These documents have been provided by the contributing authors as a means
to ensure timely dissemination of scholarly and technical work on a noncommercial basis.
Copyright and all rights therein are retained by authors or by other copyright holders.
All persons copying this information are expected to adhere to the terms and constraints
invoked by each author's copyright. These works may not be reposted without the explicit
permission of the copyright holder.
2025
- Heiko Mantel. Information Flow and Noninterference. In Encyclopedia of Cryptography and Security (3rd Ed.), pages 1217-1221, 2025.
[ BibTeX entry | URL ] - Heiko Mantel. Information Flow Policies. In Encyclopedia of Cryptography and Security (3rd Ed.), pages 1221-1225, 2025.
[ BibTeX entry | URL ]
2024
- Serge Demeyer, Reiner Hähnle and Heiko Mantel. Automating Software Re-Engineering Introduction to the ISoLA 2024 Track. In International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA), 2024.
[ BibTeX entry | URL ] - Maximilian Gehring and Heiko Mantel. Towards A More Sustainable Re-Engineering Of Heterogeneous Distributed Systems Using Cooperating Run-Time Monitors. In International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA), 2024.
[ BibTeX entry | URL | PDF ] - Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel and Hossein Yalame. HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation. In Proceedings of the 61st Design Automation Conference (DAC), 2024.
[ BibTeX entry ] - Florentin Putz, Steffen Haesler, Thomas Völkl, Maximilian Gehring, Nils Rollshausen and Matthias Hollick. PairSonic: Helping Groups Securely Exchange Contact Information. In CSCW Companion '24: Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024.
[ BibTeX entry | URL ] - Leon Vack. Formal Verification of Selected Optimizations for Run-Time Monitoring in Isabelle/HOL. Bachelor's thesis, TU Darmstadt, 2024.
[ BibTeX entry ]
2023
- Richard August See, Maximilian Gehring, Matthias Fischer and Shankar Karuppayah. Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons. In Proceedings of the 39th Annual Computer Security Applications Conference, 2023.
[ BibTeX entry | URL ] - Maximilian Gehring. Program Slicing as Preprocessing for a Quantitative Security Analysis. Master's Thesis, TU Darmstadt, 2023.
[ BibTeX entry ]
2022
- Federica Adobbati, Görkem Kilinc and Adrian Puerto Aubel. A Finite Prefix for Analyzing Information Flow Among Transitions of a Free-Choice Net. In IEEE Access, 10, 2022.
[ BibTeX entry | URL ] - Serge Demeyer, Reiner Hähnle and Heiko Mantel. Automating Software Re-engineering - Introduction to the ISoLA 2022 Track. In Proceedings of the 11th International Symposium on Leveraging Applications of Formal Methods (ISoLA), pages 195-200. Springer, 2022.
[ BibTeX entry ] - Florian Dewald, Johanna Rohde, Christian Hochberger and Heiko Mantel. Improving Loop Parallelization by a Combination of Static and Dynamic Analyses in HLS. In ACM Transactions on Reconfigurable Technology and Systems, 2022.
[ BibTeX entry | URL ] - Martin Edlund, Heiko Mantel, Alexandra Weber and Tim Weißmantel. Graphical User Interfaces for a Qualitative and a Quantitative Side-Channel Analysis Tool. TU Darmstadt, Technical Report, 2022.
[ BibTeX entry | URL ] - Alexandra Weber. Semantics-Based Cache-Side-Channel Quantification in Cryptographic Implementations. Ph.D. Thesis, TU Darmstadt, 2022.
[ BibTeX entry ]
2021
- Fabian Czappa, Alexandru Calotoiu, Thomas Höhl, Heiko Mantel, Toni Nguyen and Felix Wolf. Design-Time Performance Modeling of Compositional Parallel Programs. In Parallel Computing, Elsevier, 2021.
[ BibTeX entry | URL ] - Jan-Patrick Lehr, Christian Bischof, Florian Dewald, Heiko Mantel, Mohammad Norouzi and Felix Wolf. Tool-Supported Mini-App Extraction to Facilitate Program Analysis and Parallelization. In International Conference on Parallel Processing (ICPP), 2021.
[ BibTeX entry | URL ] - Heiko Mantel and Alexandra Weber. Towards Leakage Bounds for Side Channels based on Caches and Pipelined Executions. TU Darmstadt, Technical Report, 2021.
[ BibTeX entry | URL ] - Heiko Mantel, Tim Weißmantel, Marc Fischlin and Alexandra Weber. A Comparative Study of Cache Side Channels across AES Implementations and Modes of Operation. TU Darmstadt, Technical Report, 2021.
[ BibTeX entry | URL ] - Alexandra Weber, Oleg Nikiforov, Alexander Sauer, Johannes Schickel, Gernot Alber, Heiko Mantel and Thomas Walther. Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography. In Proceedings of the 26th European Symposium on Research in Computer Security (ESORICS), 2021.
[ BibTeX entry | PDF ] - David Kretzmer. A Tested and Mechanized Semantics for a Sub-language of Dalvik Bytecode. Master's Thesis, TU Darmstadt, 2021.
[ BibTeX entry ]
2020
- Serge Demeyer, Reiner Hähnle and Heiko Mantel. Automating Software Re-engineering, Introduction to the ISoLA 2020 Track. In International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISOLA), 2020.
[ BibTeX entry ] - Marie-Christine Jakobs and Heiko Mantel. A Unifying Framework for Dynamic Monitoring and a Taxonomy of Optimizations. In International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISOLA), 2020.
[ BibTeX entry | PDF ] - Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert and Tim Weißmantel. RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation. In International Conference on Cryptology and Network Security (CANS), 2020.
[ BibTeX entry | PDF ] - Patrick Uftring. An Example-driven Investigation of Effects and Consequences of Weak Memory Behavior on Dependencies. Master's Thesis, TU Darmstadt, 2020.
[ BibTeX entry ] - Tim Weißmantel. Exploring Cache-Side-Channel Leakage of AES across CBC, CTR and GCM Mode. Master's Thesis, TU Darmstadt, 2020.
[ BibTeX entry ] - Jannik Birk. Policy Enforcement in an IoT Scenario for Temperature Control using CliSeAu. Bachelor's thesis, TU Darmstadt, 2020.
[ BibTeX entry ] - Philip Grenz. A C Implementation of Runtime Enforcement Components. Bachelor's thesis, TU Darmstadt, 2020.
[ BibTeX entry ]
2019
- Jasmin Christian Blanchette, Lorenzo Gheri, Andrei Popescu and Dmitriy Traytel. Bindings as Bounded Natural Functors. In Proceedings of the 46th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), pages 22:1-22:34, 2019.
[ BibTeX entry ] - Alexandru Calotoiu, Thomas Höhl, Heiko Mantel, Toni Nguyen and Felix Wolf. Designing Efficient Parallel Software via Compositional Performance Modeling. In Proceedings of the 1st Workshop on Programming and Performance Visualization Tools (ProTools 19), 2019.
[ BibTeX entry | PDF ] - Lorenzo Gheri and Andrei Popescu. A General Theory of Syntax with Bindings. In Archive of Formal Proofs, 2019.
[ BibTeX entry ] - Lorenzo Gheri and Andrei Popescu. A Formalized General Theory of Syntax with Bindings: Extended Version. In Journal of Automated Reasoning 64(4), pages 641-675, 2019.
[ BibTeX entry ] - Heiko Mantel. From Attacker Models to Reliable Security. In Proceedings of the 14th ACM ASIA Conference on Computer and Communications Security (ASIACCS), pages 547-548, 2019.
[ BibTeX entry | PDF ] - Heiko Mantel and Christian Probst. On the Meaning and Purpose of Attack Trees. In Proceedings of the 32nd IEEE Computer Security Foundations Symposium (CSF), pages 184-199, 2019.
[ BibTeX entry | PDF ] - Manuel Cremer. From Dependence Graphs with Semantics to Parallel Programs. Master's Thesis, TU Darmstadt, 2019.
[ BibTeX entry ] - Lukas Engelter. Enlightening the Real-world Consequences of Data Races. Bachelor's thesis, TU Darmstadt, 2019.
[ BibTeX entry ] - Melanie Jehn. A Performance Evaluation on Dynamic Enforcement Frameworks. Bachelor's thesis, TU Darmstadt, 2019.
[ BibTeX entry ] - Thomas Kreutz. Towards Enforcing Dynamic Security Policies in Java Programs. Bachelor's thesis, TU Darmstadt, 2019.
[ BibTeX entry ] - Jonas Meurer. Investigating the Effects of Inter-Process and Cross-Device Communication on Runtime Enforcement for Android. Bachelor's thesis, TU Darmstadt, 2019.
[ BibTeX entry ] - Joscha Seemann. Towards a C/C++ Extension for a Distributed Enforcement Framework. Bachelor's thesis, TU Darmstadt, 2019.
[ BibTeX entry ]
2018
- Oliver Bracevac, Richard Gay, Sylvia Grewe, Heiko Mantel, Henning Sudbrock and Markus Tasch. An Isabelle/HOL Formalization of the Modular Assembly Kit for Security Properties. In Archive of Formal Proofs, 2018.
[ BibTeX entry ] - Yuri Gil Dantas, Richard Gay, Tobias Hamann, Heiko Mantel and Johannes Schickel. An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior. In 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), pages 323-338, 2018.
[ BibTeX entry | PDF ] - Yuri Gil Dantas, Tobias Hamann and Heiko Mantel. A Comparative Study across Static and Dynamic Side-Channel Countermeasures. In Proceedings of the 11th International Symposium on Foundations & Practice of Security (FPS), pages 173-189, 2018.
[ BibTeX entry | PDF ] - Florian Dewald, Heiko Mantel and Alexandra Weber. Poster: Side-Channel Finder for AVR. Poster at the 20th International Conference on Cryptographic Hardware and Embedded Systems (CHES), 2018.
[ BibTeX entry | PDF ] - Sylvia Grewe, Heiko Mantel, Markus Tasch, Richard Gay and Henning Sudbrock. I-MAKS A Framework for Information-Flow Security in Isabelle/HOL. TU Darmstadt, Technical Report TUD-CS-2018-0056, 2018.
[ BibTeX entry | PDF ] - Tobias Hamann, Mihai Herda, Heiko Mantel, Martin Mohr, David Schneider and Markus Tasch. A Uniform Information-Flow-Security Benchmark Suite for Source Code and Bytecode. In Proceedings of the 23nd Nordic Conference on Secure IT Systems (NordSec), pages 437-453, 2018.
[ BibTeX entry | PDF ] - Tobias Hamann and Heiko Mantel. Decentralized Dynamic Security Enforcement for Mobile Applications with CliSeAuDroid. In Proceedings of the 11th International Symposium on Foundations & Practice of Security (FPS), pages 29-45, 2018.
[ BibTeX entry | PDF ] - Marcilio O.O.Lemos, Yuri Gil Dantas, Iguatemi E. Fonseca and Vivek Nigam. On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks. In Proceedings of the Journal of Logical and Algebraic Methods in Programming (JLAMP), pages 45-67, 2018.
[ BibTeX entry | PDF ] - Heiko Mantel, Johannes Schickel, Alexandra Weber and Friedrich Weber. How Secure is Green IT? The Case of Software-Based Energy Side Channels. In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), pages 218-239, 2018.
[ BibTeX entry | PDF ] - Oleg Nikiforov, Alexander Sauer, Johannes Schickel, Alexandra Weber, Gernot Alber, Heiko Mantel and Thomas Walther. Side-Channel Analysis of Privacy Amplification in Postprocessing Software for a Quantum Key Distribution System. TU Darmstadt, Technical Report TUD-CS-2018-0024, 2018.
[ BibTeX entry | PDF ] - Florian Dewald. Exploring the Robustness of Dependency Graphs Based on Operational Semantics. Master's Thesis, TU Darmstadt, 2018.
[ BibTeX entry ] - Isabella Dix. A Type System and Implementation for Detecting the Lucky13 Vulnerability with SPASCA. Master's Thesis, TU Darmstadt, 2018.
[ BibTeX entry ] - Sebastian Frantzen. Runtime Monitoring and Enforcement Mechanism in the Floodlight SDN Controller. Master Thesis, TU Darmstadt, 2018.
[ BibTeX entry ] - Thomas Höhl. Exploiting Selected Design Patterns in Modular Reasoning about C Programs. Master's Thesis, TU Darmstadt, 2018.
[ BibTeX entry ] - Timothy Earley. Extending the Language Coverage for Side-Channel FinderAVR. Bachelor's thesis, TU Darmstadt, 2018.
[ BibTeX entry ] - Case Study: An E-Learning Platform with Formal Information-Flow Guarantees. Dorothea Treitz. Bachelor's thesis, TU Darmstadt, 2018.
[ BibTeX entry ] - David Kretzmer. Towards Rely-Guarantee-Style Reasoning About Information-Flow Security for Object-Oriented Concurrent Programs. Bachelor's thesis, TU Darmstadt, 2018.
[ BibTeX entry ] - Jan Schneider. Towards an Implementation of a Concurrency-Aware Type System for Analyzing Android Applications with Cassandra. Bachelor's thesis, TU Darmstadt, 2018.
[ BibTeX entry ]
2017
- Thomas Bauereiß, Simon Greiner, Mihai Herda, Michael Kirsten, Ximeng Li, Heiko Mantel, Martin Mohr, Matthias Perner, David Schneider and Markus Tasch. RIFL 1.1: A Common Specification Language for Information-Flow Requirements. TU Darmstadt, Technical Report TUD-CS-2017-0225, 2017.
[ BibTeX entry | PDF ] - Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel and Alexandra Weber. Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics. Cryptology ePrint Archive, Technical Report, 2017. http://eprint.iacr.org/2017/951.
[ BibTeX entry | PDF ] - Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel and Alexandra Weber. Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics. In Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), pages 225-241, 2017.
[ BibTeX entry | PDF ] - Yuri Gil Dantas, Tobias Hamann, Heiko Mantel and Johannes Schickel. An Experimental Study of a Bucketing Approach (Extended Abstract). In Proceedings of the 15th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL), 2017.
[ BibTeX entry ] - Florian Dewald, Heiko Mantel and Alexandra Weber. AVR Processors as a Platform for Language-Based Security. In Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), pages 427-445, 2017.
[ BibTeX entry | PDF ] - Richard Gay. A Generic Framework for Enforcing Security in Distributed Systems. Ph.D. Thesis, TU Darmstadt, 2017.
[ BibTeX entry | PDF ] - Richard Gay, Jinwei Hu, Heiko Mantel and Sogol Mazaheri. Relationship-Based Access Control for Resharing in Decentralized Online Social Networks. In Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), pages 18-34, 2017.
[ BibTeX entry | PDF ] - Richard Gay, Jinwei Hu, Heiko Mantel and Johannes Schickel. Towards Accelerated Usage Control based on Access Correlations. In Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), pages 245-261, 2017.
[ BibTeX entry | PDF ] - Ben Hermann, Ximeng Li, Heiko Mantel, Mira Mezini, Markus Tasch and Florian Wendel. Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface. TU Darmstadt, Technical Report TUD-CS-2017-0025, 2017.
[ BibTeX entry | PDF ] - Ximeng Li, Heiko Mantel, Johannes Schickel, Markus Tasch, Iva Toteva and Alexandra Weber. SPASCA: Secure-Programming Assistant and Side-Channel Analyzer. TU Darmstadt, Technical Report TUD-CS-2017-0303, 2017.
[ BibTeX entry | PDF ] - Ximeng Li, Heiko Mantel and Markus Tasch. Taming Message-passing Communication in Compositional Reasoning about Confidentiality. In Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), pages 45-66, 2017.
[ BibTeX entry | PDF ] - Heiko Mantel, Johannes Schickel, Alexandra Weber and Friedrich Weber. Vulnerabilities Introduced by Features for Software-based Energy Measurement. TU Darmstadt, Technical Report, 2017.
[ BibTeX entry | PDF ] - Heiko Mantel, Alexandra Weber and Boris Köpf. A Systematic Study of Cache Side Channels across AES Implementations. In Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS), pages 213-230, 2017.
[ BibTeX entry | PDF ] - Tulio A. Pascoal, Yuri Gil Dantas, Iguatemi E. Fonseca and Vivek Nigam. Slow TCAM Exhaustion DDoS Attack. In Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), pages 17-31, 2017.
[ BibTeX entry | PDF ] - Florian Dewald. Establishing Trust in a Timing-Sensitive Information-Flow Analysis for AVR Assembly Programs. Studienarbeit, TU Darmstadt, 2017.
[ BibTeX entry ] - Thomas Höhl. Proving the Soundness of Cassandra's Security Type System in Isabelle/HOL. Studienarbeit, TU Darmstadt, 2017.
[ BibTeX entry ] - Benjamin Richter. From Axioms about Relaxed Consistency to Executions in an Operational Model. Master's Thesis, TU Darmstadt, 2017.
[ BibTeX entry ] - Manuel Cremer. Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA. Bachelor's thesis, TU Darmstadt, 2017.
[ BibTeX entry ] - Rune Fiedler. Towards Precise Treatment of Inter-Procedural Implicit Information Flow in Android Applications. Bachelor's thesis, TU Darmstadt, 2017.
[ BibTeX entry ] - Maximilian Scheid. Effects of Processor Optimizations in a Raspberry Pi on Possible Results of Multi-threaded Programs. Bachelor's thesis, TU Darmstadt, 2017.
[ BibTeX entry ]
2016
- Steven Arzt, Alexandre Bartel, Richard Gay, Steffen Lortz, Enrico Lovat, Heiko Mantel, Martin Mohr, Benedikt Nordhoff, Matthias Perner, Siegfried Rasthofer, David Schneider, Gregor Snelting, Artem Starostin and Alexandra Weber. Software Security for Mobile Devices. Poster at the 25th USENIX Security Symposium, 2016.
[ BibTeX entry ] - David Basin, Germano Caronni, Sarah Ereth, Matus Harvan, Felix Klaedtke and Heiko Mantel. Scalable Offline Monitoring of Temporal Specifications. In Formal Methods in System Design 49 (1-2), pages 75-108, 2016.
[ BibTeX entry ] - Thomas Bauereiss, Abhishek Bichhawat, Iulia Bolosteanu, Peter Faymonville, Bernd Finkbeiner, Deepak Garg, Richard Gay, Sergey Grebenshchikov, Christian Hammer, Dieter Hutter, Ondřej Kunčar, Peter Lammich, Heiko Mantel, Christian Müller, Andrei Popescu, Markus Rabe, Vineet Rajani, Helmut Seidl, Markus Tasch and Leander Tentrup. Security in Web-Based Workflows. Poster at the 25th USENIX Security Symposium, 2016.
[ BibTeX entry ] - Daniel Bruns, Huy Quoc Do, Simon Greiner, Mihai Herda, Martin Mohr, Enrico Scapin, Tomasz Truderung, Bernhard Beckert, Ralf Küsters, Heiko Mantel and Richard Gay. Security in E-Voting. Poster at the 25th USENIX Security Symposium, 2016.
[ BibTeX entry ] - Yuri Gil Dantas, Marcilio O. O. Lemos, Iguatemi Fonseca and Vivek Nigam. Formal Specification and Verification of a Selective Defense for TDoS Attacks. In Proceedings of the 11th International Workshop on Rewriting Logic and its Applications (WRLA), pages 82-97, 2016.
[ BibTeX entry | PDF ] - Steffen Lortz, Heiko Mantel, David Schneider, Artem Starostin, Timo Bähr and Alexandra Weber. Certifying the Security of Android Applications with Cassandra. Work-in-Progress Report at the 25th USENIX Security Symposium, 2016.
[ BibTeX entry | Abstract ] - Tobias Hamann. CliSeAu for Android Applications: Design, Case Studies and Evaluation. Master Thesis, TU Darmstadt, 2016.
[ BibTeX entry ] - Johannes Schickel. Using File-Correlation to Accelerate Decision-Making in a Decentralized Cooperative Security Enforcement. Master Thesis, TU Darmstadt, 2016.
[ BibTeX entry ] - Iva Toteva. Advancing Tool Support for the Detection of Side-Channel Vulnerabilities in Java. Master's Thesis, TU Darmstadt, 2016.
[ BibTeX entry ] - Florian Dewald. Timing-Sensitive Information-Flow Analysis of AVR Assembly Programs. Bachelor's thesis, TU Darmstadt, 2016.
[ BibTeX entry ] - Thomas Höhl. Computing Security Certificates of Android Applications in Cassandra. Bachelor's thesis, TU Darmstadt, 2016.
[ BibTeX entry ] - Hoang Duong Nguyen. Empirical Evaluation of Side-Channel Mitigation on a JVM with JIT-Compilation. Bachelor's thesis, TU Darmstadt, 2016.
[ BibTeX entry ]
2015
- Steven Arzt, Alexandre Bartel, Richard Gay, Steffen Lortz, Enrico Lovat, Heiko Mantel, Martin Mohr, Benedikt Nordhoff, Matthias Perner, Siegfried Rasthofer, David Schneider, Gregor Snelting, Artem Starostin and Alexandra Weber. Software Security for Mobile Devices. Poster at the 36th IEEE Symposium on Security and Privacy (S&P), 2015.
[ BibTeX entry | Abstract ] - Aslan Askarov, Stephen Chong and Heiko Mantel. Hybrid Monitors for Concurrent Noninterference. In Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), pages 137-151. IEEE Computer Society, 2015.
[ BibTeX entry | PDF ] - Thomas Bauereiss, Abhishek Bichhawat, Iulia Bolosteanu, Peter Faymonville, Bernd Finkbeiner, Deepak Garg, Richard Gay, Sergey Grebenshchikov, Christian Hammer, Dieter Hutter, Ondřej Kunčar, Peter Lammich, Heiko Mantel, Christian Müller, Andrei Popescu, Markus Rabe, Vineet Rajani, Helmut Seidl, Markus Tasch and Leander Tentrup. Security in Web-Based Workflows. Poster at the 36th IEEE Symposium on Security and Privacy (S&P), 2015.
[ BibTeX entry | Abstract ] - Daniel Bruns, Huy Quoc Do, Simon Greiner, Mihai Herda, Martin Mohr, Enrico Scapin, Tomasz Truderung, Bernhard Beckert, Ralf Küsters, Heiko Mantel and Richard Gay. Security in E-Voting. Poster at the 36th IEEE Symposium on Security and Privacy (S&P), 2015.
[ BibTeX entry | Abstract ] - Dominik Bollmann, Steffen Lortz, Heiko Mantel, Artem Starostin. An Automatic Inference of Minimal Security Types. In Proceedings of the 11th International Conference on Information Systems Security (ICISS), pages 395-415, 2015.
[ BibTeX entry | PDF ] - Richard Gay, Heiko Mantel and Henning Sudbrock. An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels. In International Journal of Secure Software Engineering (IJSSE), 6(2), pages 1-22, 2015.
[ BibTeX entry ] - Jinwei Hu, Heiko Mantel and Sebastian Ruhleder. Enforcing Usage Constraints on Credentials for Web Applications. In Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), pages 112-125. Springer, 2015.
[ BibTeX entry | PDF ] - Steffen Lortz, Heiko Mantel, David Schneider, Artem Starostin, Timo Bähr and Alexandra Weber. Certifying the Security of Android Applications with Cassandra. Short Talk at the 36th IEEE Symposium on Security and Privacy (S&P), 2015.
[ BibTeX entry | Abstract ] - Heiko Mantel, Markus Müller-Olm, Matthias Perner and Alexander Wenner. Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis. In Post-Proceedings of the 25th Logic-Based Program Synthesis and Transformation (LOPSTR), pages 201-217. Springer, 2015.
[ BibTeX entry | PDF ] - Heiko Mantel, Markus Müller-Olm, Matthias Perner and Alexander Wenner. Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis. In Pre-Proceedings of the 25th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2015.
[ BibTeX entry | PDF ] - Heiko Mantel and Artem Starostin. Transforming Out Timing Leaks, More or Less. In Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS) - Part I, pages 447-467. Springer, 2015.
[ BibTeX entry | PDF ] - Eduard Kamburjan. Vergleich zweier operationeller Ausführungssemantiken mit schwachen Speichermodellen. Studienarbeit, TU Darmstadt, 2015.
[ BibTeX entry ] - Markus Tasch. Towards Guaranteeing Information Flow Properties by Architectural Design. Master Thesis, TU Darmstadt, 2015.
[ BibTeX entry ] - Moritz Tiedje. Design and Evaluation of Profiling Methods for the Distributed Enforcement Mechanism CliSeAu. Bachelor Thesis, TU Darmstadt, 2015.
[ BibTeX entry ] - Friedrich Weber. Software-Based Energy-Consumption Measurement for Side-Channel Analysis. Bachelor Thesis, TU Darmstadt, 2015.
[ BibTeX entry ] - Roberts Kolosovs. Soundly Extending the Scope of a Security Analysis for Java by Program Rewriting. Bachelor's thesis, TU Darmstadt, 2015.
[ BibTeX entry ]
2014
- David Basin, Germano Caronni, Sarah Ereth, Matúš Harvan, Felix Klaedtke and Heiko Mantel. Scalable Offline Monitoring. In Proceedings of the 14th International Conference on Runtime Verification (RV), pages 31-47, 2014.
[ BibTeX entry | PDF ] - Sarah Ereth, Steffen Lortz and Matthias Perner. Confidentiality for Android Apps: Specification and Verification. In it - Information Technology, 56(6), pages 288-293, 2014.
[ BibTeX entry ] - Sarah Ereth, Heiko Mantel and Matthias Perner. Towards a Common Specification Language for Information-Flow Security in RS3 and Beyond: RIFL 1.0 - The Language. TU Darmstadt, Technical Report TUD-CS-2014-0115, 2014.
[ BibTeX entry | PDF ] - Richard Gay, Jinwei Hu and Heiko Mantel. CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement. In Proceedings of the 10th International Conference on Information Systems Security (ICISS). LNCS 8880, pages 378-398. Springer, 2014.
[ BibTeX entry | PDF ] - Richard Gay, Jinwei Hu and Heiko Mantel. Coordinating Distributed Security Enforcement. Short Talk at the 27th IEEE Computer Security Foundations Symposium (CSF), 2014.
[ BibTeX entry | Abstract ] - Sylvia Grewe, Alexander Lux, Heiko Mantel and Jens Sauer. A Formalization of Strong Security. In Archive of Formal Proofs, 2014. http://afp.sf.net/entries/Strong_Security.shtml, Formal proof development.
[ BibTeX entry ] - Sylvia Grewe, Alexander Lux, Heiko Mantel and Jens Sauer. A Formalization of Declassification with WHAT-and-WHERE-Security. In Archive of Formal Proofs, 2014. http://afp.sf.net/entries/WHATandWHERE_Security.shtml, Formal proof development.
[ BibTeX entry ] - Sylvia Grewe, Heiko Mantel and Daniel Schoepe. A Formalization of Assumptions and Guarantees for Compositional Noninterference. In Archive of Formal Proofs, 2014. http://afp.sf.net/entries/SIFUM_Type_Systems.shtml, Formal proof development.
[ BibTeX entry ] - Steve Kremer and Robert Künnemann. Automated Analysis of Security Protocols with Global State. In Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P), pages 163-178. IEEE Computer Society, 2014.
[ Abstract | BibTeX entry | PDF ] - Steffen Lortz, Heiko Mantel, Artem Starostin and Alexandra Weber. A Sound Information-Flow Analysis for Cassandra. TU Darmstadt, Technical Report TUD-CS-2014-0064, 2014.
[ BibTeX entry | PDF ] - Steffen Lortz, Heiko Mantel, Artem Starostin, Timo Bähr and David Schneider. Cassandra: Towards a Certifying App Store. TU Darmstadt, Technical Report TUD-CS-2014-0117, 2014.
[ BibTeX entry | PDF ] - Steffen Lortz, Heiko Mantel, Artem Starostin, Timo Bähr, David Schneider and Alexandra Weber. Cassandra: Towards a Certifying App Store for Android. In Proceedings of the 4th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pages 93-104. ACM, 2014.
[ BibTeX entry | PDF ] - Heiko Mantel, Matthias Perner and Jens Sauer. Noninterference under Weak Memory Models (Progress Report). TU Darmstadt, Technical Report TUD-CS-2014-0062, 2014.
[ BibTeX entry | PDF ] - Heiko Mantel, Matthias Perner and Jens Sauer. Noninterference under Weak Memory Models. In Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF), pages 80-94. IEEE Computer Society, 2014.
[ BibTeX entry | PDF ] - Heiko Mantel, Matthias Perner and Jens Sauer. Noninterference under Weak Memory Models. In Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF), pages 80-94. IEEE Computer Society, 2014.
[ BibTeX entry | PDF ] - Heiko Mantel (Ed.). Special Issue: Reliably Secure Software Systems. it - Information Technology 56(6), De Gruyter, 2014.
[ BibTeX entry | URL ] - Frank Hartmann. Protecting Third-Party Web Service Integrations with Service Automata. Master Thesis, TU Darmstadt, 2014.
[ BibTeX entry ] - Jan Erik Keller. Der typbasierte Nachweis von Noninterference für Dalvik-Programme mit Ausnahmebehandlung. Master Thesis, TU Darmstadt, 2014.
[ BibTeX entry ] - David Schneider. An Object-Sensitive Type-Based Information-Flow Analysis for Android Applications. Master Thesis, TU Darmstadt, 2014.
[ BibTeX entry ] - Alexandra Weber. Comparison of an Operational and an Axiomatic Model of Execution for Multi-threaded Programs. Master Thesis, TU Darmstadt, 2014.
[ BibTeX entry ]
2013
- Markus Aderhold, Alexander Gebhardt and Heiko Mantel. Choosing a Formalism for Secure Coding: FSM vs. LTL. TU Darmstadt, Technical Report TUD-CS-2013-0180, 2013.
[ BibTeX entry | PDF ] - Markus Aderhold and Artjom Kochtchi. Tailoring PMD to Secure Coding. TU Darmstadt, Technical Report TUD-CS-2013-0245, 2013.
[ BibTeX entry | PDF ] - Richard Gay, Heiko Mantel and Henning Sudbrock. An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels. In Proceedings of the 2nd International Workshop on Quantitative Aspects in Security Assurance (QASA), 2013.
[ BibTeX entry | PDF ] - Matúš Harvan, David Basin, Germano Caronni, Sarah Ereth, Felix Klaedtke and Heiko Mantel. Checking System Compliance by Slicing and Monitoring Logs. ETH Zurich, Technical Report 791, 2013.
[ BibTeX entry | PDF ] - Heiko Mantel and Henning Sudbrock. Types vs. PDGs in Information Flow Analysis. In Post-Proceedings of the 22nd International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR 2012). LNCS 7844, pages 106-121. Springer, 2013.
[ BibTeX entry | PDF | Addendum ] - Barbara Sprick and Daniel Staesche. Verifying Information Flow Security in Visibly Pushdown Automata. TU Darmstadt, Technical Report TUD-CS-2013-0275, 2013.
[ BibTeX entry | PDF ] - Henning Sudbrock. Compositional and Scheduler-Independent Information Flow Security. Ph.D. Thesis, Technische Universität Darmstadt, 2013.
[ BibTeX entry | PDF ] - Jens Korinth. Preserving Information Flow Properties of CSP Specifications under Refinement. Master Thesis, TU Darmstadt, 2013.
[ BibTeX entry ] - Patrick Metzler. Tool Support for Step-Wise Analysis and Mitigation of Timing Channels in Java. Bachelor Thesis, TU Darmstadt, 2013.
[ BibTeX entry ] - Sebastian Ruhleder. Enforcing Usage Constraints on Credentials for Web Applications. Bachelor Thesis, TU Darmstadt, 2013.
[ BibTeX entry ] - Dominic Scheurer. Enforcing Datalog Policies with Service Automata on Distributed Version Control Systems. Bachelor Thesis, TU Darmstadt, 2013.
[ BibTeX entry ] - Johannes Schickel. Towards Automatic Construction of Timing Attacks against Software. Bachelor Thesis, TU Darmstadt, 2013.
[ BibTeX entry ] - Markus Tasch. Exemplary Specification of Integrity Requirements by Information-Flow Properties. Bachelor Thesis, TU Darmstadt, 2013.
[ BibTeX entry ] - Pascal Wittmann. Confidentiality for Multithreaded Dalvik Programs by SIFUM Security. Bachelor Thesis, TU Darmstadt, 2013.
[ BibTeX entry ] - Timo Bähr. Berichte für Zertifizierungsergebnisse im Certifying Application Store. Bachelor's thesis, TU Darmstadt, 2013.
[ BibTeX entry ]
2012
- Richard Gay, Heiko Mantel and Barbara Sprick. Service Automata. In Post-Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011). LNCS 7140, pages 148-163. Springer, 2012.
[ BibTeX entry | PDF | Proofs ] - Jinwei Hu, Khaled M. Khan, Yun Bai and Yan Zhang. Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems. In Proceedings of the 15th Information Security Conference (ISC), pages 290-305. Springer, 2012.
[ BibTeX entry ] - Alexander Lux, Heiko Mantel and Matthias Perner. Scheduler-Independent Declassification. TU Darmstadt, Technical Report TUD-CS-2012-0061, 2012.
[ BibTeX entry | PDF ] - Alexander Lux, Heiko Mantel and Matthias Perner. Scheduler-Independent Declassification. In Proceedings of the 11th International Conference on Mathematics of Program Construction (MPC). LNCS 7342, pages 25-47. Springer, 2012.
[ BibTeX entry | PDF ] - Christopher Mann and Artem Starostin. A Framework for Static Detection of Privacy Leaks in Android Applications. In Proceedings of the 27th Symposium on Applied Computing (SAC), Computer Security Track, pages 1457-1462. ACM, 2012.
[ BibTeX entry | PDF ] - Heiko Mantel and Henning Sudbrock. Types vs. PDGs in Information Flow Analysis. In Pre-Proceedings of the 22nd International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR 2012), 2012.
[ BibTeX entry ] - Martin Ochoa, Sebastian Pape, Thomas Ruhroth, Barbara Sprick, Kurt Stenzel and Henning Sudbrock. Report on the RS3 Topic Workshop ``Security Properties in Software Engineering''. Universität Augsburg, Technical Report 2012-02, 2012.
[ BibTeX entry ] - Markus Aderhold, Serge Autexier and Heiko Mantel (Ed.). Proceedings of the 6th International Verification Workshop (VERIFY 2010). EPiC Series in Computer Science, Vol. 3, 2012. Workshop in connection with the Federated Logic Conference (FLoC 2010).
[ BibTeX entry ] - Alexander Gebhardt. Monitoring C Programs by Finite State Machines. Master Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Sylvia Grewe. Toward a Framework for Soundness Proofs of Type Systems in Language-based Information-flow Security. Master Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Steffen Lortz. Robustness of Information Flow Security Under Refinement of Synchronization Primitives. Master Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Sogol Mazaheri. Race Conditions in Distributed Enforcement at the Example of Online Social Networks. Bachelor Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Jan Mundo. Analyse von C-Programmen bezüglich Secure Coding mittels LTL-Modelchecking. Bachelor Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Simon Reinhardt. Implementation and Evaluation of a Module for Type-based Information-Flow Analysis of Multi-threaded Programs on Android. Bachelor Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Lucas Rothamel. Formalisation of Android Inter-Application Communication. Bachelor Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Jens Sauer. Informationsflusssicherheit in Systemen mit zwei Prozessoren. Master Thesis, TU Darmstadt, 2012.
[ BibTeX entry | PDF ] - David Schneider. Instance-Specific Security Domain Assignments in Sequential Programming Languages. Bachelor Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Daniel Schoepe. Compositionality of Information Flow Security with Assumptions and Guarantees in Isabelle/HOL. Bachelor Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Daniel Specht. A Formal Model and Tool for Data Flow Security in Computer Networks. Bachelor Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Daniel Staesche. Security Preserving Refinement of CSP Specifications. Master Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Alexandra Weber. A Formal Model, a Noninterference Condition, and a Sound Type System for a Certifying Application Store. Bachelor Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Florian Wendel. An Evaluation of Delegation Strategies for Coordinated Enforcement. Bachelor Thesis, TU Darmstadt, 2012.
[ BibTeX entry ] - Dominik Bollmann. Security Type Inference for the Type-Based Information Flow Analysis of Java Programs. Bachelor's thesis, TU Darmstadt, 2012.
[ BibTeX entry ]
2011
- Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing and Markus Rückert. On the Security of the Winternitz One-Time Signature Scheme. In 4th International Conference on Cryptology in Africa (AFRICACRYPT). LNCS 6737, pages 363-378. Springer, 2011.
[ BibTeX entry | URL ] - Deepak D'Souza, Ravindra Holla, Raghavendra KR and Barbara Sprick. Model Checking Trace Based Information Flow Properties. In Journal of Computer Security (JCS), 19(1), pages 101-138, 2011.
[ BibTeX entry ] - Richard Gay, Heiko Mantel and Barbara Sprick. Service Automata. In Pre-Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2011.
[ BibTeX entry | PDF | Proofs ] - Alexander Lux and Artem Starostin. A Tool for Static Detection of Timing Channels in Java. In Proceedings of the 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE), 2011.
[ BibTeX entry | PDF ] - Alexander Lux and Artem Starostin. A Tool for Static Detection of Timing Channels in Java. In Journal of Cryptographic Engineering (JCEN), 1(4), pages 303-313, 2011.
[ BibTeX entry | PDF ] - Heiko Mantel. Information Flow and Noninterference. In Encyclopedia of Cryptography and Security (2nd Ed.), pages 605-607, 2011.
[ BibTeX entry ] - Heiko Mantel, David Sands and Henning Sudbrock. Assumptions and Guarantees for Compositional Noninterference. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF), pages 218-232. IEEE Computer Society, 2011.
[ BibTeX entry | PDF | Proofs and Addendum ] - Christopher Mann. A Static Framework for Privacy Analysis of Android Applications. Bachelor Thesis, TU Darmstadt, 2011.
[ BibTeX entry ] - Matthias Perner. Controlled Declassification under Semantics with Schedulers. Master Thesis, TU Darmstadt, 2011.
[ BibTeX entry | PDF ] - Tobias Plötz. Vertraulichkeit von Werten im Modular Assembly Kit for Security (MAKS). Bachelor Thesis, TU Darmstadt, 2011.
[ BibTeX entry ]
2010
- Markus Aderhold. Automated Termination Analysis for Programs with Second-Order Recursion. In Proceedings of the 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS). LNCS 6015, pages 221-235. Springer, 2010.
[ BibTeX entry | PDF ] - Markus Aderhold. Automated Synthesis of Induction Axioms for Programs with Second-Order Recursion. In Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR). LNAI 6173, pages 263-277. Springer, 2010.
[ BibTeX entry | PDF ] - Markus Aderhold. Second-Order Programs with Preconditions. In Verification, Induction, Termination Analysis: Festschrift for Christoph Walther on the Occasion of His 60th Birthday. LNAI 6463, pages 129-143, Springer, 2010.
[ BibTeX entry | PDF ] - Markus Aderhold, Jorge Cuéllar, Heiko Mantel and Henning Sudbrock. Exemplary Formalization of Secure Coding Guidelines. TU Darmstadt, Technical Report TUD-CS-2010-0060, 2010.
[ BibTeX entry | PDF ] - Richard Gay, Heiko Mantel and Barbara Sprick. Service Automata for Secure Distributed Systems. Poster at the 26th Annual Computer Security Applications Conference (ACSAC), 2010.
[ BibTeX entry | Poster Proposal ] - Alexander Lux, Heiko Mantel, Matthias Perner and Artem Starostin. Side Channel Finder (Version 1.0). TU Darmstadt, Technical Report TUD-CS-2010-0155, 2010.
[ BibTeX entry | PDF ] - Alexander Lux and Artem Starostin. Side Channel Finder (Version 1.0). Poster at the 26th Annual Computer Security Applications Conference (ACSAC), 2010.
[ BibTeX entry | Poster Proposal ] - Heiko Mantel. Sicherheitsgarantien zuverlässig nachweisen. In forschen(2), pages 66-70, 2010.
[ BibTeX entry ] - Heiko Mantel and Henning Sudbrock. Flexible Scheduler-Independent Security. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS). LNCS 6345, pages 116-133. Springer, 2010.
[ BibTeX entry | PDF | Proofs of Theorems ] - Sylvia Grüner. Formale Spezifikation von Sicherheitsanforderungen mit MAKS in Isabelle/HOL. Bachelor Thesis, TU Darmstadt, 2010.
[ BibTeX entry ] - Jens Korinth. Relating Process Semantics by Equivalence-Preserving Transformations. Bachelor Thesis, TU Darmstadt, 2010.
[ BibTeX entry ] - Timo Schneider. Model Checking von Informationsflusseigenschaften. Master Thesis, TU Darmstadt, 2010.
[ BibTeX entry ] - Oliver Bračevac. Verhaltensintegrität von Programmen unter nebenläufigen Dateisystemzugriffen. Bachelor Thesis, TU Darmstadt, 2010.
[ BibTeX entry ]
2009
- Alexander Lux and Heiko Mantel. Who Can Declassify? In Post-Proceedings of the 5th Workshop on Formal Aspects in Security and Trust (FAST 2008). LNCS, 5491, pages 35-49. Springer, 2009.
[ BibTeX entry | PDF ] - Alexander Lux and Heiko Mantel. Declassification with Explicit Reference Points. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS). LNCS, 5789, pages 69-85. Springer, 2009.
[ BibTeX entry | PDF ] - Heiko Mantel and Henning Sudbrock. Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels. In Post-Proceedings of the 5th International Workshop on Formal Aspects in Security and Trust (FAST 2008). LNCS 5491, pages 67-81. Springer, 2009.
[ BibTeX entry | PDF | Appendix ] - Heiko Mantel and Henning Sudbrock. Increasing the Precision of the Combining Calculus (Extended Abstract). In Proceedings of the 5th International Workshop on Programming Language Interference and Dependence (PLID), 2009.
[ BibTeX entry ] - Sven Amann. Spezifikation und Codegenerierung von Sicherheitsautomaten. Bachelor Thesis, TU Darmstadt, 2009.
[ BibTeX entry ] - Steffen Lortz. Typbasierte Informationsflussanalyse für JVM-Programme auf Mobilgeräten. Bachelor Thesis, TU Darmstadt, 2009.
[ BibTeX entry ]
2008
- Deepak D'Souza, Raveendra Holla, Janardhan Kulkarni, Raghavendra Kagalavadi Ramesh and Barbara Sprick. On the Decidability of Model-Checking Information Flow Properties. In Proceedings of the 4th International Conference on Information Systems Security (ICISS). LNCS 5352, pages 26-40. Springer, 2008.
[ BibTeX entry ] - Alexander Lux and Heiko Mantel. Who Can Declassify? In Pre-Proceedings of the 5th Workshop on Formal Aspects in Security and Trust (FAST 2008), pages 35-49, 2008.
[ BibTeX entry | PDF ] - Heiko Mantel and Henning Sudbrock. Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels. In Pre-Proceedings of the 5th Workshop on Formal Aspects in Security and Trust (FAST 2008), pages 67-81, 2008.
[ BibTeX entry | PDF ] - H. Gregor Molter, Hui Shao, Henning Sudbrock, Sorin A. Huss and Heiko Mantel. Designing a Coprocessor for Interrupt Handling on an FPGA. TU Darmstadt, Technical Report TUD-CS-2008-1103, 2008.
[ BibTeX entry | PDF ] - Serge Autexier, Heiko Mantel, Stephan Merz and Tobias Nipkow (Ed.). Special Issue on Formal Modeling and Verification of Critical Systems. Journal of Automated Reasoning 41(3-4), Springer, 2008.
[ BibTeX entry | URL ] - Matthias Perner. Information Flow Analysis for CIL. Bachelor Thesis, TU Darmstadt, 2008.
[ BibTeX entry | PDF ] - Timo Schneider. Fallstudie: Sicherheitsautomat für einen orchestrierten Dienst in einer serviceorientierten Architektur. Bachelor Thesis, TU Darmstadt, 2008.
[ BibTeX entry ]
2007
- Dieter Hutter, Heiko Mantel, Ina Schaefer and Axel Schairer. Security of Multi-agent Systems: A Case Study on Comparison Shopping. In Journal of Applied Logic (JAL), 5(2), pages 303-332, 2007.
[ BibTeX entry ] - Boris Köpf and Heiko Mantel. Transformational Typing and Unification for Automatically Correcting Insecure Programs. In International Journal of Information Security (IJIS), 6(2-3), pages 107-131, 2007.
[ BibTeX entry ] - Tina Kraußer, Heiko Mantel and Henning Sudbrock. A Probabilistic Justification of the Combining Calculus under the Uniform Scheduler Assumption. RWTH Aachen, Technical Report 2007-09, 2007.
[ BibTeX entry ] - Heiko Mantel and Alexander Reinhard. Controlling the What and Where of Declassification in Language-Based Security. In Proceedings of the 16th European Symposium on Programming (ESOP). LNCS, 4421, pages 141-156. Springer, 2007.
[ Abstract | BibTeX entry | PDF ] - Heiko Mantel and Henning Sudbrock. Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. In Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF), pages 326-340. IEEE Computer Society, 2007.
[ Abstract | BibTeX entry | PDF ] - Heiko Mantel, Henning Sudbrock and Tina Kraußer. Combining Different Proof Techniques for Verifying Information Flow Security. In Post-Proceedings of the 16th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR 2006). LNCS, 4407, pages 94-110. Springer, 2007.
[ Abstract | BibTeX entry | PDF ] - Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers and Andrei Sabelfeld (Ed.). Executive Summary and Abstracts Collection of Seminar 0709: Mobility, Ubiquity, and Security. Dagstuhl, 2007.
[ BibTeX entry ] - Virgil D. Gligor and Heiko Mantel (Ed.). Proceedings of the ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE). 2007.
[ BibTeX entry ]
2006
- Heiko Mantel, Henning Sudbrock and Tina Kraußer. Combining Different Proof Techniques for Verifying Information Flow Security. In Pre-Proceedings of the 16th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR 2006), pages 85-101, 2006.
[ Abstract | BibTeX entry | PDF | zipped Postscript ] - Boris Köpf and Heiko Mantel. Eliminating Implicit Information Leaks by Transformational Typing and Unification. In Post-Proceedings of the 3rd International Workshop on Formal Aspects in Security and Trust (FAST 2005). LNCS, 3866, pages 47-62. Springer, 2006.
[ BibTeX entry | URL ] - Serge Autexier and Heiko Mantel (Ed.). Proceedings of the Verification Workshop (VERIFY 2006). FLoC, 2006. Workshop in connection with Federated Logic Conference, FLoC'06.
[ BibTeX entry | URL ] - Alexander Reinhard. Analyse nebenläufiger Programme unter intransitiven Sicherheitspolitiken. Diploma Thesis, RWTH Aachen, 2006.
[ BibTeX entry | PDF ]
2005
- Boris Köpf and Heiko Mantel. Eliminating Implicit Information Leaks by Transformational Typing and Unification. In Pre-Proceedings of the 3rd International Workshop on Formal Aspects in Security and Trust (FAST 2005), pages 45-60, 2005.
[ BibTeX entry | URL | PDF | zipped Postscript ] - Boris Köpf and Heiko Mantel. Eliminating Implicit Information Leaks by Transformational Typing and Unification. ETH Zürich, Technical Report 498, 2005.
[ BibTeX entry | PDF | zipped Postscript ] - Heiko Mantel. The Framework of Selective Interleaving Functions and the Modular Assembly Kit. In Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE), pages 53-62. ACM, 2005.
[ BibTeX entry | PDF | zipped Postscript ] - Heiko Mantel and Axel Schairer. Exploiting Generic Aspects of Security Models in Formal Developments. In Mechanizing Mathematical Reasoning. LNCS 2605, pages 129-145, Springer, 2005.
[ BibTeX entry | URL ] - Serge Autexier, Iliano Cervesato and Heiko Mantel (Ed.). Special Issue on FCS/Verify 2002. International Journal for Information Security 4(1-2), Springer, 2005.
[ BibTeX entry | URL ]
2004
- Christoph Kreitz and Heiko Mantel. A Matrix Characterization for Multiplicative Exponential Linear Logic. In Journal of Automated Reasoning (JAR), 32(2), pages 121-166, 2004.
[ BibTeX entry ] - Heiko Mantel and David Sands. Controlled Declassification based on Intransitive Noninterference. In Proceedings of the 2nd ASIAN Symposium on Programming Languages and Systems (APLAS). LNCS 3302, pages 129-145. Springer, 2004.
[ BibTeX entry | PDF | zipped Postscript ]
2003
- Heiko Mantel. A Uniform Framework for the Formal Specification and Verification of Information Flow Security. Ph.D. Thesis, Universität des Saarlandes, 2003.
[ BibTeX entry | PDF ] - Heiko Mantel and Andrei Sabelfeld. A Unifying Approach to the Security of Distributed and Multi-Threaded Programs. In Journal of Computer Security (JCS), 11(4), pages 615-676, 2003.
[ BibTeX entry ] - Anindya Banerjee, Heiko Mantel, David Naumann and Andrei Sabelfeld (Ed.). Final Report on Seminar 03411: Language-Based Security. Dagstuhl, 2003.
[ BibTeX entry ]
2002
- Heiko Mantel. On the Composition of Secure Systems. In Proceedings of the 23rd IEEE Symposium on Security and Privacy (S&P), pages 88-101. IEEE Computer Society, 2002.
[ Abstract | BibTeX entry | PDF | zipped Postscript ] - Andrei Sabelfeld and Heiko Mantel. Static Confidentiality Enforcement for Distributed Programs. In Proceedings of the 9th International Static Analysis Symposium (SAS). LNCS 2477, pages 376-394. Springer, 2002.
[ BibTeX entry | PDF | zipped Postscript ] - Serge Autexier and Heiko Mantel (Ed.). Proceedings of the Verification Workshop (VERIFY'02). DIKU, 2002. Workshop in connection with Federated Logic Conference, FLoC'02.
[ BibTeX entry | URL ]
2001
- Heiko Mantel. Information Flow Control and Applications - Bridging a Gap. In Proceedings of the 10th International Symposium of Formal Methods Europe (FME). LNCS 2021, pages 153-172. Springer, 2001.
[ BibTeX entry | PDF | zipped Postscript ] - Heiko Mantel. Preserving Information Flow Properties under Refinement. In Proceedings of the 22nd IEEE Symposium on Security and Privacy (S&P), pages 78-91. IEEE Computer Society, 2001.
[ Abstract | BibTeX entry | PDF | zipped Postscript ] - Heiko Mantel and Andrei Sabelfeld. A Generic Approach to the Security of Multi-threaded Programs. In Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW), pages 126-142. IEEE Computer Society, 2001.
[ Abstract | BibTeX entry | PDF | zipped Postscript ] - Heiko Mantel, Axel Schairer, Matthias Kabatnik, Michael Kreutzer and Alf Zugenmaier. Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks. Institut für Informatik, Universität Freiburg, Technical Report 159, 2001.
[ BibTeX entry | PDF | zipped Postscript ] - Serge Autexier and Heiko Mantel (Ed.). Proceedings of the Verification Workshop (VERIFY'01). Università degli Studi di Siena, 2001. Workshop in connection with International Joint Conference on Automated Reasoning, IJCAR'01.
[ BibTeX entry ]
2000
- Serge Autexier, Dieter Hutter, Bruno Langenstein, Heiko Mantel, Georg Rock, Axel Schairer, Werner Stephan, Roland Vogt and Andreas Wolpers. VSE: Formal Methods Meet Industrial Needs. In International Journal on Software Tools for Technology Transfer (STTT), 3(1), pages 66-77, 2000.
[ BibTeX entry ] - Christoph Kreitz and Heiko Mantel. A Matrix Characterization for Multiplicative Exponential Linear Logic. Cornell University, Technical Report, 2000. Revised version appeared in 2004 in Journal of Automated Reasoning.
[ BibTeX entry ] - Heiko Mantel. Possibilistic Definitions of Security - An Assembly Kit. In Proceedings of the 13th IEEE Computer Security Foundations Workshop (CSFW), pages 185-199. IEEE Computer Society, 2000.
[ Abstract | BibTeX entry | PDF | zipped Postscript ] - Heiko Mantel. Unwinding Possibilistic Security Properties. In European Symposium on Research in Computer Security (ESORICS). LNCS 1895, pages 238-254. Springer, 2000.
[ BibTeX entry | PDF | zipped Postscript ] - Heiko Mantel. A new framework for possibilistic security - A summary - ABSTRACT. IEEE Symposium on Security and Privacy, Technical Report, 2000. The full paper appeared in 2000 at CSFW.
[ BibTeX entry ] - Heiko Mantel and Felix Gärtner. A Case Study in the Mechanical Verification of Fault Tolerance. In Proceedings of the 13th International Florida Artificial Intelligence Research Society Conference (FLAIRS), pages 341-345. AAAI Press, 2000.
[ BibTeX entry | PDF | zipped Postscript ] - Heiko Mantel and Felix Gärtner. A Case Study in the Mechanical Verification of Fault Tolerance. In Journal of Experimental and Theoretical Artificial Intelligence (JETAI), 12(4), pages 473-488, 2000.
[ BibTeX entry ]
1999
- Serge Autexier, Dieter Hutter, Heiko Mantel and Axel Schairer. System Description: INKA 5.0 - A Logic Voyager. In Proceedings of the 16th International Conference on Automated Deduction (CADE). LNAI 1632, pages 207-211. Springer, 1999.
[ BibTeX entry | PDF | zipped Postscript ] - Serge Autexier, Dieter Hutter, Heiko Mantel and Axel Schairer. Towards an Evolutionary Formal Software-Development Using CASL (Abstract). In Proceedings of the 14th International Workshop on Algebraic Development Techniques (WADT). LNCS, 1827, pages 73-88. Springer, 1999.
[ BibTeX entry | PDF | zipped Postscript ] - Serge Autexier, Dieter Hutter, Heiko Mantel and Axel Schairer. Towards an Evolutionary Formal Software-Development Using CASL. In Recent Trends in Algebraic Development Techniques, 14th International Workshop, WADT'99, Chateau de Bonas, France, September 15-18, 1999, Selected Papers, 1999.
[ BibTeX entry ] - Heiko Mantel and Felix Gärtner. A Case Study in the Mechanical Verification of Fault Tolerance. TU Darmstadt, Technical Report TUD-BS-1999-08, 1999.
[ BibTeX entry | PDF | zipped Postscript ] - Heiko Mantel and Jens Otten. linTAP: A Tableau Prover for Linear Logic. In Proceedings of the 8th International Conference on Automated Reasoning with Analytic Tableaux and Related Methods (TABLEAUX). LNAI 1617, pages 217-231. Springer, 1999.
[ BibTeX entry | PDF | zipped Postscript ]
1998
- Serge Autexier and Heiko Mantel. Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus. University of Saarbrücken, Technical Report SR-98-05, 1998.
[ BibTeX entry | PDF | zipped Postscript ] - Serge Autexier, Heiko Mantel and Werner Stephan. Simultaneous Quantifier Elimination. In Proceedings of the 22nd German Conference on Artificial Intelligence (KI). LNAI 1504, pages 141-152. Springer, 1998.
[ BibTeX entry | PDF | zipped Postscript ] - Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn and Kurt Stenzel. VSE: Controlling the Complexity in Formal Software Developments. In Proceedings of the International Workshop on Current Trends in Applied Formal Methods (FM-Trends). LNCS 1641, pages 351-358. Springer, 1998.
[ BibTeX entry ] - Heiko Mantel. Developing a Matrix Characterization for MELL. DFKI, Technical Report RR-98-03, 1998.
[ BibTeX entry | URL ] - Heiko Mantel and Christoph Kreitz. A Matrix Characterization for MELL. In Proceedings of the 5th European Workshop on Logics in Artificial Intelligence (JELIA). LNAI 1489, pages 169-183. Springer, 1998.
[ BibTeX entry ]
1997
- Christoph Kreitz, Heiko Mantel, Jens Otten and Stephan Schmitt. Connection-Based Proof Construction in Linear Logic. In Proceedings of the 14th International Conference on Automated Deduction (CADE). LNAI 1249, pages 207-221. Springer, 1997.
[ BibTeX entry | PDF | zipped Postscript ] - Heiko Mantel and Enno Sandner. A Framework for Connection Calculi. Knowledge Representation and Reasoning Group, Artificial Intelligence Institute, Computer Science Departement, Dresden University of Technology, Technical Report, 1997.
[ BibTeX entry | PDF | zipped Postscript ]
1996
- Heiko Mantel. Eine Matrixcharakterisierung für ein Fragment der Linearen Logik. Diploma Thesis, TU Darmstadt, 1996.
[ BibTeX entry ]
250 hits found
BibTeX file of all entries
BibTeX file of all entries