TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | G | H | J | K | L | M | N | P | R | S | W
Number of items at this level (without sub-levels): 165.

A

Aderhold, Markus ; Kochtchi, Artjom (2013):
Tailoring PMD to Secure Coding.
(TUD-CS-2013-0245), [Report]

Aderhold, Markus ; Gebhardt, Alexander ; Mantel, Heiko (2013):
Choosing a Formalism for Secure Coding: FSM vs. LTL.
[Report]

Aderhold, Markus
Esparza, Javier ; Majumdar, Rupak (eds.) (2010):
Automated Termination Analysis for Programs with Second-Order Recursion.
In: 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS-16),
Springer, [Conference or Workshop Item]

Aderhold, Markus ; Cuéllar, Jorge ; Mantel, Heiko ; Sudbrock, Henning (2010):
Exemplary Formalization of Secure Coding Guidelines.
In: aderhold.ea:exemplary:2010a, Germany, [Report]

Aderhold, Markus
Esparza, J. ; Majumdar, R. (eds.) (2010):
Automated Termination Analysis for Programs with Second-Order Recursion.
In: LNCS 6015, In: 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS-16), pp. 221--235,
Springer, [Conference or Workshop Item]

Aderhold, Markus
Giesl, J. ; Hähnle, R. (eds.) (2010):
Automated Synthesis of Induction Axioms for Programs with Second-Order Recursion.
In: LNAI 6173, In: 5th International Joint Conference on Automated Reasoning (IJCAR-5), pp. 263--277,
Springer, [Conference or Workshop Item]

Amann, Sven (2009):
Spezifikation und Codegenerierung von Sicherheitsautomaten.
TU Darmstadt, [Bachelor Thesis]

Amann, Sven (2009):
Spezifikation und Codegenerierung von Sicherheitsautomaten.
[Other]

Autexier, Serge ; Hutter, Dieter ; Langenstein, Bruno ; Mantel, Heiko ; Rock, Georg ; Schairer, Axel ; Stephan, Werner ; Vogt, Roland ; Wolpers, Andreas (2000):
VSE: Formal Methods Meet Industrial Needs.
In: International Journal on Software Tools for Technology Transfer, 3 (1), pp. 66-77. Springer, ISSN 1433-2779,
[Article]

Autexier, Serge ; Hutter, Dieter ; Mantel, Heiko ; Schairer, Axel (1999):
System Description: INKA 5.0 -- A Logic Voyager.
In: LNAI 1632, In: 16th International Conference on Automated Deduction, CADE--16, pp. pp.~207-211,
Trento, Italy, Springer, [Conference or Workshop Item]

Autexier, Serge ; Hutter, Dieter ; Mantel, Heiko ; Schairer, Axel
Bert, Didier ; Choppy, C. ; Mosses, P. (eds.) (1999):
Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: Lecture Notes in Computer Science, 1827, In: Recent trends in algebraic development techniques : 14th International Workshop on Algebraic Development Techniques, WADT'99, pp. 73-88, Berlin ; Heidelberg, Springer, [Book Section]

Autexier, Serge ; Hutter, Dieter ; Mantel, Heiko ; Schairer, Axel
Bert, D. ; Choppy, C. ; Mosses, P. (eds.) (1999):
Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: LNCS, 1827, In: 14th International Workshop on Algebraic Development Techniques, WADT'99, pp. 73--88,
Springer, [Conference or Workshop Item]

Autexier, Serge ; Mantel, Heiko ; Stephan, Werner
Herzog, Otthein ; Günter, Andreas (eds.) (1998):
Simultaneous Quantifier Elimination.
In: LNAI 1504, In: KI-98: Advances in Artificial Intelligence, 22nd Annual German Conference on Artificial Intelligence, pp. 141-152,
Bremen, Germany, Springer, [Conference or Workshop Item]

Autexier, Serge ; Mantel, Heiko (1998):
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
In: autexier.ea:semantical-investigation-of-simultaneous-skolemization-for-first-order-sequent-calculus:1998a, Germany, [Report]

Autexier, Serge ; Mantel, Heiko (1998):
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
(SEKI Report SR-98-05), [Report]

B

Bauereiß, Thomas ; Greiner, Simon ; Herda, Mihai ; Kirsten, Michael ; Li, Ximeng ; Mantel, Heiko ; Mohr, Martin ; Perner, Matthias ; Schneider, David ; Tasch, Markus (2017):
RIFL 1.1: A Common Specification Language for Information-Flow Requirements.
[Report]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
pp. 225-241, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Bollmann, Dominik ; Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem (2015):
An Automatic Inference of Minimal Security Types.
In: Proceedings of the 11th International Conference on Information Systems Security (ICISS),
[Conference or Workshop Item]

Buchner, Karolina ; Lissermann, Roman ; Holmquist, Lars Erik (2014):
Interaction Techniques for Co-located Collaborative TV.
In: CHI 2014, pp. 1819-1824,
ACM, [Conference or Workshop Item]

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko (2014):
Scalable Offline Monitoring.
pp. 31-47, Heidelberg, Germany, Springer, Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany, [Conference or Workshop Item]

C

Cremer, Manuel (2017):
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt, [Bachelor Thesis]

D

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: LNCS, In: The 11th International Symposium on Foundations & Practice of Security (FPS),
Springer, The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, [Conference or Workshop Item]

Dix, Isabella (2018):
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
TU Darmstadt, [Master Thesis]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2017):
An Experimental Study of a Bucketing Approach.
In: Quantitative Aspects of Programming Languages and Systems,
Uppsala, Sweden, [Conference or Workshop Item]

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
pp. 427-445, Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Döweling, Sebastian ; Tahiri, Tarik ; Sowinski, Philipp ; Schmidt, Benedikt ; Khalilbeigi, Mohammadreza (2013):
Support for Collaborative Situation Analysis and Planning in Crisis Management Teams using Interactive Tabletops.
In: ACM International Conference on Interactive Tabletops and Surfaces (ITS'13), pp. 273-282,
DOI: 10.1145/2512349.2512823,
[Conference or Workshop Item]

Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Huber, Jochen ; Müller, Florian ; Mühlhäuser, Max (2012):
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
In: CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 2483-2488,
ACM, 30th ACM Conference on Human Factors in Computing Systems (CHI '12), Austin, USA, 05.-10.05.2012, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223823,
[Conference or Workshop Item]

D'Souza, Deepak ; Holla, Raveendra ; Kulkarni, Janardhan ; Ramesh, Raghavendra Kagalavadi ; Sprick, Barbara (2008):
The Decidability of Model-Checking Information Flow Properties.
In: International Conference on Information Systems Security (ICISS),
[Conference or Workshop Item]

D'Souza, Deepak ; Holla, Raveendra ; Kulkarni, Janardhan ; Ramesh, Raghavendra Kagalavadi ; Sprick, Barbara (2008):
The Decidability of Model-Checking Information Flow Properties.
In: International Conference on Information Systems Security (ICISS),
[Conference or Workshop Item]

E

Edlund, Martin ; Mantel, Heiko ; Weber, Alexandra ; Weißmantel, Tim (2022):
Graphical User Interfaces for a Qualitative and a Quantitative Side-Channel Analysis Tool. (Publisher's Version)
Darmstadt, DOI: 10.26083/tuprints-00020262,
[Report]

Earley, Timothy (2018):
Extending the Language Coverage of Side-Channel Finder AVR.
TU Darmstadt, [Bachelor Thesis]

Ereth, Sarah ; Lortz, Steffen ; Perner, Matthias (2014):
Confidentiality for Android Apps: Specification and Verification.
In: it -- Information Technology, 56 (6), pp. 288--293. [Article]

Ereth, Sarah ; Mantel, Heiko ; Perner, Matthias (2014):
Towards a Common Specification Language for Information-Flow Security in RS3 and Beyond: RIFL 1.0 - The Language.
[Report]

G

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Article]

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Conference or Workshop Item]

Gay, Richard (2017):
A Generic Framework for Enforcing Security in Distributed Systems.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
pp. 245-261, Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Conference or Workshop Item]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol (2017):
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
pp. 18-34, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Gay, Richard ; Mantel, Heiko ; Sudbrock, Henning (2013):
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
In: 2nd International Workshop on Quantitative Aspects in Security Assurance,
[Conference or Workshop Item]

Gay, Richard ; Mantel, Heiko ; Sprick, Barbara
TU Darmstadt (ed.) (2011):
Service Automata.
In: Preproceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST),
[Conference or Workshop Item]

Gay, Richard ; Mantel, Heiko ; Sprick, Barbara (2010):
Service Automata for Secure Distributed Systems.
[Other]

Gay, Richard (2008):
Interrupt-Related Covert Channels from an Attacker's Perspective.
RWTH Aachen, [Master Thesis]

Gay, Richard (2008):
Interrupt-Related Covert Channels from an Attacker's Perspective.
RWTH Aachen, [Master Thesis]

H

Hermann, Ben ; Li, Ximeng ; Mantel, Heiko ; Mezini, Mira ; Tasch, Markus ; Wendel, Florian ; Weber, Friedrich (2017):
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.
[Report]

Hu, Jinwei ; Mantel, Heiko ; Ruhleder, Sebastian (2015):
Enforcing Usage Constraints on Credentials for Web Applications.
Springer, Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC 2015), [Conference or Workshop Item]

Heinrichs, Felix ; Schreiber, Daniel ; Huber, Jochen ; Mühlhäuser, Max (2012):
Toward a Theory of Interaction in Mobile Paper-Digital Ensembles.
In: CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 1897-1900,
ACM, 30th ACM Conference on Human Factors in Computing Systems (CHI '12), Austin, USA, 05.-10.05.2012, ISBN 978-1-4503-1015-4,
DOI: 10.1145/2208276.2208328,
[Conference or Workshop Item]

Huber, Jochen ; Steimle, Jürgen ; Liao, Chunyuan ; Liu, Qiong ; Mühlhäuser, Max (2012):
LightBeam: Nomadic Pico Projector Interaction with Real World Objects.
In: CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 2513-2518,
ACM, 30th ACM Conference on Human Factors in Computing Systems (CHI '12), Austin, USA, 05.-10.05.2012, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223828,
[Conference or Workshop Item]

Huber, Jochen ; Ding, Yun (2012):
Adapting Web Pages Using Graph Partitioning Algorithms for User-Centric Multi-Device Web Browsing.
In: Springer Multimedia Tools and Applications, 51 (3), pp. 1-23. DOI: 10.1007/s11042-011-0980-1,
[Article]

Huber, Jochen ; Steimle, Jürgen ; Lissermann, Roman ; Olberding, Simon ; Mühlhäuser, Max (2010):
Wipe'n'Watch: Spatial Interaction Techniques for Interrelated Video Collections on Mobile Devices.
In: BCS '10: Proceedings of the 24th BCS Interaction Specialist Group Conference, pp. 423-427,
ACM, 24th BCS Interaction Specialist Group Conference, Dundee, United Kingdom, 06.-10.09.2010, ISBN 978-1-78017-130-2,
[Conference or Workshop Item]

Huber, Jochen ; Steimle, Jürgen ; Mühlhäuser, Max (2010):
Interaction Techniques for Mobile E-Lectures.
In: Workshop on "Next Generation of HCI and Education" in conjunction with CHI 2010,
ACM, Atlanta, GA, USA, [Conference or Workshop Item]

Huber, Jochen ; Steimle, Jürgen ; Mühlhäuser, Max (2010):
Mobile Interaction Techniques for Interrelated Videos.
In: CHI '10 Extended Abstracts on Human Factors in Computing Systems, pp. 3535-3540,
ACM Press, Atlanta, USA, ISBN 978-1-60558-930-5/10/04,
DOI: 10.1145/1753846.1754014,
[Conference or Workshop Item]

Hutter, Dieter ; Mantel, Heiko ; Schaefer, Ina ; Schairer, Axel (2007):
Security of Multiagent Systems: A Case Study on Comparison Shopping.
In: Journal of Applied Logic, [Article]

Hutter, Dieter ; Mantel, Heiko ; Schaefer, Ina ; Schairer, Axel (2007):
Security of Multiagent Systems: A Case Study on Comparison Shopping.
In: Journal of Applied Logic, [Article]

Hutter, Dieter ; Mantel, Heiko ; Rock, Georg ; Stephan, Werner ; Wolpers, Andreas ; Balser, Michael ; Reif, Wolfgang ; Schellhorn, Gerhard ; Stenzel, Kurt (1998):
VSE: Controlling the Complexity in Formal Software Developments.
In: LNCS 1641, In: International Workshop on Applied Formal Methods -- FM-Trends, pp. pp.~351-358,
Boppard, Germany, Springer, [Conference or Workshop Item]

Hutter, Dieter ; Mantel, Heiko ; Rock, Georg ; Stephan, Werner ; Wolpers, Andreas ; Balser, Michael ; Reif, Wolfgang ; Schellhorn, Gerhard ; Stenzel, Kurt (1998):
VSE: Controlling the Complexity in Formal Software Developments.
In: LNCS 1641, In: International Workshop on Applied Formal Methods -- FM-Trends, pp. pp.~351--358,
Springer, [Conference or Workshop Item]

J

Jakobs, Marie-Christine ; Mantel, Heiko
Margaria, Tiziana ; Steffen, Bernhard (eds.) (2020):
A Unifying Framework for Dynamic Monitoring and a Taxonomy of Optimizations.
pp. 72-92, Springer, 9th International Symposium on Leveraging Applications of Formal Methods (ISoLA 2020), virtual Conference, 20.-30.10., ISBN 978-3-030-61469-0,
DOI: 10.1007/978-3-030-61470-6_6,
[Conference or Workshop Item]

K

Khalilbeigi, Mohammadreza ; Schmittat, Patrik ; Steimle, Jürgen ; Mühlhäuser, Max (2012):
Occlusion-aware Interaction Techniques for Tabletop Systems.
In: CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 2531-2536,
ACM, 30th ACM Conference on Human Factors in Computing Systems (CHI '12), Austin, USA, 05.-10.05.2012, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223831,
[Conference or Workshop Item]

Kiemes, Tom ; Novelli, Francesco ; Oberle, Daniel
Barros, Alistair ; Oberle, Daniel (eds.) (2011):
Service Pricing.
In: Handbook of Service Description, pp. 229-244, Springer, ISBN 978-1-4614-1863-4,
[Book Section]

Khalilbeigi, Mohammadreza ; Steimle, Jürgen ; Mühlhäuser, Max (2010):
Interaction techniques for hybrid piles of documents on interactive tabletops.
In: CHI '10 Proceedings of the 28th international conference extended abstracts on Human factors in computing systems, pp. 3943-3948,
ACM, Atlanta, Georgia, USA, ISBN 978-1-60558-930-5,
DOI: 10.1145/1753846.1754083,
[Conference or Workshop Item]

Kraußer, Tina ; Mantel, Heiko ; Sudbrock, Henning (2007):
A Probabilistic Justification of the Combining Calculus under the Uniform Scheduler Assumption.
In: krauer.ea:probabilistic:2007a, [Report]

Köpf, Boris ; Mantel, Heiko (2007):
Transformational Typing and Unification for Automatically Correcting Insecure Programs.
In: International Journal of Information Security (IJIS), [Article]

Köpf, Boris ; Mantel, Heiko (2007):
Transformational Typing and Unification for Automatically Correcting Insecure Programs.
In: International Journal of Information Security (IJIS), [Article]

Krausser, Tina ; Mantel, Heiko ; Sudbrock, Henning (2007):
A Probabilistic Justification of the Combining Calculus under the Uniform Scheduler Assumption.
(2007-09), [Report]

Köpf, Boris ; Mantel, Heiko
Dimitrakos, Theodosis ; Martinelli, Fabio ; Ryan, Peter Y. A. ; Schneider, Steve (eds.) (2006):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: LNCS, 3866, In: Revised Selected Papers, Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, pp. 47-62,
Newcastle upon Tyne, UK, Springer Verlag, [Conference or Workshop Item]

Köpf, Boris ; Mantel, Heiko
Dimitrakos, Theodosis ; Martinelli, Fabio ; Ryan, Heiko Y. A. ; Schneider, Steve (eds.) (2006):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: LNCS, 3866, In: Revised Selected Papers, Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, pp. 47--62,
Springer Verlag, [Conference or Workshop Item]

Köpf, Boris ; Mantel, Heiko (2005):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: Proceedings of Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, pp. 45-60,
Newcastle, UK, University of Newcastle, [Conference or Workshop Item]

Köpf, Boris ; Mantel, Heiko (2005):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: Revised version appeared 2006 in Springer LNCS, Zürich, [Report]

Köpf, Boris ; Mantel, Heiko (2005):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: Proceedings of Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, pp. 45--60,
University of Newcastle, [Conference or Workshop Item]

Köpf, Boris ; Mantel, Heiko (2005):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
(498), [Report]

Kreitz, Christoph ; Mantel, Heiko (2004):
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: Automated Reasoning (JAR), Kluwer, 32, pp. 121-166. [Article]

Kreitz, Christoph ; Mantel, Heiko (2004):
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: Automated Reasoning (JAR), Kluwer, 32, pp. 121--166. [Article]

Kreitz, Christoph ; Mantel, Heiko (2000):
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: kreitz.ea:a-matrix-characterization-for-multiplicative-exponential-linear-logic:2000b Revised version appeared in 2004 in Journal of Automated Reasoning, [Report]

Kreitz, Christoph ; Mantel, Heiko (2000):
A Matrix Characterization for Multiplicative Exponential Linear Logic.
[Report]

Kreitz, Christoph ; Mantel, Heiko ; Otten, Jens ; Schmitt, Stephan
McCune, William (ed.) (1997):
Connection-Based Proof Construction in Linear Logic.
In: LNAI 1249, In: 14th International Conference on Automated Deduction, CADE-14, pp. 207-221,
Townsville, Australia, Springer, [Conference or Workshop Item]

L

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2018):
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, 94, pp. 45-67. Elsevier, ISSN 2352-2216,
[Article]

Li, Ximeng ; Mantel, Heiko ; Schickel, Johannes ; Tasch, Markus ; Weber, Alexandra ; Toteva, Iva (2017):
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.
[Report]

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus (2017):
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
pp. 45-66, Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), [Conference or Workshop Item]

Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem ; Bähr, Timo ; Schneider, David (2014):
Cassandra: Towards a Certifying App Store.
[Report]

Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem ; Weber, Alexandra (2014):
A Sound Information-Flow Analysis for Cassandra.
[Report]

Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem ; Bähr, Timo ; Schneider, David ; Weber, Alexandra (2014):
Cassandra: Towards a Certifying App Store for Android.
In: Proceedings of the 4th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp. 93--104,
ACM, [Conference or Workshop Item]

Lissermann, Roman ; Huber, Jochen ; Hadjakos, Aristotelis ; Nanayakkara, Suranga ; Mühlhäuser, Max (2014):
EarPut: Augmenting Ear-worn Devices for Ear-based Interaction.
In: Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures - the Future of Design, {OZCHI} '14, Sydney, New South Wales, Australia, December 2-5, 2014, pp. 300--307,
DOI: 10.1145/2686612.2686655,
[Conference or Workshop Item]

Lux, Alexander ; Mantel, Heiko ; Perner, Matthias (2012):
Scheduler-independent Declassifification.
(TUD-CS-2012-0061), [Report]

Lux, Alexander ; Starostin, Artem (2011):
A Tool for Static Detection of Timing Channels in Java.
In: 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design,
[Conference or Workshop Item]

Lux, Alexander ; Starostin, Artem (2010):
Side Channel Finder (Version 1.0).
[Other]

Lux, Alexander ; Mantel, Heiko ; Perner, Matthias ; Starostin, Artem (2010):
Side Channel Finder (Version 1.0).
[Report]

Lortz, Steffen (2009):
Typbasierte Informationsflussanalyse für JVM-Programme auf Mobilgeräten.
[Other]

Lux, Alexander ; Mantel, Heiko
Backes, Michael ; Ning, Peng (eds.) (2009):
Declassification with Explicit Reference Points.
In: LNCS, 5789, In: 14th European Symposium on Research in Computer Security, pp. 69-85,
Springer, [Conference or Workshop Item]

Lux, Alexander ; Mantel, Heiko
Degano, P. ; Guttman, J. ; Martinelli, F. (eds.) (2009):
Who Can Declassify?
In: LNCS, 5491, In: Proceedings of the Workshop on Formal Aspects in Security and Trust, FAST 2008, pp. 35-49,
Springer, [Conference or Workshop Item]

Lux, Alexander ; Mantel, Heiko (2008):
Who can declassify?
In: Preproceedings of the Workshop on Formal Aspects in Security and Trust (FAST),
[Conference or Workshop Item]

M

Mantel, Heiko ; Weber, Alexandra (2021):
Towards Leakage Bounds for Side Channels based on Caches and Pipelined Executions. (Publisher's Version)
Darmstadt, Technische Universität, DOI: 10.26083/tuprints-00019755,
[Report]

Mantel, Heiko ; Weißmantel, Tim ; Fischlin, Marc ; Weber, Alexandra (2021):
A Comparative Study of Cache Side Channels across AES Implementations and Modes of Operation. (Publisher's Version)
Darmstadt, DOI: 10.26083/tuprints-00019753,
[Report]

Mantel, Heiko ; Scheidel, Lukas ; Schneider, Thomas ; Weber, Alexandra ; Weinert, Christian ; Weißmantel, Tim (2020):
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20), virtual Conference, 14.-16.12., [Conference or Workshop Item]

Mantel, Heiko ; Probst, Christian (2019):
On the Meaning and Purpose of Attack Trees.
The 32nd IEEE Computer Security Foundations Symposium (CSF), Hoboken, NJ, USA, Jun 25, 2019 - Jun 28, 2019, [Conference or Workshop Item]

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2018):
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2017):
Vulnerabilities Introduced by Features for Software-based Energy Measurement.
[Report]

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris (2017):
A Systematic Study of Cache Side Channels across AES Implementations.
pp. 213-230, Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS), [Conference or Workshop Item]

Mantel, Heiko ; Starostin, Artem (2015):
Transforming Out Timing Leaks, More or Less.
In: LNCS, In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015) - Part I, p. 20,
Springer, Vienna, Austria, [Conference or Workshop Item]

Mantel, Heiko ; Perner, Matthias ; Sauer, Jens (2014):
Noninterference under Weak Memory Models (Progress Report).
[Report]

Mantel, Heiko ; Sands, David ; Sudbrock, Henning (2011):
Assumptions and Guarantees for Compositional Noninterference.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, pp. 218-232,
[Conference or Workshop Item]

Mantel, Heiko ; Sudbrock, Henning (2010):
Flexible Scheduler-independent Security.
In: LNCS 6345, In: European Symposium on Research in Computer Security (ESORICS), pp. 116-133,
Springer, [Conference or Workshop Item]

Mantel, Heiko ; Sudbrock, Henning
Degano, P. ; Guttman, J. ; Martinelli, F. (eds.) (2009):
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Springer, LNCS 5491, In: Proceedings of the Workshop on Formal Aspects in Security and Trust, FAST 2008, pp. 67-81,
[Conference or Workshop Item]

Mantel, Heiko ; Sudbrock, Henning (2009):
Increasing the Precision of the Combining Calculus (Extended Abstract).
In: 5th International Workshop on Programming Language Interference and Dependence ( PLID'09 ),
[Conference or Workshop Item]

Mantel, Heiko ; Sudbrock, Henning (2009):
Increasing the Precision of the Combining Calculus (Extended Abstract).
In: 5th International Workshop on Programming Language Interference and Dependence ( PLID'09 ),
[Conference or Workshop Item]

Mantel, Heiko ; Sudbrock, Henning
Degano, P. ; Guttman, J. ; Martinelli, F. (eds.) (2009):
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Springer, LNCS 5491, In: Proceedings of the Workshop on Formal Aspects in Security and Trust, FAST 2008, pp. 67--81,
[Conference or Workshop Item]

Mantel, Heiko ; Sudbrock, Henning
Degano, P. ; Guttman, J. ; Martinelli, F. (eds.) (2009):
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Springer, LNCS 5491, In: Proceedings of the Workshop on Formal Aspects in Security and Trust, FAST 2008, pp. 67-81,
[Conference or Workshop Item]

Molter, Hans Gregor ; Shao, Hui ; Sudbrock, Henning ; Huss, Sorin A. ; Mantel, Heiko (2008):
Designing a Coprocessor for Interrupt Handling on an FPGA.
In: molter.ea:designing:2008a, [Report]

Mantel, Heiko ; Sudbrock, Henning (2008):
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Pre-Proceedings of the Workshop on Formal Aspects in Security and Trust (FAST),
[Conference or Workshop Item]

Mantel, Heiko ; Sudbrock, Henning (2008):
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Pre-Proceedings of the Workshop on Formal Aspects in Security and Trust (FAST),
[Conference or Workshop Item]

Molter, Gregor ; Shao, Hui ; Sudbrock, Henning ; Huss, Sorin ; Mantel, Heiko (2008):
Designing a Coprocessor for Interrupt Handling on an FPGA.
[Report]

Mantel, Heiko ; Sudbrock, Henning ; Kraußer, Tina
Puebla, German (ed.) (2007):
Combining Different Proof Techniques for Verifying Information Flow Security.
In: LNCS, 4407, In: 16th International Symposium on Logic Based Program Synthesis and Transformation, LOPSTR 2006,
Springer, [Conference or Workshop Item]

Mantel, Heiko ; Reinhard, Alexander
Nicola, Rocco De (ed.) (2007):
Controlling the What and Where of Declassification in Language-Based Security.
In: LNCS, 4421, In: European Symposium on Programming (ESOP), pp. 141-156,
Springer, [Conference or Workshop Item]

Mantel, Heiko ; Sudbrock, Henning ; Krausser, Tina
Puebla, Germán (ed.) (2007):
Combining Different Proof Techniques for Verifying Information Flow Security.
In: LNCS, 4407, In: 16th International Symposium on Logic Based Program Synthesis and Transformation, LOPSTR 2006,
Springer, [Conference or Workshop Item]

Mantel, Heiko ; Sudbrock, Henning (2007):
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework.
In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, pp. 326--340,
IEEE Computer Society Press, [Conference or Workshop Item]

Mantel, Heiko ; Reinhard, Alexander
Nicola, Rocco De (ed.) (2007):
Controlling the What and Where of Declassification in Language-Based Security.
In: LNCS, 4421, In: European Symposium on Programming (ESOP), pp. 141--156,
Springer, ISBN 978-3-540-71314-2,
[Conference or Workshop Item]

Mantel, Heiko ; Sudbrock, Henning ; Kraußer, Tina
Puebla, German (ed.) (2006):
Combining Different Proof Techniques for Verifying Information Flow Security.
In: In Pre-Proceedings of 16th International Symposium on Logic Based Program Synthesis and Transformation, LOPSTR 2006, pp. 85-101,
Venice, Italy, Raporta di Ricerca CS-2006-5, Università Ca' Foscari Di Venezia, [Conference or Workshop Item]

Mantel, Heiko ; Sudbrock, Henning ; Krausser, Tina
Puebla, Germán (ed.) (2006):
Combining Different Proof Techniques for Verifying Information Flow Security.
In: In Pre-Proceedings of 16th International Symposium on Logic Based Program Synthesis and Transformation, LOPSTR 2006, pp. 85--101,
Raporta di Ricerca CS-2006-5, Università Ca' Foscari Di Venezia, [Conference or Workshop Item]

Mantel, Heiko (2005):
The Framework of Selective Interleaving Functions and the Modular Assembly Kit.
In: FMSE'05: 3rd ACM Workshop on Formal Methods for Security Engineering: From Specifications to Code, pp. 53-62,
Alexandria , VA, USA, ACM, [Conference or Workshop Item]

Mantel, Heiko ; Schairer, Axel (2005):
Exploiting Generic Aspects of Security Models in Formal Developments.
In: LNCS, 2605, In: Mechanizing Mathematical Reasoning, pp. 129-145, Springer Verlag, [Book Section]

Mantel, Heiko ; Schairer, Axel (2005):
Exploiting Generic Aspects of Security Models in Formal Developments.
In: LNCS, 2605, In: Mechanizing Mathematical Reasoning, pp. 129--145, Springer Verlag, ISBN 3-540-25051-4,
[Book Section]

Mantel, Heiko (2005):
The Framework of Selective Interleaving Functions and the Modular Assembly Kit.
In: FMSE'05: 3rd ACM Workshop on Formal Methods for Security Engineering: From Specifications to Code, pp. 53--62,
ACM, [Conference or Workshop Item]

Mantel, Heiko ; Sands, David (2004):
Controlled Declassification based on Intransitive Noninterference.
In: LNCS 3302, In: Proceedings of the 2nd ASIAN Symposium on Programming Languages and Systems, APLAS 2004, pp. 129-145,
Taipei, Taiwan, Springer-Verlag, [Conference or Workshop Item]

Mantel, Heiko ; Sands, David (2004):
Controlled Declassification based on Intransitive Noninterference.
In: LNCS 3302, In: Proceedings of the 2nd ASIAN Symposium on Programming Languages and Systems, APLAS 2004, pp. 129--145,
Springer-Verlag, [Conference or Workshop Item]

Mantel, Heiko ; Sabelfeld, Andrei (2003):
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
In: Journal of Computer Security (JCS), 11 (4), pp. 615-676. IOS Press, [Article]

Mantel, Heiko ; Sabelfeld, Andrei (2003):
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
In: Journal of Computer Security (JCS), 11 (4), pp. 615--676. IOS Press, [Article]

Mantel, Heiko (2003):
A Uniform Framework for the Formal Specification and Verification of Information Flow Security.
Universität des Saarlandes,
[Ph.D. Thesis]

Mantel, Heiko (2002):
On the Composition of Secure Systems.
In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 88-101,
Oakland, CA, USA, IEEE Computer Society, [Conference or Workshop Item]

Mantel, Heiko ; Schairer, Axel ; Kabatnik, Matthias ; Kreutzer, Michael ; Zugenmaier, Alf (2001):
Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks.
In: mantel.ea:using:2001a, Freiburg, [Report]

Mantel, Heiko ; Sabelfeld, Andrei (2001):
A Generic Approach to the Security of Multi-threaded Programs.
In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp. 126-142,
Cape Breton, Nova Scotia, Canada, IEEE Computer Society, [Conference or Workshop Item]

Mantel, Heiko (2001):
Preserving Information Flow Properties under Refinement.
In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 78-91,
Oakland, CA, USA, IEEE Computer Society, [Conference or Workshop Item]

Mantel, Heiko
Olivera, Jose Nuno ; Zave, Pamela (eds.) (2001):
Information Flow Control and Applications - Bridging a Gap.
In: LNCS 2021, In: FME 2001: Formal Methods for Increasing Software Productivity, International Symposium of Formal Methods Europe, pp. 153-172,
Berlin, Germany, Springer, [Conference or Workshop Item]

Mantel, Heiko ; Sabelfeld, Andrei (2001):
A Generic Approach to the Security of Multi-threaded Programs.
In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp. 126--142,
IEEE Computer Society, [Conference or Workshop Item]

Mantel, Heiko ; Schairer, Axel ; Kabatnik, Matthias ; Kreutzer, Michael ; Zugenmaier, Alf (2001):
Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks.
(159), [Report]

Mantel, Heiko
Olivera, Jose Nuno ; Zave, Pamela (eds.) (2001):
Information Flow Control and Applications -- Bridging a Gap.
In: LNCS 2021, In: FME 2001: Formal Methods for Increasing Software Productivity, International Symposium of Formal Methods Europe, pp. 153--172,
Springer, [Conference or Workshop Item]

Mantel, Heiko (2001):
Preserving Information Flow Properties under Refinement.
In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 78--91,
IEEE Computer Society, [Conference or Workshop Item]

Mantel, Heiko ; Gärtner, Felix (2000):
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Proceedings of Special Track on Verification, Validation and System Certification at 13th International Florida Artificial Intelligence Research Society Conference 2000, FLAIRS-2000, pp. 341--345,
AAAI Press, [Conference or Workshop Item]

Mantel, Heiko ; Gärtner, Felix (2000):
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Journal of Experimental and Theoretical Artificial Intelligence (JETAI), 12 (4), pp. 473-488. Taylor & Francis, [Article]

Mantel, Heiko (2000):
Unwinding Possibilistic Security Properties.
In: LNCS 1895, In: European Symposium on Research in Computer Security (ESORICS), pp. 238-254,
Toulouse, France, Springer, [Conference or Workshop Item]

Mantel, Heiko ; Gärtner, Felix (2000):
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Proceedings of Special Track on Verification, Validation and System Certification at 13th International Florida Artificial Intelligence Research Society Conference 2000, FLAIRS-2000, pp. 341-345,
Orlando, Florida, USA, [Conference or Workshop Item]

Mantel, Heiko (2000):
A new framework for possibilistic security - A summary - ABSTRACT.
In: mantel:new:2000a The full paper appeared in 2000 at CSFW, Berkeley, California, [Report]

Mantel, Heiko ; Gärtner, Felix (2000):
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Journal of Experimental and Theoretical Artificial Intelligence (JETAI), 12 (4), pp. 473--488. Taylor & Francis, [Article]

Mantel, Heiko (2000):
A new framework for possibilistic security - A summary - ABSTRACT.
[Report]

Mantel, Heiko (2000):
Possibilistic Definitions of Security -- An Assembly Kit.
In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, pp. 185--199,
IEEE Computer Society, [Conference or Workshop Item]

Mantel, Heiko ; Otten, Jens
Murray, Neil V. (ed.) (1999):
linTAP: A Tableau Prover for Linear Logic.
In: LNAI 1617, In: Automated Reasoning with Analytic Tableaux and Related Methods, International Conference (TABLEAUX'99), pp. 217-231,
Saratoga Springs, NY, USA, Springer, [Conference or Workshop Item]

Mantel, Heiko ; Gärtner, Felix (1999):
A Case Study in the Mechanical Verification of Fault Tolerance.
In: mantel.ea:a-case-study-in-the-mechanical-verification-of-fault-tolerance:1999a, Germany, [Report]

Mantel, Heiko ; Gärtner, Felix (1999):
A Case Study in the Mechanical Verification of Fault Tolerance.
(Technical Report TUD-BS-1), [Report]

Mantel, Heiko ; Kreitz, Christoph
Dix, Jürgen ; del Cerro, Luis Farinas ; Furbach, Ulrich (eds.) (1998):
A Matrix Characterization for MELL.
In: Lecture Notes in Computer Science, 1489, In: Logics in Artificial Intelligence, European Workshop, JELIA '98 : Proceedings, pp. 169-183, Berlin ; Heidelberg, Springer, [Book Section]

Mantel, Heiko (1998):
Developing a Matrix Characterization for MELL.
In: mantel:developing-a-matrix-characterization-for-mell:1998a, Kaiserslautern Germany, [Report]

Mantel, Heiko ; Sandner, Enno (1997):
A Framework for Connection Calculi.
In: mantel.ea:a-framework-for-connection-calculi:1997a, [Report]

Mantel, Heiko (1996):
Eine Matrixcharakterisierung für ein Fragment der Linearen Logik.
Darmstadt, Technische Univ., Darmstadt University of Technology, [Diploma Thesis or Magisterarbeit]

Mantel, Heiko (1996):
Eine Matrixcharakterisierung für ein Fragment der Linearen Logik.
Darmstadt University of Technology, [Diploma Thesis or Magisterarbeit]

N

Nikiforov, Oleg ; Sauer, Alexander ; Schickel, Johannes ; Weber, Alexandra ; Alber, Gernot ; Mantel, Heiko ; Walther, Thomas (2018):
Side-Channel Analysis of Privacy Amplification in Postprocessing Software for a Quantum Key Distribution System.
[Report]

P

Pascoal, Túlio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2017):
Slow TCAM Exhaustion DDoS Attack.
In: IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection, pp. 17-31,
Springer, [Conference or Workshop Item]

Perner, Matthias (2008):
Information Flow Analysis for CIL.
[Other]

R

Reinhard, Alexander (2006):
Analyse nebenläufiger Programme unter intransitiven Sicherheitspolitiken.
RWTH Aachen, [Master Thesis]

Reinhard, Alexander (2006):
Analyse nebenläufiger Programme unter intransitiven Sicherheitspolitiken.
RWTH Aachen, [Master Thesis]

S

Schmitz, Martin (2016):
Exploring 3D Printed Interaction.
In: TEI '16, In: Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction, pp. 705-708,
ACM, Eindhoven, Netherlands, ISBN 978-1-4503-3582-9,
DOI: 10.1145/2839462.2854105,
[Conference or Workshop Item]

Schmitz, Martin ; Khalilbeigi, Mohammadreza ; Balwierz, Matthias ; Lissermann, Roman ; Steimle, Jürgen ; Mühlhäuser, Max (2015):
Capricate: A Fabrication Pipeline to Design and 3D Print Capacitive Touch Sensors for Interactive Objects.
In: UIST '15, In: Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology, pp. 253-258,
ACM, Charlotte, NC, USA, ISBN 978-1-4503-3779-3,
DOI: 10.1145/2807442.2807503,
[Conference or Workshop Item]

Sudbrock, Henning (2013):
Compositional and Scheduler-Independent Information Flow Security.
TU Darmstadt,
[Ph.D. Thesis]

Steimle, Jürgen ; Huber, Jochen ; Lukosch, Stephan
Mühlhäuser, Max ; Sesink, Werner ; Kaminski, Andreas ; Steimle, Jürgen (eds.) (2011):
Disruptive User Interfaces for Technology-enhanced Learning: a Taxonomy”.
In: IATEL : interdisciplinary approaches to technology-enhanced learning, pp. 339-352, Berlin, Waxmann, ISBN 978-3-8309-2481-4,
[Book Section]

Schneider, Timo (2008):
Fallstudie: Sicherheitsautomat für einen orchestrierten Dienst in einer serviceorientierten Architektur.
[Other]

Sabelfeld, Andrei ; Mantel, Heiko (2002):
Static Confidentiality Enforcement for Distributed Programs.
In: LNCS 2477, In: Proceedings of the 9th International Static Analysis Symposium, SAS'02, pp. 376-394,
Madrid, Spain, Springer-Verlag, [Conference or Workshop Item]

Sabelfeld, Andrei ; Mantel, Heiko (2002):
Static Confidentiality Enforcement for Distributed Programs.
In: LNCS 2477, In: Proceedings of the 9th International Static Analysis Symposium, SAS'02, pp. 376--394,
Springer-Verlag, [Conference or Workshop Item]

W

Weber, Alexandra (2022):
Semantics-Based Cache-Side-Channel Quantification in Cryptographic Implementations. (Publisher's Version)
Darmstadt, Technische Universität,
DOI: 10.26083/tuprints-00021208,
[Ph.D. Thesis]

Weber, Alexandra ; Nikiforov, Oleg ; Sauer, Alexander ; Schickel, Johannes ; Alber, Gernot ; Mantel, Heiko ; Walther, Thomas (2021):
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography.
26th European Symposium on Research in Computer Security (ESORICS), virtual Conference, 04.-08.2021, [Conference or Workshop Item]

Wachsmann, Christian (2014):
Trusted and Privacy-preserving Embedded Systems: Advances in Design, Analysis and Application of Lightweight Privacy-preserving Authentication and Physical Security Primitives.
Darmstadt, Technische Universität Darmstadt,
[Ph.D. Thesis]

This list was generated on Sun Mar 26 01:21:36 2023 CET.