2014
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“The KeY Platform for Verification and Analysis of Java Programs”, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
H. Mantel, Perner, M., and Sauer, J.,
“Noninterference under Weak Memory Models”, in
Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014), 2014.
M. R. Clarkson, Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N., and Sánchez, C.,
“Temporal Logics for Hyperproperties”, in
Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
2015
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M.,
“A Hybrid Approach for Proving Noninterference of Java Programs”, in
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
A. Askarov, Chong, S., and Mantel, H.,
“Hybrid Monitors for Concurrent Noninterference”, in
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P.,
“IccTA: Detecting Inter-Component Privacy Leaks in Android Apps”, in
Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R.,
“Security in E-Voting”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R.,
“Security in E-Voting”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
E. Loval, Fromm, A., Mohr, M., and Pretschner, A.,
“SHRIFT System-wide HybRid Information Flow Tracking”, in
Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A.,
“Software Security for Mobile Devices”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A.,
“Software Security for Mobile Devices”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
H. Mantel, Müller-Olm, M., Perner, M., and Wenner, A.,
“Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis”, in
Pre-Proceedings of the 25th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2015.
H. Mantel, Müller-Olm, M., Perner, M., and Wenner, A.,
“Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis”, in
Pre-Proceedings of the 25th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2015.
2016
D. Octeau, Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., and Le Traon, Y.,
“Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis”, in
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2016.
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G.,
“On Improvements Of Low-Deterministic Security”, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
R. Küsters, Müller, J., Scapin, E., and Truderung, T.,
“sElect: A Lightweight Verifiable Remote Voting System”, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
V. Cortier, Galindo, D., Küsters, R., Müller, J., and Truderung, T.,
“SoK: Verifiability Notions for E-Voting Protocols”, in
Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016.
Pages