2016
I. Bolosteanu and Garg, D.,
“Asymmetric Secure Multi-execution with Declassification”, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
D. Octeau, Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., and Le Traon, Y.,
“Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis”, in
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2016.
T. Liu, Tyszberowicz, S., Herda, M., Beckert, B., Grahl, D., and Taghdiri, M.,
“Computing Specification-Sensitive Abstractions for Program Verification”, in
Proceedings of the 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA), 2016.
O. Kunčar and Popescu, A.,
“From Types to Sets by Local Type Definitions in Higher-Order Logic”, in
Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP), 2016.
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G.,
“On Improvements Of Low-Deterministic Security”, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
F. Dörre and Klebanov, V.,
“Practical Detection of Entropy Loss in Pseudo-Random Number Generators”, in
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), 2016.
W. Rafnsson, Sabelfeld, A., and Garg, D.,
“Progress-Sensitive Security for SPARK”, in
Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
R. Küsters, Müller, J., Scapin, E., and Truderung, T.,
“sElect: A Lightweight Verifiable Remote Voting System”, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
V. Cortier, Galindo, D., Küsters, R., Müller, J., and Truderung, T.,
“SoK: Verifiability Notions for E-Voting Protocols”, in
Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016.
V. Klebanov, Weigl, A., and Weisbarth, J.,
“Sound Probabilistic #SAT with Projection”, in
Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL), 2016.
2017
O. Kunčar and Popescu, A.,
“Comprehending Isabelle/HOL's Consistency”, in
Proceedings of the 26th European Symposium on Programming (ESOP), 2017.
B. Finkbeiner and Zimmermann, M.,
“The First-Order Logic of Hyperproperties”, in
Proceedings of the 34th Symposium on Theoretical Aspects of Computer Science (STACS), 2017.
S. Greiner, Mohr, M., and Beckert, B.,
“Modular Verification of Information-Flow Security in Component-Based Systems”, in
Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
B. Finkbeiner, Hahn, C., Stenger, M., and Tentrup, L.,
“Monitoring Hyperproperties”, in
Proceedings of the 17th International Conference on Runtime Verification (RV), 2017.
V. Rajani, Bastys, I., Rafnsson, W., and Garg, D.,
“Type Systems for Information Flow Control: The Question of Granularity”,
ACM SIGLOG News, vol. 4, no. 1, 2017.
A. Bichhawat, Rajani, V., Jain, J., Garg, D., and Hammer, C.,
“WebPol: Fine-grained Information Flow Policies for Web Browsers”, in
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017.
Pages