TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "20 Fachbereich Informatik > Modellierung und Analyse von Informationssystemen (MAIS)"

Ebene hoch
Gruppiere nach: Autor(en) | Datum | Typ des Eintrags | Sprache | Keine Gruppierung
Springe zu: A | B | C | D | E | G | H | K | L | M | N | O | P | R | S | W
Anzahl der Einträge auf dieser Ebene: 165.

A

Aderhold, Markus ; Kochtchi, Artjom :
Tailoring PMD to Secure Coding.

[Report], (2013)

Aderhold, Markus ; Gebhardt, Alexander ; Mantel, Heiko :
Choosing a Formalism for Secure Coding: FSM vs. LTL.

[Report], (2013)

Aderhold, Markus ; Cuéllar, Jorge ; Mantel, Heiko ; Sudbrock, Henning :
Exemplary Formalization of Secure Coding Guidelines.
In: aderhold.ea:exemplary:2010a . Germany
[Report], (2010)

Aderhold, Markus
Esparza, J. ; Majumdar, R. (eds.) :

Automated Termination Analysis for Programs with Second-Order Recursion.
In: LNCS 6015 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Aderhold, Markus
Giesl, J. ; Hähnle, R. (eds.) :

Automated Synthesis of Induction Axioms for Programs with Second-Order Recursion.
In: LNAI 6173 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Aderhold, Markus
Esparza, Javier ; Majumdar, Rupak (eds.) :

Automated Termination Analysis for Programs with Second-Order Recursion.
16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS-16) Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Amann, Sven :
Spezifikation und Codegenerierung von Sicherheitsautomaten.
TU Darmstadt
[Bachelorarbeit], (2009)

Amann, Sven :
Spezifikation und Codegenerierung von Sicherheitsautomaten.

[Anderes], (2009)

Autexier, Serge ; Hutter, Dieter ; Langenstein, Bruno ; Mantel, Heiko ; Rock, Georg ; Schairer, Axel ; Stephan, Werner ; Vogt, Roland ; Wolpers, Andreas :
VSE: Formal Methods Meet Industrial Needs.
[Online-Edition: https://link.springer.com/article/10.1007/s100099900022]
In: International Journal on Software Tools for Technology Transfer, 3 (1) pp. 66-77. ISSN 1433-2779
[Artikel], (2000)

Autexier, Serge ; Hutter, Dieter ; Mantel, Heiko ; Schairer, Axel :
System Description: INKA 5.0 -- A Logic Voyager.
In: LNAI 1632 . Springer , Trento, Italy
[Konferenz- oder Workshop-Beitrag], (1999)

Autexier, Serge ; Hutter, Dieter ; Mantel, Heiko ; Schairer, Axel
Bert, D. ; Choppy, C. ; Mosses, P. (eds.) :

Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: LNCS , 1827 . Springer
[Konferenz- oder Workshop-Beitrag], (1999)

Autexier, Serge ; Hutter, Dieter ; Mantel, Heiko ; Schairer, Axel
Bert, Didier ; Choppy, C. ; Mosses, P. (eds.) :

Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: Recent trends in algebraic development techniques : 14th International Workshop on Algebraic Development Techniques, WADT'99. Lecture Notes in Computer Science, 1827. Springer, Berlin ; Heidelberg Chateaux de Bonas, France , pp. 73-88.
[Buchkapitel], (1999)

Autexier, Serge ; Mantel, Heiko ; Stephan, Werner
Herzog, Otthein ; Günter, Andreas (eds.) :

Simultaneous Quantifier Elimination.
In: LNAI 1504 . Springer , Bremen, Germany
[Konferenz- oder Workshop-Beitrag], (1998)

Autexier, Serge ; Mantel, Heiko :
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.

[Report], (1998)

Autexier, Serge ; Mantel, Heiko :
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
In: autexier.ea:semantical-investigation-of-simultaneous-skolemization-for-first-order-sequent-calculus:1998a . Germany
[Report], (1998)

B

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
The 10th International Symposium on Foundations & Practice of Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Bauereiß, Thomas ; Greiner, Simon ; Herda, Mihai ; Kirsten, Michael ; Li, Ximeng ; Mantel, Heiko ; Mohr, Martin ; Perner, Matthias ; Schneider, David ; Tasch, Markus :
RIFL 1.1: A Common Specification Language for Information-Flow Requirements.

[Report], (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag], (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag], (2017)

Bollmann, Dominik ; Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem :
An Automatic Inference of Minimal Security Types.
Proceedings of the 11th International Conference on Information Systems Security (ICISS)
[Konferenz- oder Workshop-Beitrag], (2015)

Buchner, Karolina ; Lissermann, Roman ; Holmquist, Lars Erik :
Interaction Techniques for Co-located Collaborative TV.
CHI 2014 ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko :
Scalable Offline Monitoring.
In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany. Springer , Heidelberg, Germany
[Konferenz- oder Workshop-Beitrag], (2014)

C

Cremer, Manuel :
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt
[Bachelorarbeit], (2017)

D

Dantas, Yuri Gil ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
[Konferenz- oder Workshop-Beitrag], (2018)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
ESORICS - Proceedings of the 22nd European Symposium on Research in Computer Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Experimental Study of a Bucketing Approach.
Quantitative Aspects of Programming Languages and Systems
[Konferenz- oder Workshop-Beitrag], (2017)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2017)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2017)

Döweling, Sebastian ; Tahiri, Tarik ; Sowinski, Philipp ; Schmidt, Benedikt ; Khalilbeigi, Mohammadreza :
Support for Collaborative Situation Analysis and Planning in Crisis Management Teams using Interactive Tabletops.
ACM International Conference on Interactive Tabletops and Surfaces (ITS'13)
[Konferenz- oder Workshop-Beitrag], (2013)

Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Huber, Jochen ; Müller, Florian ; Mühlhäuser, Max :
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Konferenz- oder Workshop-Beitrag], (2012)

D'Souza, Deepak ; Holla, Raveendra ; Kulkarni, Janardhan ; Ramesh, Raghavendra Kagalavadi ; Sprick, Barbara :
The Decidability of Model-Checking Information Flow Properties.
International Conference on Information Systems Security (ICISS)
[Konferenz- oder Workshop-Beitrag], (2008)

D'Souza, Deepak ; Holla, Raveendra ; Kulkarni, Janardhan ; Ramesh, Raghavendra Kagalavadi ; Sprick, Barbara :
The Decidability of Model-Checking Information Flow Properties.
International Conference on Information Systems Security (ICISS)
[Konferenz- oder Workshop-Beitrag], (2008)

E

Ereth, Sarah ; Lortz, Steffen ; Perner, Matthias :
Confidentiality for Android Apps: Specification and Verification.
In: it -- Information Technology, 56 (6) 288--293.
[Artikel], (2014)

Ereth, Sarah ; Mantel, Heiko ; Perner, Matthias :
Towards a Common Specification Language for Information-Flow Security in RS3 and Beyond: RIFL 1.0 - The Language.

[Report], (2014)

G

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
[Konferenz- oder Workshop-Beitrag], (2018)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes :
Towards Accelerated Usage Control based on Access Correlations.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard :
A Generic Framework for Enforcing Security in Distributed Systems.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6987]
Technische Universität , Darmstadt
[Dissertation], (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol :
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol :
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes :
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Mantel, Heiko ; Sudbrock, Henning :
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
[Online-Edition: https://www.iit.cnr.it/qasa2013/]
2nd International Workshop on Quantitative Aspects in Security Assurance
[Konferenz- oder Workshop-Beitrag], (2013)

Gay, Richard ; Mantel, Heiko ; Sprick, Barbara
TU Darmstadt (ed.) :

Service Automata.
TU Darmstadt (.) Preproceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST)
[Konferenz- oder Workshop-Beitrag], (2011)

Gay, Richard ; Mantel, Heiko ; Sprick, Barbara :
Service Automata for Secure Distributed Systems.

[Anderes], (2010)

Gay, Richard :
Interrupt-Related Covert Channels from an Attacker's Perspective.
RWTH Aachen
[Masterarbeit], (2008)

Gay, Richard :
Interrupt-Related Covert Channels from an Attacker's Perspective.
RWTH Aachen
[Masterarbeit], (2008)

H

Hermann, Ben ; Li, Ximeng ; Mantel, Heiko ; Mezini, Mira ; Tasch, Markus ; Wendel, Florian ; Weber, Friedrich :
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.

[Report], (2017)

Hu, Jinwei ; Mantel, Heiko ; Ruhleder, Sebastian :
Enforcing Usage Constraints on Credentials for Web Applications.
In: Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC 2015). Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Heinrichs, Felix ; Schreiber, Daniel ; Huber, Jochen ; Mühlhäuser, Max :
Toward a Theory of Interaction in Mobile Paper-Digital Ensembles.
In: CHI'12 . ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Huber, Jochen ; Steimle, Jürgen ; Liao, Chunyuan ; Liu, Qiong ; Mühlhäuser, Max :
LightBeam: Nomadic Pico Projector Interaction with Real World Objects.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Huber, Jochen ; Ding, Yun :
Adapting Web Pages Using Graph Partitioning Algorithms for User-Centric Multi-Device Web Browsing.
In: Springer Multimedia Tools and Applications, 51 (3) pp. 1-23.
[Artikel], (2012)

Huber, Jochen ; Steimle, Jürgen ; Lissermann, Roman ; Olberding, Simon ; Mühlhäuser, Max :
Wipe'n'Watch: Spatial Interaction Techniques for Interrelated Video Collections on Mobile Devices.
BCS HCI '10: Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction ACM
[Konferenz- oder Workshop-Beitrag], (2010)

Huber, Jochen ; Steimle, Jürgen ; Mühlhäuser, Max :
Interaction Techniques for Mobile E-Lectures.
In: Workshop ACM
[Konferenz- oder Workshop-Beitrag], (2010)

Huber, Jochen ; Steimle, Jürgen ; Mühlhäuser, Max :
Mobile Interaction Techniques for Interrelated Videos.
CHI '10 Extended Abstracts on Human Factors in Computing Systems ACM Press
[Konferenz- oder Workshop-Beitrag], (2010)

Hutter, Dieter ; Mantel, Heiko ; Schaefer, Ina ; Schairer, Axel :
Security of Multiagent Systems: A Case Study on Comparison Shopping.
In: Journal of Applied Logic
[Artikel], (2007)

Hutter, Dieter ; Mantel, Heiko ; Schaefer, Ina ; Schairer, Axel :
Security of Multiagent Systems: A Case Study on Comparison Shopping.
In: Journal of Applied Logic
[Artikel], (2007)

Hutter, Dieter ; Mantel, Heiko ; Rock, Georg ; Stephan, Werner ; Wolpers, Andreas ; Balser, Michael ; Reif, Wolfgang ; Schellhorn, Gerhard ; Stenzel, Kurt :
VSE: Controlling the Complexity in Formal Software Developments.
In: LNCS 1641 . Springer , Boppard, Germany
[Konferenz- oder Workshop-Beitrag], (1998)

Hutter, Dieter ; Mantel, Heiko ; Rock, Georg ; Stephan, Werner ; Wolpers, Andreas ; Balser, Michael ; Reif, Wolfgang ; Schellhorn, Gerhard ; Stenzel, Kurt :
VSE: Controlling the Complexity in Formal Software Developments.
In: LNCS 1641 . Springer
[Konferenz- oder Workshop-Beitrag], (1998)

K

Khalilbeigi, Mohammadreza ; Schmittat, Patrik ; Steimle, Jürgen ; Mühlhäuser, Max :
Occlusion-aware Interaction Techniques for Tabletop Systems.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Kiemes, Tom ; Novelli, Francesco ; Oberle, Daniel
Barros, Alistair ; Oberle, Daniel (eds.) :

Service Pricing.
[Online-Edition: http://www.springer.com/computer/database+management+%26+inf...]
In: Handbook of Service Description. Springer , pp. 229-244. ISBN 978-1-4614-1863-4
[Buchkapitel], (2011)

Khalilbeigi, Mohammadreza ; Steimle, Jürgen ; Mühlhäuser, Max :
Interaction techniques for hybrid piles of documents on interactive tabletops.
CHI '10 Proceedings of the 28th international conference extended abstracts on Human factors in computing systems ACM
[Konferenz- oder Workshop-Beitrag], (2010)

Kraußer, Tina ; Mantel, Heiko ; Sudbrock, Henning :
A Probabilistic Justification of the Combining Calculus under the Uniform Scheduler Assumption.
In: krauer.ea:probabilistic:2007a .
[Report], (2007)

Köpf, Boris ; Mantel, Heiko :
Transformational Typing and Unification for Automatically Correcting Insecure Programs.
In: International Journal of Information Security (IJIS)
[Artikel], (2007)

Krausser, Tina ; Mantel, Heiko ; Sudbrock, Henning :
A Probabilistic Justification of the Combining Calculus under the Uniform Scheduler Assumption.

[Report], (2007)

Köpf, Boris ; Mantel, Heiko :
Transformational Typing and Unification for Automatically Correcting Insecure Programs.
In: International Journal of Information Security (IJIS)
[Artikel], (2007)

Köpf, Boris ; Mantel, Heiko
Dimitrakos, Theodosis ; Martinelli, Fabio ; Ryan, Peter Y. A. ; Schneider, Steve (eds.) :

Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: LNCS , 3866 . Springer Verlag , Newcastle upon Tyne, UK
[Konferenz- oder Workshop-Beitrag], (2006)

Köpf, Boris ; Mantel, Heiko
Dimitrakos, Theodosis ; Martinelli, Fabio ; Ryan, Heiko Y. A. ; Schneider, Steve (eds.) :

Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: LNCS , 3866 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2006)

Köpf, Boris ; Mantel, Heiko :
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Proceedings of Third International Workshop on Formal Aspects in Security and Trust, FAST 2005 University of Newcastle , Newcastle, UK
[Konferenz- oder Workshop-Beitrag], (2005)

Köpf, Boris ; Mantel, Heiko :
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Proceedings of Third International Workshop on Formal Aspects in Security and Trust, FAST 2005 University of Newcastle
[Konferenz- oder Workshop-Beitrag], (2005)

Köpf, Boris ; Mantel, Heiko :
Eliminating Implicit Information Leaks by Transformational Typing and Unification.

[Report], (2005)

Köpf, Boris ; Mantel, Heiko :
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: Revised version appeared 2006 in Springer LNCS . Zürich
[Report], (2005)

Kreitz, Christoph ; Mantel, Heiko :
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: Automated Reasoning (JAR), Kluwer, 32 121--166.
[Artikel], (2004)

Kreitz, Christoph ; Mantel, Heiko :
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: Automated Reasoning (JAR), Kluwer, 32 pp. 121-166.
[Artikel], (2004)

Kreitz, Christoph ; Mantel, Heiko :
A Matrix Characterization for Multiplicative Exponential Linear Logic.

[Report], (2000)

Kreitz, Christoph ; Mantel, Heiko :
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: kreitz.ea:a-matrix-characterization-for-multiplicative-exponential-linear-logic:2000b Revised version appeared in 2004 in Journal of Automated Reasoning .
[Report], (2000)

Kreitz, Christoph ; Mantel, Heiko ; Otten, Jens ; Schmitt, Stephan
McCune, William (ed.) :

Connection-Based Proof Construction in Linear Logic.
In: LNAI 1249 . Springer , Townsville, Australia
[Konferenz- oder Workshop-Beitrag], (1997)

L

Li, Ximeng ; Mantel, Heiko ; Schickel, Johannes ; Tasch, Markus ; Weber, Alexandra ; Toteva, Iva :
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.

[Report], (2017)

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus :
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS).
[Konferenz- oder Workshop-Beitrag], (2017)

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming
[Artikel], (2017)

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus :
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS).
[Konferenz- oder Workshop-Beitrag], (2017)

Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem ; Bähr, Timo ; Schneider, David :
Cassandra: Towards a Certifying App Store.

[Report], (2014)

Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem ; Weber, Alexandra :
A Sound Information-Flow Analysis for Cassandra.

[Report], (2014)

Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem ; Bähr, Timo ; Schneider, David ; Weber, Alexandra :
Cassandra: Towards a Certifying App Store for Android.
Proceedings of the 4th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Lissermann, Roman ; Huber, Jochen ; Hadjakos, Aristotelis ; Nanayakkara, Suranga ; Mühlhäuser, Max :
EarPut: Augmenting Ear-worn Devices for Ear-based Interaction.
Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures - the Future of Design, {OZCHI} '14, Sydney, New South Wales, Australia, December 2-5, 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Lux, Alexander ; Mantel, Heiko ; Perner, Matthias :
Scheduler-independent Declassifification.

[Report], (2012)

Lux, Alexander ; Starostin, Artem :
A Tool for Static Detection of Timing Channels in Java.
2nd International Workshop on Constructive Side-Channel Analysis and Secure Design
[Konferenz- oder Workshop-Beitrag], (2011)

Lux, Alexander ; Starostin, Artem :
Side Channel Finder (Version 1.0).

[Anderes], (2010)

Lux, Alexander ; Mantel, Heiko ; Perner, Matthias ; Starostin, Artem :
Side Channel Finder (Version 1.0).

[Report], (2010)

Lortz, Steffen :
Typbasierte Informationsflussanalyse für JVM-Programme auf Mobilgeräten.

[Anderes], (2009)

Lux, Alexander ; Mantel, Heiko
Backes, Michael ; Ning, Peng (eds.) :

Declassification with Explicit Reference Points.
In: LNCS , 5789 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Lux, Alexander ; Mantel, Heiko
Degano, P. ; Guttman, J. ; Martinelli, F. (eds.) :

Who Can Declassify?
In: LNCS , 5491 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Lux, Alexander ; Mantel, Heiko :
Who can declassify?
Preproceedings of the Workshop on Formal Aspects in Security and Trust (FAST)
[Konferenz- oder Workshop-Beitrag], (2008)

M

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich :
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2018)

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich :
Vulnerabilities Introduced by Features for Software-based Energy Measurement.

[Report], (2017)

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris :
A Systematic Study of Cache Side Channels across AES Implementations.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris :
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS).
[Konferenz- oder Workshop-Beitrag], (2017)

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris :
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS).
[Konferenz- oder Workshop-Beitrag], (2017)

Mantel, Heiko ; Starostin, Artem :
Transforming Out Timing Leaks, More or Less.
In: LNCS (9326). Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Mantel, Heiko ; Perner, Matthias ; Sauer, Jens :
Noninterference under Weak Memory Models (Progress Report).

[Report], (2014)

Mantel, Heiko ; Sands, David ; Sudbrock, Henning :
Assumptions and Guarantees for Compositional Noninterference.
Proceedings of the 24th IEEE Computer Security Foundations Symposium
[Konferenz- oder Workshop-Beitrag], (2011)

Mantel, Heiko ; Sudbrock, Henning :
Flexible Scheduler-independent Security.
In: LNCS 6345 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Mantel, Heiko ; Sudbrock, Henning :
Increasing the Precision of the Combining Calculus (Extended Abstract).
5th International Workshop on Programming Language Interference and Dependence ( PLID'09 )
[Konferenz- oder Workshop-Beitrag], (2009)

Mantel, Heiko ; Sudbrock, Henning
Degano, P. ; Guttman, J. ; Martinelli, F. (eds.) :

Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Springer, LNCS 5491 .
[Konferenz- oder Workshop-Beitrag], (2009)

Mantel, Heiko ; Sudbrock, Henning
Degano, P. ; Guttman, J. ; Martinelli, F. (eds.) :

Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Springer, LNCS 5491 .
[Konferenz- oder Workshop-Beitrag], (2009)

Mantel, Heiko ; Sudbrock, Henning :
Increasing the Precision of the Combining Calculus (Extended Abstract).
5th International Workshop on Programming Language Interference and Dependence ( PLID'09 )
[Konferenz- oder Workshop-Beitrag], (2009)

Mantel, Heiko ; Sudbrock, Henning
Degano, P. ; Guttman, J. ; Martinelli, F. (eds.) :

Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
In: Springer, LNCS 5491 .
[Konferenz- oder Workshop-Beitrag], (2009)

Mantel, Heiko ; Sudbrock, Henning :
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
Pre-Proceedings of the Workshop on Formal Aspects in Security and Trust (FAST)
[Konferenz- oder Workshop-Beitrag], (2008)

Molter, Gregor ; Shao, Hui ; Sudbrock, Henning ; Huss, Sorin ; Mantel, Heiko :
Designing a Coprocessor for Interrupt Handling on an FPGA.

[Report], (2008)

Mantel, Heiko ; Sudbrock, Henning :
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
Pre-Proceedings of the Workshop on Formal Aspects in Security and Trust (FAST)
[Konferenz- oder Workshop-Beitrag], (2008)

Molter, Hans Gregor ; Shao, Hui ; Sudbrock, Henning ; Huss, Sorin. A. ; Mantel, Heiko :
Designing a Coprocessor for Interrupt Handling on an FPGA.
In: molter.ea:designing:2008a .
[Report], (2008)

Mantel, Heiko ; Sudbrock, Henning ; Krausser, Tina
Puebla, Germán (ed.) :

Combining Different Proof Techniques for Verifying Information Flow Security.
In: LNCS , 4407 . Springer
[Konferenz- oder Workshop-Beitrag], (2007)

Mantel, Heiko ; Sudbrock, Henning :
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework.
20th IEEE Computer Security Foundations Symposium, CSF 2007 IEEE Computer Society Press
[Konferenz- oder Workshop-Beitrag], (2007)

Mantel, Heiko ; Reinhard, Alexander
Nicola, Rocco De (ed.) :

Controlling the What and Where of Declassification in Language-Based Security.
In: LNCS , 4421 . Springer
[Konferenz- oder Workshop-Beitrag], (2007)

Mantel, Heiko ; Reinhard, Alexander
Nicola, Rocco De (ed.) :

Controlling the What and Where of Declassification in Language-Based Security.
In: LNCS , 4421 . Springer
[Konferenz- oder Workshop-Beitrag], (2007)

Mantel, Heiko ; Sudbrock, Henning ; Kraußer, Tina
Puebla, German (ed.) :

Combining Different Proof Techniques for Verifying Information Flow Security.
In: LNCS , 4407 . Springer
[Konferenz- oder Workshop-Beitrag], (2007)

Mantel, Heiko ; Sudbrock, Henning ; Kraußer, Tina
Puebla, German (ed.) :

Combining Different Proof Techniques for Verifying Information Flow Security.
In Pre-Proceedings of 16th International Symposium on Logic Based Program Synthesis and Transformation, LOPSTR 2006 Raporta di Ricerca CS-2006-5, Università Ca' Foscari Di Venezia , Venice, Italy
[Konferenz- oder Workshop-Beitrag], (2006)

Mantel, Heiko ; Sudbrock, Henning ; Krausser, Tina
Puebla, Germán (ed.) :

Combining Different Proof Techniques for Verifying Information Flow Security.
In Pre-Proceedings of 16th International Symposium on Logic Based Program Synthesis and Transformation, LOPSTR 2006 Raporta di Ricerca CS-2006-5, Università Ca' Foscari Di Venezia
[Konferenz- oder Workshop-Beitrag], (2006)

Mantel, Heiko :
The Framework of Selective Interleaving Functions and the Modular Assembly Kit.
FMSE'05: 3rd ACM Workshop on Formal Methods for Security Engineering: From Specifications to Code ACM , Alexandria , VA, USA
[Konferenz- oder Workshop-Beitrag], (2005)

Mantel, Heiko ; Schairer, Axel :
Exploiting Generic Aspects of Security Models in Formal Developments.
In: Mechanizing Mathematical Reasoning. LNCS, 2605. Springer Verlag , 129--145. ISBN 3-540-25051-4
[Buchkapitel], (2005)

Mantel, Heiko :
The Framework of Selective Interleaving Functions and the Modular Assembly Kit.
FMSE'05: 3rd ACM Workshop on Formal Methods for Security Engineering: From Specifications to Code ACM
[Konferenz- oder Workshop-Beitrag], (2005)

Mantel, Heiko ; Schairer, Axel :
Exploiting Generic Aspects of Security Models in Formal Developments.
In: Mechanizing Mathematical Reasoning. LNCS, 2605. Springer Verlag , pp. 129-145.
[Buchkapitel], (2005)

Mantel, Heiko ; Sands, David :
Controlled Declassification based on Intransitive Noninterference.
In: LNCS 3302 . Springer-Verlag , Taipei, Taiwan
[Konferenz- oder Workshop-Beitrag], (2004)

Mantel, Heiko ; Sands, David :
Controlled Declassification based on Intransitive Noninterference.
In: LNCS 3302 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2004)

Mantel, Heiko ; Sabelfeld, Andrei :
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
In: Journal of Computer Security (JCS), 11 (4) 615--676.
[Artikel], (2003)

Mantel, Heiko :
A Uniform Framework for the Formal Specification and Verification of Information Flow Security.
Universität des Saarlandes
[Dissertation]

Mantel, Heiko ; Sabelfeld, Andrei :
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
In: Journal of Computer Security (JCS), 11 (4) pp. 615-676.
[Artikel], (2003)

Mantel, Heiko :
On the Composition of Secure Systems.
Proceedings of the IEEE Symposium on Security and Privacy IEEE Computer Society , Oakland, CA, USA
[Konferenz- oder Workshop-Beitrag], (2002)

Mantel, Heiko ; Schairer, Axel ; Kabatnik, Matthias ; Kreutzer, Michael ; Zugenmaier, Alf :
Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks.
In: mantel.ea:using:2001a . Freiburg
[Report], (2001)

Mantel, Heiko ; Sabelfeld, Andrei :
A Generic Approach to the Security of Multi-threaded Programs.
Proceedings of the 14th IEEE Computer Security Foundations Workshop IEEE Computer Society , Cape Breton, Nova Scotia, Canada
[Konferenz- oder Workshop-Beitrag], (2001)

Mantel, Heiko :
Preserving Information Flow Properties under Refinement.
Proceedings of the IEEE Symposium on Security and Privacy IEEE Computer Society , Oakland, CA, USA
[Konferenz- oder Workshop-Beitrag], (2001)

Mantel, Heiko
Olivera, Jose Nuno ; Zave, Pamela (eds.) :

Information Flow Control and Applications - Bridging a Gap.
In: LNCS 2021 . Springer , Berlin, Germany
[Konferenz- oder Workshop-Beitrag], (2001)

Mantel, Heiko ; Sabelfeld, Andrei :
A Generic Approach to the Security of Multi-threaded Programs.
Proceedings of the 14th IEEE Computer Security Foundations Workshop IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2001)

Mantel, Heiko ; Schairer, Axel ; Kabatnik, Matthias ; Kreutzer, Michael ; Zugenmaier, Alf :
Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks.

[Report], (2001)

Mantel, Heiko
Olivera, Jose Nuno ; Zave, Pamela (eds.) :

Information Flow Control and Applications -- Bridging a Gap.
In: LNCS 2021 . Springer
[Konferenz- oder Workshop-Beitrag], (2001)

Mantel, Heiko :
Preserving Information Flow Properties under Refinement.
Proceedings of the IEEE Symposium on Security and Privacy IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2001)

Mantel, Heiko ; Gärtner, Felix :
A Case Study in the Mechanical Verification of Fault Tolerance.
Proceedings of Special Track on Verification, Validation and System Certification at 13th International Florida Artificial Intelligence Research Society Conference 2000, FLAIRS-2000 AAAI Press
[Konferenz- oder Workshop-Beitrag], (2000)

Mantel, Heiko :
Unwinding Possibilistic Security Properties.
In: LNCS 1895 . Springer , Toulouse, France
[Konferenz- oder Workshop-Beitrag], (2000)

Mantel, Heiko ; Gärtner, Felix :
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Journal of Experimental and Theoretical Artificial Intelligence (JETAI), 12 (4) pp. 473-488.
[Artikel], (2000)

Mantel, Heiko :
A new framework for possibilistic security - A summary - ABSTRACT.
In: mantel:new:2000a The full paper appeared in 2000 at CSFW . Berkeley, California
[Report], (2000)

Mantel, Heiko ; Gärtner, Felix :
A Case Study in the Mechanical Verification of Fault Tolerance.
Proceedings of Special Track on Verification, Validation and System Certification at 13th International Florida Artificial Intelligence Research Society Conference 2000, FLAIRS-2000 Orlando, Florida, USA
[Konferenz- oder Workshop-Beitrag], (2000)

Mantel, Heiko ; Gärtner, Felix :
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Journal of Experimental and Theoretical Artificial Intelligence (JETAI), 12 (4) 473--488.
[Artikel], (2000)

Mantel, Heiko :
A new framework for possibilistic security - A summary - ABSTRACT.

[Report], (2000)

Mantel, Heiko :
Possibilistic Definitions of Security -- An Assembly Kit.
Proceedings of the 13th IEEE Computer Security Foundations Workshop IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2000)

Mantel, Heiko ; Otten, Jens
V.Murray, Neil (ed.) :

linTAP: A Tableau Prover for Linear Logic.
In: LNAI 1617 . Springer , Saratoga Springs, NY, USA
[Konferenz- oder Workshop-Beitrag], (1999)

Mantel, Heiko ; Gärtner, Felix :
A Case Study in the Mechanical Verification of Fault Tolerance.

[Report], (1999)

Mantel, Heiko ; Gärtner, Felix :
A Case Study in the Mechanical Verification of Fault Tolerance.
In: mantel.ea:a-case-study-in-the-mechanical-verification-of-fault-tolerance:1999a . Germany
[Report], (1999)

Mantel, Heiko ; Kreitz, Christoph
Dix, Jürgen ; del Cerro, Luis Farinas ; Furbach, Ulrich (eds.) :

A Matrix Characterization for MELL.
In: Logics in Artificial Intelligence, European Workshop, JELIA '98 : Proceedings. Lecture Notes in Computer Science, 1489. Springer, Berlin ; Heidelberg Dagstuhl, Germany , pp. 169-183.
[Buchkapitel], (1998)

Mantel, Heiko :
Developing a Matrix Characterization for MELL.
In: mantel:developing-a-matrix-characterization-for-mell:1998a . Kaiserslautern Germany
[Report], (1998)

Mantel, Heiko ; Sandner, Enno :
A Framework for Connection Calculi.
In: mantel.ea:a-framework-for-connection-calculi:1997a .
[Report], (1997)

Mantel, Heiko :
Eine Matrixcharakterisierung für ein Fragment der Linearen Logik.
Technische Univ. , Darmstadt
[Masterarbeit], (1996)

Mantel, Heiko :
Eine Matrixcharakterisierung für ein Fragment der Linearen Logik.
Darmstadt University of Technology
[Masterarbeit], (1996)

N

Nikiforov, Oleg ; Sauer, Alexander ; Schickel, Johannes ; Weber, Alexandra ; Alber, Gernot ; Mantel, Heiko ; Walther, Thomas :
Side-Channel Analysis of Privacy Amplification in Postprocessing Software for a Quantum Key Distribution System.

[Report], (2018)

O

O.O.Lemos, Marcilio ; Gil Dantas, Yuri ; Fonseca, Iguatemi E. ; Nigam, Vivek :
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Proceedings of the Journal of Logical and Algebraic Methods in Programming (JLAMP) pp. 45-67.
[Artikel], (2018)

P

Pascoal, Tulio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
Slow TCAM Exhaustion DDoS Attack.
In: Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC).
[Konferenz- oder Workshop-Beitrag], (2017)

Perner, Matthias :
Information Flow Analysis for CIL.

[Anderes], (2008)

R

Reinhard, Alexander :
Analyse nebenläufiger Programme unter intransitiven Sicherheitspolitiken.
RWTH Aachen
[Masterarbeit], (2006)

Reinhard, Alexander :
Analyse nebenläufiger Programme unter intransitiven Sicherheitspolitiken.
RWTH Aachen
[Masterarbeit], (2006)

S

Schmitz, Martin :
Exploring 3D Printed Interaction.
[Online-Edition: https://doi.org/10.1145/2839462.2854105]
In: TEI '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Schmitz, Martin ; Khalilbeigi, Mohammadreza ; Balwierz, Matthias ; Lissermann, Roman ; Steimle, Jürgen ; Mühlhäuser, Max :
Capricate: A Fabrication Pipeline to Design and 3D Print Capacitive Touch Sensors for Interactive Objects.
[Online-Edition: https://doi.org/10.1145/2807442.2807503]
In: UIST '15 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Sudbrock, Henning :
Compositional and Scheduler-Independent Information Flow Security.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3884]
TU Darmstadt
[Dissertation], (2013)

Steimle, Jürgen ; Huber, Jochen ; Lukosch, Stephan
Mühlhäuser, Max ; Sesink, Werner ; Kaminski, Andreas ; Steimle, Jürgen (eds.) :

Interdisciplinary Approaches to Technology-Enhanced Learning.
In: Keine Angabe Waxmann , pp. 339-352. ISBN 978-3-8309-2481-4
[Buchkapitel], (2011)

Schneider, Timo :
Fallstudie: Sicherheitsautomat für einen orchestrierten Dienst in einer serviceorientierten Architektur.

[Anderes], (2008)

Schneider, Timo :
Fallstudie: Sicherheitsautomat für einen orchestrierten Dienst in einer serviceorientierten Architektur.

[Anderes], (2008)

Sabelfeld, Andrei ; Mantel, Heiko :
Static Confidentiality Enforcement for Distributed Programs.
In: LNCS 2477 . Springer-Verlag , Madrid, Spain
[Konferenz- oder Workshop-Beitrag], (2002)

Sabelfeld, Andrei ; Mantel, Heiko :
Static Confidentiality Enforcement for Distributed Programs.
In: LNCS 2477 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2002)

W

Wachsmann, Christian :
Trusted and Privacy-preserving Embedded Systems: Advances in Design, Analysis and Application of Lightweight Privacy-preserving Authentication and Physical Security Primitives.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3851]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2013)

Diese Liste wurde am Sun Sep 23 02:15:37 2018 CEST generiert.