2016
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G.,
“On Improvements Of Low-Deterministic Security”, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
2017
S. Greiner, Mohr, M., and Beckert, B.,
“Modular Verification of Information-Flow Security in Component-Based Systems”, in
Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
V. Rajani, Bastys, I., Rafnsson, W., and Garg, D.,
“Type Systems for Information Flow Control: The Question of Granularity”,
ACM SIGLOG News, vol. 4, no. 1, 2017.
A. Bichhawat, Rajani, V., Jain, J., Garg, D., and Hammer, C.,
“WebPol: Fine-grained Information Flow Policies for Web Browsers”, in
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017.
Pages