployment of Layered Attestation ManagersAdam Petz, Will Thomas, Anna Fritz, T. J. Barclay, Logan Schmalz, Perry Alexander. 290-308 [doi]
- Right or Wrong - Understanding How Users Write Software Models in AlloyAna Jovanovic, Allison Sullivan. 309-327 [doi]
- An Operational Semantics for YulVasileios Koutavas, Yu-Yang Lin, Nikos Tzevelekos. 328-346 [doi]
- Execution-Time Opacity Control for Timed AutomataÉtienne André, Marie Duflot, Laetitia Laversa, Engel Lefaucheux. 347-365 [doi]
- Unlocking the Power of Environment Assumptions for Unit ProofsSiddharth Priya, Temesghen Kahsai, Arie Gurfinkel. 366-384 [doi]
- Towards Quantum Multiparty Session TypesIvan Lanese, Ugo Dal Lago, Vikraman Choudhury. 385-403 [doi]
- Automated Invariant Generation for Efficient Deductive Reasoning About Embedded SystemsPhilip Tasche, Paula Herber, Marieke Huisman. 404-422 [doi]
- Formal Analysis of Multi-Factor Authentication Schemes in Digital Identity CardsMatteo Paier, Roberto van Eeden, Marino Miculan. 423-440 [doi]
- Leveraging Contracts for Failure Monitoring and Identification in Automated Driving SystemsSrajan Goyal, Alberto Griggio, Stefano Tonetta. 441-460 [doi]