W
A. Bichhawat, Rajani, V., Jain, J., Garg, D., and Hammer, C.,
“WebPol: Fine-grained Information Flow Policies for Web Browsers”, in
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017.
T
V. Rajani, Bastys, I., Rafnsson, W., and Garg, D.,
“Type Systems for Information Flow Control: The Question of Granularity”,
ACM SIGLOG News, vol. 4, no. 1, 2017.
C. Atkinson, Gerbig, R., and Tunjic, C.,
“Towards Multi-level Aware Model Transformations”, in
5th International Conference on Theory and Practice of Model Transformations (ICMT 2012), 2012.
S
C. Atkinson, Gerbig, R., and Kennel, B.,
“Symbiotic general-purpose and domain-specific languages”, in
Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), 2012.
V. Cortier, Galindo, D., Küsters, R., Müller, J., and Truderung, T.,
“SoK: Verifiability Notions for E-Voting Protocols”, in
Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A.,
“Software Security for Mobile Devices”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
R. Gay, Mantel, H., and Sprick, B.,
“Service Automata”, in
Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2012.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R.,
“Security in E-Voting”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R.,
“Security in E-Voting”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
M
S. Greiner, Mohr, M., and Beckert, B.,
“Modular Verification of Information-Flow Security in Component-Based Systems”, in
Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
B. Beckert, Bruns, D., and Grebing, S.,
“Mind the Gap: Formal Verification and the Common Criteria”, in
Proceedings of the 6th International Verification Workshop (VERIFY 2010), 2012.
K
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“The KeY Platform for Verification and Analysis of Java Programs”, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“The KeY Platform for Verification and Analysis of Java Programs”, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
J
T. M. Gawlitza, Lammich, P., Müller-Olm, M., Seidl, H., and Wenner, A.,
“Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation”, in
Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011), 2011.
I
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C.,
“Information Flow Control in WebKit's JavaScript Bytecode”, in
Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G.,
“On Improvements Of Low-Deterministic Security”, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
Pages