Get my own profile
Public access
View all42 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Igor KonnovIndependent Security and Formal Methods ResearcherVerified email at konnov.phd
Helmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienVerified email at forsyte.tuwien.ac.at
Marijana LazićPostdoc, TU MünchenVerified email at in.tum.de
Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
Ayrat KhalimovTU ClausthalVerified email at tu-clausthal.de
Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Martin BielyGoogleVerified email at google.com
Jennifer Lundelius WelchProfessor, Department of Computer Science and Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
Matthias FüggerCNRS, LMF, ENS Paris-Saclay, Université Paris-SaclayVerified email at lmf.cnrs.fr
Florian ZulegerAssociate Professor, TU WienVerified email at forsyte.tuwien.ac.at
Damien ZuffereySenior Software Engineer, Machine Learning Safety, NVIDIAVerified email at nvidia.com
Andre SchiperProfessor, School of Communication and Computer Science, EPFLVerified email at epfl.ch
Thomas HenzingerIST AustriaVerified email at ist.ac.at
Emmanuelle AnceaumeResearcher at CNRS - UMR 6074Verified email at irisa.fr
Srikanth SastryGoogle IncVerified email at csail.mit.edu