default search action
Gidon Ernst
Person information
- affiliation: LMU Munich, Germany
- affiliation (former): University of Melbourne, Australia
- affiliation (PhD 2016): University of Augsburg, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c38]Claudio Menghi, Paolo Arcaini, Walstan Baptista, Gidon Ernst, Georgios Fainekos, Federico Formica, Sauvik Gon, Tanmay Khandait, Atanu Kundu, Giulia Pedrielli, Jarkko Peltomäki, Ivan Porres, Rajarshi Ray, Masaki Waga, Zhenya Zhang:
ARCH-COMP23 Category Report: Falsification. ARCH 2023: 151-169 - [c37]Toby Murray, Mukesh Tiwari, Gidon Ernst, David A. Naumann:
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications. CCS 2023: 1746-1760 - [c36]Toby Murray, Pengbo Yan, Gidon Ernst:
Compositional Vulnerability Detection with Insecurity Separation Logic. ICFEM 2023: 65-82 - [c35]Gidon Ernst, Alexander Weigl:
Verify This: Memcached - A Practical Long-Term Challenge for the Integration of Formal Methods. iFM 2023: 82-89 - [c34]Gidon Ernst:
Korn - Software Verification with Horn Clauses (Competition Contribution). TACAS (2) 2023: 559-564 - [i9]Toby Murray, Mukesh Tiwari, Gidon Ernst, David A. Naumann:
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications (Extended Version). CoRR abs/2309.03442 (2023) - 2022
- [c33]Gidon Ernst, Paolo Arcaini, Georgios Fainekos, Federico Formica, Jun Inoue, Tanmay Khandait, Mohammad Mahdi Mahboob, Claudio Menghi, Giulia Pedrielli, Masaki Waga, Yoriyuki Yamagata, Zhenya Zhang:
ARCH-COMP 2022 Category Report: Falsification with Ubounded Resources. ARCH@SAFECOMP 2022: 204-221 - [c32]Gidon Ernst, Alexander Knapp, Toby Murray:
A Hoare Logic with Regular Behavioral Specifications. ISoLA (1) 2022: 45-64 - [c31]Gidon Ernst:
Loop Verification with Invariants and Contracts. VMCAI 2022: 69-92 - [c30]Dongge Liu, Van-Thuan Pham, Gidon Ernst, Toby Murray, Benjamin I. P. Rubinstein:
State Selection Algorithms and Their Impact on The Performance of Stateful Network Protocol Fuzzing. SANER 2022: 720-730 - [i8]Gidon Ernst, Alexander Knapp, Toby Murray:
A Hoare Logic with Regular Behavioral Specifications. CoRR abs/2205.06584 (2022) - 2021
- [j9]Gidon Ernst, Sean Sedwards, Zhenya Zhang, Ichiro Hasuo:
Falsification of Hybrid Systems Using Adaptive Probabilistic Search. ACM Trans. Model. Comput. Simul. 31(3): 18:1-18:22 (2021) - [c29]Gidon Ernst, Paolo Arcaini, Ismail Bennani, Aniruddh Chandratre, Alexandre Donzé, Georgios Fainekos, Goran Frehse, Khouloud Gaaloul, Jun Inoue, Tanmay Khandait, Logan Mathesen, Claudio Menghi, Giulia Pedrielli, Marc Pouzet, Masaki Waga, Shakiba Yaghoubi, Yoriyuki Yamagata, Zhenya Zhang:
ARCH-COMP 2021 Category Report: Falsification with Validation of Results. ARCH@ADHS 2021: 133-152 - [c28]Grigory Fedyukovich, Gidon Ernst:
Bridging Arrays and ADTs in Recursive Proofs. TACAS (2) 2021: 24-42 - [c27]Gidon Ernst, Ichiro Hasuo, Zhenya Zhang, Sean Sedwards:
Time-Staging Enhancement of Hybrid System Falsification. SNR 2021: 25-43 - [c26]Gidon Ernst, Johannes Blau, Toby Murray:
Deductive Verification via the Debug Adapter Protocol. F-IDE@NFM 2021: 89-96 - [i7]Toby Murray, Pengbo Yan, Gidon Ernst:
Incremental Vulnerability Detection via Back-Propagating Symbolic Execution of Insecurity Separation Logic. CoRR abs/2107.05225 (2021) - [i6]Dongge Liu, Van-Thuan Pham, Gidon Ernst, Toby Murray, Benjamin I. P. Rubinstein:
State Selection Algorithms and Their Impact on The Performance of Stateful Network Protocol Fuzzing. CoRR abs/2112.15498 (2021) - 2020
- [c25]Gidon Ernst, Paolo Arcaini, Ismail Bennani, Alexandre Donzé, Georgios Fainekos, Goran Frehse, Logan Mathesen, Claudio Menghi, Giulia Pedrielli, Marc Pouzet, Shakiba Yaghoubi, Yoriyuki Yamagata, Zhenya Zhang:
ARCH-COMP 2020 Category Report: Falsification. ARCH 2020: 140-152 - [c24]Dongge Liu, Gidon Ernst, Toby Murray, Benjamin I. P. Rubinstein:
Legion: Best-First Concolic Testing (Competition Contribution). FASE 2020: 545-549 - [c23]Dongge Liu, Gidon Ernst, Toby Murray, Benjamin I. P. Rubinstein:
LEGION: Best-First Concolic Testing. ASE 2020: 54-65 - [i5]Dongge Liu, Gidon Ernst, Toby Murray, Benjamin I. P. Rubinstein:
Legion: Best-First Concolic Testing. CoRR abs/2002.06311 (2020) - [i4]Gidon Ernst:
Cuvée: Blending SMT-LIB with Programs and Weakest Preconditions. CoRR abs/2010.05023 (2020) - [i3]Gidon Ernst:
A Complete Approach to Loop Verification with Invariants and Summaries. CoRR abs/2010.05812 (2020)
2010 – 2019
- 2019
- [c22]Gidon Ernst, Toby Murray:
SecCSL: Security Concurrent Separation Logic. CAV (2) 2019: 208-230 - [c21]Gidon Ernst, Paolo Arcaini, Alexandre Donzé, Georgios Fainekos, Logan Mathesen, Giulia Pedrielli, Shakiba Yaghoubi, Yoriyuki Yamagata, Zhenya Zhang:
ARCH-COMP 2019 Category Report: Falsification. ARCH@CPSIoTWeek 2019: 129-140 - [c20]Gidon Ernst, Sean Sedwards, Zhenya Zhang, Ichiro Hasuo:
Fast Falsification of Hybrid Systems Using Probabilistically Adaptive Input. QEST 2019: 165-181 - [c19]Gidon Ernst, Marieke Huisman, Wojciech Mostowski, Mattias Ulbrich:
VerifyThis - Verification Competition with a Human Factor. TACAS (3) 2019: 176-195 - [e1]Toby Murray, Gidon Ernst:
Proceedings of the 21st Workshop on Formal Techniques for Java-like Programs, FTfJP@ECOOP 2019, London, United Kingdom, July 15, 2019. ACM 2019, ISBN 978-1-4503-6864-3 [contents] - 2018
- [j8]Yuyan Bao, Gary T. Leavens, Gidon Ernst:
Unifying separation logic and region logic to allow interoperability. Formal Aspects Comput. 30(3-4): 381-441 (2018) - [j7]Gerhard Schellhorn, Gidon Ernst, Jörg Pfähler, Stefan Bodenmüller, Wolfgang Reif:
Symbolic execution for a clash-free subset of ASMs. Sci. Comput. Program. 158: 21-40 (2018) - [j6]Zhenya Zhang, Gidon Ernst, Sean Sedwards, Paolo Arcaini, Ichiro Hasuo:
Two-Layered Falsification of Hybrid Systems Guided by Monte Carlo Tree Search. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(11): 2894-2905 (2018) - [c18]Adel Dokhanchi, Shakiba Yaghoubi, Bardh Hoxha, Georgios Fainekos, Gidon Ernst, Zhenya Zhang, Paolo Arcaini, Ichiro Hasuo, Sean Sedwards:
ARCH-COMP18 Category Report: Results on the Falsification Benchmarks. ARCH@ADHS 2018: 104-109 - [c17]Zhenya Zhang, Gidon Ernst, Ichiro Hasuo, Sean Sedwards:
Time-Staging Enhancement of Hybrid System Falsification. MT@CPSWeek 2018: 3-4 - [c16]Abdullah Issa, Toby Murray, Gidon Ernst:
In search of perfect users: towards understanding the usability of converged multi-level secure user interfaces. OZCHI 2018: 572-576 - [i2]Zhenya Zhang, Ichiro Hasuo, Gidon Ernst, Sean Sedwards:
Two-Layered Falsification of Hybrid Systems guided by Monte Carlo Tree Search. CoRR abs/1803.06276 (2018) - [i1]Gidon Ernst, Sean Sedwards, Zhenya Zhang, Ichiro Hasuo:
Fast Falsification of Hybrid Systems using Probabilistically Adaptive Input. CoRR abs/1812.04159 (2018) - 2017
- [b1]Gidon Ernst:
A Verified POSIX-Compliant Flash File System - Modular Verification Technology & Crash Tolerance. University of Augsburg, Germany, 2017 - [c15]Jörg Pfähler, Gidon Ernst, Stefan Bodenmüller, Gerhard Schellhorn, Wolfgang Reif:
Modular Verification of Order-Preserving Write-Back Caches. IFM 2017: 375-390 - 2016
- [j5]Gidon Ernst, Jörg Pfähler, Gerhard Schellhorn, Wolfgang Reif:
Modular, crash-safe refinement for ASMs with submachines. Sci. Comput. Program. 131: 3-21 (2016) - [c14]Gerhard Schellhorn, Gidon Ernst, Jörg Pfähler, Wolfgang Reif:
A Relational Encoding for a Clash-Free Subset of ASMs. ABZ 2016: 237-243 - 2015
- [j4]Gidon Ernst, Gerhard Schellhorn, Wolfgang Reif:
Verification of B+ trees by integration of shape analysis and interactive theorem proving. Softw. Syst. Model. 14(1): 27-44 (2015) - [j3]Gidon Ernst, Jörg Pfähler, Gerhard Schellhorn, Dominik Haneberg, Wolfgang Reif:
KIV: overview and VerifyThis competition. Int. J. Softw. Tools Technol. Transf. 17(6): 677-694 (2015) - [c13]Yuyan Bao, Gary T. Leavens, Gidon Ernst:
Conditional effects in fine-grained region logic. FTfJP@ECOOP 2015: 5:1-5:6 - [c12]Gidon Ernst, Jörg Pfähler, Gerhard Schellhorn, Wolfgang Reif:
Inside a Verified Flash File System: Transactions and Garbage Collection. VSTTE 2015: 73-93 - 2014
- [j2]Gerhard Schellhorn, Bogdan Tofan, Gidon Ernst, Jörg Pfähler, Wolfgang Reif:
RGITL: A temporal logic framework for compositional reasoning about interleaved programs. Ann. Math. Artif. Intell. 71(1-3): 131-174 (2014) - [c11]Gerhard Schellhorn, Gidon Ernst, Jörg Pfähler, Dominik Haneberg, Wolfgang Reif:
Development of a Verified Flash File System. ABZ 2014: 9-24 - [c10]Gidon Ernst, Jörg Pfähler, Gerhard Schellhorn, Wolfgang Reif:
Modular Refinement for Submachines of ASMs. ABZ 2014: 188-203 - 2013
- [j1]Bogdan Tofan, Gerhard Schellhorn, Gidon Ernst, Jörg Pfähler, Wolfgang Reif:
Compositional Verification of a Lock-Free Stack with RGITL. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 66 (2013) - [c9]Jörg Pfähler, Gidon Ernst, Gerhard Schellhorn, Dominik Haneberg, Wolfgang Reif:
Formal Specification of an Erase Block Management Layer for Flash Memory. Haifa Verification Conference 2013: 214-229 - [c8]Gidon Ernst, Gerhard Schellhorn, Dominik Haneberg, Jörg Pfähler, Wolfgang Reif:
Verification of a Virtual Filesystem Switch. VSTTE 2013: 242-261 - 2012
- [c7]Gidon Ernst, Gerhard Schellhorn, Dominik Haneberg, Jörg Pfähler, Wolfgang Reif:
A Formal Model of a Virtual Filesystem Switch. SSV 2012: 33-45 - 2011
- [c6]Thorsten Bormer, Marc Brockschmidt, Dino Distefano, Gidon Ernst, Jean-Christophe Filliâtre, Radu Grigore, Marieke Huisman, Vladimir Klebanov, Claude Marché, Rosemary Monahan, Wojciech Mostowski, Nadia Polikarpova, Christoph Scheben, Gerhard Schellhorn, Bogdan Tofan, Julian Tschannen, Mattias Ulbrich:
The COST IC0701 Verification Competition 2011. FoVeOOS 2011: 3-21 - [c5]Dominik Haneberg, Maximilian Junker, Gerhard Schellhorn, Wolfgang Reif, Gidon Ernst:
Simulating a Flash File System with CoreASM and Eclipse. GI-Jahrestagung 2011: 355 - [c4]Gidon Ernst, Gerhard Schellhorn, Wolfgang Reif:
Verification of B + Trees: An Experiment Combining Shape Analysis and Interactive Theorem Proving. SEFM 2011: 188-203 - [c3]Gerhard Schellhorn, Bogdan Tofan, Gidon Ernst, Wolfgang Reif:
Interleaved Programs and Rely-Guarantee Reasoning with ITL. TIME 2011: 99-106 - 2010
- [c2]Faisal Aslam, Luminous Fennell, Christian Schindelhauer, Peter Thiemann, Gidon Ernst, Elmar Haussmann, Stefan Rührup, Zartash Afzal Uzmi:
Optimized Java Binary and Virtual Machine for Tiny Motes. DCOSS 2010: 15-30
2000 – 2009
- 2008
- [c1]Faisal Aslam, Christian Schindelhauer, Gidon Ernst, Damian Spyra, Jan Meyer, Mohannad Zalloom:
Introducing TakaTuka: a java virtualmachine for motes. SenSys 2008: 399-400
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint