Formal verification in hardware design: a survey C Kern, MR Greenstreet ACM Transactions on Design Automation of Electronic Systems (TODAES) 4 (2 …, 1999 | 513 | 1999 |
Foundations of security: what every programmer needs to know C Kern, A Kesavan, N Daswani Apress, 2007 | 127 | 2007 |
Securing the Tangled Web C Kern Communications of the ACM 57 (9), 38-47, 2014 | 45 | 2014 |
If It’s Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development with API Hardening P Wang, J Bangert, C Kern 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 14 | 2021 |
Verifying a self-timed divider T Ono-Tesfaye, C Kern, MR Greenstreet Proceedings Fourth International Symposium on Advanced Research in …, 1998 | 7 | 1998 |
Discrete-time approximation of the machine interference problem with generally distributed failure, repair, and walking times M Mittler, C Kern European journal of control 3 (4), 254-267, 1997 | 7 | 1997 |
A light-weight framework for hardware verification C Kern, T Ono-Tesfaye, MR Greenstreet Tools and Algorithms for the Construction and Analysis of Systems: 5th …, 1999 | 4 | 1999 |
A light-weight framework for hardware verification C Kern, T Ono-Tesfaye, MR Greenstreet International Journal on Software Tools for Technology Transfer 3, 286-313, 2001 | 2 | 2001 |
It is time to standardize principles and practices for software memory safety (extended version) RNM Watson, J Baldwin, T Chen, D Chisnall, J Clarke, B Davis, ... University of Cambridge, Computer Laboratory, 2025 | | 2025 |