A
B. Finkbeiner, Rabe, M., and Sánchez, C.,
“Algorithms for Model Checking HyperLTL and HyperCTL*”, in
Proceedings of the 27th International Conference on Computer Aided Verification (CAV), 2015.
H. Mantel, Sands, D., and Sudbrock, H.,
“Assumptions and Guarantees for Compositional Noninterference”, in
Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF 2011), 2011.
H. Mantel, Sands, D., and Sudbrock, H.,
“Assumptions and Guarantees for Compositional Noninterference”, in
Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF 2011), 2011.
C
G. Snelting, Giffhorn, D., Graf, J., Hammer, C., Hecker, M., Mohr, M., and Wasserrab, D.,
“Checking Probabilistic Noninterference Using JOANA”,
it - Information Technology, 2014.
P. Lammich, Müller-Olm, M., Seidl, H., and Wenner, A.,
“Contextual Locking for Dynamic Pushdown Networks”, in
Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.
E
S. Schinzel,
“An Efficient Mitigation Method for Timing Side Channels on the Web”, in
Proceedings of the 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011), 2011.
C. Scheben and Schmitt, P. H.,
“Efficient Self-Composition for Weakest Precondition Calculi”, in
Proceedings of the 19th International Symposium on Formal Methods (FM 2014), 2014.
C. Scheben and Schmitt, P. H.,
“Efficient Self-Composition for Weakest Precondition Calculi”, in
Proceedings of the 19th International Symposium on Formal Methods (FM 2014), 2014.
J. C. Blanchette, Böhme, S., Popescu, A., and Smallbone, N.,
“Encoding Monomorphic and Polymorphic Types”, in
Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), 2013.
K. Katkalov, Fischer, P., Stenzel, K., Moebius, N., and Reif, W.,
“Evaluation of Jif and Joana as information flow analyzers in a model-driven approach”, in
Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012), 2012.
H
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C.,
“A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs”, in
Grande Region Security and Reliability Day 2013, 2013.
I
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G.,
“On Improvements Of Low-Deterministic Security”, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
M. Taghdiri, Snelting, G., and Sinz, C.,
“Information Flow Analysis via Path Condition Refinement”, in
Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (FAST 2010), 2010.
M. Taghdiri, Snelting, G., and Sinz, C.,
“Information Flow Analysis via Path Condition Refinement”, in
Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (FAST 2010), 2010.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“Information Flow in Object-Oriented Software”, in
Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“Information Flow in Object-Oriented Software”, in
Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
Pages