Verification of control flow based security properties T Jensen, D Le Métayer, T Thorn Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999 | 216 | 1999 |
Automata-based confidentiality monitoring G Le Guernic, A Banerjee, T Jensen, DA Schmidt Annual Asian Computing Science Conference, 75-89, 2006 | 176 | 2006 |
Homology of higher dimensional automata E Goubault, TP Jensen International Conference on Concurrency Theory, 254-268, 1992 | 132 | 1992 |
Model checking security properties of control flow graphs F Besson, T Jensen, D Le Métayer, T Thorn Journal of computer security 9 (3), 217-250, 2001 | 115 | 2001 |
Strictness analysis in logical form TP Jensen Conference on Functional Programming Languages and Computer Architecture …, 1991 | 102 | 1991 |
Security and dynamic class loading in java: A formalisation T Jensen, D Le Métayer, T Thorn Proceedings of the 1998 International Conference on Computer Languages (Cat …, 1998 | 84 | 1998 |
Proof-carrying code from certified abstract interpretation and fixpoint compression F Besson, T Jensen, D Pichardie Theoretical Computer Science 364 (3), 273-291, 2006 | 81 | 2006 |
Abstract interpretation in logical form TP Jensen PhD Thesis, the Imerial College, 1992 | 73 | 1992 |
Rewriting approximations for fast prototyping of static analyzers Y Boichut, T Genet, T Jensen, L Le Roux International Conference on Rewriting Techniques and Applications, 48-62, 2007 | 72 | 2007 |
Semantic foundations and inference of non-null annotations L Hubert, T Jensen, D Pichardie International Conference on Formal Methods for Open Object-Based Distributed …, 2008 | 71 | 2008 |
Polyhedral analysis for synchronous languages F Besson, T Jensen, JP Talpin International Static Analysis Symposium, 51-68, 1999 | 70 | 1999 |
Extracting a data flow analyser in constructive logic D Cachera, T Jensen, D Pichardie, V Rusu Theoretical Computer Science 342 (1), 56-78, 2005 | 68 | 2005 |
Certified memory usage analysis D Cachera, T Jensen, D Pichardie, G Schneider FM 2005: Formal Methods: International Symposium of Formal Methods Europe …, 2005 | 60 | 2005 |
A calculational approach to control-flow analysis by abstract interpretation J Midtgaard, T Jensen International Static Analysis Symposium, 347-362, 2008 | 53 | 2008 |
Skeletal semantics and their interpretations M Bodin, P Gardner, T Jensen, A Schmitt Proceedings of the ACM on Programming Languages 3 (POPL), 1-31, 2019 | 52 | 2019 |
Disjunctive strictness analysis TP Jensen 1992 Proceedings of the Seventh Annual IEEE Symposium on Logic in Computer …, 1992 | 52 | 1992 |
Class analyses as abstract interpretations of trace semantics F Spoto, T Jensen ACM Transactions on Programming Languages and Systems (TOPLAS) 25 (5), 578-630, 2003 | 50 | 2003 |
Certified result checking for polyhedral analysis of bytecode programs F Besson, T Jensen, D Pichardie, T Turpin International Symposium on Trustworthy Global Computing, 253-267, 2010 | 49* | 2010 |
Hybrid information flow monitoring against web tracking F Besson, N Bielova, T Jensen 2013 IEEE 26th Computer Security Foundations Symposium, 240-254, 2013 | 47 | 2013 |
Inference of polynomial invariants for imperative programs: A farewell to Gröbner bases D Cachera, T Jensen, A Jobin, F Kirchner Science of Computer Programming 93, 89-109, 2014 | 46 | 2014 |