Sepideh Asadi
Sepideh Asadi
Universita della Svizzera Italiana (USI), Lugano, Switzerland
Verified email at usi.ch - Homepage
Title
Cited by
Cited by
Year
Computing exact worst-case gas consumption for smart contracts
M Marescotti, M Blicha, AEJ Hyvärinen, S Asadi, N Sharygina
International Symposium on Leveraging Applications of Formal Methods, 450-465, 2018
222018
HiFrog: SMT-based Function Summarization for Software Veri cation
L Alt, S Asadi, H Chockler, KE Mendoza, G Fedyukovich, AEJ Hyvärinen, ...
23rd International Conference on Tools and Algorithms for the Construction …, 2017
122017
Duality-Based Interpolation for Quantifier-Free Equalities and Uninterpreted Functions
L Alt, AEJ Hyvärinen, S Asadi, N Sharygina
FMCAD, 2017
62017
Theory Refinement for Program Verification
AEJ Hyvärinen, S Asadi, K Even-Mendoza, G Fedyukovich, H Chockler, ...
International Conference on Theory and Applications of Satisfiability …, 2017
52017
Lattice-based refinement in bounded model checking
K Even-Mendoza, S Asadi, AEJ Hyvärinen, H Chockler, N Sharygina
Working Conference on Verified Software: Theories, Tools, and Experiments, 50-68, 2018
12018
Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool
S Asadi, H Shahhoseini
IEEE, Sixth International Symposium on Telecommunications (IST), pp.1060-1064, 2012
12012
Function Summarization Modulo Theories.
S Asadi, M Blicha, G Fedyukovich, AEJ Hyvärinen, K Even-Mendoza, ...
LPAR, 56-75, 2018
2018
Poster: HiFrog: Interpolation-based Software Verification using Theory Refinement
S Asadi
http://www.cs.utexas.edu/users/hunt/FMCAD/FMCAD17/student-forum/poster-91.pdf, 2017
2017
Security Requirements of Enterprise Service Bus (ESB) based on ITU-T Recommendation X.805
S Asadi, M Fasanghari, C Hamideh
Iran Telecommunication Research Center (ITRC), 2015
2015
Formal Analysis of RFID Authentication Protocol using ProVerif
S Asadi
7th Iranian conference on Electrical Engineering, ICEE, May 2015., 2015
2015
Investigation of Karoon River self-refinement capacity exposed to Khorramshahr's soup factory based on EC, BOD, COD and DO parameters using river sediments.
E Panahpour, S Asadi, A Gholami
Technical Journal of Engineering and Applied Sciences 3 (8), 669-672, 2013
2013
Technical Annex for Security of Network Management
S Asadi, M Safkhani, H Shahoseini, K Afhami
Iran Telecommunication Research Center (ITRC), 2013
2013
Formal Analysis of Privacy in SNMPv3 Protocol by ProVerif
S Asadi, H Shahhoseini
9th International ISC Conference on Information Security and Cryptology …, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–13