TU Darmstadt / ULB / TUbiblio

Items in division

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | G | H | K | L | M | N | P | R | S | W
Number of items at this level: 159.

A

Aderhold, Markus and Kochtchi, Artjom :
Tailoring PMD to Secure Coding.

[Report] , (2013)

Aderhold, Markus and Gebhardt, Alexander and Mantel, Heiko :
Choosing a Formalism for Secure Coding: FSM vs. LTL.

[Report] , (2013)

Aderhold, Markus and Cuéllar, Jorge and Mantel, Heiko and Sudbrock, Henning :
Exemplary Formalization of Secure Coding Guidelines.
In: aderhold.ea:exemplary:2010a . Germany
[Report] , (2010)

Aderhold, Markus
Esparza, J. and Majumdar, R. (eds.) :

Automated Termination Analysis for Programs with Second-Order Recursion.
In: LNCS 6015 . Springer
[Conference or Workshop Item] , (2010)

Aderhold, Markus
Giesl, J. and Hähnle, R. (eds.) :

Automated Synthesis of Induction Axioms for Programs with Second-Order Recursion.
In: LNAI 6173 . Springer
[Conference or Workshop Item] , (2010)

Aderhold, Markus
Esparza, Javier and Majumdar, Rupak (eds.) :

Automated Termination Analysis for Programs with Second-Order Recursion.
16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS-16) Springer
[Conference or Workshop Item] , (2010)

Amann, Sven :
Spezifikation und Codegenerierung von Sicherheitsautomaten.
TU Darmstadt
[Bachelor Thesis] , (2009)

Amann, Sven :
Spezifikation und Codegenerierung von Sicherheitsautomaten.

[Other] , (2009)

Autexier, Serge and Hutter, Dieter and Langenstein, Bruno and Mantel, Heiko and Rock, Georg and Schairer, Axel and Stephan, Werner and Vogt, Roland and Wolpers, Andreas :
VSE: Formal Methods Meet Industrial Needs.
[Online-Edition: https://link.springer.com/article/10.1007/s100099900022]
In: International Journal on Software Tools for Technology Transfer, 3 (1) pp. 66-77. ISSN 1433-2779
[Article] , (2000)

Autexier, Serge and Hutter, Dieter and Mantel, Heiko and Schairer, Axel :
System Description: INKA 5.0 -- A Logic Voyager.
In: LNAI 1632 . Springer , Trento, Italy
[Conference or Workshop Item] , (1999)

Autexier, Serge and Hutter, Dieter and Mantel, Heiko and Schairer, Axel
Bert, D. and Choppy, C. and Mosses, P. (eds.) :

Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: LNCS , 1827 . Springer
[Conference or Workshop Item] , (1999)

Autexier, Serge and Hutter, Dieter and Mantel, Heiko and Schairer, Axel
Bert, Didier and Choppy, C. and Mosses, P. (eds.) :

Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: Recent trends in algebraic development techniques : 14th International Workshop on Algebraic Development Techniques, WADT'99. Lecture Notes in Computer Science, 1827. Springer, Berlin ; Heidelberg Chateaux de Bonas, France , pp. 73-88.
[Book Section] , (1999)

Autexier, Serge and Mantel, Heiko and Stephan, Werner
Herzog, Otthein and Günter, Andreas (eds.) :

Simultaneous Quantifier Elimination.
In: LNAI 1504 . Springer , Bremen, Germany
[Conference or Workshop Item] , (1998)

Autexier, Serge and Mantel, Heiko :
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.

[Report] , (1998)

Autexier, Serge and Mantel, Heiko :
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
In: autexier.ea:semantical-investigation-of-simultaneous-skolemization-for-first-order-sequent-calculus:1998a . Germany
[Report] , (1998)

B

Bauereiß, Thomas and Greiner, Simon and Herda, Mihai and Kirsten, Michael and Li, Ximeng and Mantel, Heiko and Mohr, Martin and Perner, Matthias and Schneider, David and Tasch, Markus :
RIFL 1.1: A Common Specification Language for Information-Flow Requirements.

[Report] , (2017)

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Mantel, Heiko and Schickel, Johannes and Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Conference or Workshop Item] , (2017)

Bollmann, Dominik and Lortz, Steffen and Mantel, Heiko and Starostin, Artem :
An Automatic Inference of Minimal Security Types.
Proceedings of the 11th International Conference on Information Systems Security (ICISS)
[Conference or Workshop Item] , (2015)

Buchner, Karolina and Lissermann, Roman and Holmquist, Lars Erik :
Interaction Techniques for Co-located Collaborative TV.
CHI 2014 ACM
[Conference or Workshop Item] , (2014)

Basin, David and Caronni, Germano and Ereth, Sarah and Harvan, Matus and Klaedtke, Felix and Mantel, Heiko :
Scalable Offline Monitoring.
In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany. Springer , Heidelberg, Germany
[Conference or Workshop Item] , (2014)

C

Cremer, Manuel :
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt
[Bachelor Thesis] , (2017)

D

Dantas, Yuri Gil and Hamann, Tobias and Mantel, Heiko :
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
[Online-Edition: http://fps2018.encs.concordia.ca/]
In: The 11th International Symposium on Foundations & Practice of Security (FPS), 13, 14 and 15 November 2018, Montreal, Canada. In: LNCS . Springer
[Conference or Workshop Item] , (2018) (Unpublished)

Dix, Isabella :
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
TU Darmstadt
[Master Thesis] , (2018)

Dantas, Yuri Gil and Hamann, Tobias and Mantel, Heiko and Schickel, Johannes :
An Experimental Study of a Bucketing Approach.
Quantitative Aspects of Programming Languages and Systems
[Conference or Workshop Item] , (2017)

Dewald, Florian and Mantel, Heiko and Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
[Conference or Workshop Item] , (2017)

Döweling, Sebastian and Tahiri, Tarik and Sowinski, Philipp and Schmidt, Benedikt and Khalilbeigi, Mohammadreza :
Support for Collaborative Situation Analysis and Planning in Crisis Management Teams using Interactive Tabletops.
ACM International Conference on Interactive Tabletops and Surfaces (ITS'13)
[Conference or Workshop Item] , (2013)

Dezfuli, Niloofar and Khalilbeigi, Mohammadreza and Huber, Jochen and Müller, Florian and Mühlhäuser, Max :
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Conference or Workshop Item] , (2012)

D'Souza, Deepak and Holla, Raveendra and Kulkarni, Janardhan and Ramesh, Raghavendra Kagalavadi and Sprick, Barbara :
The Decidability of Model-Checking Information Flow Properties.
International Conference on Information Systems Security (ICISS)
[Conference or Workshop Item] , (2008)

D'Souza, Deepak and Holla, Raveendra and Kulkarni, Janardhan and Ramesh, Raghavendra Kagalavadi and Sprick, Barbara :
The Decidability of Model-Checking Information Flow Properties.
International Conference on Information Systems Security (ICISS)
[Conference or Workshop Item] , (2008)

E

Earley, Timothy :
Extending the Language Coverage of Side-Channel Finder AVR.
TU Darmstadt
[Bachelor Thesis] , (2018)

Ereth, Sarah and Lortz, Steffen and Perner, Matthias :
Confidentiality for Android Apps: Specification and Verification.
In: it -- Information Technology, 56 (6) 288--293.
[Article] , (2014)

Ereth, Sarah and Mantel, Heiko and Perner, Matthias :
Towards a Common Specification Language for Information-Flow Security in RS3 and Beyond: RIFL 1.0 - The Language.

[Report] , (2014)

G

Gil Dantas, Yuri and Hamann, Tobias and Mantel, Heiko :
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS)
[Article] , (2018)

Gil Dantas, Yuri and Gay, Richard and Hamann, Tobias and Mantel, Heiko and Schickel, Johannes :
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
[Conference or Workshop Item] , (2018)

Gay, Richard :
A Generic Framework for Enforcing Security in Distributed Systems.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6987]
Technische Universität , Darmstadt
[Ph.D. Thesis], (2017)

Gay, Richard and Hu, Jinwei and Mantel, Heiko and Schickel, Johannes :
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
[Conference or Workshop Item] , (2017)

Gay, Richard and Hu, Jinwei and Mantel, Heiko and Mazaheri, Sogol :
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Conference or Workshop Item] , (2017)

Gay, Richard and Mantel, Heiko and Sudbrock, Henning :
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
[Online-Edition: https://www.iit.cnr.it/qasa2013/]
2nd International Workshop on Quantitative Aspects in Security Assurance
[Conference or Workshop Item] , (2013)

Gay, Richard and Mantel, Heiko and Sprick, Barbara
TU Darmstadt (ed.) :

Service Automata.
TU Darmstadt (.) Preproceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST)
[Conference or Workshop Item] , (2011)

Gay, Richard and Mantel, Heiko and Sprick, Barbara :
Service Automata for Secure Distributed Systems.

[Other] , (2010)

Gay, Richard :
Interrupt-Related Covert Channels from an Attacker's Perspective.
RWTH Aachen
[Master Thesis] , (2008)

Gay, Richard :
Interrupt-Related Covert Channels from an Attacker's Perspective.
RWTH Aachen
[Master Thesis] , (2008)

H

Hermann, Ben and Li, Ximeng and Mantel, Heiko and Mezini, Mira and Tasch, Markus and Wendel, Florian and Weber, Friedrich :
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.

[Report] , (2017)

Hu, Jinwei and Mantel, Heiko and Ruhleder, Sebastian :
Enforcing Usage Constraints on Credentials for Web Applications.
In: Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC 2015). Springer
[Conference or Workshop Item] , (2015)

Heinrichs, Felix and Schreiber, Daniel and Huber, Jochen and Mühlhäuser, Max :
Toward a Theory of Interaction in Mobile Paper-Digital Ensembles.
In: CHI'12 . ACM
[Conference or Workshop Item] , (2012)

Huber, Jochen and Steimle, Jürgen and Liao, Chunyuan and Liu, Qiong and Mühlhäuser, Max :
LightBeam: Nomadic Pico Projector Interaction with Real World Objects.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Conference or Workshop Item] , (2012)

Huber, Jochen and Ding, Yun :
Adapting Web Pages Using Graph Partitioning Algorithms for User-Centric Multi-Device Web Browsing.
In: Springer Multimedia Tools and Applications, 51 (3) pp. 1-23.
[Article] , (2012)

Huber, Jochen and Steimle, Jürgen and Lissermann, Roman and Olberding, Simon and Mühlhäuser, Max :
Wipe'n'Watch: Spatial Interaction Techniques for Interrelated Video Collections on Mobile Devices.
BCS HCI '10: Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction ACM
[Conference or Workshop Item] , (2010)

Huber, Jochen and Steimle, Jürgen and Mühlhäuser, Max :
Interaction Techniques for Mobile E-Lectures.
In: Workshop ACM
[Conference or Workshop Item] , (2010)

Huber, Jochen and Steimle, Jürgen and Mühlhäuser, Max :
Mobile Interaction Techniques for Interrelated Videos.
CHI '10 Extended Abstracts on Human Factors in Computing Systems ACM Press
[Conference or Workshop Item] , (2010)

Hutter, Dieter and Mantel, Heiko and Schaefer, Ina and Schairer, Axel :
Security of Multiagent Systems: A Case Study on Comparison Shopping.
In: Journal of Applied Logic
[Article] , (2007)

Hutter, Dieter and Mantel, Heiko and Schaefer, Ina and Schairer, Axel :
Security of Multiagent Systems: A Case Study on Comparison Shopping.
In: Journal of Applied Logic
[Article] , (2007)

Hutter, Dieter and Mantel, Heiko and Rock, Georg and Stephan, Werner and Wolpers, Andreas and Balser, Michael and Reif, Wolfgang and Schellhorn, Gerhard and Stenzel, Kurt :
VSE: Controlling the Complexity in Formal Software Developments.
In: LNCS 1641 . Springer , Boppard, Germany
[Conference or Workshop Item] , (1998)

Hutter, Dieter and Mantel, Heiko and Rock, Georg and Stephan, Werner and Wolpers, Andreas and Balser, Michael and Reif, Wolfgang and Schellhorn, Gerhard and Stenzel, Kurt :
VSE: Controlling the Complexity in Formal Software Developments.
In: LNCS 1641 . Springer
[Conference or Workshop Item] , (1998)

K

Khalilbeigi, Mohammadreza and Schmittat, Patrik and Steimle, Jürgen and Mühlhäuser, Max :
Occlusion-aware Interaction Techniques for Tabletop Systems.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Conference or Workshop Item] , (2012)

Kiemes, Tom and Novelli, Francesco and Oberle, Daniel
Barros, Alistair and Oberle, Daniel (eds.) :

Service Pricing.
[Online-Edition: http://www.springer.com/computer/database+management+%26+inf...]
In: Handbook of Service Description. Springer , pp. 229-244. ISBN 978-1-4614-1863-4
[Book Section] , (2011)

Khalilbeigi, Mohammadreza and Steimle, Jürgen and Mühlhäuser, Max :
Interaction techniques for hybrid piles of documents on interactive tabletops.
CHI '10 Proceedings of the 28th international conference extended abstracts on Human factors in computing systems ACM
[Conference or Workshop Item] , (2010)

Kraußer, Tina and Mantel, Heiko and Sudbrock, Henning :
A Probabilistic Justification of the Combining Calculus under the Uniform Scheduler Assumption.
In: krauer.ea:probabilistic:2007a .
[Report] , (2007)

Köpf, Boris and Mantel, Heiko :
Transformational Typing and Unification for Automatically Correcting Insecure Programs.
In: International Journal of Information Security (IJIS)
[Article] , (2007)

Krausser, Tina and Mantel, Heiko and Sudbrock, Henning :
A Probabilistic Justification of the Combining Calculus under the Uniform Scheduler Assumption.

[Report] , (2007)

Köpf, Boris and Mantel, Heiko :
Transformational Typing and Unification for Automatically Correcting Insecure Programs.
In: International Journal of Information Security (IJIS)
[Article] , (2007)

Köpf, Boris and Mantel, Heiko
Dimitrakos, Theodosis and Martinelli, Fabio and Ryan, Peter Y. A. and Schneider, Steve (eds.) :

Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: LNCS , 3866 . Springer Verlag , Newcastle upon Tyne, UK
[Conference or Workshop Item] , (2006)

Köpf, Boris and Mantel, Heiko
Dimitrakos, Theodosis and Martinelli, Fabio and Ryan, Heiko Y. A. and Schneider, Steve (eds.) :

Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: LNCS , 3866 . Springer Verlag
[Conference or Workshop Item] , (2006)

Köpf, Boris and Mantel, Heiko :
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Proceedings of Third International Workshop on Formal Aspects in Security and Trust, FAST 2005 University of Newcastle , Newcastle, UK
[Conference or Workshop Item] , (2005)

Köpf, Boris and Mantel, Heiko :
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Proceedings of Third International Workshop on Formal Aspects in Security and Trust, FAST 2005 University of Newcastle
[Conference or Workshop Item] , (2005)

Köpf, Boris and Mantel, Heiko :
Eliminating Implicit Information Leaks by Transformational Typing and Unification.

[Report] , (2005)

Köpf, Boris and Mantel, Heiko :
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: Revised version appeared 2006 in Springer LNCS . Zürich
[Report] , (2005)

Kreitz, Christoph and Mantel, Heiko :
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: Automated Reasoning (JAR), Kluwer, 32 121--166.
[Article] , (2004)

Kreitz, Christoph and Mantel, Heiko :
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: Automated Reasoning (JAR), Kluwer, 32 pp. 121-166.
[Article] , (2004)

Kreitz, Christoph and Mantel, Heiko :
A Matrix Characterization for Multiplicative Exponential Linear Logic.

[Report] , (2000)

Kreitz, Christoph and Mantel, Heiko :
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: kreitz.ea:a-matrix-characterization-for-multiplicative-exponential-linear-logic:2000b Revised version appeared in 2004 in Journal of Automated Reasoning .
[Report] , (2000)

Kreitz, Christoph and Mantel, Heiko and Otten, Jens and Schmitt, Stephan
McCune, William (ed.) :

Connection-Based Proof Construction in Linear Logic.
In: LNAI 1249 . Springer , Townsville, Australia
[Conference or Workshop Item] , (1997)

L

Lemos, Marcilio O. O. and Dantas, Yuri Gil and Fonseca, Iguatemi E. and Nigam, Vivek :
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, 94 pp. 45-67. ISSN 2352-2216
[Article] , (2018)

Li, Ximeng and Mantel, Heiko and Schickel, Johannes and Tasch, Markus and Weber, Alexandra and Toteva, Iva :
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.

[Report] , (2017)

Li, Ximeng and Mantel, Heiko and Tasch, Markus :
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS).
[Conference or Workshop Item] , (2017)

Lortz, Steffen and Mantel, Heiko and Starostin, Artem and Bähr, Timo and Schneider, David :
Cassandra: Towards a Certifying App Store.

[Report] , (2014)

Lortz, Steffen and Mantel, Heiko and Starostin, Artem and Weber, Alexandra :
A Sound Information-Flow Analysis for Cassandra.

[Report] , (2014)

Lortz, Steffen and Mantel, Heiko and Starostin, Artem and Bähr, Timo and Schneider, David and Weber, Alexandra :
Cassandra: Towards a Certifying App Store for Android.
Proceedings of the 4th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) ACM
[Conference or Workshop Item] , (2014)

Lissermann, Roman and Huber, Jochen and Hadjakos, Aristotelis and Nanayakkara, Suranga and Mühlhäuser, Max :
EarPut: Augmenting Ear-worn Devices for Ear-based Interaction.
Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures - the Future of Design, {OZCHI} '14, Sydney, New South Wales, Australia, December 2-5, 2014
[Conference or Workshop Item] , (2014)

Lux, Alexander and Mantel, Heiko and Perner, Matthias :
Scheduler-independent Declassifification.

[Report] , (2012)

Lux, Alexander and Starostin, Artem :
A Tool for Static Detection of Timing Channels in Java.
2nd International Workshop on Constructive Side-Channel Analysis and Secure Design
[Conference or Workshop Item] , (2011)

Lux, Alexander and Starostin, Artem :
Side Channel Finder (Version 1.0).

[Other] , (2010)

Lux, Alexander and Mantel, Heiko and Perner, Matthias and Starostin, Artem :
Side Channel Finder (Version 1.0).

[Report] , (2010)

Lortz, Steffen :
Typbasierte Informationsflussanalyse für JVM-Programme auf Mobilgeräten.

[Other] , (2009)

Lux, Alexander and Mantel, Heiko
Backes, Michael and Ning, Peng (eds.) :

Declassification with Explicit Reference Points.
In: LNCS , 5789 . Springer
[Conference or Workshop Item] , (2009)

Lux, Alexander and Mantel, Heiko
Degano, P. and Guttman, J. and Martinelli, F. (eds.) :

Who Can Declassify?
In: LNCS , 5491 . Springer
[Conference or Workshop Item] , (2009)

Lux, Alexander and Mantel, Heiko :
Who can declassify?
Preproceedings of the Workshop on Formal Aspects in Security and Trust (FAST)
[Conference or Workshop Item] , (2008)

M

Mantel, Heiko and Probst, Christian :
On the Meaning and Purpose of Attack Trees.
In: The 32nd IEEE Computer Security Foundations Symposium (CSF), Jun 25, 2019 - Jun 28, 2019, Hoboken, NJ, USA.
[Conference or Workshop Item] , (2019)

Mantel, Heiko and Schickel, Johannes and Weber, Alexandra and Weber, Friedrich :
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS).
[Conference or Workshop Item] , (2018)

Mantel, Heiko and Schickel, Johannes and Weber, Alexandra and Weber, Friedrich :
Vulnerabilities Introduced by Features for Software-based Energy Measurement.

[Report] , (2017)

Mantel, Heiko and Weber, Alexandra and Köpf, Boris :
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS).
[Conference or Workshop Item] , (2017)

Mantel, Heiko and Starostin, Artem :
Transforming Out Timing Leaks, More or Less.
In: LNCS (9326). Springer
[Conference or Workshop Item] , (2015)

Mantel, Heiko and Perner, Matthias and Sauer, Jens :
Noninterference under Weak Memory Models (Progress Report).

[Report] , (2014)

Mantel, Heiko and Sands, David and Sudbrock, Henning :
Assumptions and Guarantees for Compositional Noninterference.
Proceedings of the 24th IEEE Computer Security Foundations Symposium
[Conference or Workshop Item] , (2011)

Mantel, Heiko and Sudbrock, Henning :
Flexible Scheduler-independent Security.
In: LNCS 6345 . Springer
[Conference or Workshop Item] , (2010)

Mantel, Heiko and Sudbrock, Henning :
Increasing the Precision of the Combining Calculus (Extended Abstract).
5th International Workshop on Programming Language Interference and Dependence ( PLID'09 )
[Conference or Workshop Item] , (2009)

Mantel, Heiko and Sudbrock, Henning
Degano, P. and Guttman, J. and Martinelli, F. (eds.) :

Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Springer, LNCS 5491 .
[Conference or Workshop Item] , (2009)

Mantel, Heiko and Sudbrock, Henning
Degano, P. and Guttman, J. and Martinelli, F. (eds.) :

Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Springer, LNCS 5491 .
[Conference or Workshop Item] , (2009)

Mantel, Heiko and Sudbrock, Henning :
Increasing the Precision of the Combining Calculus (Extended Abstract).
5th International Workshop on Programming Language Interference and Dependence ( PLID'09 )
[Conference or Workshop Item] , (2009)

Mantel, Heiko and Sudbrock, Henning
Degano, P. and Guttman, J. and Martinelli, F. (eds.) :

Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Springer, LNCS 5491 .
[Conference or Workshop Item] , (2009)

Mantel, Heiko and Sudbrock, Henning :
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
Pre-Proceedings of the Workshop on Formal Aspects in Security and Trust (FAST)
[Conference or Workshop Item] , (2008)

Molter, Gregor and Shao, Hui and Sudbrock, Henning and Huss, Sorin and Mantel, Heiko :
Designing a Coprocessor for Interrupt Handling on an FPGA.

[Report] , (2008)

Mantel, Heiko and Sudbrock, Henning :
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
Pre-Proceedings of the Workshop on Formal Aspects in Security and Trust (FAST)
[Conference or Workshop Item] , (2008)

Molter, Hans Gregor and Shao, Hui and Sudbrock, Henning and Huss, Sorin A. and Mantel, Heiko :
Designing a Coprocessor for Interrupt Handling on an FPGA.
In: molter.ea:designing:2008a .
[Report] , (2008)

Mantel, Heiko and Sudbrock, Henning and Krausser, Tina
Puebla, Germán (ed.) :

Combining Different Proof Techniques for Verifying Information Flow Security.
In: LNCS , 4407 . Springer
[Conference or Workshop Item] , (2007)

Mantel, Heiko and Sudbrock, Henning :
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework.
20th IEEE Computer Security Foundations Symposium, CSF 2007 IEEE Computer Society Press
[Conference or Workshop Item] , (2007)

Mantel, Heiko and Reinhard, Alexander
Nicola, Rocco De (ed.) :

Controlling the What and Where of Declassification in Language-Based Security.
In: LNCS , 4421 . Springer
[Conference or Workshop Item] , (2007)

Mantel, Heiko and Reinhard, Alexander
Nicola, Rocco De (ed.) :

Controlling the What and Where of Declassification in Language-Based Security.
In: LNCS , 4421 . Springer
[Conference or Workshop Item] , (2007)

Mantel, Heiko and Sudbrock, Henning and Kraußer, Tina
Puebla, German (ed.) :

Combining Different Proof Techniques for Verifying Information Flow Security.
In: LNCS , 4407 . Springer
[Conference or Workshop Item] , (2007)

Mantel, Heiko and Sudbrock, Henning and Kraußer, Tina
Puebla, German (ed.) :

Combining Different Proof Techniques for Verifying Information Flow Security.
In Pre-Proceedings of 16th International Symposium on Logic Based Program Synthesis and Transformation, LOPSTR 2006 Raporta di Ricerca CS-2006-5, Università Ca' Foscari Di Venezia , Venice, Italy
[Conference or Workshop Item] , (2006)

Mantel, Heiko and Sudbrock, Henning and Krausser, Tina
Puebla, Germán (ed.) :

Combining Different Proof Techniques for Verifying Information Flow Security.
In Pre-Proceedings of 16th International Symposium on Logic Based Program Synthesis and Transformation, LOPSTR 2006 Raporta di Ricerca CS-2006-5, Università Ca' Foscari Di Venezia
[Conference or Workshop Item] , (2006)

Mantel, Heiko :
The Framework of Selective Interleaving Functions and the Modular Assembly Kit.
FMSE'05: 3rd ACM Workshop on Formal Methods for Security Engineering: From Specifications to Code ACM , Alexandria , VA, USA
[Conference or Workshop Item] , (2005)

Mantel, Heiko and Schairer, Axel :
Exploiting Generic Aspects of Security Models in Formal Developments.
In: Mechanizing Mathematical Reasoning. LNCS, 2605. Springer Verlag , 129--145. ISBN 3-540-25051-4
[Book Section] , (2005)

Mantel, Heiko :
The Framework of Selective Interleaving Functions and the Modular Assembly Kit.
FMSE'05: 3rd ACM Workshop on Formal Methods for Security Engineering: From Specifications to Code ACM
[Conference or Workshop Item] , (2005)

Mantel, Heiko and Schairer, Axel :
Exploiting Generic Aspects of Security Models in Formal Developments.
In: Mechanizing Mathematical Reasoning. LNCS, 2605. Springer Verlag , pp. 129-145.
[Book Section] , (2005)

Mantel, Heiko and Sands, David :
Controlled Declassification based on Intransitive Noninterference.
In: LNCS 3302 . Springer-Verlag , Taipei, Taiwan
[Conference or Workshop Item] , (2004)

Mantel, Heiko and Sands, David :
Controlled Declassification based on Intransitive Noninterference.
In: LNCS 3302 . Springer-Verlag
[Conference or Workshop Item] , (2004)

Mantel, Heiko and Sabelfeld, Andrei :
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
In: Journal of Computer Security (JCS), 11 (4) 615--676.
[Article] , (2003)

Mantel, Heiko :
A Uniform Framework for the Formal Specification and Verification of Information Flow Security.
Universität des Saarlandes
[Ph.D. Thesis]

Mantel, Heiko and Sabelfeld, Andrei :
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
In: Journal of Computer Security (JCS), 11 (4) pp. 615-676.
[Article] , (2003)

Mantel, Heiko :
On the Composition of Secure Systems.
Proceedings of the IEEE Symposium on Security and Privacy IEEE Computer Society , Oakland, CA, USA
[Conference or Workshop Item] , (2002)

Mantel, Heiko and Schairer, Axel and Kabatnik, Matthias and Kreutzer, Michael and Zugenmaier, Alf :
Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks.
In: mantel.ea:using:2001a . Freiburg
[Report] , (2001)

Mantel, Heiko and Sabelfeld, Andrei :
A Generic Approach to the Security of Multi-threaded Programs.
Proceedings of the 14th IEEE Computer Security Foundations Workshop IEEE Computer Society , Cape Breton, Nova Scotia, Canada
[Conference or Workshop Item] , (2001)

Mantel, Heiko :
Preserving Information Flow Properties under Refinement.
Proceedings of the IEEE Symposium on Security and Privacy IEEE Computer Society , Oakland, CA, USA
[Conference or Workshop Item] , (2001)

Mantel, Heiko
Olivera, Jose Nuno and Zave, Pamela (eds.) :

Information Flow Control and Applications - Bridging a Gap.
In: LNCS 2021 . Springer , Berlin, Germany
[Conference or Workshop Item] , (2001)

Mantel, Heiko and Sabelfeld, Andrei :
A Generic Approach to the Security of Multi-threaded Programs.
Proceedings of the 14th IEEE Computer Security Foundations Workshop IEEE Computer Society
[Conference or Workshop Item] , (2001)

Mantel, Heiko and Schairer, Axel and Kabatnik, Matthias and Kreutzer, Michael and Zugenmaier, Alf :
Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks.

[Report] , (2001)

Mantel, Heiko
Olivera, Jose Nuno and Zave, Pamela (eds.) :

Information Flow Control and Applications -- Bridging a Gap.
In: LNCS 2021 . Springer
[Conference or Workshop Item] , (2001)

Mantel, Heiko :
Preserving Information Flow Properties under Refinement.
Proceedings of the IEEE Symposium on Security and Privacy IEEE Computer Society
[Conference or Workshop Item] , (2001)

Mantel, Heiko and Gärtner, Felix :
A Case Study in the Mechanical Verification of Fault Tolerance.
Proceedings of Special Track on Verification, Validation and System Certification at 13th International Florida Artificial Intelligence Research Society Conference 2000, FLAIRS-2000 AAAI Press
[Conference or Workshop Item] , (2000)

Mantel, Heiko :
Unwinding Possibilistic Security Properties.
In: LNCS 1895 . Springer , Toulouse, France
[Conference or Workshop Item] , (2000)

Mantel, Heiko and Gärtner, Felix :
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Journal of Experimental and Theoretical Artificial Intelligence (JETAI), 12 (4) pp. 473-488.
[Article] , (2000)

Mantel, Heiko :
A new framework for possibilistic security - A summary - ABSTRACT.
In: mantel:new:2000a The full paper appeared in 2000 at CSFW . Berkeley, California
[Report] , (2000)

Mantel, Heiko and Gärtner, Felix :
A Case Study in the Mechanical Verification of Fault Tolerance.
Proceedings of Special Track on Verification, Validation and System Certification at 13th International Florida Artificial Intelligence Research Society Conference 2000, FLAIRS-2000 Orlando, Florida, USA
[Conference or Workshop Item] , (2000)

Mantel, Heiko and Gärtner, Felix :
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Journal of Experimental and Theoretical Artificial Intelligence (JETAI), 12 (4) 473--488.
[Article] , (2000)

Mantel, Heiko :
A new framework for possibilistic security - A summary - ABSTRACT.

[Report] , (2000)

Mantel, Heiko :
Possibilistic Definitions of Security -- An Assembly Kit.
Proceedings of the 13th IEEE Computer Security Foundations Workshop IEEE Computer Society
[Conference or Workshop Item] , (2000)

Mantel, Heiko and Otten, Jens
Murray, Neil V. (ed.) :

linTAP: A Tableau Prover for Linear Logic.
In: LNAI 1617 . Springer , Saratoga Springs, NY, USA
[Conference or Workshop Item] , (1999)

Mantel, Heiko and Gärtner, Felix :
A Case Study in the Mechanical Verification of Fault Tolerance.

[Report] , (1999)

Mantel, Heiko and Gärtner, Felix :
A Case Study in the Mechanical Verification of Fault Tolerance.
In: mantel.ea:a-case-study-in-the-mechanical-verification-of-fault-tolerance:1999a . Germany
[Report] , (1999)

Mantel, Heiko and Kreitz, Christoph
Dix, Jürgen and del Cerro, Luis Farinas and Furbach, Ulrich (eds.) :

A Matrix Characterization for MELL.
In: Logics in Artificial Intelligence, European Workshop, JELIA '98 : Proceedings. Lecture Notes in Computer Science, 1489. Springer, Berlin ; Heidelberg Dagstuhl, Germany , pp. 169-183.
[Book Section] , (1998)

Mantel, Heiko :
Developing a Matrix Characterization for MELL.
In: mantel:developing-a-matrix-characterization-for-mell:1998a . Kaiserslautern Germany
[Report] , (1998)

Mantel, Heiko and Sandner, Enno :
A Framework for Connection Calculi.
In: mantel.ea:a-framework-for-connection-calculi:1997a .
[Report] , (1997)

Mantel, Heiko :
Eine Matrixcharakterisierung für ein Fragment der Linearen Logik.
Technische Univ. , Darmstadt
[Master Thesis] , (1996)

Mantel, Heiko :
Eine Matrixcharakterisierung für ein Fragment der Linearen Logik.
Darmstadt University of Technology
[Master Thesis] , (1996)

N

Nikiforov, Oleg and Sauer, Alexander and Schickel, Johannes and Weber, Alexandra and Alber, Gernot and Mantel, Heiko and Walther, Thomas :
Side-Channel Analysis of Privacy Amplification in Postprocessing Software for a Quantum Key Distribution System.

[Report] , (2018)

P

Pascoal, Túlio A. and Dantas, Yuri Gil and Fonseca, Iguatemi E. and Nigam, Vivek :
Slow TCAM Exhaustion DDoS Attack.
IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection Springer
[Conference or Workshop Item] , (2017)

Perner, Matthias :
Information Flow Analysis for CIL.

[Other] , (2008)

R

Reinhard, Alexander :
Analyse nebenläufiger Programme unter intransitiven Sicherheitspolitiken.
RWTH Aachen
[Master Thesis] , (2006)

Reinhard, Alexander :
Analyse nebenläufiger Programme unter intransitiven Sicherheitspolitiken.
RWTH Aachen
[Master Thesis] , (2006)

S

Schmitz, Martin :
Exploring 3D Printed Interaction.
[Online-Edition: https://doi.org/10.1145/2839462.2854105]
In: TEI '16 . ACM
[Conference or Workshop Item] , (2016)

Schmitz, Martin and Khalilbeigi, Mohammadreza and Balwierz, Matthias and Lissermann, Roman and Steimle, Jürgen and Mühlhäuser, Max :
Capricate: A Fabrication Pipeline to Design and 3D Print Capacitive Touch Sensors for Interactive Objects.
[Online-Edition: https://doi.org/10.1145/2807442.2807503]
In: UIST '15 . ACM
[Conference or Workshop Item] , (2015)

Sudbrock, Henning :
Compositional and Scheduler-Independent Information Flow Security.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3884]
TU Darmstadt
[Ph.D. Thesis], (2013)

Steimle, Jürgen and Huber, Jochen and Lukosch, Stephan
Mühlhäuser, Max and Sesink, Werner and Kaminski, Andreas and Steimle, Jürgen (eds.) :

Interdisciplinary Approaches to Technology-Enhanced Learning.
In: UNSPECIFIED Waxmann , pp. 339-352. ISBN 978-3-8309-2481-4
[Book Section] , (2011)

Schneider, Timo :
Fallstudie: Sicherheitsautomat für einen orchestrierten Dienst in einer serviceorientierten Architektur.

[Other] , (2008)

Schneider, Timo :
Fallstudie: Sicherheitsautomat für einen orchestrierten Dienst in einer serviceorientierten Architektur.

[Other] , (2008)

Sabelfeld, Andrei and Mantel, Heiko :
Static Confidentiality Enforcement for Distributed Programs.
In: LNCS 2477 . Springer-Verlag , Madrid, Spain
[Conference or Workshop Item] , (2002)

Sabelfeld, Andrei and Mantel, Heiko :
Static Confidentiality Enforcement for Distributed Programs.
In: LNCS 2477 . Springer-Verlag
[Conference or Workshop Item] , (2002)

W

Wachsmann, Christian :
Trusted and Privacy-preserving Embedded Systems: Advances in Design, Analysis and Application of Lightweight Privacy-preserving Authentication and Physical Security Primitives.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3851]
Technische Universität Darmstadt , Darmstadt
[Ph.D. Thesis], (2013)

This list was generated on Sun May 19 01:57:05 2019 CEST.