Conference Paper
V. Rajani, Garg, D., and Rezk, T.,
“On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks”, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
B. Finkbeiner, Rabe, M., and Sánchez, C.,
“Algorithms for Model Checking HyperLTL and HyperCTL*”, in
Proceedings of the 27th International Conference on Computer Aided Verification (CAV), 2015.
R. Accorsi,
“Anwenden struktureller Nicht-Interferenz zur Sicherheitsanalyse von Workflow-Modellen”, in
Proceedings of INFORMATIK 2011 - Dependable Software for Critical Infrastructures (DSCI 2011), 2011.
H. Mantel, Sands, D., and Sudbrock, H.,
“Assumptions and Guarantees for Compositional Noninterference”, in
Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF 2011), 2011.
I. Bolosteanu and Garg, D.,
“Asymmetric Secure Multi-execution with Declassification”, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
R. Accorsi and Lehmann, A.,
“Automatic Information Flow Analysis of Business Process Models”, in
10th International Conference on Business Process Management (BPM 2012), 2012.
B. Köpf, Mauborgne, L., and Ochoa, M.,
“Automatic Quantification of Cache Side-Channels”, in
Proceedings of the 24th International Conference on Computer Aided Verification (CAV 2012), 2012.
L. Fennell and Thiemann, P.,
“The Blame Theorem for a Linear Lambda Calculus with Type Dynamic”, in
Proceedings of the Symposium on Trends in Functional Programming (TFP 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A.,
“Clash Attacks on the Verifiability of E-Voting Systems”, in
Proceedings of the 33rd IEEE Symposium on Security and Privacy (S{&}P 2012), 2012.
D. Octeau, Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., and Le Traon, Y.,
“Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis”, in
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2016.
T. Bauereiss and Hutter, D.,
“Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS”, in
Proceedings of the 29th International Information Security and Privacy Conference (IFIP SEC 2014), 2014.
T. Wüchner, Müller, S., and Fischer, R.,
“Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control”, in
Proceedings of the 5th International Conference on Cloud Computing Technology and Science (CloudCom 2013), 2013.
O. Kunčar and Popescu, A.,
“Comprehending Isabelle/HOL's Consistency”, in
Proceedings of the 26th European Symposium on Programming (ESOP), 2017.
T. Liu, Tyszberowicz, S., Herda, M., Beckert, B., Grahl, D., and Taghdiri, M.,
“Computing Specification-Sensitive Abstractions for Program Verification”, in
Proceedings of the 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA), 2016.
S. Kanav, Lammich, P., and Popescu, A.,
“A Conference Management System with Verified Document Confidentiality”, in
Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014), 2014.
O. Kunčar and Popescu, A.,
“A Consistent Foundation for Isabelle/HOL”, in
Proceedings of the 6th International Conference on Interactive Theorem Proving (ITP), 2015.
P. Lammich, Müller-Olm, M., Seidl, H., and Wenner, A.,
“Contextual Locking for Dynamic Pushdown Networks”, in
Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.
E. Lovat,
“Cross-Layer Data-Centric Usage Control”, in
Proceedings of the International Symposium on Engineering Secure Software and Systems - Doctoral Symposium (ESSoS 2014)), 2014.
E. Lovat and Pretschner, A.,
“Data-centric multi-layer usage control enforcement: a Social Network Example”, in
Proceedings of the 16th ACM symposium on Access control models and technologies (SACMAT 2011), 2011.
F. Kelbert and Pretschner, A.,
“Decentralized Distributed Data Usage Control”, in
Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014.
F. Freiling and Schinzel, S.,
“Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications”, in
Proceedings of the 26th International Information Security Conference (IFIP/SEC 2011), 2011.
Pages