Sepideh Asadi
Sepideh Asadi
Universita della Svizzera Italiana (USI), Lugano, Switzerland
Verified email at - Homepage
Cited by
Cited by
Computing exact worst-case gas consumption for smart contracts
M Marescotti, M Blicha, AEJ Hyvärinen, S Asadi, N Sharygina
International Symposium on Leveraging Applications of Formal Methods, 450-465, 2018
HiFrog: SMT-based Function Summarization for Software Veri cation
L Alt, S Asadi, H Chockler, KE Mendoza, G Fedyukovich, AEJ Hyvärinen, ...
23rd International Conference on Tools and Algorithms for the Construction …, 2017
Duality-Based Interpolation for Quantifier-Free Equalities and Uninterpreted Functions
L Alt, AEJ Hyvärinen, S Asadi, N Sharygina
FMCAD, 2017
Theory Refinement for Program Verification
AEJ Hyvärinen, S Asadi, K Even-Mendoza, G Fedyukovich, H Chockler, ...
International Conference on Theory and Applications of Satisfiability …, 2017
Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool
S Asadi, H Shahhoseini
IEEE, Sixth International Symposium on Telecommunications (IST), pp.1060-1064, 2012
Function Summarization Modulo Theories.
S Asadi, M Blicha, G Fedyukovich, AEJ Hyvärinen, K Even-Mendoza, ...
LPAR, 56-75, 2018
Lattice-based refinement in bounded model checking
K Even-Mendoza, S Asadi, AEJ Hyvärinen, H Chockler, N Sharygina
Working Conference on Verified Software: Theories, Tools, and Experiments, 50-68, 2018
Farkas-based tree interpolation
S Asadi, M Blicha, A Hyvärinen, G Fedyukovich, N Sharygina
International Static Analysis Symposium, 357-379, 2020
Incremental verification by SMT-based summary repair
S Asadi, M Blicha, A Hyvärinen, G Fedyukovich, N Sharygina
2020 Formal Methods in Computer Aided Design (FMCAD), 77-82, 2020
Poster: HiFrog: Interpolation-based Software Verification using Theory Refinement
S Asadi, 2017
Technical Annex for Security of Network Management
S Asadi, M Safkhani, H Shahoseini, K Afhami
Iran Telecommunication Research Center (ITRC), 2013
Formal Analysis of Privacy in SNMPv3 Protocol by ProVerif
S Asadi, H Shahhoseini
9th International ISC Conference on Information Security and Cryptology …, 2012
S Asadi, M Blicha, A Hyvärinen, G Fedyukovich, N Sharygina, A Cimatti, ...
The system can't perform the operation now. Try again later.
Articles 1–13