TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Number of items at this level: 170.

Article

Gil Dantas, Yuri and Hamann, Tobias and Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Article]

Lemos, Marcilio O. O. and Dantas, Yuri Gil and Fonseca, Iguatemi E. and Nigam, Vivek (2018):
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, Elsevier, pp. 45-67, 94, ISSN 2352-2216,
[Article]

Ereth, Sarah and Lortz, Steffen and Perner, Matthias (2014):
Confidentiality for Android Apps: Specification and Verification.
In: it -- Information Technology, pp. 288--293, 56, (6), [Article]

Huber, Jochen and Ding, Yun (2012):
Adapting Web Pages Using Graph Partitioning Algorithms for User-Centric Multi-Device Web Browsing.
In: Springer Multimedia Tools and Applications, pp. 1-23, 51, (3), DOI: 10.1007/s11042-011-0980-1,
[Article]

Hutter, Dieter and Mantel, Heiko and Schaefer, Ina and Schairer, Axel (2007):
Security of Multiagent Systems: A Case Study on Comparison Shopping.
In: Journal of Applied Logic, [Article]

Köpf, Boris and Mantel, Heiko (2007):
Transformational Typing and Unification for Automatically Correcting Insecure Programs.
In: International Journal of Information Security (IJIS), [Article]

Hutter, Dieter and Mantel, Heiko and Schaefer, Ina and Schairer, Axel (2007):
Security of Multiagent Systems: A Case Study on Comparison Shopping.
In: Journal of Applied Logic, [Article]

Köpf, Boris and Mantel, Heiko (2007):
Transformational Typing and Unification for Automatically Correcting Insecure Programs.
In: International Journal of Information Security (IJIS), [Article]

Kreitz, Christoph and Mantel, Heiko (2004):
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: Automated Reasoning (JAR), Kluwer, pp. 121--166, 32, [Article]

Kreitz, Christoph and Mantel, Heiko (2004):
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: Automated Reasoning (JAR), Kluwer, pp. 121-166, 32, [Article]

Mantel, Heiko and Sabelfeld, Andrei (2003):
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
In: Journal of Computer Security (JCS), IOS Press, pp. 615--676, 11, (4), [Article]

Mantel, Heiko and Sabelfeld, Andrei (2003):
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
In: Journal of Computer Security (JCS), IOS Press, pp. 615-676, 11, (4), [Article]

Mantel, Heiko and Gärtner, Felix (2000):
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Journal of Experimental and Theoretical Artificial Intelligence (JETAI), Taylor & Francis, pp. 473-488, 12, (4), [Article]

Mantel, Heiko and Gärtner, Felix (2000):
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Journal of Experimental and Theoretical Artificial Intelligence (JETAI), Taylor & Francis, pp. 473--488, 12, (4), [Article]

Autexier, Serge and Hutter, Dieter and Langenstein, Bruno and Mantel, Heiko and Rock, Georg and Schairer, Axel and Stephan, Werner and Vogt, Roland and Wolpers, Andreas (2000):
VSE: Formal Methods Meet Industrial Needs.
In: International Journal on Software Tools for Technology Transfer, Springer, pp. 66-77, 3, (1), ISSN 1433-2779,
[Online-Edition: https://link.springer.com/article/10.1007/s100099900022],
[Article]

Book Section

Kiemes, Tom and Novelli, Francesco and Oberle, Daniel
Barros, Alistair and Oberle, Daniel (eds.) (2011):
Service Pricing.
In: Handbook of Service Description, Springer, pp. 229-244, [Online-Edition: http://www.springer.com/computer/database+management+%26+inf...],
[Book Section]

Steimle, Jürgen and Huber, Jochen and Lukosch, Stephan
Mühlhäuser, Max and Sesink, Werner and Kaminski, Andreas and Steimle, Jürgen (eds.) (2011):
Interdisciplinary Approaches to Technology-Enhanced Learning.
Waxmann, pp. 339-352, [Book Section]

Mantel, Heiko and Schairer, Axel (2005):
Exploiting Generic Aspects of Security Models in Formal Developments.
In: Mechanizing Mathematical Reasoning, Springer Verlag, pp. 129--145, [Book Section]

Mantel, Heiko and Schairer, Axel (2005):
Exploiting Generic Aspects of Security Models in Formal Developments.
In: Mechanizing Mathematical Reasoning, Springer Verlag, pp. 129-145, [Book Section]

Autexier, Serge and Hutter, Dieter and Mantel, Heiko and Schairer, Axel
Bert, Didier and Choppy, C. and Mosses, P. (eds.) (1999):
Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: Recent trends in algebraic development techniques : 14th International Workshop on Algebraic Development Techniques, WADT'99, Berlin ; Heidelberg, Springer, pp. 73-88, [Book Section]

Mantel, Heiko and Kreitz, Christoph
Dix, Jürgen and del Cerro, Luis Farinas and Furbach, Ulrich (eds.) (1998):
A Matrix Characterization for MELL.
In: Logics in Artificial Intelligence, European Workshop, JELIA '98 : Proceedings, Berlin ; Heidelberg, Springer, pp. 169-183, [Book Section]

Book

Gligor, Virgil and Mantel, Heiko (eds.) (2007):
Proceedings of the ACM Workshop on Formal Methods in Security Engineering : From Specifications to Code (FMSE).
[Book]

Gligor, Virgil D. and Mantel, Heiko (eds.) (2007):
Proceedings of the ACM Workshop on Formal Methods in Security Engineering : From Specifications to Code (FMSE).
Fairfax, USA, [Book]

Autexier, Serge and Cervesato, Iliano and Mantel, Heiko (eds.) (2005):
Selected papers from FCS/VERIFY 2002.
Springer Verlag, 4 (1-2, [Book]

Autexier, Serge and Mantel, Heiko (eds.) (2002):
Proceedings of the Verification Workshop (VERIFY'02).
Copenhagen, Denmark, DIKU, [Book]

Autexier, Serge and Mantel, Heiko (eds.) (2001):
Proceedings of the Verification Workshop (VERIFY'01).
Siena, Italy, Universit`a degli studi di Siena, [Book]

Conference or Workshop Item

Mantel, Heiko and Probst, Christian (2019):
On the Meaning and Purpose of Attack Trees.
In: The 32nd IEEE Computer Security Foundations Symposium (CSF), Hoboken, NJ, USA, Jun 25, 2019 - Jun 28, 2019, [Conference or Workshop Item]

Dantas, Yuri Gil and Hamann, Tobias and Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, In: The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, In: LNCS, [Online-Edition: http://fps2018.encs.concordia.ca/],
[Conference or Workshop Item]

Gil Dantas, Yuri and Gay, Richard and Hamann, Tobias and Mantel, Heiko and Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Conference or Workshop Item]

Mantel, Heiko and Schickel, Johannes and Weber, Alexandra and Weber, Friedrich (2018):
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Dantas, Yuri Gil and Hamann, Tobias and Mantel, Heiko and Schickel, Johannes (2017):
An Experimental Study of a Bucketing Approach.
In: Quantitative Aspects of Programming Languages and Systems, Uppsala, Sweden, [Conference or Workshop Item]

Pascoal, Túlio A. and Dantas, Yuri Gil and Fonseca, Iguatemi E. and Nigam, Vivek (2017):
Slow TCAM Exhaustion DDoS Attack.
In: IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection, Springer, [Conference or Workshop Item]

Mantel, Heiko and Weber, Alexandra and Köpf, Boris (2017):
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS), [Conference or Workshop Item]

Li, Ximeng and Mantel, Heiko and Tasch, Markus (2017):
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), [Conference or Workshop Item]

Gay, Richard and Hu, Jinwei and Mantel, Heiko and Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Conference or Workshop Item]

Gay, Richard and Hu, Jinwei and Mantel, Heiko and Mazaheri, Sogol (2017):
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Dewald, Florian and Mantel, Heiko and Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Mantel, Heiko and Schickel, Johannes and Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Schmitz, Martin (2016):
Exploring 3D Printed Interaction.
In: Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction, ACM, Eindhoven, Netherlands, In: TEI '16, ISBN 978-1-4503-3582-9,
DOI: 10.1145/2839462.2854105,
[Online-Edition: https://doi.org/10.1145/2839462.2854105],
[Conference or Workshop Item]

Schmitz, Martin and Khalilbeigi, Mohammadreza and Balwierz, Matthias and Lissermann, Roman and Steimle, Jürgen and Mühlhäuser, Max (2015):
Capricate: A Fabrication Pipeline to Design and 3D Print Capacitive Touch Sensors for Interactive Objects.
In: Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology, ACM, Charlotte, NC, USA, In: UIST '15, ISBN 978-1-4503-3779-3,
DOI: 10.1145/2807442.2807503,
[Online-Edition: https://doi.org/10.1145/2807442.2807503],
[Conference or Workshop Item]

Mantel, Heiko and Starostin, Artem (2015):
Transforming Out Timing Leaks, More or Less.
In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015) - Part I, Springer, Vienna, Austria, In: LNCS, [Conference or Workshop Item]

Hu, Jinwei and Mantel, Heiko and Ruhleder, Sebastian (2015):
Enforcing Usage Constraints on Credentials for Web Applications.
Springer, In: Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC 2015), [Conference or Workshop Item]

Bollmann, Dominik and Lortz, Steffen and Mantel, Heiko and Starostin, Artem (2015):
An Automatic Inference of Minimal Security Types.
In: Proceedings of the 11th International Conference on Information Systems Security (ICISS), [Conference or Workshop Item]

Buchner, Karolina and Lissermann, Roman and Holmquist, Lars Erik (2014):
Interaction Techniques for Co-located Collaborative TV.
In: CHI 2014, ACM, [Conference or Workshop Item]

Lortz, Steffen and Mantel, Heiko and Starostin, Artem and Bähr, Timo and Schneider, David and Weber, Alexandra (2014):
Cassandra: Towards a Certifying App Store for Android.
In: Proceedings of the 4th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), ACM, [Conference or Workshop Item]

Basin, David and Caronni, Germano and Ereth, Sarah and Harvan, Matus and Klaedtke, Felix and Mantel, Heiko (2014):
Scalable Offline Monitoring.
Heidelberg, Germany, Springer, In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany, [Conference or Workshop Item]

Lissermann, Roman and Huber, Jochen and Hadjakos, Aristotelis and Nanayakkara, Suranga and Mühlhäuser, Max (2014):
EarPut: Augmenting Ear-worn Devices for Ear-based Interaction.
In: Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures - the Future of Design, {OZCHI} '14, Sydney, New South Wales, Australia, December 2-5, 2014, DOI: 10.1145/2686612.2686655,
[Conference or Workshop Item]

Gay, Richard and Mantel, Heiko and Sudbrock, Henning (2013):
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
In: 2nd International Workshop on Quantitative Aspects in Security Assurance, [Online-Edition: https://www.iit.cnr.it/qasa2013/],
[Conference or Workshop Item]

Döweling, Sebastian and Tahiri, Tarik and Sowinski, Philipp and Schmidt, Benedikt and Khalilbeigi, Mohammadreza (2013):
Support for Collaborative Situation Analysis and Planning in Crisis Management Teams using Interactive Tabletops.
In: ACM International Conference on Interactive Tabletops and Surfaces (ITS'13), DOI: 10.1145/2512349.2512823,
[Conference or Workshop Item]

Heinrichs, Felix and Schreiber, Daniel and Huber, Jochen and Mühlhäuser, Max (2012):
Toward a Theory of Interaction in Mobile Paper-Digital Ensembles.
In: CHI '12: Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, ACM, In: CHI'12, ISBN 978-1-4503-1015-4,
DOI: 10.1145/2208276.2208328,
[Conference or Workshop Item]

Khalilbeigi, Mohammadreza and Schmittat, Patrik and Steimle, Jürgen and Mühlhäuser, Max (2012):
Occlusion-aware Interaction Techniques for Tabletop Systems.
In: CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, ACM, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223831,
[Conference or Workshop Item]

Huber, Jochen and Steimle, Jürgen and Liao, Chunyuan and Liu, Qiong and Mühlhäuser, Max (2012):
LightBeam: Nomadic Pico Projector Interaction with Real World Objects.
In: CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, ACM, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223828,
[Conference or Workshop Item]

Dezfuli, Niloofar and Khalilbeigi, Mohammadreza and Huber, Jochen and Müller, Florian and Mühlhäuser, Max (2012):
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
In: CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, ACM, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223823,
[Conference or Workshop Item]

Gay, Richard and Mantel, Heiko and Sprick, Barbara
TU Darmstadt (Corporate Creator) (2011):
Service Automata.
In: Preproceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST), [Conference or Workshop Item]

Lux, Alexander and Starostin, Artem (2011):
A Tool for Static Detection of Timing Channels in Java.
In: 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design, [Conference or Workshop Item]

Mantel, Heiko and Sands, David and Sudbrock, Henning (2011):
Assumptions and Guarantees for Compositional Noninterference.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, [Conference or Workshop Item]

Huber, Jochen and Steimle, Jürgen and Lissermann, Roman and Olberding, Simon and Mühlhäuser, Max (2010):
Wipe'n'Watch: Spatial Interaction Techniques for Interrelated Video Collections on Mobile Devices.
In: BCS HCI '10: Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, ACM, [Conference or Workshop Item]

Huber, Jochen and Steimle, Jürgen and Mühlhäuser, Max (2010):
Interaction Techniques for Mobile E-Lectures.
In: Workshop on "Next Generation of HCI and Education" in conjunction with CHI 2010, ACM, Atlanta, GA, USA, [Conference or Workshop Item]

Huber, Jochen and Steimle, Jürgen and Mühlhäuser, Max (2010):
Mobile Interaction Techniques for Interrelated Videos.
In: CHI '10 Extended Abstracts on Human Factors in Computing Systems, ACM Press, Atlanta, USA, ISBN 978-1-60558-930-5/10/04,
DOI: http://doi.acm.org/10.1145/1753846.1754014,
[Conference or Workshop Item]

Aderhold, Markus
Esparza, J. and Majumdar, R. (eds.) (2010):
Automated Termination Analysis for Programs with Second-Order Recursion.
In: 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS-16), Springer, In: LNCS 6015, [Conference or Workshop Item]

Aderhold, Markus
Giesl, J. and Hähnle, R. (eds.) (2010):
Automated Synthesis of Induction Axioms for Programs with Second-Order Recursion.
In: 5th International Joint Conference on Automated Reasoning (IJCAR-5), Springer, In: LNAI 6173, [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning (2010):
Flexible Scheduler-independent Security.
In: European Symposium on Research in Computer Security (ESORICS), Springer, In: LNCS 6345, [Conference or Workshop Item]

Aderhold, Markus
Esparza, Javier and Majumdar, Rupak (eds.) (2010):
Automated Termination Analysis for Programs with Second-Order Recursion.
In: 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS-16), Springer, [Conference or Workshop Item]

Khalilbeigi, Mohammadreza and Steimle, Jürgen and Mühlhäuser, Max (2010):
Interaction techniques for hybrid piles of documents on interactive tabletops.
In: CHI '10 Proceedings of the 28th international conference extended abstracts on Human factors in computing systems, ACM, Atlanta, Georgia, USA, ISBN 978-1-60558-930-5,
DOI: 10.1145/1753846.1754083,
[Conference or Workshop Item]

Lux, Alexander and Mantel, Heiko
Backes, Michael and Ning, Peng (eds.) (2009):
Declassification with Explicit Reference Points.
In: 14th European Symposium on Research in Computer Security, Springer, In: LNCS, 5789, [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning (2009):
Increasing the Precision of the Combining Calculus (Extended Abstract).
In: 5th International Workshop on Programming Language Interference and Dependence ( PLID'09 ), [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning
Degano, P. and Guttman, J. and Martinelli, F. (eds.) (2009):
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Proceedings of the Workshop on Formal Aspects in Security and Trust, FAST 2008, In: Springer, LNCS 5491, [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning
Degano, P. and Guttman, J. and Martinelli, F. (eds.) (2009):
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Proceedings of the Workshop on Formal Aspects in Security and Trust, FAST 2008, In: Springer, LNCS 5491, [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning (2009):
Increasing the Precision of the Combining Calculus (Extended Abstract).
In: 5th International Workshop on Programming Language Interference and Dependence ( PLID'09 ), [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning
Degano, P. and Guttman, J. and Martinelli, F. (eds.) (2009):
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Proceedings of the Workshop on Formal Aspects in Security and Trust, FAST 2008, In: Springer, LNCS 5491, [Conference or Workshop Item]

Lux, Alexander and Mantel, Heiko
Degano, P. and Guttman, J. and Martinelli, F. (eds.) (2009):
Who Can Declassify?
In: Proceedings of the Workshop on Formal Aspects in Security and Trust, FAST 2008, Springer, In: LNCS, 5491, [Conference or Workshop Item]

Autexier, Serge and Mantel, Heiko and Merz, Stephan and Nipkow, Tobias (eds.) (2008):
Special Issue on Formal Modeling and Verification of Critical Systems.
Journal of Automated Reasoning, Vol. 41, Nos. 3-4, Springer, [Conference or Workshop Item]

D'Souza, Deepak and Holla, Raveendra and Kulkarni, Janardhan and Ramesh, Raghavendra Kagalavadi and Sprick, Barbara (2008):
The Decidability of Model-Checking Information Flow Properties.
In: International Conference on Information Systems Security (ICISS), [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning (2008):
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Pre-Proceedings of the Workshop on Formal Aspects in Security and Trust (FAST), [Conference or Workshop Item]

D'Souza, Deepak and Holla, Raveendra and Kulkarni, Janardhan and Ramesh, Raghavendra Kagalavadi and Sprick, Barbara (2008):
The Decidability of Model-Checking Information Flow Properties.
In: International Conference on Information Systems Security (ICISS), [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning (2008):
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Pre-Proceedings of the Workshop on Formal Aspects in Security and Trust (FAST), [Conference or Workshop Item]

Autexier, Serge and Mantel, Heiko and Merz, Stephan and Nipkow, Tobias (eds.) (2008):
Special Issue on Formal Modeling and Verification of Critical Systems.
Journal of Automated Reasoning, Vol. 41, Nos. 3-4, Springer, [Conference or Workshop Item]

Lux, Alexander and Mantel, Heiko (2008):
Who can declassify?
In: Preproceedings of the Workshop on Formal Aspects in Security and Trust (FAST), [Conference or Workshop Item]

Barthe, Gilles and Mantel, Heiko and Müller, Peter and Myers, Andrew and Sabelfeld, Andrei (eds.) (2007):
Executive Summary and Abstracts Collection of Seminar 0709: Mobility, Ubiquity, and Security.
Dagstuhl, [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning and Krausser, Tina
Puebla, Germán (ed.) (2007):
Combining Different Proof Techniques for Verifying Information Flow Security.
In: 16th International Symposium on Logic Based Program Synthesis and Transformation, LOPSTR 2006, Springer, In: LNCS, 4407, [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning (2007):
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework.
In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, IEEE Computer Society Press, [Conference or Workshop Item]

Mantel, Heiko and Reinhard, Alexander
Nicola, Rocco De (ed.) (2007):
Controlling the What and Where of Declassification in Language-Based Security.
In: European Symposium on Programming (ESOP), Springer, In: LNCS, 4421, ISBN 978-3-540-71314-2,
[Conference or Workshop Item]

Mantel, Heiko and Reinhard, Alexander
Nicola, Rocco De (ed.) (2007):
Controlling the What and Where of Declassification in Language-Based Security.
In: European Symposium on Programming (ESOP), Springer, In: LNCS, 4421, [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning and Kraußer, Tina
Puebla, German (ed.) (2007):
Combining Different Proof Techniques for Verifying Information Flow Security.
In: 16th International Symposium on Logic Based Program Synthesis and Transformation, LOPSTR 2006, Springer, In: LNCS, 4407, [Conference or Workshop Item]

Barthe, Gilles and Mantel, Heiko and Müller, Peter and Myers, Andrew C. and Sabelfeld, Andrei (eds.) (2007):
Executive Summary and Abstracts Collection of Seminar 0709: Mobility, Ubiquity, and Security.
Dagstuhl, [Conference or Workshop Item]

Autexier, Serge and Mantel, Heiko (eds.) (2006):
Verify'06: Verification Workshop.
Seattle, USA, FLoC, [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning and Kraußer, Tina
Puebla, German (ed.) (2006):
Combining Different Proof Techniques for Verifying Information Flow Security.
In: In Pre-Proceedings of 16th International Symposium on Logic Based Program Synthesis and Transformation, LOPSTR 2006, Venice, Italy, Raporta di Ricerca CS-2006-5, Università Ca' Foscari Di Venezia, [Conference or Workshop Item]

Köpf, Boris and Mantel, Heiko
Dimitrakos, Theodosis and Martinelli, Fabio and Ryan, Peter Y. A. and Schneider, Steve (eds.) (2006):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: Revised Selected Papers, Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, Springer Verlag, In: LNCS, 3866, [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning and Krausser, Tina
Puebla, Germán (ed.) (2006):
Combining Different Proof Techniques for Verifying Information Flow Security.
In: In Pre-Proceedings of 16th International Symposium on Logic Based Program Synthesis and Transformation, LOPSTR 2006, Raporta di Ricerca CS-2006-5, Università Ca' Foscari Di Venezia, [Conference or Workshop Item]

Köpf, Boris and Mantel, Heiko
Dimitrakos, Theodosis and Martinelli, Fabio and Ryan, Heiko Y. A. and Schneider, Steve (eds.) (2006):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: Revised Selected Papers, Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Springer Verlag, In: LNCS, 3866, [Conference or Workshop Item]

Mantel, Heiko (2005):
The Framework of Selective Interleaving Functions and the Modular Assembly Kit.
In: FMSE'05: 3rd ACM Workshop on Formal Methods for Security Engineering: From Specifications to Code, Alexandria , VA, USA, ACM, [Conference or Workshop Item]

Köpf, Boris and Mantel, Heiko (2005):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: Proceedings of Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, Newcastle, UK, University of Newcastle, [Conference or Workshop Item]

Köpf, Boris and Mantel, Heiko (2005):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: Proceedings of Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, University of Newcastle, [Conference or Workshop Item]

Mantel, Heiko (2005):
The Framework of Selective Interleaving Functions and the Modular Assembly Kit.
In: FMSE'05: 3rd ACM Workshop on Formal Methods for Security Engineering: From Specifications to Code, ACM, [Conference or Workshop Item]

Mantel, Heiko and Sands, David (2004):
Controlled Declassification based on Intransitive Noninterference.
In: Proceedings of the 2nd ASIAN Symposium on Programming Languages and Systems, APLAS 2004, Taipei, Taiwan, Springer-Verlag, In: LNCS 3302, [Conference or Workshop Item]

Mantel, Heiko and Sands, David (2004):
Controlled Declassification based on Intransitive Noninterference.
In: Proceedings of the 2nd ASIAN Symposium on Programming Languages and Systems, APLAS 2004, Springer-Verlag, In: LNCS 3302, [Conference or Workshop Item]

Banerjee, Anindya and Mantel, Heiko and Naumann, David and Sabelfeld, Andrei (eds.) (2003):
Final Report on Seminar 03411: Language-Based Security.
Dagstuhl, [Conference or Workshop Item]

Sabelfeld, Andrei and Mantel, Heiko (2002):
Static Confidentiality Enforcement for Distributed Programs.
In: Proceedings of the 9th International Static Analysis Symposium, SAS'02, Madrid, Spain, Springer-Verlag, In: LNCS 2477, [Conference or Workshop Item]

Mantel, Heiko (2002):
On the Composition of Secure Systems.
In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, IEEE Computer Society, [Conference or Workshop Item]

Sabelfeld, Andrei and Mantel, Heiko (2002):
Static Confidentiality Enforcement for Distributed Programs.
In: Proceedings of the 9th International Static Analysis Symposium, SAS'02, Springer-Verlag, In: LNCS 2477, [Conference or Workshop Item]

Mantel, Heiko and Sabelfeld, Andrei (2001):
A Generic Approach to the Security of Multi-threaded Programs.
In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, IEEE Computer Society, [Conference or Workshop Item]

Mantel, Heiko (2001):
Preserving Information Flow Properties under Refinement.
In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, IEEE Computer Society, [Conference or Workshop Item]

Mantel, Heiko
Olivera, Jose Nuno and Zave, Pamela (eds.) (2001):
Information Flow Control and Applications - Bridging a Gap.
In: FME 2001: Formal Methods for Increasing Software Productivity, International Symposium of Formal Methods Europe, Berlin, Germany, Springer, In: LNCS 2021, [Conference or Workshop Item]

Mantel, Heiko and Sabelfeld, Andrei (2001):
A Generic Approach to the Security of Multi-threaded Programs.
In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society, [Conference or Workshop Item]

Mantel, Heiko
Olivera, Jose Nuno and Zave, Pamela (eds.) (2001):
Information Flow Control and Applications -- Bridging a Gap.
In: FME 2001: Formal Methods for Increasing Software Productivity, International Symposium of Formal Methods Europe, Springer, In: LNCS 2021, [Conference or Workshop Item]

Mantel, Heiko (2001):
Preserving Information Flow Properties under Refinement.
In: Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, [Conference or Workshop Item]

Mantel, Heiko and Gärtner, Felix (2000):
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Proceedings of Special Track on Verification, Validation and System Certification at 13th International Florida Artificial Intelligence Research Society Conference 2000, FLAIRS-2000, AAAI Press, [Conference or Workshop Item]

Mantel, Heiko (2000):
Unwinding Possibilistic Security Properties.
In: European Symposium on Research in Computer Security (ESORICS), Toulouse, France, Springer, In: LNCS 1895, [Conference or Workshop Item]

Mantel, Heiko and Gärtner, Felix (2000):
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Proceedings of Special Track on Verification, Validation and System Certification at 13th International Florida Artificial Intelligence Research Society Conference 2000, FLAIRS-2000, Orlando, Florida, USA, [Conference or Workshop Item]

Mantel, Heiko (2000):
Possibilistic Definitions of Security -- An Assembly Kit.
In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society, [Conference or Workshop Item]

Autexier, Serge and Hutter, Dieter and Mantel, Heiko and Schairer, Axel (1999):
System Description: INKA 5.0 -- A Logic Voyager.
In: 16th International Conference on Automated Deduction, CADE--16, Trento, Italy, Springer, In: LNAI 1632, [Conference or Workshop Item]

Mantel, Heiko and Otten, Jens
Murray, Neil V. (ed.) (1999):
linTAP: A Tableau Prover for Linear Logic.
In: Automated Reasoning with Analytic Tableaux and Related Methods, International Conference (TABLEAUX'99), Saratoga Springs, NY, USA, Springer, In: LNAI 1617, [Conference or Workshop Item]

Autexier, Serge and Hutter, Dieter and Mantel, Heiko and Schairer, Axel
Bert, D. and Choppy, C. and Mosses, P. (eds.) (1999):
Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: 14th International Workshop on Algebraic Development Techniques, WADT'99, Springer, In: LNCS, 1827, [Conference or Workshop Item]

Hutter, Dieter and Mantel, Heiko and Rock, Georg and Stephan, Werner and Wolpers, Andreas and Balser, Michael and Reif, Wolfgang and Schellhorn, Gerhard and Stenzel, Kurt (1998):
VSE: Controlling the Complexity in Formal Software Developments.
In: International Workshop on Applied Formal Methods -- FM-Trends, Boppard, Germany, Springer, In: LNCS 1641, [Conference or Workshop Item]

Autexier, Serge and Mantel, Heiko and Stephan, Werner
Herzog, Otthein and Günter, Andreas (eds.) (1998):
Simultaneous Quantifier Elimination.
In: KI-98: Advances in Artificial Intelligence, 22nd Annual German Conference on Artificial Intelligence, Bremen, Germany, Springer, In: LNAI 1504, [Conference or Workshop Item]

Hutter, Dieter and Mantel, Heiko and Rock, Georg and Stephan, Werner and Wolpers, Andreas and Balser, Michael and Reif, Wolfgang and Schellhorn, Gerhard and Stenzel, Kurt (1998):
VSE: Controlling the Complexity in Formal Software Developments.
In: International Workshop on Applied Formal Methods -- FM-Trends, Springer, In: LNCS 1641, [Conference or Workshop Item]

Kreitz, Christoph and Mantel, Heiko and Otten, Jens and Schmitt, Stephan
McCune, William (ed.) (1997):
Connection-Based Proof Construction in Linear Logic.
In: 14th International Conference on Automated Deduction, CADE-14, Townsville, Australia, Springer, In: LNAI 1249, [Conference or Workshop Item]

Report

Nikiforov, Oleg and Sauer, Alexander and Schickel, Johannes and Weber, Alexandra and Alber, Gernot and Mantel, Heiko and Walther, Thomas (2018):
Side-Channel Analysis of Privacy Amplification in Postprocessing Software for a Quantum Key Distribution System.
[Report]

Mantel, Heiko and Schickel, Johannes and Weber, Alexandra and Weber, Friedrich (2017):
Vulnerabilities Introduced by Features for Software-based Energy Measurement.
[Report]

Li, Ximeng and Mantel, Heiko and Schickel, Johannes and Tasch, Markus and Weber, Alexandra and Toteva, Iva (2017):
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.
[Report]

Bauereiß, Thomas and Greiner, Simon and Herda, Mihai and Kirsten, Michael and Li, Ximeng and Mantel, Heiko and Mohr, Martin and Perner, Matthias and Schneider, David and Tasch, Markus (2017):
RIFL 1.1: A Common Specification Language for Information-Flow Requirements.
[Report]

Hermann, Ben and Li, Ximeng and Mantel, Heiko and Mezini, Mira and Tasch, Markus and Wendel, Florian and Weber, Friedrich (2017):
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.
[Report]

Lortz, Steffen and Mantel, Heiko and Starostin, Artem and Bähr, Timo and Schneider, David (2014):
Cassandra: Towards a Certifying App Store.
[Report]

Lortz, Steffen and Mantel, Heiko and Starostin, Artem and Weber, Alexandra (2014):
A Sound Information-Flow Analysis for Cassandra.
[Report]

Mantel, Heiko and Perner, Matthias and Sauer, Jens (2014):
Noninterference under Weak Memory Models (Progress Report).
[Report]

Ereth, Sarah and Mantel, Heiko and Perner, Matthias (2014):
Towards a Common Specification Language for Information-Flow Security in RS3 and Beyond: RIFL 1.0 - The Language.
[Report]

Aderhold, Markus and Kochtchi, Artjom (2013):
Tailoring PMD to Secure Coding.
(TUD-CS-2013-0245), [Report]

Aderhold, Markus and Gebhardt, Alexander and Mantel, Heiko (2013):
Choosing a Formalism for Secure Coding: FSM vs. LTL.
[Report]

Lux, Alexander and Mantel, Heiko and Perner, Matthias (2012):
Scheduler-independent Declassifification.
(TUD-CS-2012-0061), [Report]

Lux, Alexander and Mantel, Heiko and Perner, Matthias and Starostin, Artem (2010):
Side Channel Finder (Version 1.0).
[Report]

Aderhold, Markus and Cuéllar, Jorge and Mantel, Heiko and Sudbrock, Henning (2010):
Exemplary Formalization of Secure Coding Guidelines.
Germany, In: aderhold.ea:exemplary:2010a, [Report]

Molter, Gregor and Shao, Hui and Sudbrock, Henning and Huss, Sorin and Mantel, Heiko (2008):
Designing a Coprocessor for Interrupt Handling on an FPGA.
[Report]

Molter, Hans Gregor and Shao, Hui and Sudbrock, Henning and Huss, Sorin A. and Mantel, Heiko (2008):
Designing a Coprocessor for Interrupt Handling on an FPGA.
In: molter.ea:designing:2008a, [Report]

Kraußer, Tina and Mantel, Heiko and Sudbrock, Henning (2007):
A Probabilistic Justification of the Combining Calculus under the Uniform Scheduler Assumption.
In: krauer.ea:probabilistic:2007a, [Report]

Krausser, Tina and Mantel, Heiko and Sudbrock, Henning (2007):
A Probabilistic Justification of the Combining Calculus under the Uniform Scheduler Assumption.
(2007-09), [Report]

Köpf, Boris and Mantel, Heiko (2005):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
(498), [Report]

Köpf, Boris and Mantel, Heiko (2005):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Zürich, In: Revised version appeared 2006 in Springer LNCS, [Report]

Mantel, Heiko and Schairer, Axel and Kabatnik, Matthias and Kreutzer, Michael and Zugenmaier, Alf (2001):
Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks.
Freiburg, In: mantel.ea:using:2001a, [Report]

Mantel, Heiko and Schairer, Axel and Kabatnik, Matthias and Kreutzer, Michael and Zugenmaier, Alf (2001):
Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks.
(159), [Report]

Mantel, Heiko (2000):
A new framework for possibilistic security - A summary - ABSTRACT.
Berkeley, California, In: mantel:new:2000a The full paper appeared in 2000 at CSFW, [Report]

Kreitz, Christoph and Mantel, Heiko (2000):
A Matrix Characterization for Multiplicative Exponential Linear Logic.
[Report]

Mantel, Heiko (2000):
A new framework for possibilistic security - A summary - ABSTRACT.
[Report]

Kreitz, Christoph and Mantel, Heiko (2000):
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: kreitz.ea:a-matrix-characterization-for-multiplicative-exponential-linear-logic:2000b Revised version appeared in 2004 in Journal of Automated Reasoning, [Report]

Mantel, Heiko and Gärtner, Felix (1999):
A Case Study in the Mechanical Verification of Fault Tolerance.
(Technical Report TUD-BS-1), [Report]

Mantel, Heiko and Gärtner, Felix (1999):
A Case Study in the Mechanical Verification of Fault Tolerance.
Germany, In: mantel.ea:a-case-study-in-the-mechanical-verification-of-fault-tolerance:1999a, [Report]

Mantel, Heiko (1998):
Developing a Matrix Characterization for MELL.
Kaiserslautern Germany, In: mantel:developing-a-matrix-characterization-for-mell:1998a, [Report]

Autexier, Serge and Mantel, Heiko (1998):
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
(SEKI Report SR-98-05), [Report]

Autexier, Serge and Mantel, Heiko (1998):
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
Germany, In: autexier.ea:semantical-investigation-of-simultaneous-skolemization-for-first-order-sequent-calculus:1998a, [Report]

Mantel, Heiko and Sandner, Enno (1997):
A Framework for Connection Calculi.
In: mantel.ea:a-framework-for-connection-calculi:1997a, [Report]

Ph.D. Thesis

Gay, Richard (2017):
A Generic Framework for Enforcing Security in Distributed Systems.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6987],
[Ph.D. Thesis]

Wachsmann, Christian (2014):
Trusted and Privacy-preserving Embedded Systems: Advances in Design, Analysis and Application of Lightweight Privacy-preserving Authentication and Physical Security Primitives.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3851],
[Ph.D. Thesis]

Sudbrock, Henning (2013):
Compositional and Scheduler-Independent Information Flow Security.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3884],
[Ph.D. Thesis]

Mantel, Heiko (2003):
A Uniform Framework for the Formal Specification and Verification of Information Flow Security.
Universität des Saarlandes, [Ph.D. Thesis]

Master Thesis

Dix, Isabella (2018):
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
TU Darmstadt, [Master Thesis]

Gay, Richard (2008):
Interrupt-Related Covert Channels from an Attacker's Perspective.
RWTH Aachen, [Master Thesis]

Gay, Richard (2008):
Interrupt-Related Covert Channels from an Attacker's Perspective.
RWTH Aachen, [Master Thesis]

Reinhard, Alexander (2006):
Analyse nebenläufiger Programme unter intransitiven Sicherheitspolitiken.
RWTH Aachen, [Master Thesis]

Reinhard, Alexander (2006):
Analyse nebenläufiger Programme unter intransitiven Sicherheitspolitiken.
RWTH Aachen, [Master Thesis]

Mantel, Heiko (1996):
Eine Matrixcharakterisierung für ein Fragment der Linearen Logik.
Darmstadt, Technische Univ., Darmstadt University of Technology, [Master Thesis]

Mantel, Heiko (1996):
Eine Matrixcharakterisierung für ein Fragment der Linearen Logik.
Darmstadt University of Technology, [Master Thesis]

Bachelor Thesis

Earley, Timothy (2018):
Extending the Language Coverage of Side-Channel Finder AVR.
TU Darmstadt, [Bachelor Thesis]

Cremer, Manuel (2017):
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt, [Bachelor Thesis]

Amann, Sven (2009):
Spezifikation und Codegenerierung von Sicherheitsautomaten.
TU Darmstadt, [Bachelor Thesis]

Other

Gay, Richard and Mantel, Heiko and Sprick, Barbara (2010):
Service Automata for Secure Distributed Systems.
[Other]

Lux, Alexander and Starostin, Artem (2010):
Side Channel Finder (Version 1.0).
[Other]

Lortz, Steffen (2009):
Typbasierte Informationsflussanalyse für JVM-Programme auf Mobilgeräten.
[Other]

Amann, Sven (2009):
Spezifikation und Codegenerierung von Sicherheitsautomaten.
[Other]

Perner, Matthias (2008):
Information Flow Analysis for CIL.
[Other]

Schneider, Timo (2008):
Fallstudie: Sicherheitsautomat für einen orchestrierten Dienst in einer serviceorientierten Architektur.
[Other]

Schneider, Timo (2008):
Fallstudie: Sicherheitsautomat für einen orchestrierten Dienst in einer serviceorientierten Architektur.
[Other]

This list was generated on Sun Jun 16 01:25:21 2019 CEST.