2016
D. Octeau, Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., and Le Traon, Y.,
“Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis”, in
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2016.
T. Liu, Tyszberowicz, S., Herda, M., Beckert, B., Grahl, D., and Taghdiri, M.,
“Computing Specification-Sensitive Abstractions for Program Verification”, in
Proceedings of the 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA), 2016.
2014
G. Snelting, Giffhorn, D., Graf, J., Hammer, C., Hecker, M., Mohr, M., and Wasserrab, D.,
“Checking Probabilistic Noninterference Using JOANA”,
it - Information Technology, 2014.
T. Bauereiss and Hutter, D.,
“Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS”, in
Proceedings of the 29th International Information Security and Privacy Conference (IFIP SEC 2014), 2014.
S. Kanav, Lammich, P., and Popescu, A.,
“A Conference Management System with Verified Document Confidentiality”, in
Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014), 2014.
E. Lovat,
“Cross-Layer Data-Centric Usage Control”, in
Proceedings of the International Symposium on Engineering Secure Software and Systems - Doctoral Symposium (ESSoS 2014)), 2014.
2013
T. Wüchner, Müller, S., and Fischer, R.,
“Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control”, in
Proceedings of the 5th International Conference on Cloud Computing Technology and Science (CloudCom 2013), 2013.
P. Lammich, Müller-Olm, M., Seidl, H., and Wenner, A.,
“Contextual Locking for Dynamic Pushdown Networks”, in
Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.