2025

[91]
A. D. Brucker, “Cybersecurity threats and attacks in modern manufacturing,” presented at the BSides exeter, Exeter, UK, Apr. 26, 2025. Author copy: https://logicalhacking.com/publications/talk-brucker-manufacturing-security-2025/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2024

[90]
A. D. Brucker, “Comparing formal verification and hardware checks for achieving memory safety,” presented at the Embedded world, Nuremberg, Germany, Apr. 11, 2024. Author copy: https://logicalhacking.com/publications/talk-brucker-cheri-vs-verification-2024/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[89]
A. D. Brucker, “Attacking AI: A primer,” presented at the BSides exeter, Exeter, UK, Jul. 27, 2024. Author copy: https://logicalhacking.com/publications/talk-brucker-attacking-ai-2024/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2023

[88]
A. D. Brucker, “Isabelle’s code generator and functional programming environment: A (not so) gentle introduction,” presented at the Fun in the afternoon / s-REPLS - 13, Bristol, UK, Nov. 01, 2023. Author copy: https://logicalhacking.com/publications/talk-brucker-isabelle-code-generation-2023/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[87]
A. D. Brucker, “A tale of santa building a trustworthy system,” presented at the Christmas lecture 2023, department of computer science, university of exeter, Exeter, UK, Dec. 11, 2023. Author copy: https://logicalhacking.com/publications/talk-brucker-christmas-lecture-2023/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[86]
A. D. Brucker, “Security by design for smart vehicles,” presented at the Secure souht west 16, Exeter, UK, Apr. 19, 2023. Author copy: https://logicalhacking.com/publications/talk-brucker-dsbd-smart-vehicles-2023/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2022

[85]
A. D. Brucker, “1 + 0 = 1 – oft, aber nicht immer,” presented at the Heise devSec() conference, Exeter, UK, Oct. 06, 2022.
[Abstract | BibTeX | RIS | EndNote | Word]
[84]
A. D. Brucker, “Blockchain and smart contracts: Curse or blessing for security?” presented at the IEEE exeter blockchain event, Exeter, UK, Nov. 04, 2022.
[Abstract | BibTeX | RIS | EndNote | Word]
[83]
A. D. Brucker, “The link between digital security/privacy by design and skills needs,” presented at the Secure south west 15, Plymouth, UK, Apr. 08, 2022.
[Abstract | BibTeX | RIS | EndNote | Word]

2021

[82]
A. D. Brucker, “When the integers are not what they appear to be: On the impact of integers overflows,” presented at the Hot issues in security principles and trust (HotSpot 2021), Online, Jun. 21, 2021.
[Abstract | BibTeX | RIS | EndNote | Word]
[81]
A. D. Brucker, “AI in both defensive and offensive context,” presented at the Secure south west 14, Online, Mar. 17, 2021.
[Abstract | BibTeX | RIS | EndNote | Word]
[80]
A. D. Brucker, “Attacking the (software) supply chain: A piece in three acts,” presented at the CIISEC master class, Online, Feb. 17, 2021.
[Abstract | BibTeX | RIS | EndNote | Word]

2020

[79]
A. D. Brucker and M. Herzberg, “Formal foundations of web components,” presented at the FoMSESS jahrestreffen 2020, Online, Oct. 12, 2020.
[Abstract | BibTeX | RIS | EndNote | Word]
[78]
A. D. Brucker, “Securing a world dominated by software,” presented at the Security group seminar of the University of Kent, Kent, UK, Jan. 31, 2020.
[Abstract | BibTeX | RIS | EndNote | Word]

2019

[77]
A. D. Brucker, “Hacking (not so) smart things 101,” presented at the TechExeter conference, Exeter, UK, Sep. 11, 2019. Author copy: https://logicalhacking.com/publications/talk-brucker-techexeter-iot-2019/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[76]
A. D. Brucker, “Securing software supply chains: A case for new research in software security?” presented at the Workshop on secure software engineering (SSE 2019), Kent, UK, Aug. 28, 2019. Invited Keynote.. Author copy: https://logicalhacking.com/publications/talk-brucker-sw-supply-chain-research-2019/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[75]
A. D. Brucker and M. Herzberg, “A formally verified model of web components,” presented at the International conference on formal aspects of component software (FACS 2019), Amsterdam, The Netherlands, Oct. 25, 2019. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-web-components-2019/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[74]
A. D. Brucker, “Security in a maritime world dominated by software,” presented at the Marine and maritime cyber security conference, Plymouth, UK, Nov. 05, 2019. Author copy: https://logicalhacking.com/publications/talk-brucker-marine-security-2019/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[73]
A. D. Brucker, “Owning an enterprise with three lines of code,” presented at the SteelCon conference, Sheffield, UK, Jul. 13, 2019. Author copy: https://logicalhacking.com/publications/talk-brucker-steelcon-sw-supply-chain-security-2019/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2018

[72]
A. D. Brucker, “Useable security for developers: A nightmare,” presented at the OWASP AppSec EU conference, London, UK, Jul. 06, 2018. Author copy: https://logicalhacking.com/publications/talk-brucker-dev-usability-2018/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[71]
A. D. Brucker, “Formalizing (web) standards: An application of test and proof,” presented at the International conference on tests and proofs (TAP 2018), Toulouse, France, Jun. 27, 2018. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-standard-compliance-testing-2018/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2017

[70]
A. D. Brucker, “Theorem prover-based testing: Combining verification and testing,” presented at the Midlands graduate school, Leicester, UK, Apr. 09, 2017.
[Abstract | BibTeX | RIS | EndNote | Word]
[69]
A. D. Brucker, “Introducing security testing to developers: Experiences and lessons learned,” presented at the Checkmarx security conference, Tokyo, Japan, Dec. 01, 2017. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-cx-security-testing-2017/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[68]
A. D. Brucker, “The evil friend in your browser,” presented at the OWASP day benelux, Tillburg, The Netherlands, Nov. 24, 2017. Author copy: https://logicalhacking.com/publications/talk-brucker-owasp-benelux-evil-friend-2017/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[67]
A. D. Brucker and M. Herzberg, “The evil friend in your browser,” presented at the SteelCon conference, Sheffield, UK, Jul. 08, 2017. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-steelcon-evil-friend-2017/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[66]
A. D. Brucker and M. Herzberg, “Combining the security risks of native and web development: Hybrid apps,” presented at the OWASP AppSec EU, Belfast, UK, May 12, 2017. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-hybrid-app-security-2017/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[65]
A. D. Brucker and M. Herzberg, “The evil friend in your browser,” presented at the OWASP AppSec EU, Belfast, UK, May 11, 2017. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-owasp-evil-friend-2017/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[64]
A. D. Brucker, “Developing secure software: Experiences from an international software vendor,” presented at the Shift left summit london, London, UK, Jan. 19, 2017. Author copy: https://logicalhacking.com/publications/talk-brucker-shift-left-sdlc-2017/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2016

[63]
A. D. Brucker, “Why is software always crashing?” presented at the Pint of Science, Sheffield, UK, May 16, 2016. Author copy: https://logicalhacking.com/publications/talk-brucker-pint-sw-assurance-2018/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[62]
A. D. Brucker, “Your (not so) smart TV is currently busy with taking down the internet,” presented at the Pint of Science, Sheffield, UK, May 15, 2016. Author copy: https://logicalhacking.com/publications/talk-brucker-pint-iot-security-2017/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[61]
A. D. Brucker, “Will computes ever be secure,” presented at the Pint of Science, Sheffield, UK, May 25, 2016. Author copy: https://logicalhacking.com/publications/talk-brucker-pint-security-challenge-2016/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[60]
A. D. Brucker, “Static analysis: The workhorse of a end-to-end security testing strategy,” presented at the SECENTIS winter school, Trento, Italy, Feb. 09, 2016. Author copy: https://logicalhacking.com/publications/talk-brucker-secentis-static-analsyis-2016/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[59]
A. D. Brucker, “Developing secure software: Experiences from an international software vendor,” presented at the OWASP meeting sheffield, Sheffield, UK, Feb. 25, 2016. Author copy: https://logicalhacking.com/publications/talk-brucker-owasp-secure-software-2016/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[58]
A. D. Brucker, F. Massacci, and S. Dashevsky, “Using third party components for building an application might be more dangerous than you think!” presented at the OWASP AppSec EU conference, Rome, Italy, Jun. 30, 2016. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-owasp-third-party-security-2016/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[57]
A. D. Brucker and M. Herzberg, “On the static analysis of hybrid mobile apps: A report on the state of apache cordova nation,” presented at the International symposium on engineering secure software and systems (ESSoS 2016), Egham, UK, Apr. 07, 2016. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-cordova-security-2016/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2015

[56]
A. D. Brucker, “How to enable developers to deliver secure codes,” presented at the Checkmarx webinar: Meet the expert, May 21, 2015. Author copy: https://logicalhacking.com/publications/talk-brucker-developer-awareness-2017/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[55]
A. D. Brucker, “Developing secure software: From mobile apps to ERP systems,” presented at the ZertApps abschlussveranstaltung “sichere und datenschutzgerechte entwicklung von mobilen apps” TeleTrusT bremen, Bremen, Germany, Nov. 17, 2015. Invited Keynote.. Author copy: https://logicalhacking.com/publications/talk-brucker-teletrust-2015/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[54]
A. D. Brucker, “Isabelle: Not only a proof assistant,” presented at the Proof assistants and related tools - the PART project, Lyngby, Denmark, Sep. 24, 2015. Invited Keynote.. Author copy: https://logicalhacking.com/publications/talk-brucker-part-isabelle-framework-2015/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[53]
A. D. Brucker, “Agile secure software development in a large software development organisation: Security testing,” presented at the International workshop on agile secure software development (ASSD), Toulouse, France, Aug. 26, 2015. Invited Keynote.. Author copy: https://logicalhacking.com/publications/talk-brucker-assd-2015/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[52]
A. D. Brucker, D. Yanev, and S. Hookings, “Bringing security testing to development: How to enable developers to act as security experts,” presented at the OWASP AppSec EU conference, Amsterdam, The Netherlands, May 21, 2015. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-owasp-sectest-2015/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[51]
A. D. Brucker, “Security testing: Myths, challenges, and opportunities,” presented at the Keynote: 6th international workshop on security testing (SECTEST), Graz, Austria, Apr. 13, 2015. Invited Keynote.. Author copy: https://logicalhacking.com/publications/talk-brucker-sectest-2015/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2014

[50]
A. D. Brucker, “Integration of formal methods and testing for model-based security engineering,” presented at the NII shonan meeting seminar 048 “integration of formal method and testing for model-based systems engineering,” Shonan, Japan, Dec. 01, 2014. Author copy: https://logicalhacking.com/publications/talk-brucker-mbst-2014/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[49]
A. D. Brucker, “Industrial challenges of secure software development,” presented at the Seminar on road mapping cybersecurity research and innovation (NIS WG3/CAPITAL/CSP FORUM), Florence, Italy, Oct. 08, 2014. Author copy: https://logicalhacking.com/publications/talk-brucker-ssdl-challenges-2014/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[48]
A. D. Brucker, “A collection of real world (JavaScript) security problems: Examples from 2 1/2 applications areas of JavaScript,” presented at the Dagstuhl seminar 14271 “scripting languages and frameworks: Analysis and verification,” Dagstuhl, Germany, Jul. 02, 2014. Author copy: https://logicalhacking.com/publications/talk-brucker-js-challenges-2014/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[47]
A. D. Brucker, “SAST for JavaScript: A brief overview of commercial tools,” presented at the Dagstuhl seminar 14271 “scripting languages and frameworks: Analysis and verification,” Dagstuhl, Germany, Jun. 30, 2014. Author copy: https://logicalhacking.com/publications/talk-brucker-sast-js-2014/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[46]
A. D. Brucker, “Zertifizierte Datensicherheit für mobile Anwendungen,” Vienna, Austria, Mar. 20, 2014. Author copy: https://logicalhacking.com/publications/talk-sohr.ea-zertapps-2014/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[45]
A. D. Brucker, “Deploying static application security testing on a large scale,” presented at the GI sicherheit 2014, Vienna, Austria, Mar. 19, 2014. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-sast-expierences-2014/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[44]
A. D. Brucker, “BPM and cloud integration: A new driver for research in security in business processes,” presented at the Guest lecture: Konzepte und anwendung von workflowsystemen, karlsruhe institute of technology (KIT), Karlsruhe, Germany, Feb. 13, 2014. Author copy: https://logicalhacking.com/publications/talk-brucker-bpm-cloud-2014/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2013

[43]
A. D. Brucker, “Model-based testing for secure services,” presented at the Aniketos spring ph.d. School on “trustworthy & secure service composition,” Malaga, Spain, May 30, 2013.
[Abstract | BibTeX | RIS | EndNote | Word]
[42]
A. D. Brucker, “Service compositions: Curse or blessing for security?” presented at the International workshop on behavioural types (BEAT), Madrid, Spain, Sep. 24, 2013. Invited Keynote.. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-service-composition-2013/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[41]
A. D. Brucker, F. Malmignati, M. Merabti, Q. Shi, and B. Zhou, “A framework for secure service composition,” presented at the ASE/IEEE international conference on information privacy, security, risk and trust (PASSAT), Washington D.C., USA, Sep. 11, 2013. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-framework-2013/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[40]
A. D. Brucker, “Integrating application security into a software development process,” presented at the 2. Tagung IT sicherheit: Sicherheit in der cloud und in applikationen, Emden, Germany, Jan. 31, 2013. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-anwendungsssicherheit-2013/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[39]
A. D. Brucker, “Modeling@SAP,” presented at the Dagstuhl seminar 13211 “automated reasoning on conceptual schemas,” Dagstuhl, Germany, May 20, 2013. Author copy: https://logicalhacking.com/publications/talk-brucker-modeling-sap-2013/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[38]
A. D. Brucker, “Reasoning over secure business processes,” presented at the Dagstuhl seminar 13211 “automated reasoning on conceptual schemas,” Dagstuhl, Germany, May 21, 2013. Author copy: https://logicalhacking.com/publications/talk-brucker-reasoning-2013/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[37]
A. D. Brucker, “Security in the context of business processes: Thoughts from a system vendor’s perspective,” presented at the Dagstuhl seminar 13341 “verifiably secure process-aware information systems,” Dagstuhl, Germany, Aug. 19, 2013. Invited Keynote.. Author copy: https://logicalhacking.com/publications/talk-brucker-security-process-systems-2013/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[36]
A. D. Brucker and L. Brügger, “Model-based conformance testing of security properties,” presented at the Dagstuhl seminar 13012 “symbolic methods in testing,” Dagstuhl, Germany, Jan. 09, 2013. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-security-conformance-2013/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2012

[35]
R. Bachmann and A. D. Brucker, “1000 projects later: Security code scans at SAP,” presented at the German OWASP day, Munich, Germany, Nov. 07, 2012. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-1000projekte-2012/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[34]
A. D. Brucker and B. Wolff, “Featherweight OCL: A study for the consistent semantics of OCL 2.3 in HOL,” Sep. 30, 2012. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-featherweight-2012/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[33]
A. D. Brucker, “Testing security properties of web services,” presented at the LRI/université research seminar, Université Paris Sud, May 02, 2012. Author copy: https://logicalhacking.com/publications/talk-brucker-ws-testing-2012/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[32]
A. D. Brucker and I. Hang, “Secure and compliant implementation of business process-driven systems,” presented at the Joint workshop on security in business processe (SBP 2012), Tallinn, Estonia, Sep. 03, 2012. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-secure-2012/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2010

[31]
A. D. Brucker, “Encoding object-oriented datatypes in HOL: Extensible records revisited,” presented at the Isabelle developers workshop (IDW), Cambridge, UK, Jun. 18, 2010. Author copy: https://logicalhacking.com/publications/talk-brucker-encoding-2010/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[30]
A. D. Brucker and H. Petritsch, “Analyzing access control overrides,” presented at the PoFI 2011, Pisa, Italy, Sep. 21, 2010. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-aniketos-2011/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[29]
M. Altenhofen and A. D. Brucker, “Practical issues with formal specifications: Lessons learned from an industrial case study,” presented at the FMICS 2010, Antwerp, Belgium, Sep. 21, 2010. Author copy: https://logicalhacking.com/publications/talk-altenhofen.ea-issues-2010/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[28]
A. D. Brucker, “Research challenges: Securing the internet of service,” presented at the Achtes jahrestreffen der GI fachgruppe formale methoden und software engineering für sichere systeme (FoMSESS), Berlin, Germany, Apr. 27, 2010. Author copy: https://logicalhacking.com/publications/talk-brucker-soa-security-2010/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2009

[27]
A. D. Brucker, “Integrating automated and interactive protocol verification,” presented at the Computer science colloquium at the German Research Center for Artificial Intelligence (DFKI), Saarbrücken, Germany, Dec. 09, 2009. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-integrating-2009-b/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[26]
A. D. Brucker and S. A. Mödersheim, “Integrating automated and interactive protocol verification,” presented at the Workshop on formal aspects in security and trust (FAST 2009), Eindhoven, The Netherlands, Nov. 06, 2009. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-integrating-2009/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[25]
A. D. Brucker and B. Wolff, “HOL-TestGen: An interactive test-case generation framework,” presented at the Fundamental approaches to software engineering (FASE09), York, UK, Mar. 27, 2009. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-hol-testgen-2009/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[24]
A. D. Brucker and H. Petritsch, “Extending access control models with break-glass,” presented at the ACM symposium on access control models and technologies (SACMAT), Strea, Italy, Jun. 05, 2009. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-extending-2009/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2008

[23]
A. D. Brucker, “Formal analysis of UML/OCL models,” presented at the Computer science colloquium at the university bremen, Bremen, Germany, Oct. 31, 2008. Author copy: https://logicalhacking.com/publications/talk-brucker-formal-2008/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[22]
A. D. Brucker, HOL-OCL tool demonstration,” presented at the OCL workshop at the UML/MoDELS conferences 2008, Toulouse, France, Sep. 30, 2008. Author copy: https://logicalhacking.com/publications/talk-brucker-hol-ocl-2008/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[21]
A. D. Brucker and B. Wolff, “Tutorial: Analyzing UML/OCL models with HOL-OCL,” presented at the MoDELS 2008, Toulouse, France, Sep. 28, 2008. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-analyzing-2008/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[20]
A. D. Brucker, “Model-driven security – an introduction to SecureUML,” presented at the SAP research “security and trust summit,” Sophia-Antipolis, France, Apr. 18, 2008. Author copy: https://logicalhacking.com/publications/talk-brucker-model-driven-2008-b/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[19]
A. D. Brucker, “Model-driven security with support for formal analysis methods,” presented at the Karlsruher fachkreis IT sicherheit, Jan. 29, 2008. Author copy: https://logicalhacking.com/publications/talk-brucker-model-driven-2008/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[18]
A. D. Brucker and B. Wolff, HOL-OCL – a formal proof environment for UML/OCL,” Budapest, Hungary, Mar. 31, 2008. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-hol-ocl-2008/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2007

[17]
A. D. Brucker and B. Wolff, “Tutorial: Theorem-prover based testing with HOL-TestGen,” presented at the Testcom/fates 2007, Tallinn, Estonia, Jun. 26, 2007. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-theorem-prover-2007/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[16]
A. D. Brucker, “An interactive proof environment for object-oriented specifications,” presented at the Ph.d. defense, ETH Zurich, Zurich, Switzerland, Mar. 09, 2007. Author copy: https://logicalhacking.com/publications/talk-brucker-interactive-2007/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[15]
A. D. Brucker, “An application of Isabelle/HOL: HOL-OCL.” ETH Zurich, Switzerland, Jan. 31, 2007. Author copy: https://logicalhacking.com/publications/talk-brucker-application-2007/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[14]
A. D. Brucker, “Verification of UML/OCL specifications with HOL-OCL.” Innsbruck, Austria, Jan. 08, 2007. Author copy: https://logicalhacking.com/publications/talk-brucker-verification-2007/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2006

[13]
A. D. Brucker, J. Doser, and B. Wolff, “A model transformation semantics and analysis methodology for SecureUML.” Genova, Italy, Oct. 04, 2006. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-transformation-2006/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[12]
A. D. Brucker, J. Doser, and B. Wolff, “Semantic issues of OCL: Past, present, and future.” Genova, Italy, Oct. 02, 2006. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-semantic-2006-b/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2004

[11]
A. D. Brucker, “The KeY-tool.” ETH Zurich, Switzerland, Jan. 21, 2004. Author copy: https://logicalhacking.com/publications/talk-brucker-key-tool-2004/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[10]
A. D. Brucker, “Applied web and network security.” ETH Zurich, Switzerland, Mar. 23, 2004. Author copy: https://logicalhacking.com/publications/talk-brucker-applied-2004/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[9]
A. D. Brucker, “A shallow embedding of OCL into Isabelle/HOL and its application to formal testing.” ETH Zurich, Switzerland, Mar. 09, 2004. Author copy: https://logicalhacking.com/publications/talk-brucker-shallow-2004/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2003

[8]
A. D. Brucker and B. Wolff, “A case study of a formalized security architecture.” Røros, Norway, Jun. 05, 2003. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-case-2003/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[7]
A. D. Brucker and B. Wolff, HOL-OCL: Embedding OCL into Isabelle/HOL.” Karlsruhe, Germany, Jan. 17, 2003. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-hol-ocl-2003/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2002

[6]
A. D. Brucker and B. Wolff, HOL-OCL: Experiences, consequences and design choices.” Dresden, Germany, Oct. 03, 2002. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-hol-ocl-2002/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[5]
A. D. Brucker, OCL: Bridging the gap between semi-formal and formal specification.” Freiburg, Germany, Sep. 30, 2002. Author copy: https://logicalhacking.com/publications/talk-brucker-ocl-2002/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[4]
A. D. Brucker, “CASE tool-based system development using UML/OCL.” Freiburg, Germany, Apr. 12, 2002. Author copy: https://logicalhacking.com/publications/talk-brucker-case-2002/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]

2001

[3]
A. D. Brucker and B. Wolff, “Testing distributed component based systems using UML/OCL.” Wien, Austria, Sep. 26, 2001. Author copy: https://logicalhacking.com/publications/talk-brucker.ea-testing-2001/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[2]
A. D. Brucker, “Semi-formale methoden bei der entwicklung verteilter systeme,” presented at the IKOM-2, Freiburg, Germany, May 07, 2001. Author copy: https://logicalhacking.com/publications/talk-brucker-semi-formale-2001/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]
[1]
A. D. Brucker, “Security-enhanced linux: Implementation of a formal security architecture,” presented at the Research seminar of the research group “software engineering,” Univeristy of Freiburg, Freiburg, Germany, Jun. 22, 2001. Author copy: https://logicalhacking.com/publications/talk-brucker-security-enhanced-2001/
[Abstract | PDF | BibTeX | RIS | EndNote | Word]