2014
E. Lovat, Oudinet, J., and Pretschner, A.,
“On Quantitative Dynamic Data Flow Tracking”, in
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014.
T. Bauereiss and Hutter, D.,
“Security (hyper-)properties in workflow systems: From specification to verification”, in
Electronic Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2014), 2014.
E. Lovat and Kelbert, F.,
“Structure Matters - A new Approach for Data flow Tracking”, in
Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2014), 2014.
M. R. Clarkson, Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N., and Sánchez, C.,
“Temporal Logics for Hyperproperties”, in
Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
H. Blasum, Havle, O., Langenstein, B., Nemouchi, Y., Schmaltz, J., Stephan, W., Tverdyshew, S., Verbeek, F., and Wolf, B.,
“Using Isabelle/HOL to Develop and Maintain Separation Invariants for an Operating System”, in
Isabelle 2014 workshop at FloC 2014, 2014.
2015
B. Finkbeiner, Rabe, M., and Sánchez, C.,
“Algorithms for Model Checking HyperLTL and HyperCTL*”, in
Proceedings of the 27th International Conference on Computer Aided Verification (CAV), 2015.
O. Kunčar and Popescu, A.,
“A Consistent Foundation for Isabelle/HOL”, in
Proceedings of the 6th International Conference on Interactive Theorem Proving (ITP), 2015.
Q. Huy Do, Bubel, R., and Hähnle, R.,
“Exploit Generation for Information Flow Leaks in Object-Oriented Programs”, in
Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
F. Kelbert and Pretschner, A.,
“A Fully Decentralized Data Usage Control Enforcement Infrastructure”, in
Proceedings of the 13th International Conference on Applied Cryptography and Network Security, 2015.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M.,
“A Hybrid Approach for Proving Noninterference of Java Programs”, in
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
A. Askarov, Chong, S., and Mantel, H.,
“Hybrid Monitors for Concurrent Noninterference”, in
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P.,
“IccTA: Detecting Inter-Component Privacy Leaks in Android Apps”, in
Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
F. Dörre and Klebanov, V.,
“Pseudo-Random Number Generator Verification: A Case Study”, in
Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments (VSTTE), 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R.,
“Security in E-Voting”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
E. Loval, Fromm, A., Mohr, M., and Pretschner, A.,
“SHRIFT System-wide HybRid Information Flow Tracking”, in
Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A.,
“Software Security for Mobile Devices”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
H. Mantel, Müller-Olm, M., Perner, M., and Wenner, A.,
“Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis”, in
Pre-Proceedings of the 25th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2015.
2016
V. Rajani, Garg, D., and Rezk, T.,
“On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks”, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
Pages