Mads Dam
Orcid: 0000-0001-5432-6442Affiliations:
- Swedish Institute of Computer Science, Stockholm, Sweden
According to our database1,
Mads Dam
authored at least 86 papers
between 1986 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
2023
Formal Verification of Correctness and Information Flow Security for an In-Order Pipelined Processor.
Proceedings of the Formal Methods in Computer-Aided Design, 2023
2022
Foundations and Tools in HOL4 for Analysis of Microarchitectural Out-of-Order Execution.
Proceedings of the 22nd Formal Methods in Computer-Aided Design, 2022
Proceedings of the 5th International Workshop on P4 in Europe, 2022
Proceedings of the Logic of Software. A Tasting Menu of Formal Methods, 2022
2021
Proceedings of the Formal Methods in Computer Aided Design, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
2020
Proceedings of the Software Engineering and Formal Methods - 18th International Conference, 2020
InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
On the verification of system-level information flow properties for virtualized execution platforms.
J. Cryptogr. Eng., 2019
2018
Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018
2017
Proceedings of the PROOFS 2017, 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Software Engineering and Formal Methods - 14th International Conference, 2016
2015
Serv. Oriented Comput. Appl., 2015
Math. Struct. Comput. Sci., 2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the SOFSEM 2015: Theory and Practice of Computer Science, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
Proceedings of the Hardware and Software: Verification and Testing, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Proceedings 6th Interaction and Concurrency Experience, 2013
Proceedings of the Certified Programs and Proofs - Third International Conference, 2013
Proceedings of the TrustED'13, 2013
Formal verification of information flow security for a simple arm-based separation kernel.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 Workshop on Programming based on Actors, 2013
2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 7th Workshop on Methods for Modalities, 2011
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011
2010
Proceedings of the Algorithms for Next Generation Networks, 2010
IEEE Trans. Netw. Serv. Manag., 2010
J. Comput. Secur., 2010
CoRR, 2010
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010
2009
IEEE Trans. Netw. Serv. Manag., 2009
Proceedings of the Integrated Network Management, 2009
Proceedings of the IJCAI 2009, 2009
Proceedings of the ECOOP 2009, 2009
Proceedings of the Automated Technology for Verification and Analysis, 2009
Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009
2008
Comput. Networks, 2008
Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware, 2008
2007
Proceedings of the 22nd IEEE Symposium on Logic in Computer Science (LICS 2007), 2007
2006
Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2006
2005
Proceedings of the Ambient Networks, 2005
2004
2003
RAIRO Theor. Informatics Appl., 2003
Proceedings of the Eighth International Workshop on Formal Methods for Industrial Critical Systems, 2003
On the Structure of Inductive Reasoning: Circular and Tree-Shaped Proofs in the µ-Calculus.
Proceedings of the Foundations of Software Science and Computational Structures, 2003
Proceedings of the Logic for Concurrency and Synchronisation, 2003
2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
A note on global induction in a mu-calculus with explicit approximations.
Proceedings of the Fixed Points in Computer Science, 2002
2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
1999
Proceedings of the FM'99 - Formal Methods, 1999
Proceedings of the Perspectives of System Informatics, 1999
1998
Proceedings of the 1998 ACM symposium on Applied Computing, 1998
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998
Proceedings of the CONCUR '98: Concurrency Theory, 1998
Proceedings of the Automated Deduction, 1998
1997
Theor. Comput. Sci., 1997
Proceedings of the Compositionality: The Significant Difference, International Symposium, 1997
1996
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1996
1995
Proceedings of the TAPSOFT'95: Theory and Practice of Software Development, 1995
Proceedings of the CONCUR '95: Concurrency Theory, 1995
1994
J. Log. Comput., 1994
1992
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1992
Proceedings of the CAAP '92, 1992
1988
Proceedings of the Third Annual Symposium on Logic in Computer Science (LICS '88), 1988
1986