Securify: Practical security analysis of smart contracts P Tsankov, A Dan, D Drachsler-Cohen, A Gervais, F Buenzli, M Vechev Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 1011 | 2018 |
Effective abstractions for verification under relaxed memory models A Dan, Y Meshman, M Vechev, E Yahav Computer Languages, Systems & Structures 47, 62-76, 2017 | 51 | 2017 |
Predicate abstraction for relaxed memory models AM Dan, Y Meshman, M Vechev, E Yahav Static Analysis: 20th International Symposium, SAS 2013, Seattle, WA, USA …, 2013 | 51 | 2013 |
Scalable polyhedral verification of recurrent neural networks W Ryou, J Chen, M Balunovic, G Singh, A Dan, M Vechev Computer Aided Verification: 33rd International Conference, CAV 2021 …, 2021 | 36 | 2021 |
Synthesis of memory fences via refinement propagation Y Meshman, A Dan, M Vechev, E Yahav Static Analysis: 21st International Symposium, SAS 2014, Munich, Germany …, 2014 | 28 | 2014 |
Modeling and analysis of remote memory access programming AM Dan, P Lam, T Hoefler, M Vechev Proceedings of the 2016 ACM SIGPLAN International Conference on Object …, 2016 | 13 | 2016 |
Fast and effective robustness certification for recurrent neural networks W Ryou, J Chen, M Balunovic, G Singh, AM Dan, MT Vechev arXiv preprint arXiv:2005.13300, 2020 | 12 | 2020 |
Finding fix locations for cfl-reachability analyses via minimum cuts AM Dan, M Sridharan, S Chandra, JB Jeannin, M Vechev Computer Aided Verification: 29th International Conference, CAV 2017 …, 2017 | 4 | 2017 |
Synthesizing unrestricted false positive adversarial objects using generative models M Kotuliak, SE Schoenborn, A Dan arXiv preprint arXiv:2005.09294, 2020 | 2 | 2020 |
Automatic Verification of RMA Programs via Abstraction Extrapolation C Baumann, AM Dan, Y Meshman, T Hoefler, M Vechev International Conference on Verification, Model Checking, and Abstract …, 2017 | 1 | 2017 |
Program Analysis for Weak Memory Models AM Dan ETH Zurich, 2018 | | 2018 |