Follow
Sepideh Asadi
Sepideh Asadi
Universita della Svizzera Italiana (USI), Lugano, Switzerland
Verified email at usi.ch - Homepage
Title
Cited by
Cited by
Year
Computing exact worst-case gas consumption for smart contracts
M Marescotti, M Blicha, AEJ Hyvärinen, S Asadi, N Sharygina
International Symposium on Leveraging Applications of Formal Methods, 450-465, 2018
542018
HiFrog: SMT-based Function Summarization for Software Verification
L Alt, S Asadi, H Chockler, KE Mendoza, G Fedyukovich, AEJ Hyvärinen, ...
23rd International Conference on Tools and Algorithms for the Construction …, 2017
26*2017
Duality-Based Interpolation for Quantifier-Free Equalities and Uninterpreted Functions
L Alt, AEJ Hyvärinen, S Asadi, N Sharygina
FMCAD, 2017
112017
Theory Refinement for Program Verification
AEJ Hyvärinen, S Asadi, K Even-Mendoza, G Fedyukovich, H Chockler, ...
International Conference on Theory and Applications of Satisfiability …, 2017
72017
Function summarization modulo theories
S Asadi, M Blicha, G Fedyukovich, A Hyyvarinen, KE Mendoza, ...
LPAR-22: 22nd International Conference on Logic for Programming, Articial …, 2018
52018
Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool
S Asadi, HS Shahhoseini
IEEE, Sixth International Symposium on Telecommunications (IST), pp.1060-1064, 2012
42012
Incremental verification by SMT-based summary repair
S Asadi, M Blicha, A Hyvärinen, G Fedyukovich, N Sharygina
# PLACEHOLDER_PARENT_METADATA_VALUE# 1, 77-82, 2020
32020
Farkas-based tree interpolation
S Asadi, M Blicha, A Hyvärinen, G Fedyukovich, N Sharygina
International Static Analysis Symposium, 357-379, 2020
22020
Lattice-based refinement in bounded model checking
K Even-Mendoza, S Asadi, AEJ Hyvärinen, H Chockler, N Sharygina
Working Conference on Verified Software: Theories, Tools, and Experiments, 50-68, 2018
22018
Isolation and identification of the bacterium producing antitumor and antimicrobial compounds derived from Iranian swamp frog (Rana ridibunda) skin
S Asadi, N Soleimani, ZK Babadi, GH Ebrahimipour
Iranian Journal of Microbiology 13 (3), 372, 2021
2021
Poster: HiFrog: Interpolation-based Software Verification using Theory Refinement
S Asadi
http://www.cs.utexas.edu/users/hunt/FMCAD/FMCAD17/student-forum/poster-91.pdf, 2017
2017
A Formal security analysis of the F-A authentication protocol from the RFID family
I Rajabi, M Alaei, S Asadi
7th Iranian conference on electrical and electronic engineering (ICEEE 2015), 2015
2015
IT Consultant Services for National Information Network
M Fasangari, H Cheragchi, S Asadi
Technical report, 2014
2014
Technical report for Security analysis of Network Management Protocols
S Asadi, M Safkhani, HS Shahoseini, K Afhami
press ITRC 1, 1-120, 2013
2013
Formal Analysis of Privacy in SNMPv3 Protocol by ProVerif
S Asadi, HS Shahhoseini
9th International ISC Conference on Information Security and Cryptology …, 2012
2012
Automated Formal Verification Of Security Properties of SNMPv3 Protocol Over User-Based Security Model
S Asadi, HS Shahhoseini
SAT/SMT
S Asadi, M Blicha, A Hyvärinen, G Fedyukovich, N Sharygina, A Cimatti, ...
The system can't perform the operation now. Try again later.
Articles 1–17