Computing exact worst-case gas consumption for smart contracts M Marescotti, M Blicha, AEJ Hyvärinen, S Asadi, N Sharygina Leveraging Applications of Formal Methods, Verification and Validation …, 2018 | 68 | 2018 |
HiFrog: SMT-based Function Summarization for Software Verification L Alt, S Asadi, H Chockler, KE Mendoza, G Fedyukovich, AEJ Hyvärinen, ... 23rd International Conference on Tools and Algorithms for the Construction …, 2017 | 35* | 2017 |
Duality-Based Interpolation for Quantifier-Free Equalities and Uninterpreted Functions L Alt, AEJ Hyvärinen, S Asadi, N Sharygina FMCAD, 2017 | 15 | 2017 |
Theory Refinement for Program Verification AEJ Hyvärinen, S Asadi, K Even-Mendoza, G Fedyukovich, H Chockler, ... International Conference on Theory and Applications of Satisfiability …, 2017 | 9 | 2017 |
Function Summarization Modulo Theories. S Asadi, M Blicha, G Fedyukovich, AEJ Hyvärinen, K Even-Mendoza, ... LPAR, 56-75, 2018 | 8 | 2018 |
Incremental verification by SMT-based summary repair S Asadi, M Blicha, A Hyvärinen, G Fedyukovich, N Sharygina # PLACEHOLDER_PARENT_METADATA_VALUE# 1, 77-82, 2020 | 7 | 2020 |
Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool S Asadi, HS Shahhoseini IEEE, Sixth International Symposium on Telecommunications (IST), pp.1060-1064, 2012 | 6 | 2012 |
Farkas-based tree interpolation S Asadi, M Blicha, A Hyvärinen, G Fedyukovich, N Sharygina International Static Analysis Symposium, 357-379, 2020 | 4 | 2020 |
Lattice-based refinement in bounded model checking K Even-Mendoza, S Asadi, AEJ Hyvärinen, H Chockler, N Sharygina Verified Software. Theories, Tools, and Experiments: 10th International …, 2018 | 3 | 2018 |
SMT-based verification of program changes through summary repair S Asadi, M Blicha, AEJ Hyvärinen, G Fedyukovich, N Sharygina Formal Methods in System Design 60 (3), 350-380, 2022 | 2 | 2022 |
Effective and flexible SMT-streamlined software model checking S Asadi | | 2023 |
Poster: HiFrog: Interpolation-based Software Verification using Theory Refinement S Asadi http://www.cs.utexas.edu/users/hunt/FMCAD/FMCAD17/student-forum/poster-91.pdf, 2017 | | 2017 |
A Formal security analysis of the F-A authentication protocol from the RFID family I Rajabi, M Alaei, S Asadi 7th Iranian conference on electrical and electronic engineering (ICEEE 2015), 2015 | | 2015 |
IT Consultant Services for National Information Network M Fasangari, H Cheragchi, S Asadi Technical report, 2014 | | 2014 |
Technical report for Security analysis of Network Management Protocols S Asadi, M Safkhani, HS Shahoseini, K Afhami press ITRC 1, 1-120, 2013 | | 2013 |
Formal Analysis of Privacy in SNMPv3 Protocol by ProVerif S Asadi, HS Shahhoseini 9th International ISC Conference on Information Security and Cryptology …, 2012 | | 2012 |
Automated Formal Verification Of Security Properties of SNMPv3 Protocol Over User-Based Security Model S Asadi, HS Shahhoseini | | |
SAT/SMT S Asadi, M Blicha, A Hyvärinen, G Fedyukovich, N Sharygina, A Cimatti, ... | | |