CTL∗ and ECTL∗ as fragments of the modal μ-calculus M Dam Theoretical Computer Science 126 (1), 77-96, 1994 | 266 | 1994 |

Model checking mobile processes M Dam Information and Computation 129 (1), 35-51, 1996 | 137 | 1996 |

Constrained delegation O Bandmann, M Dam, BS Firozabadi Proceedings 2002 IEEE Symposium on Security and Privacy, 131-140, 2002 | 126 | 2002 |

Cache storage channels: Alias-driven attacks and verified countermeasures R Guanciale, H Nemati, C Baumann, M Dam 2016 IEEE Symposium on Security and Privacy (SP), 38-55, 2016 | 116 | 2016 |

Formal verification of information flow security for a simple ARM-based separation kernel M Dam, R Guanciale, N Khakpour, H Nemati, O Schwarz Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 114 | 2013 |

A generic protocol for network state aggregation M Dam, R Stadler Proc. Radiovetenskap och Kommunikation (RVK), 14-16, 2005 | 113 | 2005 |

On the Structure of Inductive Reasoning: Circular and Tree-Shaped Proofs in the μCalculus C Sprenger, M Dam International Conference on Foundations of Software Science and Computation …, 2003 | 113 | 2003 |

Robust monitoring of network-wide aggregates through gossiping F Wuhib, M Dam, R Stadler, A Clem IEEE Transactions on Network and Service Management 6 (2), 95-109, 2009 | 94 | 2009 |

Model checking mobile processes M Dam International Conference on Concurrency Theory, 22-36, 1993 | 81 | 1993 |

Inspectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis R Guanciale, M Balliu, M Dam Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 78 | 2020 |

Epistemic temporal logic for information flow security M Balliu, M Dam, G Le Guernic Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and …, 2011 | 72 | 2011 |

Abstraction in model checking multi-agent systems. M Cohen, M Dam, A Lomuscio, F Russo AAMAS (2), 945-952, 2009 | 65 | 2009 |

On the decidability of process equivalences for the π-calculus M Dam Theoretical Computer Science 183 (2), 215-228, 1997 | 64 | 1997 |

A verification tool for Erlang LÅ Fredlund, D Gurov, T Noll, M Dam, T Arts, G Chugunov International Journal on Software Tools for Technology Transfer 4, 405-420, 2003 | 57* | 2003 |

Toward parametric verification of open distributed systems M Dam, L Fredlund, D Gurov International Symposium on Compositionality, 150-185, 1997 | 56 | 1997 |

Automating information flow analysis of low level code M Balliu, M Dam, R Guanciale Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 55 | 2014 |

Proof systems for π-calculus logics M Dam Logic for concurrency and synchronisation, 145-212, 2003 | 53 | 2003 |

Confidentiality for mobile code: The case of a simple payment protocol M Dam, P Giambiagi Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 233-244, 2000 | 53 | 2000 |

Provably correct runtime monitoring I Aktug, M Dam, D Gurov International Symposium on Formal Methods, 262-277, 2008 | 52 | 2008 |

Relevance logic and concurrent composition M Dam LICS 88, 178-185, 1988 | 50 | 1988 |