关注
Sepideh Asadi
Sepideh Asadi
Universita della Svizzera Italiana (USI), Lugano, Switzerland
在 usi.ch 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Computing exact worst-case gas consumption for smart contracts
M Marescotti, M Blicha, AEJ Hyvärinen, S Asadi, N Sharygina
Leveraging Applications of Formal Methods, Verification and Validation …, 2018
682018
HiFrog: SMT-based Function Summarization for Software Verification
L Alt, S Asadi, H Chockler, KE Mendoza, G Fedyukovich, AEJ Hyvärinen, ...
23rd International Conference on Tools and Algorithms for the Construction …, 2017
35*2017
Duality-Based Interpolation for Quantifier-Free Equalities and Uninterpreted Functions
L Alt, AEJ Hyvärinen, S Asadi, N Sharygina
FMCAD, 2017
152017
Theory Refinement for Program Verification
AEJ Hyvärinen, S Asadi, K Even-Mendoza, G Fedyukovich, H Chockler, ...
International Conference on Theory and Applications of Satisfiability …, 2017
92017
Function Summarization Modulo Theories.
S Asadi, M Blicha, G Fedyukovich, AEJ Hyvärinen, K Even-Mendoza, ...
LPAR, 56-75, 2018
82018
Incremental verification by SMT-based summary repair
S Asadi, M Blicha, A Hyvärinen, G Fedyukovich, N Sharygina
# PLACEHOLDER_PARENT_METADATA_VALUE# 1, 77-82, 2020
72020
Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool
S Asadi, HS Shahhoseini
IEEE, Sixth International Symposium on Telecommunications (IST), pp.1060-1064, 2012
62012
Farkas-based tree interpolation
S Asadi, M Blicha, A Hyvärinen, G Fedyukovich, N Sharygina
International Static Analysis Symposium, 357-379, 2020
42020
Lattice-based refinement in bounded model checking
K Even-Mendoza, S Asadi, AEJ Hyvärinen, H Chockler, N Sharygina
Verified Software. Theories, Tools, and Experiments: 10th International …, 2018
32018
SMT-based verification of program changes through summary repair
S Asadi, M Blicha, AEJ Hyvärinen, G Fedyukovich, N Sharygina
Formal Methods in System Design 60 (3), 350-380, 2022
22022
Effective and flexible SMT-streamlined software model checking
S Asadi
2023
Poster: HiFrog: Interpolation-based Software Verification using Theory Refinement
S Asadi
http://www.cs.utexas.edu/users/hunt/FMCAD/FMCAD17/student-forum/poster-91.pdf, 2017
2017
A Formal security analysis of the F-A authentication protocol from the RFID family
I Rajabi, M Alaei, S Asadi
7th Iranian conference on electrical and electronic engineering (ICEEE 2015), 2015
2015
IT Consultant Services for National Information Network
M Fasangari, H Cheragchi, S Asadi
Technical report, 2014
2014
Technical report for Security analysis of Network Management Protocols
S Asadi, M Safkhani, HS Shahoseini, K Afhami
press ITRC 1, 1-120, 2013
2013
Formal Analysis of Privacy in SNMPv3 Protocol by ProVerif
S Asadi, HS Shahhoseini
9th International ISC Conference on Information Security and Cryptology …, 2012
2012
Automated Formal Verification Of Security Properties of SNMPv3 Protocol Over User-Based Security Model
S Asadi, HS Shahhoseini
SAT/SMT
S Asadi, M Blicha, A Hyvärinen, G Fedyukovich, N Sharygina, A Cimatti, ...
系统目前无法执行此操作,请稍后再试。
文章 1–18