We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Correct-by-Construction Runtime Enforcement in AI – A Survey
Könighofer B., Bloem R., Ehlers R., Pek C.
Principles of Systems Design, Springer Science and Business Media Deutschland GmbH, 650-663, (Lecture Notes in Computer Science ; vol. 13660 )
Reactive Synthesis Modulo Theories using Abstraction Refinement
Maderbacher B., Bloem R.
Proceedings of the 22nd Formal Methods in Computer-Aided Design, FMCAD 2022, 22nd Formal Methods in Computer-Aided Design, 315-324, (Conference Series: Formal Methods in Computer-Aided Design; vol. 3)
FERPModels: A Certification Framework for Expansion-Based QBF Solving
Bloem R., Hadzic V., Shukla ., Seidl M.
Proceedings - 2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2022, 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 80-83
Industry Paper: Surrogate Models for Testing Analog Designs under Limited Budget – a Bandgap Case Study
Bloem R., Larrauri Borroto L., Lengfeldner R., Mateis C., Nickovic D., Ziegler B.
Proceedings - 2022 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2022, 2022 International Conference on Hardware/Software Codesign and System Synthesis, 21-24, (Proceedings - 2022 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2022)
Two SAT solvers for solving quantified Boolean formulas with an arbitrary number of quantifier alternations
Bloem R., Braud-Santoni N., Hadzic V., Seidl M., Lonsing F., Egly U.
Formal Methods in System Design, Vol. 57(2), 157-177
CocoAlma: A Versatile Masking Verifier
Hadzic V., Bloem R.
Proceedings of the 21st Formal Methods in Computer-Aided Design, FMCAD 2021, 21st International Conference on Formal Methods in Computer-Aided Design, 14-23, (Proceedings of the 21st Formal Methods in Computer-Aided Design, FMCAD 2021)
Adaptive Testing for Specification Coverage in CPS Models
Bartocci E., Bloem R., Maderbacher B., Manjunath N., Nickovic D.
IFAC-PapersOnLine, Vol. 54(5), 229-234
Adaptive Shielding under Uncertainty.
Pranger S., Könighofer B., Tappler M., Deixelberger M., Jansen N., Bloem R.
2021 American Control Conference, ACC 2021, 2021 American Control Conference, 3467-3474, (Proceedings of the American Control Conference; vol. 2021-May)
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs
Gigerl B., Hadzic V., Primas R., Mangard S., Bloem R.
Proceedings of the 30th USENIX Security Symposium, 30th USENIX Security Symposium, 1469-1486
Online Shielding for Stochastic Systems
Könighofer B., Bloem R., Tappler M., Rudolf J., Palmisano A.
NASA Formal Methods - 13th International Symposium, NFM 2021, Proceedings, 13th NASA Formal Methods Symposium, 231-248, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12673 LNCS)
TEMPEST - Synthesis Tool for Reactive Systems and Shields in Probabilistic Environments
Pranger S., Könighofer B., Posch L., Bloem R.
Automated Technology for Verification and Analysis - 19th International Symposium, ATVA 2021, Proceedings, 19th International Symposium on Automated Technology for Verification and Analysis , 222-228, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12971 LNCS)
Learning Mealy Machines with One Timer
Vaandrager F., Bloem R., Ebrahimi M.
Language and Automata Theory and Applications - 15th International Conference, LATA 2021, Proceedings, 14th-15th International Conference on Language and Automata Theory and Applications, 157-170, (Lecture Notes in Computer Science; vol. 12638)
Proving SIFA Protection of Masked Redundant Circuits
Hadzic V., Primas R., Bloem R.
Automated Technology for Verification and Analysis, 19th International Symposium on Automated Technology for Verification and Analysis , 249-265, (Lecture Notes in Computer Science; vol. 12971)
Shield Synthesis for Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Lorber F.
Leveraging Applications of Formal Methods, Verification and Validation, 2020 International Symposium on Leveraging Applications of Formal Methods, 290-306, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12476 LNCS)
Placement of Runtime Checks to Counteract Fault Injections
Maderbacher B., Karl A., Bloem R.
Runtime Verification - 20th International Conference, RV 2020, Proceedings, 20th International Conference on Runtime Verification, 241-258, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12399 LNCS)
Safe Reinforcement Learning Using Probabilistic Shields
Jansen N., Könighofer B., Junges S., Serban A., Bloem R.
31st International Conference on Concurrency Theory, CONCUR 2020, 31st International Conference on Concurrency Theory, 31-316
Preface for the SYNT
Bloem R., Tabuada P.
Acta informatica, Vol. 57(1-2), 1
Run-Time Optimization for Learned Controllers Through Quantitative Games
Avni G., Bloem R., Chatterjee K., Henzinger T., Könighofer B., Pranger S.
Computer Aided Verification (CAV), 31st International Conference on Computer Aided Verification, 630-649, ( Lecture Notes in Computer Science; vol. 11561)
Synthesis of Minimum-Cost Shields for Multi-agent Systems
Bharadwaj S., Bloem R., Dimitrova R., Könighofer B., Topcu U.
2019 American Control Conference (ACC), 2019 American Control Conference, 1048-1055
Dependable Internet of Things
Römer K., Witrisal K., Baunach M., Bloem R., Horn M.
Proceedings of the International Conference on Sensor Networks (SENSORNETS) 2019