@conference {626, title = {CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees}, booktitle = {Proceedings of the 38th IEEE Symposium on Security and Privacy (S\&P)}, year = {2017}, author = {Thomas Bauerei{\ss} and Armando Pesenti Gritti and Andrei Popescu and Franco Raimondi} } @conference {624, title = {Modular Verification of Information-Flow Security in Component-Based Systems}, booktitle = {Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM)}, year = {2017}, author = {Simon Greiner and Martin Mohr and Bernhard Beckert} } @article {630, title = {Type Systems for Information Flow Control: The Question of Granularity}, journal = {ACM SIGLOG News}, volume = {4}, year = {2017}, author = {Vineet Rajani and Iulia Bastys and Willard Rafnsson and Deepak Garg} } @conference {625, title = {WebPol: Fine-grained Information Flow Policies for Web Browsers}, booktitle = {Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS)}, year = {2017}, author = {Abhishek Bichhawat and Vineet Rajani and Jinank Jain and Deepak Garg and Christian Hammer} } @conference {616, title = {On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks}, booktitle = {Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF)}, year = {2016}, author = {Vineet Rajani and Deepak Garg and Tamara Rezk} } @conference {615, title = {Asymmetric Secure Multi-execution with Declassification}, booktitle = {Proceedings of the 5th International Conference on Principles of Security and Trust (POST)}, year = {2016}, author = {Iulia Bolosteanu and Deepak Garg} } @conference {621, title = {Computing Specification-Sensitive Abstractions for Program Verification}, booktitle = {Proceedings of the 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA)}, year = {2016}, author = {Tianhai Liu and Shmuel Tyszberowicz and Mihai Herda and Bernhard Beckert and Daniel Grahl and Mana Taghdiri} } @conference {609, title = {CoSMed: A Confidentiality-Verified Social Media Platform}, booktitle = {Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP)}, year = {2016}, author = {Thomas Bauerei{\ss} and Armando Pesenti Gritti and Andrei Popescu and Franco Raimondi} } @conference {613, title = {On Improvements Of Low-Deterministic Security}, booktitle = {Proceedings of the 5th International Conference on Principles of Security and Trust (POST)}, year = {2016}, author = {Joachim Breitner and J{\"u}rgen Graf and Martin Hecker and Martin Mohr and Gregor Snelling} } @conference {622, title = {Progress-Sensitive Security for SPARK}, booktitle = {Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS)}, year = {2016}, author = {Willard Rafnsson and Andrei Sabelfeld and Deepak Garg} } @conference {619, title = {SoK: Verifiability Notions for E-Voting Protocols}, booktitle = {Proceedings of the 37th IEEE Symposium on Security and Privacy (S\&P)}, year = {2016}, author = {V{\'e}ronique Cortier and David Galindo and Ralf K{\"u}sters and Johannes M{\"u}ller and Tomasz Truderung} } @conference {592, title = {Information Flow Control for Event Handling and the DOM in Web Browsers}, booktitle = {Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF)}, year = {2015}, author = {Vineet Rajani and Abhishek Bichhawat and Deepak Gark and Christian Hammer} } @booklet {588, title = {Security in E-Voting}, journal = {Poster at the IEEE Symposium on Security and Privacy (S\&P)}, year = {2015}, author = {Daniel Bruns and Huy Quoc Do and Simon Greiner and Mihai Herda and Martin Mohr and Enrico Scapin and Tomasz Truderung and Bernhard Beckert and Ralf K{\"u}sters and Heiko Mantel and Richard Gay} } @booklet {587, title = {Security in Web-Based Workflows}, journal = {Poster at the IEEE Symposium on Security and Privacy (S\&P)}, year = {2015}, author = {Thomas Bauereiss and Abhishek Bichhawat and Iulia Bolosteanu and Peter Faymonville and Bernd Finkbeiner and Deepak Garg and Richard Gay and Sergey Grebenshchikov and Christian Hammer and Dieter Hutter and Ond{\v r}ej Kun{\v c}ar and Peter Lammich and Heiko Mantel and Christian M{\"u}ller and Andrei Popescu and Markus Rabe and Vineet Rajani and Helmut Seidl and Markus Tasch and Leander Tentrup} } @booklet {586, title = {Software Security for Mobile Devices}, journal = {Poster at the IEEE Symposium on Security and Privacy (S\&P)}, year = {2015}, author = {Steven Arzt and Alexandre Bartel and Richard Gay and Steffen Lortz and Enrico Lovat and Heiko Mantel and Martin Mohr and Benedikt Nordhoff and Matthias Perner and Siegfried Rasthofer and David Schneider and Gregor Snelting and Artem Starostin and Alexandra Weber} } @article {582, title = {Checking Probabilistic Noninterference Using JOANA}, journal = {it - Information Technology}, year = {2014}, author = {Gregor Snelting and Dennis Giffhorn and J{\"u}rgen Graf and Christian Hammer and Martin Hecker and Martin Mohr and Daniel Wasserrab} } @conference {inp:KuestersScapinTruderungGraf2014, title = {Extending and Applying a Framework for the Cryptographic Verification of Java Programs}, booktitle = {Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014)}, year = {2014}, author = {R. K{\"u}sters and E. Scapin and T. Truderung and J. Graf}, editor = {Mart{\'\i}n Abadi and Steve Kremer} } @article {ar:GreweMantelSchoepe2014, title = {A Formalization of Assumptions and Guarantees for Compositional Noninterference}, journal = {Archive of Formal Proofs}, year = {2014}, month = {apr}, issn = {2150-914x}, author = {S. Grewe and H. Mantel and D. Schoepe} } @article {ar:GreweLuxMantelSauer2014b, title = {A Formalization of Declassification with WHAT-and-WHERE-Security}, journal = {Archive of Formal Proofs}, year = {2014}, month = {apr}, issn = {2150-914x}, author = {S. Grewe and A. Lux and H. Mantel and J. Sauer} } @article {ar:GreweLuxMantelSauer2014a, title = {A Formalization of Strong Security}, journal = {Archive of Formal Proofs}, year = {2014}, month = {apr}, issn = {2150-914x}, author = {S. Grewe and A. Lux and H. Mantel and J. Sauer} } @conference {inp:BichhawatRajaniGargHammer2014b, title = {Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis}, booktitle = {Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014)}, year = {2014}, author = {A. Bichhawat and V. Rajani and D. Garg and C. Hammer} } @conference {inp:BichhawatRajaniGargHammer2014a, title = {Information Flow Control in WebKit{\textquoteright}s JavaScript Bytecode}, booktitle = {Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014)}, year = {2014}, author = {A. Bichhawat and V. Rajani and D. Garg and C. Hammer} } @conference {599, title = {The KeY Platform for Verification and Analysis of Java Programs}, booktitle = {Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments}, year = {2014}, author = {Wolfgang Ahrendt and Bernhard Beckert and Daniel Bruns and Richard Bubel and Christoph Gladisch and Sarah Grebing and Reiner H{\"a}hnle and Martin Henschel and Mihai Herda and Vladimir Klebanov and Wojciech Mostowski and Christoph Scheben and Peter~H. Schmitt and Mattias Ulbrich} } @article {578, title = {A New Algorithm for Low-Deterministic Security}, journal = {International Journal on Information Security}, year = {2014}, note = {to appear}, author = {Dennis Giffhorn and Gregor Snelting} } @conference {inp:KuestersTruderung2013, title = {A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of {Java} Programs}, booktitle = {Grande Region Security and Reliability Day 2013}, year = {2013}, note = {Extended Abstract}, author = {R. K{\"u}sters and T. Truderung and B. Beckert and D. Bruns and J. Graf and C. Scheben} } @conference {inp:GrafHeckerMohrNordhoff2013, title = {Lock-sensitive Interference Analysis for Java: Combining Program Dependence Graphs with Dynamic Pushdown Networks}, booktitle = {1st International Workshop on Interference and Dependence (ID 2013)}, year = {2013}, author = {J. Graf and M. Hecker and M. Mohr and B. Nordhoff} } @conference {inp:GrafHeckerMohr2013, title = {Using JOANA for Information Flow Control in Java Programs - A Practical Guide}, booktitle = {Proceedings of the 6th Working Conference on Programming Languages (ATPS 2013)}, year = {2013}, author = {J. Graf and M. Hecker and M. Mohr} } @conference {inp:KuestersTruderungGraf2012a, title = {{A Framework for the Cryptographic Verification of Java-like Programs}}, booktitle = {Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012)}, year = {2012}, author = {R. K{\"u}sters and T. Truderung and J. Graf} } @conference {inp:BeckertBruns2012b, title = {Mind the Gap: Formal Verification and the {Common} {Criteria}}, booktitle = {Proceedings of the 6th International Verification Workshop (VERIFY 2010)}, year = {2012}, author = {B. Beckert and D. Bruns and S. Grebing} } @conference {inp:AtkinsonGerbigKennel2012b, title = {On-the-Fly Emendation of Multi-level Models}, booktitle = {8th European Conference on Modelling Foundations and Applications (ECMFA 2012)}, year = {2012}, author = {C. Atkinson and R. Gerbig and B. Kennel} } @conference {inp:GayMantelSprick2011a, title = {Service Automata}, booktitle = {Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011)}, year = {2012}, author = {R. Gay and H. Mantel and B. Sprick} } @conference {inp:AtkinsonGerbigKennel2012a, title = {Symbiotic general-purpose and domain-specific languages}, booktitle = {Proceedings of the 34th International Conference on Software Engineering (ICSE 2012)}, year = {2012}, author = {C. Atkinson and R. Gerbig and B. Kennel} } @conference {inp:AtkinsonGerbigTunjic2012a, title = {Towards Multi-level Aware Model Transformations}, booktitle = {5th International Conference on Theory and Practice of Model Transformations (ICMT 2012)}, year = {2012}, author = {C. Atkinson and R. Gerbig and C. Tunjic} } @conference {inp:GawlitzaLMSW2011, title = {Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation}, booktitle = {Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011)}, year = {2011}, author = {T. M. Gawlitza and P. Lammich and M. M{\"u}ller-Olm and H. Seidl and A. Wenner} }