We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Online Shielding for Stochastic Systems
Könighofer B., Bloem R., Tappler M., Rudolf J., Palmisano A.
NASA Formal Methods - 13th International Symposium, NFM 2021, Proceedings, 13th NASA Formal Methods Symposium, 231-248, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12673 LNCS)
TEMPEST - Synthesis Tool for Reactive Systems and Shields in Probabilistic Environments
Pranger S., Könighofer B., Posch L., Bloem R.
Automated Technology for Verification and Analysis - 19th International Symposium, ATVA 2021, Proceedings, 19th International Symposium on Automated Technology for Verification and Analysis , 222-228, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12971 LNCS)
Shield Synthesis for Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Lorber F.
Leveraging Applications of Formal Methods, Verification and Validation, 2020 International Symposium on Leveraging Applications of Formal Methods, 290-306, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12476 LNCS)
Safe Reinforcement Learning Using Probabilistic Shields
Jansen N., Könighofer B., Junges S., Serban A., Bloem R.
31st International Conference on Concurrency Theory, CONCUR 2020, 31st International Conference on Concurrency Theory, 31-316
Run-Time Optimization for Learned Controllers Through Quantitative Games
Avni G., Bloem R., Chatterjee K., Henzinger T., Könighofer B., Pranger S.
Computer Aided Verification (CAV), 31st International Conference on Computer Aided Verification, 630-649, ( Lecture Notes in Computer Science; vol. 11561)
Synthesis of Minimum-Cost Shields for Multi-agent Systems
Bharadwaj S., Bloem R., Dimitrova R., Könighofer B., Topcu U.
2019 American Control Conference (ACC), 2019 American Control Conference, 1048-1055
Formal Verification of Masked Hardware Implementations in the Presence of Glitches
Bloem R., Groß H., Iusupov R., Könighofer B., Mangard S., Winter J.
EUROCRYPT , Springer, 321-353, (Lecture Notes in Computer Science)
Safe Reinforcement Learning via Shielding
Alshiekh M., Bloem R., Ehlers R., Könighofer B., Niekum S., Topcu U.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2-7, 2018, 32nd AAAI Conference on Artificial Intelligence, 2669-2678
Shield Synthesis: - Runtime Enforcement for Reactive Systems
Bloem R., Könighofer B., Könighofer R., Wang C.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference, 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 533-548, (Lecture Notes in Computer Science; vol. 9035)
Synthesizing Robust Systems
Bloem R., Chatterjee K., Greimel K., Henzinger T., Hofferek G., Jobstmann B., Könighofer B., Könighofer R.
Acta informatica, Vol. 51(3), 193-220
Synthesis of Synchronization using Uninterpreted Functions
Bloem R., Hofferek G., Könighofer B., Könighofer R., Außerlechner S., Spörk R.
Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design FMCAD 2014, International Conference on Formal Methods in Computer-Aided Design, 35-42
Synthesizing Multiple Boolean Functions using Interpolation on a Single Proof
Hofferek G., Gupta A., Könighofer B., Jiang J., Bloem R.
2013 Formal Methods in Computer-Aided Design, FMCAD 2013, 13th International Conference on Formal Methods in Computer-Aided Design, 77-84
Synthesizing Robust Systems with RATSY
Bloem R., Gamauf H., Hofferek G., Könighofer B., Könighofer R.
Proceedings First Workshop on Synthesis (SYNT 2012), Workshop on Synthesis (SYNT 2012), 47-53, (Electronic Proceedings in Theoretical Computer Science; vol. 84)