Conference Paper
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G.,
“On Improvements Of Low-Deterministic Security”, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C.,
“Information Flow Control in WebKit's JavaScript Bytecode”, in
Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“Information Flow in Object-Oriented Software”, in
Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“Information Flow in Object-Oriented Software”, in
Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“The KeY Platform for Verification and Analysis of Java Programs”, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“The KeY Platform for Verification and Analysis of Java Programs”, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“The KeY Platform for Verification and Analysis of Java Programs”, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
J. C. Blanchette and Popescu, A.,
“Mechanizing the Metatheory of Sledgehammer”, in
Proceedings of the 9th International Symposium on Frontiers of Combining Systems (FroCos 2013), 2013.
B. Beckert, Bruns, D., and Grebing, S.,
“Mind the Gap: Formal Verification and the Common Criteria”, in
Proceedings of the 6th International Verification Workshop (VERIFY 2010), 2012.
B. Beckert, Bruns, D., and Grebing, S.,
“Mind the Gap: Formal Verification and the Common Criteria”, in
Proceedings of the 6th International Verification Workshop (VERIFY 2010), 2012.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W.,
“Model-Driven Development of Information Flow-Secure Systems with IFlow”, in
Proceedings of 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013), 2013.
S. Greiner, Mohr, M., and Beckert, B.,
“Modular Verification of Information-Flow Security in Component-Based Systems”, in
Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
T. Bauereiss and Hutter, D.,
“Possibilistic information flow security of workflow management systems”, in
Proceedings of the 1st International Workshop on Graphical Models for Security at ETAPS 2014 (GraMSec 2014), 2014.
A. Pretschner, Lovat, E., and Buechler, M.,
“Representation-Independent Data Usage Control”, in
6th International Workshop on Data Privacy Management (DPM 2011), 2011.
T. Bauereiss and Hutter, D.,
“Security (hyper-)properties in workflow systems: From specification to verification”, in
Electronic Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2014), 2014.
H. Blasum, Havle, O., Langenstein, B., Nemouchi, Y., Schmaltz, J., Stephan, W., Tverdyshew, S., Verbeek, F., and Wolf, B.,
“Using Isabelle/HOL to Develop and Maintain Separation Invariants for an Operating System”, in
Isabelle 2014 workshop at FloC 2014, 2014.
A. Bichhawat, Rajani, V., Jain, J., Garg, D., and Hammer, C.,
“WebPol: Fine-grained Information Flow Policies for Web Browsers”, in
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017.
Journal Article
K. Katkalov, Stenzel, K., Borek, M., and Reif, W.,
“Model-Driven Development of Information Flow-Secure Systems with IFlow”,
ASE Science Journal, vol. 2, 2013.
V. Rajani, Bastys, I., Rafnsson, W., and Garg, D.,
“Type Systems for Information Flow Control: The Question of Granularity”,
ACM SIGLOG News, vol. 4, no. 1, 2017.
Pages