Publications

These documents have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.


2014

  • S. Arzt and E. Bodden. Reviser: Efficiently Updating IDE-/IFDS-Based Data-Flow Analyses in Response to Incremental Program Changes. In Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), 2014.
    To appear.
    [TU Darmstadt, EC SPRIDE]

  • S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Barte, J. Klein, Y. Le Traon, D. Octeau and P. McDaniel. FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
    [TU Darmstadt, EC SPRIDE, University of Luxembourg, Pennsylvania State University]

  • T. Bauereiss and D. Hutter. Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS. In Proceedings of the 29th International Information Security and Privacy Conference (IFIP SEC 2014), 2014.
    [DFKI]

  • T. Bauereiss and D. Hutter. Possibilistic information flow security of workflow management systems. In Proceedings of the 1st International Workshop on Graphical Models for Security at ETAPS 2014 (GraMSec 2014), 2014.
    [DFKI]

  • T. Bauereiss and D. Hutter. Security (hyper-)properties in workflow systems: From specification to verification. In Electronic Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2014), 2014.
    To appear.
    [DFKI]

  • A. Bichhawat, V. Rajani, D. Garg and C. Hammer. Information Flow Control in WebKit's JavaScript Bytecode. In Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
    [Saarland University, MPI-SWS]

  • A. Bichhawat, V. Rajani, D. Garg and C. Hammer. Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. In Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014), 2014.
    [Saarland University, MPI-SWS]

  • H. Blasum, O. Havle, B. Langenstein, Y. Nemouchi, J. Schmaltz, W. Stephan, S. Tverdyshew, F. Verbeek and B. Wolf. Using Isabelle/HOL to Develop and Maintain Separation Invariants for an Operating System. In Isabelle 2014 workshop at FloC 2014, 2014.
    [DFKI]

  • D. Bruns, W. Mostowski and M. Ulbrich. Implementation-level Verification of Algorithms with Ke\kern-.1emY. In Software Tools for Technology Transfer, 2014.
    To appear.
    [KIT]

  • M. R. Clarkson, B. Finkbeiner, M. Koleini, K. K. Micinski, M. N. Rabe and C. Sánchez. Temporal Logics for Hyperproperties. In Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
    [Saarland University, George Washington University, University of Maryland, iMdea]

  • L. Fennell and P. Thiemann. Gradual Typing for Annotated Type Systems. In Proceedings of the 23rd European Symposium on Programming (ESOP 2014), 2014.
    [University of Freiburg]

  • S. Grewe, A. Lux, H. Mantel and J. Sauer. A Formalization of Strong Security. In Archive of Formal Proofs, 2014.
    [TU Darmstadt]

  • S. Grewe, A. Lux, H. Mantel and J. Sauer. A Formalization of Declassification with WHAT-and-WHERE-Security. In Archive of Formal Proofs, 2014.
    [TU Darmstadt]

  • S. Grewe, H. Mantel and D. Schoepe. A Formalization of Assumptions and Guarantees for Compositional Noninterference. In Archive of Formal Proofs, 2014.
    [TU Darmstadt]

  • S. Kanav, P. Lammich and A. Popescu. A Conference Management System with Verified Document Confidentiality. In Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014), 2014.
    To appear.
    [TU Munich]

  • V. Klebanov. Precise Quantitative Information Flow Analysis - A Symbolic Approach. In Theoretical Computer Science, 2014.
    In press.
    [KIT]

  • R. Küsters, E. Scapin, T. Truderung and J. Graf. Extending and Applying a Framework for the Cryptographic Verification of Java Programs. In Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
    [University of Trier]

  • R. Küsters, T. Truderung and A. Vogt. Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking. In Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P 2014), 2014.
    To appear.
    [University of Trier]

  • E. Lovat. Cross-Layer Data-Centric Usage Control. In Proceedings of the International Symposium on Engineering Secure Software and Systems - Doctoral Symposium (ESSoS 2014)), 2014.
    To appear.
    [TU Munich]

  • E. Lovat and F. Kelbert. Structure Matters - A new Approach for Data flow Tracking. In Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2014), 2014.
    To appear.
    [TU Munich]

  • E. Lovat, J. Oudinet and A. Pretschner. On Quantitative Dynamic Data Flow Tracking. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014.
    [TU Munich]

  • H. Mantel, M. Perner and J. Sauer. Noninterference under Weak Memory Models. In Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014), 2014.
    To appear.
    [TU Darmstadt]

  • A. Popescu and J. Hölzl. Probabilistic Noninterference. In Archive of Formal Proofs, 2014.
    [TU Munich]

  • A. Popescu and P. Lammich. Bounded-Deducibility Security. In Archive of Formal Proofs, 2014.
    [TU Munich]

  • M. N. Rabe, P. Lammich and A. Popescu. A shallow embedding of HyperCTL. In Archive of Formal Proofs, 2014.
    [Saarland University, TU Munich]

  • S. Rasthofer, S. Arzt and E. Bodden. A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2014), 2014.
    [TU Darmstadt, EC SPRIDE]

  • S. Rasthofer, S. Arzt, E. Lovat and E. Bodden. DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android. In Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014), 2014.
    To appear.
    [TU Darmstadt, EC SPRIDE, TU Munich]

  • C. Scheben and P. H. Schmitt. Efficient Self-Composition for Weakest Precondition Calculi. In Proceedings of the 19th International Symposium on Formal Methods (FM 2014), 2014.
    [KIT]

  • H. Seidl and M. Kovács. Interprocedural Information Flow Analysis of XML Processors. In Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014), 2014.
    [TU Munich]

  • K. Stenzel, K. Katkalov, M. Borek and W. Reif. Formalizing information flow control in a model-driven approach. In Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014), 2014.
    [University of Augsburg]

  • T. Wüchner, M. Ochoa and A. Pretschner. Malware Detection with Quantitative Data Flow Graphs. In Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014), 2014.
    To appear.
    [TU Munich]

2013

  • B. Beckert and D. Bruns. Dynamic Logic with Trace Semantics. In Proceedings of the 24th International Conference on Automated Deduction (CADE-24), 2013.
    [KIT]

  • J. C. Blanchette, S. Böhme, A. Popescu and N. Smallbone. Encoding Monomorphic and Polymorphic Types. In Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), 2013.
    [TU Munich]

  • J. C. Blanchette and A. Popescu. Mechanizing the Metatheory of Sledgehammer. In Proceedings of the 9th International Symposium on Frontiers of Combining Systems (FroCos 2013), 2013.
    [TU Munich]

  • L. Fennell and P. Thiemann. Gradual Security Typing with References. In Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF 2013), pages 224-239, 2013.
    [University of Freiburg]

  • J. Graf, M. Hecker, M. Mohr and B. Nordhoff. Lock-sensitive Interference Analysis for Java: Combining Program Dependence Graphs with Dynamic Pushdown Networks. In 1st International Workshop on Interference and Dependence (ID 2013), 2013.
    [KIT, University of Münster]

  • J. Graf, M. Hecker and M. Mohr. Using JOANA for Information Flow Control in Java Programs - A Practical Guide. In Proceedings of the 6th Working Conference on Programming Languages (ATPS 2013), 2013.
    [KIT]

  • C. Hammer. Efficient Algorithms for Control Closures. In 1st International Workshop on Interference and Dependence (ID 2013), 2013.
    [Saarland University]

  • K. Katkalov, K. Stenzel, M. Borek and W. Reif. Model-Driven Development of Information Flow-Secure Systems with IFlow. In Proceedings of 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013), 2013.
    [University of Augsburg]

  • K. Katkalov, K. Stenzel, M. Borek and W. Reif. Model-Driven Development of Information Flow-Secure Systems with IFlow. In ASE Science Journal, 2 (2), 2013.
    [University of Augsburg]

  • M. Keil and P. Thiemann. Efficient Dynamic Access Analysis Using JavaScript Proxies. In Proceedings of the 9th Symposium on Dynamic Languages (DLS 2013), 2013.
    [University of Freiburg]

  • M. Keil and P. Thiemann. Type-based Dependency Analysis for JavaScript. In Proceedings of the 8th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2013), 2013.
    [University of Freiburg]

  • V. Klebanov, N. Manthey and C. Muise. SAT-based Analysis and Quantification of Information Flow in Programs. In Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013), 2013.
    [KIT]

  • M. Kovács, H. Seidl and B. Finkbeiner. Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), 2013.
    [TU Munich, Saarland University]

  • R. Küsters, T. Truderung, B. Beckert, D. Bruns, J. Graf and C. Scheben. A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs. In Grande Region Security and Reliability Day 2013, 2013.
    Extended Abstract
    [University of Trier, KIT]

  • P. Lammich, M. Müller-Olm, H. Seidl and A. Wenner. Contextual Locking for Dynamic Pushdown Networks. In Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.
    [TU Munich, University of Münster]

  • B. Nordhoff, M. Müller-Olm and P. Lammich. Iterable Forward Reachability Analysis of Monitor-DPNs. In Proceedings of Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday (Festschrift for Dave Schmidt), 2013.
    [University of Münster, TU Munich]

  • A. Popescu, J. Hölzl and T. Nipkow. Noninterfering Schedulers - When Possibilistic Noninterference Implies Probabilistic Noninterference. In Proceedings of the 5th Conference on Algebra and Coalgebra in Computer Science (CALCO 2013), 2013.
    [TU Munich]

  • A. Popescu, J. Hölzl and T. Nipkow. Formal Verification of Language-Based Concurrent Noninterference. In J. Formalized Reasoning, 6 (1), pages 1-30, 2013.
    [TU Munich]

  • A. Popescu, J. Hölzl and T. Nipkow. Formalizing Probabilistic Noninterference. In Proceedings of the 3rd International Conference on Certified Programs and Proofs (CPP 2013), 2013.
    [TU Munich]

  • T. Wüchner, S. Müller and R. Fischer. Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control. In Proceedings of the 5th International Conference on Cloud Computing Technology and Science (CloudCom 2013), 2013.
    [TU Munich]

2012

  • R. Accorsi and A. Lehmann. Automatic Information Flow Analysis of Business Process Models. In 10th International Conference on Business Process Management (BPM 2012), 2012.
    [University of Freiburg, University of Rostock]

  • C. Atkinson, R. Gerbig and B. Kennel. Symbiotic general-purpose and domain-specific languages. In Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), 2012.
    [University of Mannheim]

  • C. Atkinson, R. Gerbig and B. Kennel. On-the-Fly Emendation of Multi-level Models. In 8th European Conference on Modelling Foundations and Applications (ECMFA 2012), 2012.
    [University of Mannheim]

  • C. Atkinson, R. Gerbig and C. Tunjic. Towards Multi-level Aware Model Transformations. In 5th International Conference on Theory and Practice of Model Transformations (ICMT 2012), 2012.
    [University of Mannheim]

  • B. Beckert and D. Bruns. Formal Semantics of Model Fields in Annotation-based Specifications. In KI 2012: Advances in Artificial Intelligence, 2012.
    [KIT]

  • B. Beckert, D. Bruns and S. Grebing. Mind the Gap: Formal Verification and the Common Criteria. In Proceedings of the 6th International Verification Workshop (VERIFY 2010), 2012.
    [KIT]

  • J. C. Blanchette, A. Popescu, D. Wand and C. Weidenbach. More SPASS with Isabelle - Superposition with Hard Sorts and Configurable Simplification. In Proceedings of the 3rd Conference on Interactive Theorem Proving (ITP 2012), 2012.
    [TU Munich, MPI Saarbrücken]

  • J. Cúellar, M. Ochoa and R. Rios. Indistinguishable regions in Geographic Location Privacy. In Proceedings of the 27th ACM Symposium on Applied Computing (SAC 2012), 2012.
    [TU Dortmund, Siemens AG, University of Malaga]

  • R. Dimitrova, B. Finkbeiner, M. Kovács, M. Rabe and H. Seidl. Model Checking Information Flow in Reactive Systems. In Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2012), 2012.
    [Saarland University, TU Munich]

  • R. Dimitrova, B. Finkbeiner and M. N. Rabe. Monitoring Temporal Information Flow. In Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012.
    [Saarland University]

  • R. Ehlers and B. Finkbeiner. Monitoring Realizability. In Proceedings of the 2nd International Conference on Runtime Verification (RV 2011), 2012.
    [Saarland University]

  • L. Fennell and P. Thiemann. The Blame Theorem for a Linear Lambda Calculus with Type Dynamic. In Proceedings of the Symposium on Trends in Functional Programming (TFP 2012), 2012.
    [University of Freiburg]

  • R. Gay, H. Mantel and B. Sprick. Service Automata. In Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2012.
    [TU Darmstadt]

  • F. Hadasch, B. Mueller and A. Maedche. Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: A Qualitative Study. In Proceedings of the 20th European Conference on Information Systems (ECIS 2012), 2012.
    [University of Mannheim]

  • T. Jager, S. Schinzel and J Smorovksy. Bleichenbacher's Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption. In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS 2012), 2012.
    [KIT, University of Erlangen, Ruhr-University Bochum]

  • K. Katkalov, P. Fischer, K. Stenzel, N. Moebius and W. Reif. Evaluation of Jif and Joana as information flow analyzers in a model-driven approach. In Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012), 2012.
    [University of Augsburg]

  • F. Kelbert and A. Pretschner. Towards a Policy Enforcement Infrastructure for Distributed Usage Control. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), 2012.
    [TU Munich]

  • B. Köpf, L. Mauborgne and M. Ochoa. Automatic Quantification of Cache Side-Channels. In Proceedings of the 24th International Conference on Computer Aided Verification (CAV 2012), 2012.
    [TU Dortmund, Siemens AG, IMDEA Software Institute]

  • M. Kovács and H. Seidl. Runtime Enforcement of Information Flow Security in Tree Manipulating Processes. In Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
    [TU Munich]

  • R. Küsters, T. Truderung and A. Vogt. A Game-Based Definition of Coercion-Resistance and its Applications. In Journal of Computer Security (special issue of selected CSF 2010 papers), 20 (6/2012), 2012.
    [University of Trier]

  • R. Küsters, T. Truderung and A. Vogt. Clash Attacks on the Verifiability of E-Voting Systems. In Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), 2012.
    [University of Trier]

  • R. Küsters, T. Truderung and J. Graf. A Framework for the Cryptographic Verification of Java-like Programs. In Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012), 2012.
    [University of Trier, KIT]

  • A. Lehmann and D. Fahland. Information Flow Security for Business Process Models - just one click away. In Proceedings of the 10th International Conference on Business Process Management - Demo Track (BPM 2012), 2012.
    [University of Rostock, Eindhoven University of Technology]

  • A. Lehmann and N. Lohmann. Model support for confidential service-oriented business processes. In Proceedings of the 4th Central-European Workshop on Services and their Composition (ZEUS 2012), 2012.
    [University of Rostock]

  • A. Lehmann and N. Lohmann. Modeling wizard for confidential Business Processes. In 1st Joint International Workshop on Security in Business Processes (SBP), 2012.
    [University of Rostock]

  • A. Lehmann, N. Lohmann and K. Wolf. Stubborn Sets for Simple Linear Time Properties. In Proceedings of 33rd International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency (PETRI NETS 2012), 2012.
    [University of Rostock]

  • A. Lochbihler. Java and the Java Memory Model - a Unified, Machine-Checked Formalisation. In Proceedings of the ACM SIGPLAN 7th Workshop on Programming Languages and Systems (PLAS 2012), 2012.
    [KIT]

  • A. Lux, H. Mantel and M. Perner. Scheduler-Independent Declassification. In Proceedings of the 11th International Conference on Mathematics of Program Construction (MPC 2012), 2012.
    [TU Darmstadt]

  • C. Mann and A. Starostin. A Framework for Static Detection of Privacy Leaks in Android Applications. In Proceedings of the 27th Symposium on Applied Computing (SAC 2012), 2012.
    [TU Darmstadt]

  • M. Ochoa. Security Guarantees and Evolution: From models to reality. In Electronic Proceedings of the 1st ESSoS Doctoral Symposium (ESSoS-DS 2012), 2012.
    [TU Dortmund, Siemens AG]

  • M. Ochoa, J. Jürjens and D. Warzecha. A Sound Decision Procedure for the Compositionality of Secrecy. In Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
    [TU Dortmund, Fraunhofer ISST, Siemens AG]

  • M. Ochoa, J. Jürjens and J. Cuéllar. Non-interference on UML State-charts. In Proceedings of the 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012), 2012.
    [TU Dortmund, Siemens AG]

  • S. Pfeiffer, S. Unger, D. Timmermann and A. Lehmann. Secure Information Flow Awareness for Smart Wireless eHealth Systems. In Proceedings of 9th International Multi-Conference on Systems, Signals and Devices (SSD 2012), 2012.
    [University of Rostock]

  • A. Popescu and J. Hölzl. Possibilistic Noninterference. In Archive of Formal Proofs, 2012.
    [TU Munich]

  • A. Popescu, J. Hölzl and T. Nipkow. Proving Concurrent Noninterference. In Proceedings of the 2nd International Conference on Certified Programs and Proofs (CPP 2012), 2012.
    [TU Munich]

  • C. Scheben and P. Schmitt. Verification of Information Flow Properties of Java Programs without Approximations. In Proceedings of the Formal Verification of Object-Oriented Software (FoVeOOS 2011), 2012.
    [KIT]

  • I. Schmitt and S. Schinzel. WAFFle: Fingerprinting Filter Rules of Web Application Firewalls. In 6th USENIX Workshop on Offensive Technologies (WOOT 2012), 2012.
    [University of Erlangen]

2011

  • R. Accorsi. Anwenden struktureller Nicht-Interferenz zur Sicherheitsanalyse von Workflow-Modellen. In Proceedings of INFORMATIK 2011 - Dependable Software for Critical Infrastructures (DSCI 2011), 2011.
    [University of Freiburg]

  • R. Accorsi and C. Wonnemann. Strong non-leak guarantees for workflow models. In Proceedings of the 26th ACM Symposium on Applied Computing (SAC 2011), 2011.
    [University of Freiburg]

  • F. Freiling and S. Schinzel. Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. In Proceedings of the 26th International Information Security Conference (IFIP/SEC 2011), 2011.
    [University of Mannheim]

  • T. M. Gawlitza, P. Lammich, M. Müller-Olm, H. Seidl and A. Wenner. Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation. In Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011), 2011.
    [TU Munich, University of Münster]

  • F. Hadasch, B. Mueller and A. Maedche. Leaking Confidential Information by Non-Malicious User Behaviour in Enterprise Systems - Design of an Empirical Study. In Proceedings of the 6th Mediterranean Conference on Information Systems (MCIS 2011), 2011.
    [University of Mannheim]

  • P. Kumari, A. Pretschner, J. Peschla and J.-M. Kuhn. Distributed Data Usage Control for Web Applications: A Social Network Implementation. In Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011), 2011.
    [KIT, TU Kaiserslautern]

  • R. Küsters, T. Truderung and A. Vogt. Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study. In Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P 2011), 2011.
    [University of Trier]

  • E. Lovat and A. Pretschner. Data-centric multi-layer usage control enforcement: a Social Network Example. In Proceedings of the 16th ACM symposium on Access control models and technologies (SACMAT 2011), 2011.
    [TU Kaiserslautern]

  • H. Mantel, D. Sands and H. Sudbrock. Assumptions and Guarantees for Compositional Noninterference. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF 2011), 2011.
    [TU Darmstadt, Chalmers University of Technology]

  • A. Pretschner, E. Lovat and M. Buechler. Representation-Independent Data Usage Control. In 6th International Workshop on Data Privacy Management (DPM 2011), 2011.
    [KIT]

  • S. Schinzel. An Efficient Mitigation Method for Timing Side Channels on the Web. In Proceedings of the 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011), 2011.
    [University of Mannheim]

  • M. D. Schwarz, H. Seidl, V. Vojdani, P. Lammich and M. Müller-Olm. Static Analysis of Interrupt-Driven Programs Synchronized via the Priority Ceiling Protocol. In Proceedings of the 38th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 2011), 2011.
    [TU Munich, University of Münster]

2010

  • C. Hammer. Experiences with PDG-based IFC. In Proceedings of the 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010), 2010.
    [KIT]

  • R. Küsters, T. Truderung and A. Vogt. Proving Coercion-Resistance of Scantegrity II. In Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010), 2010.
    [University of Trier]

  • M. Taghdiri, G. Snelting and C. Sinz. Information Flow Analysis via Path Condition Refinement. In Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (FAST 2010), 2010.
    [KIT]

  • D. Wasserrab and D. Lohner. Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing. In 6th International Verification Workshop (VERIFY 2010), 2010.
    [KIT]

104 hits found
BibTeX file of all entries

Notification of publications:

Please submit Your RS3-publications by sending an bibtex-entry to assistant at spp-rs3.de. Remember to name Your project as well as the whole priority programme RS3 in Your publication. The publications will be listed on this page.