2016
V. Klebanov, Weigl, A., and Weisbarth, J.,
“Sound Probabilistic #SAT with Projection”, in
Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL), 2016.
V. Klebanov, Weigl, A., and Weisbarth, J.,
“Sound Probabilistic #SAT with Projection”, in
Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL), 2016.
2015
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A.,
“Software Security for Mobile Devices”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
H. Mantel, Müller-Olm, M., Perner, M., and Wenner, A.,
“Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis”, in
Pre-Proceedings of the 25th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2015.
2014
G. Snelting, Giffhorn, D., Graf, J., Hammer, C., Hecker, M., Mohr, M., and Wasserrab, D.,
“Checking Probabilistic Noninterference Using JOANA”,
it - Information Technology, 2014.
T. Wüchner, Ochoa, M., and Pretschner, A.,
“Malware Detection with Quantitative Data Flow Graphs”, in
Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014), 2014.
H. Blasum, Havle, O., Langenstein, B., Nemouchi, Y., Schmaltz, J., Stephan, W., Tverdyshew, S., Verbeek, F., and Wolf, B.,
“Using Isabelle/HOL to Develop and Maintain Separation Invariants for an Operating System”, in
Isabelle 2014 workshop at FloC 2014, 2014.
2013
T. Wüchner, Müller, S., and Fischer, R.,
“Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control”, in
Proceedings of the 5th International Conference on Cloud Computing Technology and Science (CloudCom 2013), 2013.
P. Lammich, Müller-Olm, M., Seidl, H., and Wenner, A.,
“Contextual Locking for Dynamic Pushdown Networks”, in
Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.
2012
M. Ochoa, Jürjens, J., and Warzecha, D.,
“A Sound Decision Procedure for the Compositionality of Secrecy”, in
Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
A. Lehmann, Lohmann, N., and Wolf, K.,
“Stubborn Sets for Simple Linear Time Properties”, in
Proceedings of 33rd International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency (PETRI NETS 2012), 2012.
2011
T. M. Gawlitza, Lammich, P., Müller-Olm, M., Seidl, H., and Wenner, A.,
“Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation”, in
Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011), 2011.
R. Accorsi and Wonnemann, C.,
“Strong non-leak guarantees for workflow models”, in
Proceedings of the 26th ACM Symposium on Applied Computing (SAC 2011), 2011.