Thorsten Tarrach
Cited by
Cited by
Efficient synthesis for concurrency by semantics-preserving transformations
P Černý, TA Henzinger, A Radhakrishna, L Ryzhyk, T Tarrach
International Conference on Computer Aided Verification, 951-967, 2013
Succinct representation of concurrent trace sets
A Gupta, TA Henzinger, A Radhakrishna, R Samanta, T Tarrach
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2015
Model-based, mutation-driven test-case generation via heuristic-guided branching search
A Fellner, W Krenn, R Schlick, T Tarrach, G Weissenbacher
ACM Transactions on Embedded Computing Systems (TECS) 18 (1), 1-28, 2019
Regression-free synthesis for concurrency
P Černý, TA Henzinger, A Radhakrishna, L Ryzhyk, T Tarrach
International conference on computer aided verification, 568-584, 2014
Automatically verifying typing constraints for a data processing language
M Backes, C Hriţcu, T Tarrach
International Conference on Certified Programs and Proofs, 296-313, 2011
Type-checking implementations of protocols based on zero-knowledge proofs
M Backes, C Hritcu, M Maffei, T Tarrach
11th International Workshop on Foundations of Computer Security (FCS), 2009
From non-preemptive to preemptive scheduling using synchronization synthesis
P Černý, EM Clarke, TA Henzinger, A Radhakrishna, L Ryzhyk, ...
Formal methods in system design 50 (2-3), 97-139, 2017
Spi2F# – A prototype code generator for security protocols
T Tarrach
Bachelor's thesis, Saarland University, 2008
A Rational Secret Sharing Scheme Robust Against Malicious Players
N Altabari, A Krohmer, H Molter, T Tarrach
Language Inclusion for Finite Prime Event Structures
A Fellner, T Tarrach, G Weissenbacher
International Conference on Verification, Model Checking, and Abstract …, 2020
Behaviour-driven formal model development of the etcs hybrid level 3
M Butler, D Dghaym, TS Hoang, T Omitola, C Snook, A Fellner, R Schlick, ...
2019 24th International Conference on Engineering of Complex Computer …, 2019
Automatically Verifying" M" Modelling Language Constraints
T Tarrach
Towards Detecting Trigger-Based Behavior in Binaries: Uncovering the Correct Environment
D Papp, T Tarrach, L Buttyán
International Conference on Software Engineering and Formal Methods, 491-509, 2019
A Vision for Enhancing Security of Cryptography in Executables
O Brechelmacher, W Krenn, T Tarrach
International Symposium on Engineering Secure Software and Systems, 1-8, 2018
Automatic synthesis of synchronisation primitives for concurrent programs
T Tarrach
Institute of Science and Technology Austria, Klosterneuburg, Austria, 2016
Optimizing Solution Quality in Synchronization Synthesis
P Černý, EM Clarke, TA Henzinger, A Radhakrishna, L Ryzhyk, ...
arXiv preprint arXiv:1511.07163, 2015
Mutation-based test-case generation for Event-B
R Schlick, T Tarrach
L Bao, JP Bodeveix, JH Boockmann, J Brotherston, Q Chen, T Chen, ...
Pavol Černý
P Černý, T Henzinger, A Radhakrishna, L Ryzhyk, T Tarrach
The system can't perform the operation now. Try again later.
Articles 1–19