Publications

These documents have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.


2014

  • H. Seidl and M. Kovács. Interprocedural Information Flow Analysis of XML Processors. In Language and Automata Theory and Applications - 8th International Conference (LATA). LNCS 8370, pages 34-61. Springer, 2014.
    [TU München]

2013

  • B. Beckert and D. Bruns. Dynamic Logic with Trace Semantics. In 24th International Conference on Automated Deduction (CADE-24). LNCS 7898, pages 315-329. Springer-Verlag, 2013.
    [KIT]

  • J. C. Blanchette, S. Böhme, A. Popescu and N. Smallbone. Encoding Monomorphic and Polymorphic Types. In 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), pages 493-507, 2013.
    [TU München]

  • J. C. Blanchette and A. Popescu. Mechanizing the Metatheory of Sledgehammer. In Frontiers of Combining Systems (FroCos), pages 245-260, 2013.
    [TU München]

  • J. Graf, M. Hecker, M. Mohr and B. Nordhoff. Lock-sensitive Interference Analysis for Java: Combining Program Dependence Graphs with Dynamic Pushdown Networks. In 1st International Workshop on Interference and Dependence, 2013.
    [KIT, University of Münster]

  • J. Graf, M. Hecker and M. Mohr. Using JOANA for Information Flow Control in Java Programs - A Practical Guide. In Proceedings of the 6th Working Conference on Programming Languages (ATPS'13), 2013.
    [KIT]

  • M. Kovács, H. Seidl and B. Finkbeiner. Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties. In ACM Conference on Computer and Communications Security, 2013.
    [TU München, Saarland University]

  • R. Küsters, T. Truderung, B. Beckert, D. Bruns, J. Graf and C. Scheben. A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs. In Grande Region Security and Reliability Day 2013, 2013.
    Extended Abstract
    [University of Trier, KIT]

  • B. Nordhoff, M. Müller-Olm and P. Lammich. Iterable Forward Reachability Analysis of Monitor-DPNs. In Proceedings Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday (Festschrift for Dave Schmidt). Electronic Proceedings in Theoretical Computer Science, 2013.
    To appear
    [University of Münster, TU München]

  • A. Popescu, J. Hölzl and T. Nipkow. Noninterfering Schedulers - When Possibilistic Noninterference Implies Probabilistic Noninterference. In 5th Conference on Algebra and Coalgebra in Computer Science (CALCO), pages 236-252, 2013.
    [TU München]

2012

  • R. Accorsi and A. Lehmann. Automatic Information Flow Analysis of Business Process Models. In 10th International Conference on Business Process Management (BPM), 2012.
    [University of Freiburg, University of Rostock]

  • C. Atkinson, R. Gerbig and B. Kennel. Symbiotic general-purpose and domain-specific languages. In Proceedings of the 2012 International Conference on Software Engineering (ICSE), pages 1269-1272, 2012.
    [University of Mannheim]

  • C. Atkinson, R. Gerbig and B. Kennel. On-the-Fly Emendation of Multi-level Models. In Modelling Foundations and Applications, 8th European Conference (ECMFA), pages 194-209, 2012.
    [University of Mannheim]

  • C. Atkinson, R. Gerbig and C. Tunjic. Towards Multi-level Aware Model Transformations. In Theory and Practice of Model Transformations, Fith International Conference (ICMT), pages 208-223, 2012.
    [University of Mannheim]

  • B. Beckert and D. Bruns. Formal Semantics of Model Fields in Annotation-based Specifications. In KI 2012: Advances in Artificial Intelligence. LNCS 7526, pages 13-24. Springer, 2012.
    [KIT]

  • B. Beckert, D. Bruns and S. Grebing. Mind the Gap: Formal Verification and the Common Criteria. In 6th~International Verification Workshop, VERIFY-2010. EPiC Series, 3, pages 4-12. EasyChair, 2012.
    [KIT]

  • J. C. Blanchette, A. Popescu, D. Wand and C. Weidenbach. More SPASS with Isabelle - Superposition with Hard Sorts and Configurable Simplification. In Interactive Theorem Proving (ITP), pages 345-360, 2012.
    [TU München, MPI Saarbrücken]

  • J. Cúellar, M. Ochoa and R. Rios. Indistinguishable regions in Geographic Location Privacy. In Proceedings of the 27th ACM Symposium on Applied Computing (SAC). ACM, 2012.
    [TU Dortmund, Siemens AG, University of Malaga]

  • R. Dimitrova, B. Finkbeiner, M. Kovács, M. Rabe and H. Seidl. Model Checking Information Flow in Reactive Systems. In Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI), 2012.
    [Saarland University, TU München]

  • R. Ehlers and B. Finkbeiner. Monitoring Realizability. In Proceedings of the 2nd International Conference on Runtime Verification (RV 2011). LNCS, 7186, pages 427-441. Springer, 2012.
    [Saarland University]

  • F. Hadasch, B. Mueller and A. Maedche. Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: A Qualitative Study. In Proceedings of the 20th European Conference on Information Systems (ECIS), 2012.
    [University of Mannheim]

  • T. Jager, S. Schinzel and J Smorovksy. Bleichenbacher's Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption. In 17th European Symposium on Research in Computer Security (ESORICS), 2012.
    [KIT, University of Erlangen, Ruhr-University Bochum]

  • B. Köpf, L. Mauborgne and M. Ochoa. Automatic Quantification of Cache Side-Channels. In Proceedings of the 24th International Conference on Computer Aided Verification (CAV). Springer, 2012.
    [TU Dortmund, Siemens AG, IMDEA Software Institute]

  • M. Kovács and H. Seidl. Runtime Enforcement of Information Flow Security in Tree Manipulating Processes. In Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS). LNCS, 7159, pages 46-59. Springer, 2012.
    [TU München]

  • R. Küsters, T. Truderung and A. Vogt. Clash Attacks on the Verifiability of E-Voting Systems. In Proceedings of the 33rd IEEE Symposium on Security and Privacy (S\&P). IEEE Computer Society, 2012.
    [University of Trier]

  • R. Küsters, T. Truderung and J. Graf. A Framework for the Cryptographic Verification of Java-like Programs. In Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF), 2012.
    [University of Trier, KIT]

  • A. Lehmann and D. Fahland. Information Flow Security for Business Process Models - just one click away. In 10th International Conference on Business Process Management - Demo Track, 2012.
    [University of Rostock, Eindhoven University of Technology]

  • A. Lehmann and N. Lohmann. Model support for confidential service-oriented business processes. In Proceedings of the 4th Central-European Workshop on Services and their Composition (ZEUS), 2012.
    [University of Rostock]

  • A. Lehmann and N. Lohmann. Modeling wizard for confidential Business Processes. In 1st Joint International Workshop on Security in Business Processes (SBP), 2012.
    [University of Rostock]

  • A. Lehmann, N. Lohmann and K. Wolf. Stubborn Sets for Simple Linear Time Properties. In Proceedings of 33rd International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency (PETRI NETS). LNCS. Springer, 2012.
    [University of Rostock]

  • A. Lochbihler. Java and the Java Memory Model - a Unified, Machine-Checked Formalisation. In Programming Languages and Systems (PLAS). LNCS, 7211, pages 497-517. Springer, 2012.
    [KIT]

  • A. Lux, H. Mantel and M. Perner. Scheduler-Independent Declassification. In Proceedings of the 11th International Conference on Mathematics of Program Construction (MPC). Springer, 2012.
    [TU Darmstadt]

  • C. Mann and A. Starostin. A Framework for Static Detection of Privacy Leaks in Android Applications. In Proceedings of the 27th Symposium on Applied Computing (SAC). ACM, 2012.
    [TU Darmstadt]

  • M. Ochoa. Security Guarantees and Evolution: From models to reality. In Electronic Proceedings of the 1st ESSoS Doctoral Symposium (ESSoS-DS). CEUR-WS.org, 2012.
    [TU Dortmund, Siemens AG]

  • M. Ochoa, J. Jürjens and D. Warzecha. A Sound Decision Procedure for the Compositionality of Secrecy. In Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS). LNCS, 7159, pages 97-105. Springer, 2012.
    [TU Dortmund, Fraunhofer ISST, Siemens AG]

  • M. Ochoa, J. Jürjens and J. Cuéllar. Non-interference on UML State-charts. In Proceedings of the 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe). LNCS. Springer, 2012.
    [TU Dortmund, Siemens AG]

  • S. Pfeiffer, S. Unger, D. Timmermann and A. Lehmann. Secure Information Flow Awareness for Smart Wireless eHealth Systems. In Proceedings of 9th International Multi-Conference on Systems, Signals and Devices (SSD), 2012.
    [University of Rostock]

  • A. Popescu, J. Hölzl and T. Nipkow. Proving Concurrent Noninterference. In The Second International Conference on Certified Programs and Proofs (CPP), 2012.
    [TU München]

  • C. Scheben and P. Schmitt. Verification of Information Flow Properties of Java Programs without Approximations. In Formal Verification of Object-Oriented Software. LNCS 7421 Springer, 2012.
    [KIT]

  • I. Schmitt and S. Schinzel. WAFFle: Fingerprinting Filter Rules of Web Application Firewalls. In 6th USENIX Workshop on Offensive Technologies (WOOT), 2012.
    [University of Erlangen]

2011

  • R. Accorsi. Anwenden struktureller Nicht-Interferenz zur Sicherheitsanalyse von Workflow-Modellen. In INFORMATIK 2011 - Dependable Software for Critical Infrastructures - Proceedings of DSCI, in Berlin, Germany. LNI. GI, 2011.
    [University of Freiburg]

  • R. Accorsi and C. Wonnemann. Strong non-leak guarantees for workflow models. In Proceedings of the 26th ACM Symposium on Applied Computing (SAC), pages 308-314. ACM, 2011.
    [University of Freiburg]

  • F. Freiling and S. Schinzel. Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. In Proceedings of the 26th IFIP TC-11 International Information Security Conference (IFIP/SEC), 2011.
    [University of Mannheim]

  • R. Gay, H. Mantel and B. Sprick. Service Automata. In Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST), 2011.
    [TU Darmstadt]

  • F. Hadasch, B. Mueller and A. Maedche. Leaking Confidential Information by Non-Malicious User Behaviour in Enterprise Systems - Design of an Empirical Study. In Proceedings of the 6th Mediterranean Conference on Information Systems (MCIS), 2011.
    [University of Mannheim]

  • P. Kumari, A. Pretschner, J. Peschla and J.-M. Kuhn. Distributed data usage control for web applications: a social network implementation. In Proceedings of the first ACM conference on Data and application security and privacy. CODASPY '11, pages 85-96. ACM, 2011.
    [KIT, TU Kaiserslautern]

  • R. Küsters, T. Truderung and A. Vogt. Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study. In Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P), pages 538-553. IEEE Computer Society, 2011.
    [University of Trier]

  • R. Küsters, T. Truderung and A. Vogt. A Game-Based Definition of Coercion-Resistance and its Applications. In Journal of Computer Security (special issue of selected CSF 2011 papers), 2011.
    [University of Trier]

  • H. Mantel, D. Sands and H. Sudbrock. Assumptions and Guarantees for Compositional Noninterference. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF). IEEE Computer Society, 2011.
    [TU Darmstadt, Chalmers University of Technology]

  • S. Schinzel. An Efficient Mitigation Method for Timing Side Channels on the Web. In Proceedings of the second International Workshop on Constructive Side-Channel Analysis and Secure Design, 2011.
    [University of Mannheim]

2010

  • C. Hammer. Experiences with PDG-based IFC. In International Symposium on Engineering Secure Software and Systems (ESSoS). LNCS, 5965, pages 44-60. Springer-Verlag, 2010.
    [KIT]

  • R. Küsters, T. Truderung and A. Vogt. Proving Coercion-Resistance of Scantegrity II. In Proceedings of the 12th International Conference on Information and Communications Security (ICICS). LNCS, 6476, pages 281-295. Springer, 2010.
    [University of Trier]

  • M. Taghdiri, G. Snelting and C. Sinz. Information Flow Analysis via Path Condition Refinement. In International Workshop on Formal Aspects of Security and Trust (FAST), 2010.
    [KIT]

  • D. Wasserrab and D. Lohner. Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing. In 6th International Verification Workshop (VERIFY), 2010.
    [KIT]

54 hits found
BibTeX file of all entries

Notification of publications:

Please submit Your RS3-publications by sending an bibtex-entry to assistant at spp-rs3.de. Remember to name Your project as well as the whole priority programme RS3 in Your publication. The publications will be listed on this page.