2008 |
6 | EE | Monica S. Lam,
Michael Martin,
V. Benjamin Livshits,
John Whaley:
Securing web applications with static and dynamic information flow tracking.
PEPM 2008: 3-12 |
5 | EE | Michael Martin,
Monica S. Lam:
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking.
USENIX Security Symposium 2008: 31-44 |
2007 |
4 | EE | Michael Martin:
Exploring the Netherlands on a Semantic Path.
CSSW 2007: 179- |
2003 |
3 | | Martin Keim,
Rolf Drechsler,
Bernd Becker,
Michael Martin,
Paul Molitor:
Polynomial Formal Verification of Multipliers.
Formal Methods in System Design 22(1): 39-58 (2003) |
1997 |
2 | EE | Martin Keim,
Michael Martin,
Bernd Becker,
Rolf Drechsler,
Paul Molitor:
Polynomial Formal Verification of Multipliers.
VTS 1997: 150-157 |
1 | EE | Jürgen Teich,
Lothar Thiele,
Sundararajan Sriram,
Michael Martin:
Performance analysis and optimization of mixed asynchronous synchronous systems.
IEEE Trans. on CAD of Integrated Circuits and Systems 16(5): 473-484 (1997) |