| 2008 |
| 6 | EE | Monica S. Lam,
Michael Martin,
V. Benjamin Livshits,
John Whaley:
Securing web applications with static and dynamic information flow tracking.
PEPM 2008: 3-12 |
| 5 | EE | Michael Martin,
Monica S. Lam:
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking.
USENIX Security Symposium 2008: 31-44 |
| 2007 |
| 4 | EE | Michael Martin:
Exploring the Netherlands on a Semantic Path.
CSSW 2007: 179- |
| 2003 |
| 3 | | Martin Keim,
Rolf Drechsler,
Bernd Becker,
Michael Martin,
Paul Molitor:
Polynomial Formal Verification of Multipliers.
Formal Methods in System Design 22(1): 39-58 (2003) |
| 1997 |
| 2 | EE | Martin Keim,
Michael Martin,
Bernd Becker,
Rolf Drechsler,
Paul Molitor:
Polynomial Formal Verification of Multipliers.
VTS 1997: 150-157 |
| 1 | EE | Jürgen Teich,
Lothar Thiele,
Sundararajan Sriram,
Michael Martin:
Performance analysis and optimization of mixed asynchronous synchronous systems.
IEEE Trans. on CAD of Integrated Circuits and Systems 16(5): 473-484 (1997) |