I
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P.,
“IccTA: Detecting Inter-Component Privacy Leaks in Android Apps”, in
Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G.,
“On Improvements Of Low-Deterministic Security”, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C.,
“Information Flow Control in WebKit's JavaScript Bytecode”, in
Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“Information Flow in Object-Oriented Software”, in
Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“Information Flow in Object-Oriented Software”, in
Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
K
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“The KeY Platform for Verification and Analysis of Java Programs”, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“The KeY Platform for Verification and Analysis of Java Programs”, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“The KeY Platform for Verification and Analysis of Java Programs”, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
M
J. C. Blanchette and Popescu, A.,
“Mechanizing the Metatheory of Sledgehammer”, in
Proceedings of the 9th International Symposium on Frontiers of Combining Systems (FroCos 2013), 2013.
B. Beckert, Bruns, D., and Grebing, S.,
“Mind the Gap: Formal Verification and the Common Criteria”, in
Proceedings of the 6th International Verification Workshop (VERIFY 2010), 2012.
B. Beckert, Bruns, D., and Grebing, S.,
“Mind the Gap: Formal Verification and the Common Criteria”, in
Proceedings of the 6th International Verification Workshop (VERIFY 2010), 2012.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W.,
“Model-Driven Development of Information Flow-Secure Systems with IFlow”, in
Proceedings of 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013), 2013.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W.,
“Model-Driven Development of Information Flow-Secure Systems with IFlow”,
ASE Science Journal, vol. 2, 2013.
S. Greiner, Mohr, M., and Beckert, B.,
“Modular Verification of Information-Flow Security in Component-Based Systems”, in
Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
S
T. Bauereiss and Hutter, D.,
“Security (hyper-)properties in workflow systems: From specification to verification”, in
Electronic Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2014), 2014.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R.,
“Security in E-Voting”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R.,
“Security in E-Voting”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
Pages