Conference Paper
O. Kunčar and Popescu, A.,
“Comprehending Isabelle/HOL's Consistency”, in
Proceedings of the 26th European Symposium on Programming (ESOP), 2017.
S. Kanav, Lammich, P., and Popescu, A.,
“A Conference Management System with Verified Document Confidentiality”, in
Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014), 2014.
O. Kunčar and Popescu, A.,
“A Consistent Foundation for Isabelle/HOL”, in
Proceedings of the 6th International Conference on Interactive Theorem Proving (ITP), 2015.
E. Lovat and Pretschner, A.,
“Data-centric multi-layer usage control enforcement: a Social Network Example”, in
Proceedings of the 16th ACM symposium on Access control models and technologies (SACMAT 2011), 2011.
F. Kelbert and Pretschner, A.,
“Decentralized Distributed Data Usage Control”, in
Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014.
J. C. Blanchette, Böhme, S., Popescu, A., and Smallbone, N.,
“Encoding Monomorphic and Polymorphic Types”, in
Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), 2013.
A. Popescu, Hölzl, J., and Nipkow, T.,
“Formalizing Probabilistic Noninterference”, in
Proceedings of the 3rd International Conference on Certified Programs and Proofs (CPP 2013), 2013.
O. Kunčar and Popescu, A.,
“From Types to Sets by Local Type Definitions in Higher-Order Logic”, in
Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP), 2016.
F. Kelbert and Pretschner, A.,
“A Fully Decentralized Data Usage Control Enforcement Infrastructure”, in
Proceedings of the 13th International Conference on Applied Cryptography and Network Security, 2015.
T. Wüchner, Ochoa, M., and Pretschner, A.,
“Malware Detection with Quantitative Data Flow Graphs”, in
Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014), 2014.
J. C. Blanchette and Popescu, A.,
“Mechanizing the Metatheory of Sledgehammer”, in
Proceedings of the 9th International Symposium on Frontiers of Combining Systems (FroCos 2013), 2013.
H. Mantel, Perner, M., and Sauer, J.,
“Noninterference under Weak Memory Models”, in
Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014), 2014.
A. Popescu, Hölzl, J., and Nipkow, T.,
“Proving Concurrent Noninterference”, in
Proceedings of the 2nd International Conference on Certified Programs and Proofs (CPP 2012), 2012.
E. Lovat, Oudinet, J., and Pretschner, A.,
“On Quantitative Dynamic Data Flow Tracking”, in
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014.
A. Pretschner, Lovat, E., and Buechler, M.,
“Representation-Independent Data Usage Control”, in
6th International Workshop on Data Privacy Management (DPM 2011), 2011.
A. Lux, Mantel, H., and Perner, M.,
“Scheduler-Independent Declassification”, in
Proceedings of the 11th International Conference on Mathematics of Program Construction (MPC 2012), 2012.
S. Pfeiffer, Unger, S., Timmermann, D., and Lehmann, A.,
“Secure Information Flow Awareness for Smart Wireless eHealth Systems”, in
Proceedings of 9th International Multi-Conference on Systems, Signals and Devices (SSD 2012), 2012.
E. Loval, Fromm, A., Mohr, M., and Pretschner, A.,
“SHRIFT System-wide HybRid Information Flow Tracking”, in
Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
F. Kelbert and Pretschner, A.,
“Towards a Policy Enforcement Infrastructure for Distributed Usage Control”, in
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), 2012.
Pages