Pnueli The temporal logic of reactive and concurrent systems specification, 1992. ,
Towards a unified theory of operational and axiomatic semantics, ICALP 2012, Springer LNCS 7392, pp.351-363 ,
Checking reachability using matching logic, OOP- SLA 2012, pp.555-574 ,
One-path reachability logic, LICS 2013, pp.358-367 ,
All-path reachability logic, RTA 2014, pp.425-440 ,
Semantics-based program verifiers for all languages, OOPSLA'16, pp.74-91 ,
Verifying Reachability-Logic Properties on Rewriting-Logic Specifications, Logic, Rewriting, and Concurrency -Essays dedicated to José Meseguer, Springer LNCS 9200, pp.451-474 ,
DOI : 10.1007/978-3-319-12904-4_5
URL : https://hal.archives-ouvertes.fr/hal-01158941
A constructor-based reachability logic for rewrite theories, 2017. ,
Breaking and fixing the needham-schroeder public-key protocol using FDR. Software -Concepts and Tools, pp.93-102, 1996. ,
DOI : 10.1007/3-540-61042-1_43
URL : http://www.cs.ubc.ca/~ajh/courses/cpsc513/NSFDR.ps
Matching logic, RTA 2015, pp.5-21 ,
Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, pp.385-394, 1976. ,
DOI : 10.1145/360248.360252
TRACER: A Symbolic Execution Tool for Verification, CAV, 2012, Springer LNCS 7358, pp.758-766 ,
DOI : 10.1007/978-3-642-31424-7_61
URL : http://www.comp.nus.edu.sg/%7Ejoxan/papers/tracer.pdf
Using symbolic execution for verifying safety-critical systems, ACM SIGSOFT Software Engineering Notes, vol.26, issue.5, pp.142-151, 2001. ,
DOI : 10.1145/503271.503230
URL : http://www.elet.polimi.it/Users/DEI/Sections/Compeng/Giovanni.Denaro/papers/ESEC-FSE2001.pdf
EXE: automatically generating inputs of death, ACM Conference on Computer and Communications Security, pp.322-335, 2006. ,
CUTE: a concolic unit testing engine for C, ESEC/FSE 2005, ACM, pp.263-272 ,
DOI : 10.21236/ada482657
Symbolic PathFinder: symbolic execution of Java bytecode, ASE 2010, pp.179-180 ,
A generic framework for symbolic execution: A coinductive approach, Journal of Symbolic Computation, vol.80, pp.125-163, 2017. ,
DOI : 10.1016/j.jsc.2016.07.012
URL : https://hal.archives-ouvertes.fr/hal-01238696
Rewriting modulo SMT and open system analysis, Journal of Logical and Algebraic Methods in Programming, vol.86, issue.1, pp.269-297, 2017. ,
DOI : 10.1016/j.jlamp.2016.10.001
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols, Higher-Order and Symbolic Computation, pp.23-160, 2007. ,
Abstract Logical Model Checking of Infinite- State Systems Using Narrowing, LIPICS, vol.21, pp.81-96, 2013. ,
Abstract interpretation, Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '77, pp.238-252 ,
DOI : 10.1145/512950.512973
URL : https://hal.archives-ouvertes.fr/hal-00930103