default search action
Erik Poll
Person information
- affiliation: Radboud University Nijmegen
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Cristian Daniele, Seyed Behnam Andarzian, Erik Poll:
Fuzzers for Stateful Systems: Survey and Research Directions. ACM Comput. Surv. 56(9): 222:1-222:23 (2024) - [i10]Cristian Daniele, Seyed Behnam Andarzian, Erik Poll:
Uses of Active and Passive Learning in Stateful Fuzzing. CoRR abs/2406.08077 (2024) - 2023
- [c66]Seyed Behnam Andarzian, Cristian Daniele, Erik Poll:
Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations. FPS (1) 2023: 253-268 - [c65]Marcello Maugeri, Cristian Daniele, Giampaolo Bella, Erik Poll:
Evaluating the Fork-Awareness of Coverage-Guided Fuzzers. ICISSP 2023: 424-429 - [i9]Cristian Daniele, Seyed Behnam Andarzian, Erik Poll:
Fuzzers for stateful systems: Survey and Research Directions. CoRR abs/2301.02490 (2023) - [i8]Marcello Maugeri, Cristian Daniele, Giampaolo Bella, Erik Poll:
Evaluating the Fork-Awareness of Coverage-Guided Fuzzers. CoRR abs/2301.05060 (2023) - 2022
- [i7]Pol Van Aubel, Erik Poll:
Security of EV-Charging Protocols. CoRR abs/2202.04631 (2022) - 2021
- [j11]Tommy Koens, Pol Van Aubel, Erik Poll:
Blockchain adoption drivers: The rationality of irrational choices. Concurr. Comput. Pract. Exp. 33(8) (2021) - [j10]Alexandru Constantin Serban, Erik Poll, Joost Visser:
Adversarial Examples on Object Recognition: A Comprehensive Survey. ACM Comput. Surv. 53(3): 66:1-66:38 (2021) - [c64]Pol Van Aubel, Erik Poll:
Compromised Through Compression - Privacy Implications of Smart Meter Traffic Analysis. SecureComm (2) 2021: 317-337 - [i6]Alex Serban, Erik Poll, Joost Visser:
Deep Repulsive Prototypes for Adversarial Robustness. CoRR abs/2105.12427 (2021) - 2020
- [c63]Maarten Vergouwen, Tommy Koens, Erik Poll:
Drivers and Impediments: Experts Opinions on Blockchain Adoption in the Netherlands. BCCA 2020: 86-91 - [c62]Alex Serban, Erik Poll, Joost Visser:
Towards Using Probabilistic Models to Design Software Systems with Inherent Uncertainty. ECSA 2020: 89-97 - [c61]Tommy Koens, Erik Poll:
Blockchain Utility in Use Cases: Observations, Red Flags, and Requirements. Euro-Par Workshops 2020: 5-17 - [c60]Alex Serban, Erik Poll, Joost Visser:
Learning to Learn from Mistakes: Robust Optimization for Adversarial Noise. ICANN (1) 2020: 467-478 - [i5]Alex Serban, Erik Poll, Joost Visser:
Towards Using Probabilistic Models to Design Software Systems with Inherent Uncertainty. CoRR abs/2008.03046 (2020) - [i4]Alex Serban, Erik Poll, Joost Visser:
Adversarial Examples on Object Recognition: A Comprehensive Survey. CoRR abs/2008.04094 (2020) - [i3]Alex Serban, Erik Poll, Joost Visser:
Learning to Learn from Mistakes: Robust Optimization for Adversarial Noise. CoRR abs/2008.05247 (2020)
2010 – 2019
- 2019
- [j9]Tommy Koens, Erik Poll:
Assessing interoperability solutions for distributed ledgers. Pervasive Mob. Comput. 59 (2019) - [c59]Pol Van Aubel, Erik Poll, Joost Rijneveld:
Non-Repudiation and End-to-End Security for Electric-Vehicle Charging. ISGT Europe 2019: 1-5 - 2018
- [j8]Erik Poll:
Strings Considered Harmful. login Usenix Mag. 43(4) (2018) - [c58]Tommy Koens, Erik Poll:
What Blockchain Alternative Do You Need? DPM/CBT@ESORICS 2018: 113-129 - [c57]Tommy Koens, Erik Poll:
The Drivers Behind Blockchain Adoption: The Rationality of Irrational Choices. Euro-Par Workshops 2018: 535-546 - [c56]Lesly-Ann Daniel, Erik Poll, Joeri de Ruiter:
Inferring OpenVPN State Machines Using Protocol State Fuzzing. EuroS&P Workshops 2018: 11-19 - [c55]Alexandru Constantin Serban, Erik Poll, Joost Visser:
A Standard Driven Software Architecture for Fully Autonomous Vehicles. ICSA Companion 2018: 120-127 - [c54]Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren:
Is Java Card Ready for Hash-Based Signatures? IWSEC 2018: 127-142 - [c53]Alexandru Constantin Serban, Erik Poll, Joost Visser:
A Security Analysis of the ETSI ITS Vehicular Communications. SAFECOMP Workshops 2018: 365-373 - [c52]Erik Poll:
LangSec Revisited: Input Security Flaws of the Second Kind. IEEE Symposium on Security and Privacy Workshops 2018: 329-334 - [c51]Alexandru Constantin Serban, Erik Poll, Joost Visser:
Tactical Safety Reasoning. A Case for Autonomous Vehicles. VTC Spring 2018: 1-5 - [i2]Alexandru Constantin Serban, Erik Poll:
Adversarial Examples - A Complete Characterisation of the Phenomenon. CoRR abs/1810.01185 (2018) - [i1]Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren:
Is Java Card ready for hash-based signatures? IACR Cryptol. ePrint Arch. 2018: 611 (2018) - 2017
- [c50]Paul Fiterau-Brostean, Toon Lenaerts, Erik Poll, Joeri de Ruiter, Frits W. Vaandrager, Patrick Verleg:
Model learning and model checking of SSH implementations. SPIN 2017: 142-151 - 2016
- [c49]Sergei Volokitin, Erik Poll:
Logical Attacks on Secured Containers of the Java Card Platform. CARDIS 2016: 122-136 - 2015
- [j7]Wei Koong Chai, Ning Wang, Konstantinos V. Katsaros, George Kamel, George Pavlou, Stijn Melis, Michael Hoefling, Bárbara Vieira, Paolo Romano, Styliani Sarri, Teklemariam Tsegay Tesfay, Binxu Yang, Florian Heimgaertner, Marco Pignati, Mario Paolone, Michael Menth, Erik Poll, Marcel Mampaey, Herman H. I. Bontius, Chris Develder:
An Information-Centric Communication Infrastructure for Real-Time State Estimation of Active Distribution Networks. IEEE Trans. Smart Grid 6(4): 2134-2146 (2015) - [c48]Florian Heimgaertner, Michael Hoefling, Bárbara Vieira, Erik Poll, Michael Menth:
A security architecture for the publish/subscribe C-DAX middleware. ICC Workshops 2015: 2616-2621 - [c47]Fabian van den Broek, Erik Poll, Bárbara Vieira:
Securing the Information Infrastructure for EV Charging. WISATS 2015: 61-74 - [c46]René Habraken, Peter Dolron, Erik Poll, Joeri de Ruiter:
An RFID Skimming Gate Using Higher Harmonics. RFIDSec 2015: 122-137 - [c45]Erik Poll, Joeri de Ruiter, Aleksy Schubert:
Protocol State Machines and Session Languages: Specification, implementation, and Security Flaws. IEEE Symposium on Security and Privacy Workshops 2015: 125-133 - [c44]Joeri de Ruiter, Erik Poll:
Protocol State Fuzzing of TLS Implementations. USENIX Security Symposium 2015: 193-206 - 2014
- [c43]Tim Cooijmans, Joeri de Ruiter, Erik Poll:
Analysis of Secure Key Storage Solutions on Android. SPSM@CCS 2014: 11-20 - [c42]Georg Chalupar, Stefan Peherstorfer, Erik Poll, Joeri de Ruiter:
Automated Reverse Engineering using Lego®. WOOT 2014 - 2013
- [c41]Fabian van den Broek, Erik Poll:
A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers. AFRICACRYPT 2013: 406-423 - [c40]Bárbara Vieira, Erik Poll:
A security protocol for information-centric networking in smart grids. SEGS@CCS 2013: 1-10 - [c39]Fides Aarts, Joeri de Ruiter, Erik Poll:
Formal Models of Bank Cards for Free. ICST Workshops 2013: 461-468 - [c38]Erik Poll, Joeri de Ruiter:
The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions. IDMAN 2013: 107-120 - [c37]Roland van Rijswijk-Deij, Erik Poll:
Using Trusted Execution Environments in Two-factor Authentication: comparing approaches. Open Identity Summit 2013: 20-31 - 2012
- [c36]Arjan Blom, Gerhard de Koning Gans, Erik Poll, Joeri de Ruiter, Roel Verdult:
Designed to Fail: A USB-Connected Reader for Online Banking. NordSec 2012: 1-16 - 2011
- [c35]Joeri de Ruiter, Erik Poll:
Formal Analysis of the EMV Protocol Suite. TOSCA 2011: 113-129 - 2010
- [c34]Wojciech Mostowski, Erik Poll:
Midlet Navigation Graphs in JML. SBMF 2010: 17-32
2000 – 2009
- 2009
- [c33]Christian Haack, Erik Poll:
Type-Based Object Immutability with Flexible Initialization. ECOOP 2009: 520-545 - [c32]Wojciech Mostowski, Erik Poll, Julien Schmaltz, Jan Tretmans, Ronny Wichers Schreur:
Model-Based Testing of Electronic Passports. FMICS 2009: 207-209 - [c31]Erik Poll:
Teaching Program Specification and Verification Using JML and ESC/Java2. TFM 2009: 92-104 - 2008
- [c30]Wojciech Mostowski, Erik Poll:
Malicious Code on Java Card Smartcards: Attacks and Countermeasures. CARDIS 2008: 1-16 - 2007
- [c29]Gary T. Leavens, Joseph R. Kiniry, Erik Poll:
A JML Tutorial: Modular Specification and Verification of Functional Behavior for Java. CAV 2007: 37 - [c28]Christian Haack, Erik Poll, Jan Schäfer, Aleksy Schubert:
Immutable Objects for a Java-Like Language. ESOP 2007: 347-362 - [c27]Marko C. J. D. van Eekelen, Olha Shkaravska, Ron van Kesteren, Bart Jacobs, Erik Poll, Sjaak Smetsers:
AHA: Amortized Heap Space Usage Analysis. Trends in Functional Programming 2007: 36-53 - 2006
- [c26]Gilles Barthe, Lennart Beringer, Pierre Crégut, Benjamin Grégoire, Martin Hofmann, Peter Müller, Erik Poll, Germán Puebla, Ian Stark, Eric Vétillard:
MOBIUS: Mobility, Ubiquity, Security. TGC 2006: 10-29 - 2005
- [j6]Lilian Burdy, Yoonsik Cheon, David R. Cok, Michael D. Ernst, Joseph R. Kiniry, Gary T. Leavens, K. Rustan M. Leino, Erik Poll:
An overview of JML tools and applications. Int. J. Softw. Tools Technol. Transf. 7(3): 212-232 (2005) - [c25]Patrice Chalin, Joseph R. Kiniry, Gary T. Leavens, Erik Poll:
Beyond Assertions: Advanced Specification and Verification with JML and ESC/Java2. FMCO 2005: 342-363 - 2004
- [c24]Alessandro Coglio, Marieke Huisman, Joseph Kiniry, Peter Müller, Erik Poll:
Formal Techniques for Java-Like Programs (FTfJP). ECOOP Workshops 2004: 76-83 - [c23]Engelbert Hubbers, Erik Poll:
Reasoning about Card Tears and Transactions in Java Card. FASE 2004: 114-128 - 2003
- [j5]Bart Jacobs, Erik Poll:
Coalgebras and monads in the semantics of Java. Theor. Comput. Sci. 291(3): 329-349 (2003) - [c22]Susan Eisenbach, Gary T. Leavens, Peter Müller, Arnd Poetzsch-Heffter, Erik Poll:
Formal Techniques for Java-Like Programs. ECOOP Workshops 2003: 62-71 - [c21]Bart Jacobs, Erik Poll:
Java Program Verification at Nijmegen: Developments and Perspective. ISSS 2003: 134-153 - [c20]Engelbert Hubbers, Martijn Oostdijk, Erik Poll:
From Finite State Machines to Provably Correct Java Card Applets. SEC 2003: 465-470 - [c19]Engelbert Hubbers, Martijn Oostdijk, Erik Poll:
Implementing a Formally Verifiable Security Protocol in Java Card. SPC 2003: 213-226 - [c18]Lilian Burdy, Yoonsik Cheon, David R. Cok, Michael D. Ernst, Joseph Kiniry, Gary T. Leavens, K. Rustan M. Leino, Erik Poll:
An overview of JML tools and applications. FMICS 2003: 75-91 - 2002
- [c17]Erik Poll, Pieter H. Hartel, Eduard de Jong:
A Java Reference Model of Transacted Memory for Smart Cards. CARDIS 2002: 75-86 - [c16]Sophia Drossopoulou, Susan Eisenbach, Gary T. Leavens, Arnd Poetzsch-Heffter, Erik Poll:
Formal Techniques for Java-like Programs. ECOOP Workshops 2002: 203-210 - 2001
- [j4]Erik Poll, Joachim van den Berg, Bart Jacobs:
Formal specification of the JavaCard API in JML: the APDU class. Comput. Networks 36(4): 407-421 (2001) - [j3]Erik Poll:
A Coalgebraic Semantics of Subtyping. RAIRO Theor. Informatics Appl. 35(1): 61-81 (2001) - [c15]Gary T. Leavens, Sophia Drossopoulou, Susan Eisenbach, Arnd Poetzsch-Heffter, Erik Poll:
Formal Techniques for Java Programs. ECOOP Workshops 2001: 30-40 - [c14]Hans Meijer, Erik Poll:
Towards a Full Formal Specification of the JavaCard API. E-smart 2001: 165-178 - [c13]Bart Jacobs, Erik Poll:
A Logic for the Java Modeling Language JML. FASE 2001: 284-299 - [c12]Erik Poll, Jan Zwanenburg:
From Algebras and Coalgebras to Dialgebras. CMCS 2001: 289-307 - 2000
- [c11]Bart Jacobs, Erik Poll:
A Monad for Basic Java Semantics. AMAST 2000: 150-164 - [c10]Erik Poll, Joachim van den Berg, Bart Jacobs:
Specification of the JavaCard API in JML. CARDIS 2000: 135-154 - [c9]Erik Poll, Simon J. Thompson:
Integrating Computer Algebra and Reasoning through the Type System of Aldor. FroCoS 2000: 136-150 - [c8]Joachim van den Berg, Bart Jacobs, Erik Poll:
Formal Specification and Verification of JavaCard's Application Identifier Class. Java Card Workshop 2000: 137-150 - [c7]Gary T. Leavens, Clyde Ruby, K. Rustan M. Leino, Erik Poll, Bart Jacobs:
JML (poster session): notations and tools supporting detailed design in Java. OOPSLA Addendum 2000: 105-106 - [c6]Erik Poll:
A Coalgebraic Semantics of Subtyping. CMCS 2000: 276-293
1990 – 1999
- 1999
- [c5]Herman Geuvers, Erik Poll, Jan Zwanenburg:
Safe Proof Checking in Type Theory with Y. CSL 1999: 439-452 - [c4]Erik Poll, Jan Zwanenburg:
A Logic for Abstract Data Types as Existential Types. TLCA 1999: 310-324 - [c3]Joachim van den Berg, Marieke Huisman, Bart Jacobs, Erik Poll:
A Type-Theoretic Memory Model for Verification of Sequential Java Programs. WADT 1999: 1-21 - 1998
- [j2]Erik Poll:
Expansion Postponement for Normalising Pure Type Systems. J. Funct. Program. 8(1): 89-96 (1998) - 1997
- [c2]Erik Poll:
System F with Width-Subtyping and Record Updating. TACS 1997: 439-457 - 1994
- [c1]Paula Severi, Erik Poll:
Pure Type Systems with Definitions. LFCS 1994: 316-328 - 1993
- [j1]Erik Poll, C. Hemerik, Huub M. M. ten Eikelder:
CPO-Models for Second Order Lambda Calculus with Recursive Types and Subtyping. RAIRO Theor. Informatics Appl. 27(3): 221-260 (1993)
Coauthor Index
aka: Alex Serban
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint