Miscellaneous
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A.,
“Software Security for Mobile Devices”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A.,
“Software Security for Mobile Devices”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A.,
“Software Security for Mobile Devices”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R.,
“Security in E-Voting”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
Journal Article
K. Katkalov, Stenzel, K., Borek, M., and Reif, W.,
“Model-Driven Development of Information Flow-Secure Systems with IFlow”,
ASE Science Journal, vol. 2, 2013.
G. Snelting, Giffhorn, D., Graf, J., Hammer, C., Hecker, M., Mohr, M., and Wasserrab, D.,
“Checking Probabilistic Noninterference Using JOANA”,
it - Information Technology, 2014.
Conference Paper
H. Blasum, Havle, O., Langenstein, B., Nemouchi, Y., Schmaltz, J., Stephan, W., Tverdyshew, S., Verbeek, F., and Wolf, B.,
“Using Isabelle/HOL to Develop and Maintain Separation Invariants for an Operating System”, in
Isabelle 2014 workshop at FloC 2014, 2014.
H. Blasum, Havle, O., Langenstein, B., Nemouchi, Y., Schmaltz, J., Stephan, W., Tverdyshew, S., Verbeek, F., and Wolf, B.,
“Using Isabelle/HOL to Develop and Maintain Separation Invariants for an Operating System”, in
Isabelle 2014 workshop at FloC 2014, 2014.
M. R. Clarkson, Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N., and Sánchez, C.,
“Temporal Logics for Hyperproperties”, in
Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
M. D. Schwarz, Seidl, H., Vojdani, V., Lammich, P., and Müller-Olm, M.,
“Static Analysis of Interrupt-Driven Programs Synchronized via the Priority Ceiling Protocol”, in
Proceedings of the 38th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 2011), 2011.
M. D. Schwarz, Seidl, H., Vojdani, V., Lammich, P., and Müller-Olm, M.,
“Static Analysis of Interrupt-Driven Programs Synchronized via the Priority Ceiling Protocol”, in
Proceedings of the 38th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 2011), 2011.
R. Gay, Mantel, H., and Sprick, B.,
“Service Automata”, in
Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2012.
R. Küsters, Müller, J., Scapin, E., and Truderung, T.,
“sElect: A Lightweight Verifiable Remote Voting System”, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
M. Kovács and Seidl, H.,
“Runtime Enforcement of Information Flow Security in Tree Manipulating Processes”, in
Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
Pages