2014
H. Mantel, Perner, M., and Sauer, J.,
“Noninterference under Weak Memory Models”, in
Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014), 2014.
M. R. Clarkson, Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N., and Sánchez, C.,
“Temporal Logics for Hyperproperties”, in
Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
H. Blasum, Havle, O., Langenstein, B., Nemouchi, Y., Schmaltz, J., Stephan, W., Tverdyshew, S., Verbeek, F., and Wolf, B.,
“Using Isabelle/HOL to Develop and Maintain Separation Invariants for an Operating System”, in
Isabelle 2014 workshop at FloC 2014, 2014.
H. Blasum, Havle, O., Langenstein, B., Nemouchi, Y., Schmaltz, J., Stephan, W., Tverdyshew, S., Verbeek, F., and Wolf, B.,
“Using Isabelle/HOL to Develop and Maintain Separation Invariants for an Operating System”, in
Isabelle 2014 workshop at FloC 2014, 2014.
2013
P. Lammich, Müller-Olm, M., Seidl, H., and Wenner, A.,
“Contextual Locking for Dynamic Pushdown Networks”, in
Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.
J. C. Blanchette, Böhme, S., Popescu, A., and Smallbone, N.,
“Encoding Monomorphic and Polymorphic Types”, in
Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), 2013.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C.,
“A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs”, in
Grande Region Security and Reliability Day 2013, 2013.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W.,
“Model-Driven Development of Information Flow-Secure Systems with IFlow”, in
Proceedings of 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013), 2013.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W.,
“Model-Driven Development of Information Flow-Secure Systems with IFlow”,
ASE Science Journal, vol. 2, 2013.
2012
K. Katkalov, Fischer, P., Stenzel, K., Moebius, N., and Reif, W.,
“Evaluation of Jif and Joana as information flow analyzers in a model-driven approach”, in
Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012), 2012.
R. Dimitrova, Finkbeiner, B., Kovács, M., Rabe, M., and Seidl, H.,
“Model Checking Information Flow in Reactive Systems”, in
Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2012), 2012.
M. Kovács and Seidl, H.,
“Runtime Enforcement of Information Flow Security in Tree Manipulating Processes”, in
Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
R. Gay, Mantel, H., and Sprick, B.,
“Service Automata”, in
Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2012.
2011
H. Mantel, Sands, D., and Sudbrock, H.,
“Assumptions and Guarantees for Compositional Noninterference”, in
Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF 2011), 2011.
H. Mantel, Sands, D., and Sudbrock, H.,
“Assumptions and Guarantees for Compositional Noninterference”, in
Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF 2011), 2011.
F. Freiling and Schinzel, S.,
“Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications”, in
Proceedings of the 26th International Information Security Conference (IFIP/SEC 2011), 2011.
Pages