2012
B. Köpf, Mauborgne, L., and Ochoa, M.,
“Automatic Quantification of Cache Side-Channels”, in
Proceedings of the 24th International Conference on Computer Aided Verification (CAV 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A.,
“Clash Attacks on the Verifiability of E-Voting Systems”, in
Proceedings of the 33rd IEEE Symposium on Security and Privacy (S{&}P 2012), 2012.
K. Katkalov, Fischer, P., Stenzel, K., Moebius, N., and Reif, W.,
“Evaluation of Jif and Joana as information flow analyzers in a model-driven approach”, in
Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012), 2012.
R. Küsters, Truderung, T., and Graf, J.,
“A Framework for the Cryptographic Verification of Java-like Programs”, in
Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A.,
“A Game-Based Definition of Coercion-Resistance and its Applications”,
Journal of Computer Security (special issue of selected CSF 2010 papers), vol. 20, 2012.
R. Dimitrova, Finkbeiner, B., Kovács, M., Rabe, M., and Seidl, H.,
“Model Checking Information Flow in Reactive Systems”, in
Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2012), 2012.
C. Atkinson, Gerbig, R., and Kennel, B.,
“On-the-Fly Emendation of Multi-level Models”, in
8th European Conference on Modelling Foundations and Applications (ECMFA 2012), 2012.
M. Kovács and Seidl, H.,
“Runtime Enforcement of Information Flow Security in Tree Manipulating Processes”, in
Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
C. Atkinson, Gerbig, R., and Kennel, B.,
“Symbiotic general-purpose and domain-specific languages”, in
Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), 2012.
F. Kelbert and Pretschner, A.,
“Towards a Policy Enforcement Infrastructure for Distributed Usage Control”, in
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), 2012.
2013
M. Keil and Thiemann, P.,
“Efficient Dynamic Access Analysis Using JavaScript Proxies”, in
Proceedings of the 9th Symposium on Dynamic Languages (DLS 2013), 2013.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C.,
“A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs”, in
Grande Region Security and Reliability Day 2013, 2013.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W.,
“Model-Driven Development of Information Flow-Secure Systems with IFlow”, in
Proceedings of 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013), 2013.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W.,
“Model-Driven Development of Information Flow-Secure Systems with IFlow”,
ASE Science Journal, vol. 2, 2013.
V. Klebanov, Manthey, N., and Muise, C.,
“SAT-based Analysis and Quantification of Information Flow in Programs”, in
Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013), 2013.
M. Keil and Thiemann, P.,
“Type-based Dependency Analysis for JavaScript”, in
Proceedings of the 8th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2013), 2013.
2014
S. Kanav, Lammich, P., and Popescu, A.,
“A Conference Management System with Verified Document Confidentiality”, in
Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014), 2014.
F. Kelbert and Pretschner, A.,
“Decentralized Distributed Data Usage Control”, in
Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014.
Pages