Hobor, Aquinas
43  results:
Search for persons X
?
1

Robust Overlays Meet Blockchains: On Handling High Churn an..:

, In: Lecture Notes in Computer Science; Stabilization, Safety, and Security of Distributed Systems,
Aradhya, Vijeth ; Gilbert, Seth ; Hobor, Aquinas - p. 191-206 , 2023
 
?
2

Schooling to Exploit Foolish Contracts:

, In: 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA),
Abdelaziz, Tamer ; Hobor, Aquinas - p. 388-395 , 2023
 
?
3

Functional Correctness of C Implementations of Dijkstra's, ..:

, In: Computer Aided Verification; Lecture Notes in Computer Science,
 
?
4

Reasoning over Permissions Regions in Concurrent Separation..:

, In: Computer Aided Verification; Lecture Notes in Computer Science,
 
?
5

A functional proof pearl: inverting the Ackermann hierarchy:

, In: Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs,
Tran, Linh ; Mohan, Anshuman ; Hobor, Aquinas - p. 129-142 , 2020
 
?
6

Certifying graph-manipulating C programs via localizations ..:

Wang, Shengyi ; Cao, Qinxiang ; Mohan, Anshuman.
Proceedings of the ACM on Programming Languages.  3 (2019)  OOPSLA - p. 1-30 , 2019
 
?
7

Exploiting the laws of order in smart contracts:

, In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis,
Kolluri, Aashish ; Nikolic, Ivica ; Sergey, Ilya.. - p. 363-373 , 2019
 
?
8

Certifying graph-manipulating C programs via localizations ..:

Wang, Shengyi ; Cao, Qinxiang ; Mohan, Anshuman.
Proceedings of the ACM on Programming Languages.  3 (2019)  OOPSLA - p. 1-30 , 2019
 
?
9

Pumping, with or Without Choice:

, In: Programming Languages and Systems; Lecture Notes in Computer Science,
Hobor, Aquinas ; Li, Elaine ; Stephan, Frank - p. 427-446 , 2019
 
?
10

Temporal Properties of Smart Contracts:

, In: Lecture Notes in Computer Science; Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice,
Sergey, Ilya ; Kumar, Amrit ; Hobor, Aquinas - p. 323-338 , 2018
 
?
11

Complexity Analysis of Tree Share Structure:

, In: Programming Languages and Systems; Lecture Notes in Computer Science,
 
?
12

Logical Reasoning for Disjoint Permissions:

, In: Programming Languages and Systems; Lecture Notes in Computer Science,
Le, Xuan-Bach ; Hobor, Aquinas - p. 385-414 , 2018
 
?
13

Finding The Greedy, Prodigal, and Suicidal Contracts at Sca..:

, In: Proceedings of the 34th Annual Computer Security Applications Conference,
Nikolić, Ivica ; Kolluri, Aashish ; Sergey, Ilya.. - p. 653-663 , 2018
 
?
14

Making Smart Contracts Smarter:

, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,
Luu, Loi ; Chu, Duc-Hiep ; Olickel, Hrishi.. - p. 254-269 , 2016
 
?
15

On Power Splitting Games in Distributed Computation: The Ca..:

, In: 2015 IEEE 28th Computer Security Foundations Symposium,
Luu, Loi ; Saha, Ratul ; Parameshwaran, Inian.. - p. 397-411 , 2015
 
1-15