Miscellaneous
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R.,
“Security in E-Voting”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
Conference Paper
H. Blasum, Havle, O., Langenstein, B., Nemouchi, Y., Schmaltz, J., Stephan, W., Tverdyshew, S., Verbeek, F., and Wolf, B.,
“Using Isabelle/HOL to Develop and Maintain Separation Invariants for an Operating System”, in
Isabelle 2014 workshop at FloC 2014, 2014.
M. Keil and Thiemann, P.,
“Type-based Dependency Analysis for JavaScript”, in
Proceedings of the 8th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2013), 2013.
C. Atkinson, Gerbig, R., and Tunjic, C.,
“Towards Multi-level Aware Model Transformations”, in
5th International Conference on Theory and Practice of Model Transformations (ICMT 2012), 2012.
V. Cortier, Galindo, D., Küsters, R., Müller, J., and Truderung, T.,
“SoK: Verifiability Notions for E-Voting Protocols”, in
Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016.
R. Küsters, Müller, J., Scapin, E., and Truderung, T.,
“sElect: A Lightweight Verifiable Remote Voting System”, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
S. Pfeiffer, Unger, S., Timmermann, D., and Lehmann, A.,
“Secure Information Flow Awareness for Smart Wireless eHealth Systems”, in
Proceedings of 9th International Multi-Conference on Systems, Signals and Devices (SSD 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A.,
“Proving Coercion-Resistance of Scantegrity II”, in
Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010), 2010.
B. Finkbeiner, Hahn, C., Stenger, M., and Tentrup, L.,
“Monitoring Hyperproperties”, in
Proceedings of the 17th International Conference on Runtime Verification (RV), 2017.
M. Taghdiri, Snelting, G., and Sinz, C.,
“Information Flow Analysis via Path Condition Refinement”, in
Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (FAST 2010), 2010.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M.,
“A Hybrid Approach for Proving Noninterference of Java Programs”, in
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C.,
“A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs”, in
Grande Region Security and Reliability Day 2013, 2013.
L. Fennell and Thiemann, P.,
“Gradual Typing for Annotated Type Systems”, in
Proceedings of the 23rd European Symposium on Programming (ESOP 2014), 2014.
L. Fennell and Thiemann, P.,
“Gradual Security Typing with References”, in
Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF 2013), 2013, pp. 224-239.
R. Küsters, Truderung, T., and Graf, J.,
“A Framework for the Cryptographic Verification of Java-like Programs”, in
Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012), 2012.
M. Keil and Thiemann, P.,
“Efficient Dynamic Access Analysis Using JavaScript Proxies”, in
Proceedings of the 9th Symposium on Dynamic Languages (DLS 2013), 2013.
T. Liu, Tyszberowicz, S., Herda, M., Beckert, B., Grahl, D., and Taghdiri, M.,
“Computing Specification-Sensitive Abstractions for Program Verification”, in
Proceedings of the 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA), 2016.
T. Liu, Tyszberowicz, S., Herda, M., Beckert, B., Grahl, D., and Taghdiri, M.,
“Computing Specification-Sensitive Abstractions for Program Verification”, in
Proceedings of the 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA), 2016.
Pages