• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
19992021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • A capability calculus for concurrency and determinism

    Terauchi, T. & Aiken, A., 2006, CONCUR 2006 - Concurrency Theory - 17th International Conference, CONCUR 2006, Proceedings. Springer Verlag, p. 218-232 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4137 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • A fixpoint logic and dependent effects for temporal property verification

    Nanjo, Y., Unno, H., Koskinen, E. & Terauchi, T., 2018 Jul 9, Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2018. Institute of Electrical and Electronics Engineers Inc., p. 759-768 10 p. (Proceedings - Symposium on Logic in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A Formal Analysis of Timing Channel Security via Bucketing

    Terauchi, T. & Antonopoulos, T., 2019, Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings. Nielson, F. & Sands, D. (eds.). Springer Verlag, p. 29-50 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11426 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • A type system for observational determinism

    Terauchi, T., 2008 Sep 19, Proceedings - 21st IEEE Computer Security Foundations Symposium, CSF 2008. p. 287-300 14 p. 4556693. (Proceedings - IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • Automatic termination verification for higher-order functional programs

    Kuwahara, T., Terauchi, T., Unno, H. & Kobayashi, N., 2014, Programming Languages and Systems - 23rd European Symposium on Programming, ESOP 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Proceedings. Springer Verlag, p. 392-411 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8410 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • Automating relatively complete verification of higher-order functional programs

    Unno, H., Terauchi, T. & Kobayashi, N., 2013, POPL 2013 - Proceedings of 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. p. 75-86 12 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • Checking race freedom via linear programming

    Terauchi, T., 2008 Dec 12, PLDI'08: Proceedings of the 2008 SIGPLAN Conference on Programming Language Design and Implementation. p. 1-10 10 p. (Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    26 Citations (Scopus)
  • Compositional synthesis of leakage resilient programs

    Blot, A., Yamamoto, M. & Terauchi, T., 2017, Principles of Security and Trust - 6th International Conference, POST 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings. Maffei, M. & Ryan, M. (eds.). Springer Verlag, p. 277-297 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10204 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Constraint-Based Relational Verification

    Unno, H., Terauchi, T. & Koskinen, E., 2021, Computer Aided Verification - 33rd International Conference, CAV 2021, Proceedings. Silva, A. & Leino, K. R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 742-766 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12759 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • Decomposition instead of self-composition for proving the absence of timing channels

    Antonopoulos, T., Gazzillo, P., Hicks, M., Koskinen, E., Terauchi, T. & Wei, S., 2017 Jun 14, PLDI 2017 - Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation. Cohen, A. & Vechev, M. (eds.). Association for Computing Machinery, p. 362-375 14 p. (Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI); vol. Part F128414).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    49 Citations (Scopus)
  • Dependent types from counterexamples

    Terauchi, T., 2010 Apr 20, POPL'10 - Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. p. 119-130 12 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Citations (Scopus)
  • Explaining the effectiveness of small refinement heuristics in program verification with CEGAR

    Terauchi, T., 2015, Static Analysis- 22nd International Symposium, SAS 2015, Proceedings. Blazy, S. & Jensen, T. (eds.). Springer Verlag, p. 128-144 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9291).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Games for security under adaptive adversaries

    Antonopoulos, T. & Terauchi, T., 2019 Jun, Proceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019. IEEE Computer Society, p. 216-229 14 p. 8823693. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2019-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Inferring channel buffer bounds via linear programming

    Terauchi, T. & Megacz, A., 2008, Programming Languages and Systems - 17th European Symposium on Programming, ESOP 2008 - Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Proceedings. p. 284-298 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4960 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Inferring simple solutions to recursion-free horn clauses via sampling

    Unno, H. & Terauchi, T., 2015, Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, Proceedings. Tinelli, C. & Baier, C. (eds.). Springer Verlag, p. 149-163 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9035).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Local temporal reasoning

    Koskinen, E. & Terauchi, T., 2014, Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic, CSL 2014 and the 29th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2014. Association for Computing Machinery, 59. (Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic, CSL 2014 and the 29th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • On bounding problems of quantitative information flow

    Yasuoka, H. & Terauchi, T., 2010 Nov 8, Computer Security, ESORICS 2010 - 15th European Symposium on Research in Computer Security, Proceedings. p. 357-372 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6345 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • On typability for rank-2 intersection types with polymorphic recursion

    Terauchi, T. & Aiken, A., 2006, Proceedings - 21st Annual IEEE Symposium on Logic in Computer Science, LICS 2006. p. 111-120 10 p. 1691222. (Proceedings - Symposium on Logic in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Polymorphic fractional capabilities

    Yasuoka, H. & Terauchi, T., 2009, Static Analysis - 16th International Symposium, SAS 2009, Proceedings. p. 36-51 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5673 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Quantitative information flow-verification hardness and possibilities

    Hirotoshi, Y. & Tachio, T., 2010, 23rd IEEE Computer Security Foundations Symposium, CSF 2010. p. 15-27 13 p. 5552655. (Proceedings - IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    41 Citations (Scopus)
  • Relaxed stratification: A new approach to practical complete predicate refinement

    Terauchi, T. & Unno, H., 2015, Programming Languages and Systems - 24th European Symposiumon Programming, ESOP 2015 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, Proceedings. Vitek, J. (ed.). Springer Verlag, p. 610-633 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9032).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Secure information flow as a safety problem

    Terauchi, T. & Aiken, A., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 352-367 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3672 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    170 Citations (Scopus)
  • Temporal verification of higher-order functional programs

    Murase, A., Terauchi, T., Kobayashi, N., Sato, R. & Unno, H., 2016 Jan 11, POPL 2016 - Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. Majumdar, R. & Bodik, R. (eds.). Association for Computing Machinery, p. 57-68 12 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages; vol. 20-22-January-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Witnessing side-effects

    Terauchi, T. & Aiken, A., 2005 Dec 1, ICFP 2005 - Proceedings of the 10th ACM SIGPLAN International Conference on Functional Programming. p. 105-115 11 p. (Proceedings of the ACM SIGPLAN International Conference on Functional Programming, ICFP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)