We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Small faults grow up - Verification of error masking robustness in arithmetically encoded programs
Karl A., Schilling R., Bloem R., Mangard S.
Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Proceedings, 2019 International Conference on Verification, Model Checking, and Abstract Interpretation , 183-204, (Lecture Notes in Computer Science; vol. 11388)
Efficient Information-Flow Verification Under Speculative Execution
Bloem R., Jacobs S., Vizel Y.
Efficient Information-Flow Verification Under Speculative Execution
Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning
Aichernig B., Bloem R., Ebrahimi M., Horn M., Pernkopf F., Roth W., Rupp A., Tappler M., Tranninger M.
Testing Software and Systems, 31st IFIP International Conference on Testing Software and Systems, 3-21, (Lecture Notes in Computer Science; vol. 11812)
Synthesizing adaptive test strategies from temporal logic specifications
Bloem R., Fey G., Greif F., Könighofer R., Pill I., Riener H., Röck F.
Formal Methods in System Design, Vol. 55(2), 103-135
Generic Low-Latency Masking in Hardware
Groß H., Iusupov R., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018(2), 1-21
Synthesis of distributed algorithms with parameterized threshold guards
Lazić M., Konnov I., Widder J., Bloem R.
21st International Conference on Principles of Distributed Systems, OPODIS 2017, 21st International Conference on Principles of Distributed Systems, OPODIS 2017
Formal Verification of Masked Hardware Implementations in the Presence of Glitches
Bloem R., Groß H., Iusupov R., Könighofer B., Mangard S., Winter J.
EUROCRYPT , Springer, 321-353, (Lecture Notes in Computer Science)
Safe Reinforcement Learning via Shielding
Alshiekh M., Bloem R., Ehlers R., Könighofer B., Niekum S., Topcu U.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2-7, 2018, 32nd AAAI Conference on Artificial Intelligence, 2669-2678
Bounded Synthesis of Register Transducers
Khalimov A., Maderbacher B., Bloem R.
Automated Technology for Verification and Analysis , 16th International Symposium on Automated Technology for Verification and Analysis, 494-510, ( Lecture Notes in Computer Science; vol. 11138)
A Counting Semantics for Monitoring LTL Specifications over Finite Traces
Bartocci E., Bloem R., Nickovic D., Röck F.
Computer Aided Verification , 30th International Conference on Computer Aided Verification, 547-564, (Lecture Notes in Computer Science; vol. 10980)
Graph Games and Reactive Synthesis
Bloem R., Chatterjee K., Jobstmann B.
Handbook of Model Checking, Springer, 921-962
Handbook of Model Checking
Clarke E., Henzinger T., Veith H., Bloem R.
, Springer
Expansion-Based QBF Solving Without Recursion
Bloem R., Braud-Santoni N., Hadzic V., Egly U., Lonsing F., Seidl M.
fmcad.18, 18th Conference on Formal Methods in Computer-Aided Design, 40-49
Automata Learning for Symbolic Execution
Aichernig B., Bloem R., Ebrahimi M., Tappler M., Winter J.
2018 Formal Methods in Computer Aided Design, FMCAD 2018, Austin, TX, USA, October 30 - November 2, 2018, 18th Conference on Formal Methods in Computer-Aided Design, 130 - 138
Towards a secure SCRUM process for agile web application development
Maier P., Ma Z., Bloem R.
ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security, 12th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series; vol. Part F130521)
Bounded Synthesis for Streett, Rabin, and CTL*
Khalimov A., Bloem R.
CAV
Model-Based Testing IoT Communication via Active Automata Learning
Tappler M., Aichernig B., Bloem R.
2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), 276-287
Dependability for the Internet of Things
Boano C., Römer K., Bloem R., Witrisal K., Baunach M., Horn M.
Elektrotechnik und Informationstechnik, Vol. 133(7), 304–309
Synthesis of Self-Stabilizing and Byzantine-Resilient Distributed Systems
Braud-Santoni N., Bloem R., Jacobs S.
Computer Aided Verification - 28th International Conference, CAV 2016, Proceedings, 28th International Conference on Computer Aided Verification, CAV 2016, 157-176, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9779)
The first reactive synthesis competition (SYNTCOMP 2014)
Jacobs S., Bloem R., Brenguier R., Ehlers R., Hell T., Könighofer R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A.
International Journal on Software Tools for Technology Transfer, 1-24