The key tool W Ahrendt, T Baar, B Beckert, R Bubel, M Giese, R Hähnle, W Menzel, ... Software and Systems Modeling 4 (1), 32-54, 2005 | 405 | 2005 |
Malicious code on Java Card smartcards: Attacks and countermeasures W Mostowski, E Poll International Conference on Smart Card Research and Advanced Applications, 1-16, 2008 | 108 | 2008 |
The KeY platform for verification and analysis of Java programs W Ahrendt, B Beckert, D Bruns, R Bubel, C Gladisch, S Grebing, R Hähnle, ... Verified Software: Theories, Tools and Experiments: 6th International …, 2014 | 89 | 2014 |
Efficient U-Prove implementation for anonymous credentials on smart cards W Mostowski, P Vullers Security and Privacy in Communication Networks: 7th International ICST …, 2012 | 75 | 2012 |
Model learning and model-based testing BK Aichernig, W Mostowski, MR Mousavi, M Tappler, M Taromirad Machine Learning for Dynamic Software Analysis: Potentials and Limits …, 2018 | 57 | 2018 |
Developing efficient blinded attribute certificates on smart cards via pairings L Batina, JH Hoepman, B Jacobs, W Mostowski, P Vullers Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010 | 49 | 2010 |
Fingerprinting passports H Richter, W Mostowski, E Poll NLUUG spring conference on security 1 (1), 2008 | 47 | 2008 |
A Program Logic for Handling Java Card’s Transaction Mechanism B Beckert, W Mostowski International Conference on Fundamental Approaches to Software Engineering …, 2003 | 46 | 2003 |
The COST IC0701 verification competition 2011 T Bormer, M Brockschmidt, D Distefano, G Ernst, JC Filliâtre, R Grigore, ... Formal Verification of Object-Oriented Software: International Conference …, 2012 | 44 | 2012 |
Fully verified Java Card API reference implementation W Mostowski [Sl]: CEUR, 2007 | 43 | 2007 |
The K£ X System: Integrating Object-Oriented Design and Formal Methods W Ahrendt, T Baar, B Beckert, M Giese, E Habermalz, R Hahnle, ... Fundamental Approaches to Software Engineering: 5th International Conference …, 2002 | 42 | 2002 |
Formalisation and Verification of Java Card Security Properties in Dynamic Logic W Mostowski International Conference on Fundamental Approaches to Software Engineering …, 2005 | 37 | 2005 |
Model-based testing of electronic passports WI Mostowski, E Poll, J Schmaltz, J Tretmans, RJM Wichers Schreur Berlin: Springer Verlag, 2009 | 35 | 2009 |
Full memory attack on a Java Card J Hogenboom, W Mostowski Louvain-la-Neuve, Belgium: Universite Catholique de Louvain, 2009 | 30 | 2009 |
Verification of concurrent systems with VerCors A Amighi, S Blom, S Darabi, M Huisman, W Mostowski, ... Formal Methods for Executable Software Models: 14th International School on …, 2014 | 29 | 2014 |
Verification of safety properties in the presence of transactions R Hähnle, W Mostowski Construction and Analysis of Safe, Secure, and Interoperable Smart Devices …, 2005 | 27 | 2005 |
Specifying Java Card API in OCL D Larsson, W Mostowski Electronic Notes in Theoretical Computer Science 102, 3-19, 2004 | 22 | 2004 |
VerifyThis–verification competition with a human factor G Ernst, M Huisman, W Mostowski, M Ulbrich Tools and Algorithms for the Construction and Analysis of Systems: 25 Years …, 2019 | 20 | 2019 |
A symbolic approach to permission accounting for concurrent reasoning M Huisman, W Mostowski 2015 14th International Symposium on Parallel and Distributed Computing, 165-174, 2015 | 20 | 2015 |
Team halmstad approach to cooperative driving in the grand cooperative driving challenge 2016 M Aramrattana, J Detournay, C Englund, V Frimodig, OU Jansson, ... IEEE Transactions on Intelligent Transportation Systems 19 (4), 1248-1261, 2018 | 19 | 2018 |