Items where Subject is "Research Areas > NRA2 Reliable Security Guarantees"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | N | O | P | R | S | T | V | W | Z | Ç
Number of items at this level: 284.

A

Abel, Andreas and Reineke, Jan
(2013) Measurement-based modeling of the cache replacement policy.
In: 19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013.
Conference: RTAS - IEEE Real-Time and Embedded Technology and Applications Symposium

Abel, Andreas and Reineke, Jan
(2014) Reverse engineering of cache replacement policies in Intel microprocessors and their evaluation.
In: 2014 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2014, Monterey, CA, USA, March 23-25, 2014.
Conference: None | Not Set

Alkassar, Eyad and Böhme, Sascha and Mehlhorn, Kurt and Rizkallah, Christine
(2013) A Framework for the Verification of Certifying Computations.
Journal of Automated Reasoning. pp. 1-33.

Alkassar, Eyad and Böhme, Sascha and Mehlhorn, Kurt and Rizkallah, Christine
(2011) Verification of Certifying Computations.
In: Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011).
Conference: CAV - Computer Aided Verification

Alkassar, Eyad and Cohen, Ernie and Kovalev, Mikhail and Paul, Wolfgang J.
(2012) Verification of TLB Virtualization Implemented in C.
In: Proc. 4th International Conference on Verified Software: Theories, Tools, and Experiments (VSTTE 2012).
Conference: None | Not Set

Altmeyer, Sebastian and Davis, Robert I. and Indrusiak, Leandro Soares and Maiza, Claire and Nélis, Vincent and Reineke, Jan
(2015) A generic and compositional framework for multicore response time analysis.
In: Proceedings of the 23rd International Conference on Real Time Networks and Systems, RTNS 2015, Lille, France, November 4-6, 2015.
Conference: None | Not Set

Alvin, Christopher and Gulwani, Sumit and Mukhopadhyay, Supratik and Majumdar, Rupak
(2014) Synthesis of Geometry Proof Problems.
In: Proc. of the 28th Conference of Artificial Intelligence (AAAI 2014).
Conference: AAAI - National Conference of the American Association for Artificial Intelligence

Andalam, Sidharta and Girault, Alain and Sinha, Roopak and Roop, Partha S. and Reineke, Jan
(2013) Precise timing analysis for direct-mapped caches.
In: The 50th Annual Design Automation Conference 2013, DAC '13, Austin, TX, USA, May 29 - June 07, 2013.
Conference: DAC - Design Automation Conf

Angius, Alessio and Horváth, András and Wolf, Verena
(2013) Approximate Transient Analysis of Queuing Networks by Quasi Product Forms.
In: Analytical and Stochastic Modelling Techniques and Applications - 20th International Conference, ASMTA 2013, Ghent, Belgium, July 8-10, 2013. Proceedings.
Conference: None | Not Set

Asghar, Muhammad Rizwan and Ion, Mihaela and Russello, Giovanni and Crispo, Bruno
(2013) ESPOON$_ERBAC$: Enforcing Security Policies in Outsourced Environments.
Elsevier Computers & Security (COSE), 35. pp. 2-24. ISSN 0167-4048

Asghar, Muhammad Rizwan and Ion, Mihaela and Russello, Giovanni and Crispo, Bruno
(2011) ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments.
In: The Sixth International Conference on Availability, Reliability and Security.

Außerlechner, Simon and Jacobs, Swen and Khalimov, Ayrat
(2016) Tight Cutoffs for Guarded Protocols with Fairness.
In: Verification, Model Checking, and Abstract Interpretation - 17th International Conference, VMCAI 2016, St. Petersburg, FL, USA, January 17-19, 2016. Proceedings.
Conference: None | Not Set

Axer, Philip and Ernst, Rolf and Falk, Heiko and Girault, Alain and Grund, Daniel and Guan, Nan and Jonsson, Bengt and Marwedel, Peter and Reineke, Jan and Rochange, Christine and Sebastian, Maurice and Hanxleden, Reinhard von and Wilhelm, Reinhard and Yi, Wang
(2014) Building timing predictable embedded systems.
ACM Transactions on Embedded Computing Systems, 13 (4). p. 82.

B

Backes, Michael and Barthe, Gilles and Berg, Matthias and Grégoire, Benjamin and Kunz, César and Skoruppa, Malte and Béguelin, Santiago Zanella
(2012) Verified Security of Merkle-Damgård.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium - CSF 2012.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2013) Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification.
In: Principles of Security and Trust 2013.
Conference: None | Not Set

Backes, Michael and Berg, Matthias and Köpf, Boris
(2011) Non-Uniform Distributions in Quantitative Information-Flow.
In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS).
Conference: None | Not Set

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Shen, Xiaoyu and Wolf, Verena
(2016) Simulating the Large-Scale Erosion of Genomic Privacy Over Time.
In: Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16).
Conference: None | Not Set

Backes, Michael and Bugiel, Sven and Derr, Erik and Hammer, Christian
(2014) Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Busenius, Alex and Hriţcu, Cătălin
(2012) On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols.
In: Proc. 4th NASA Formal Methods Symposium (NFM 2012).
Conference: None | Not Set

Backes, Michael and Dreier, Jannik and Kremer, Steve and Künnemann, Robert
(2017) A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Backes, Michael and Dürmuth, Markus and Gerling, Sebastian and Pinkal, Manfred and Sporleder, Caroline
(2010) Acoustic Side-Channel Attacks of Printers.
In: Proceedings of 19th USENIX Security Symposium.
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2011) Union and Intersection Types for Secure Protocol Implementations.
In: Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers.
Conference: None | Not Set

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2013) Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations.
Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo.

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2014) Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
Journal of Computer Security, 22 (2). pp. 301-353.

Backes, Michael and Hriţcu, Cătălin and Tarrach, Thorsten
(2011) Automatically Verifying Typing Constraints for a Data Processing Language.
In: Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011).
Conference: None | Not Set

Backes, Michael and Künnemann, Robert and Mohammadi, Esfandiar
(2016) Computational Soundness for Dalvik Bytecode.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2012) Automated Synthesis of Secure Distributed Applications.
In: Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS '12).
Conference: NDSS - Network and Distributed System Security Symposium

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011) A Security API for Distributed Social Networks.
In: Proceedings of the Network and Distributed System Security Symposium (NDSS '11).
Conference: NDSS - Network and Distributed System Security Symposium

Backes, Michael and Maffei, Matteo and Pecina, Kim and Reischuk, Raphael M.
(2011) G2C: Cryptographic Protocols from Goal-Driven Specifications.
In: TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011.
Conference: None | Not Set

Backes, Michael and Malik, Ankit and Unruh, Dominique
(2012) Computational Soundness without Protocol Restrictions.
In: Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Manoharan, Praveen and Mohammadi, Esfandiar
(2014) TUC: Time-sensitive and Modular Analysis of Anonymous Communication.
In: Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2014) Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity.
In: Proceedings of the 3rd Conference on Principles of Security and Trust (POST).
Conference: None | Not Set

Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2015) Computational Soundness for Interactive Primitves.
In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15).
Conference: ESORICS - European Symposium On Research In Computer Security

Baruah, Sanjoy and Brandenburg, Björn B.
(2013) Multiprocessor Feasibility Analysis of Recurrent Task Systems with Specified Processor Affinities.
In: Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013.
Conference: RTSS - Real Time Systems Symposium

Basin, David and Jugé, Vincent and Klaedtke, Felix and Zvalinescu, Eugen
(2012) Enforceable Security Policies Revisited.
In: Proc. 1st Conference on Principles of Security and Trust (POST).

Bichhawat, Abhishek and Hammer, Christian and Garg, Deepak and Rajani, Vineet
(2015) Information Flow Control for Event Handling and the DOM in Web Browsers.
In: Proceedings of the 28th Computer Security Foundations Symposium (CSF '15).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Bichhawat, Abhishek and Rajani, Vineet and Garg, Deepak and Hammer, Christian
(2014) Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis.
In: Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security.
Conference: None | Not Set

Bichhawat, Abhishek and Rajani, Vineet and Garg, Deepak and Hammer, Christian
(2014) Information Flow Control in WebKit's JavaScript Bytecode.
In: Principles of Security and Trust. Springer.

Birkedal, Lars and Dreyer, Derek and Gardner, Philippa and Shao, Zhong
(2015) Compositional Verification Methods for Next-Generation Concurrency (Dagstuhl Seminar 15191).
Dagstuhl Reports, 5 (5). pp. 1-23.

Bloem, Roderick and Braud-Santoni, Nicolas and Jacobs, Swen
(2016) Synthesis of Self-Stabilising and Byzantine-Resilient Distributed Systems.
In: Computer Aided Verification - 28th International Conference, CAV 2016, Toronto, ON, Canada, July 17-23, 2016, Proceedings, Part I.
Conference: CAV - Computer Aided Verification

Bloem, Roderick and Chatterjee, Krishnendu and Jacobs, Swen and Könighofer, Robert
(2015) Assume-Guarantee Synthesis for Concurrent Reactive Programs with Partial Information.
In: Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings.
Conference: TACAS - Tools and Algorithms for Construction and Analysis of Systems

Bloem, Roderick and Jacobs, Swen and Khalimov, Ayrat and Konnov, Igor and Rubin, Sasha and Veith, Helmut and Widder, Josef
(2016) Decidability in Parameterized Verification.
SIGACT News, 47 (2). pp. 53-64.

Bloem, Roderick and Jacobs, Swen and Khalimov, Ayrat and Konnov, Igor and Rubin, Sasha and Veith, Helmut and Widder, Josef
(2015) Decidability of Parameterized Verification.
Synthesis Lectures on Distributed Computing Theory . Morgan & Claypool Publishers.

Bonakdarpour, Borzoo and Finkbeiner, Bernd
(2016) Runtime Verification for HyperLTL.
In: Proceedings of the 16th International Conference on Runtime Verification (RV'2016).
Conference: None | Not Set

Brandenburg, Björn B.
(2014) Blocking Optimality in Distributed Real-Time Locking Protocols.
LITES, 1 (2). 01: 1-01: 22.

Brandenburg, Björn B.
(2013) A Fully Preemptive Multiprocessor Semaphore Protocol for Latency-Sensitive Real-Time Applications.
In: 25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013.
Conference: ECRTS - Euromicro Conference on Real-Time Systems

Brandenburg, Björn B.
(2013) Improved analysis and evaluation of real-time semaphore protocols for P-FP scheduling.
In: 19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013.
Conference: RTAS - IEEE Real-Time and Embedded Technology and Applications Symposium

Brandenburg, Björn B. and Anderson, James H.
(2013) The OMLP family of optimal multiprocessor real-time locking protocols.
Design Automation for Embedded Systems, 17 (2). pp. 277-342.

Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2012) Affine Refinement Types for Authentication and Authorization.
In: Proc. 6th International Symposium on Trustworthy Global Computing (TGC 2012).
Conference: None | Not Set

Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2015) Affine Refinement Types for Secure Distributed Programming.
ACM Transactions on Programming Languages and Systems, 37 (4). 11:1-11:66.

Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2013) Logical Foundations of Secure Resource Management.
In: Proc. of the 2nd Conference on Principles of Security and Trust (POST 2013).
Conference: None | Not Set

Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2011) Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Bui, Dai N and Lee, Edward A. and Liu, Isaac and Patel, Hiren D. and Reineke, Jan
(2011) Temporal isolation on multiprocessing architectures.
In: Proceedings of the 48th Design Automation Conference, DAC 2011, San Diego, California, USA, June 5-10, 2011.
Conference: DAC - Design Automation Conf

C

Calin, Georgel and Derevenetc, Egor and Majumdar, Rupak and Meyer, Roland
(2013) A Theory of Partitioned Global Address Spaces.
In: Proc. of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2013).
Conference: None | Not Set

Canones, Pablo and Köpf, Boris and Reineke, Jan
(2017) Security Analysis of Cache Replacement Policies.
In: Proceedings of the 6th International Conference on Principles of Security and Trust.
Conference: None | Not Set

Carreira, João Carlos Menezes and Rodrigues, Rodrigo and Candea, George and Majumdar, Rupak
(2012) Scalable Testing of File System Checkers.
In: Proc. of the 7th ACM European Conference on Computer Systems (EuroSys 2012).
Conference: EuroSys - Eurosys Conference

Carzaniga, Antonio and Goffi, Alberto and Gorla, Alessandra and Mattavelli, Andrea and Pezzè, Mauro
(2014) Cross-checking oracles from intrinsic software redundancy.
In: 36th International Conference on Software Engineering, ICSE '14, Hyderabad, India - May 31 - June 07, 2014.

Carzaniga, Antonio and Gorla, Alessandra and Mattavelli, Andrea and Perino, Nicolò and Pezzè, Mauro
(2013) Automatic recovery from runtime failures.
In: 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013.

Chatterjee, Krishnendu and Chmelik, Martin and Majumdar, Rupak
(2012) Equivalence of Games with Probabilistic Uncertainty and Partial-Observation Games.
In: Proc. of the 10th International Symposium on Automated Technology for Verification and Analysis (ATVA 2012).
Conference: ATVA - International Symposium on Automated Technology for Verification and Analysis

Chatterjee, Krishnendu and Ibsen-Jensen, Rasmus and Majumdar, Rupak
(2014) Edit Distance for Timed Automata.
In: Proc. of the 17th International Conference on Hybrid Systems: Computation and Control (HSCC 2014).
Conference: None | Not Set

Chatterjee, Krishnendu and Majumdar, Rupak
(2011) Minimum Attention Controller Synthesis for Omega-regular Objectives.
In: Proceedings of the 9th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'11).
Conference: None | Not Set

Cheikhrouhou, Lassaad and Stephan, Werner and Fischlin, Marc and Ullmann, Markus
(2012) Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE.
In: Sicherheit 2012 -- Beiträge der 6-ten Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e. V..
Conference: None | Not Set

Cheney, James
(2011) A Formal Framework for Provenance Security.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Chistikov, Dmitry and Dimitrova, Rayna and Majumdar, Rupak
(2015) Approximate Counting in SMT and Value Estimation for Probabilistic Programs.
In: Proc. 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 15).
Conference: TACAS - Tools and Algorithms for Construction and Analysis of Systems

Chistikov, Dmitry and Majumdar, Rupak
(2014) Unary Pushdown Automata and Straight-Line Programs.
In: Proc. of the 41st International Colloquium on Automata, Languages and Programming (ICALP 2014).
Conference: ICALP - International Colloquium on Automata Languages and Programming

Chistikov, Dmitry and Majumdar, Rupak
(2013) A Uniformization Theorem for Nested Word to Word Transductions.
In: Proc. of the 18th International Conference on Implementation and Application of Automata (CIAA 2013).
Conference: None | Not Set

Chistikov, Dmitry and Majumdar, Rupak and Niksic, Filip
(2016) Hitting Families of Schedules for Asynchronous Programs.
In: Proc. of the 28th International Conference on Computer Aided Verification (CAV 2016).
Conference: CAV - Computer Aided Verification

Chowdhury, Omar and Garg, Deepak and Jia, Limin and Datta, Anupam
(2015) Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
In: Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS 2015).
Conference: CCS - ACM Conference on Computer and Communications Security

Chowdhury, Omar and Jia, Limin and Garg, Deepak and Datta, Anupam
(2014) Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
In: Proc. 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV - Computer Aided Verification

Clarkson, Michael R. and Finkbeiner, Bernd and Koleini, Masoud and Micinski, Kristopher K. and Rabe, Markus N. and Sanchez, Cesar
(2014) Temporal Logics for Hyperproperties.
In: Proc. of the 3rd Conference on Principles of Security and Trust (POST 2014).
Conference: None | Not Set

Cohen, Ernie and Paul, Wolfgang J. and Schmaltz, Sabine
(2013) Theory of Multi Core Hypervisor Verification.
In: Proc. 39th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2013).
Conference: None | Not Set

Cohn-Gordon, Katriel and Cremers, Cas and Garratt, Luke and Millican, Jon and Milnber, Kevin
(2018) On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees.
(In Press)

Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015) Type-Based Verification of Electronic Voting Protocols.
In: Proceedings of the 4th International Conference on Principles of Security and Trust (POST).
Conference: None | Not Set

Cremers, Cas and Dehnel-Wild, Martin and Milner, Kevin
(2018) Secure Authentication in the Grid: A Formal Analysis of DNP3 SAv5.
Journal of Computer Security.
(In Press)

Cremers, Cas and Horvat, Marko and Hoyland, Jonathan and Scott, Sam and van der Merwe, Thyla
(2017) A Comprehensive Symbolic Analysis of TLS 1.3.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.

D

Damm, Werner and Finkbeiner, Bernd
(2014) Automatic Compositional Synthesis of Distributed Systems.
In: Proceedings of the 19th International Symposium on Formal Methods (FM'14).
Conference: None | Not Set

Damm, Werner and Finkbeiner, Bernd
(2011) Does It Pay to Extend the Perimeter of a World Model?
In: Proceedings of the 17th International Symposium on Formal Methods (FM'11).
Conference: None | Not Set

Damm, Werner and Finkbeiner, Bernd and Rakow, Astrid
(2016) What You Really Need To Know About Your Neighbor.
In: Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016.
Conference: CAV - Computer Aided Verification

Darulova, Eva and Kuncak, Viktor and Majumdar, Rupak and Saha, Indranil
(2013) Synthesis of fixed-point programs.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2013).
Conference: EMSOFT - ACM Conference on Embedded Software

Datta, Anupam and Blocki, Jeremiah and Christin, Nicolas and DeYoung, Henry and Garg, Deepak and Jia, Limin and Kaynar, Dilsun Kirli and Sinha, Arunesh
(2011) Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
In: Proc. of the 7th International Conference Information Systems Security (ICISS 2011).
Conference: None | Not Set

Datta, Anupam and Garg, Deepak and Jia, Limin
(2011) Policy auditing over incomplete logs: theory, implementation and applications.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS - ACM Conference on Computer and Communications Security

Datta, Anupam and Garg, Deepak and Jia, Limin and Chowdhury, Omar
(2014) Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
In: Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF '14).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015) A Logic of Programs with Interface-Confined Code.
In: Proceedings of the 28th Computer Security Foundations Symposium (CSF '15).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015) System M: A Program Logic for Code Sandboxing and Identification.
The Computing Research Repository (CoRR).

Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Jia, Limin and Franklin, Jason
(2011) On Adversary Models and Compositional Security.
IEEE Security & Privacy, 9 (3). pp. 26-32.

Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Sharma, Divya and Sinha, Arunesh
(2015) Program Actions as Actual Causes: A Building Block for Accountability.
In: Proceedings of the 28th Computer Security Foundations Symposium (CSF '15).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Deininger, David and Dimitrova, Rayna and Majumdar, Rupak
(2016) Symbolic Model Checking for Factored Probabilistic Models.
In: Proc. of the 14th International Symposium on Automated Technology for Verification and Analysis (ATVA 2016).
Conference: ATVA - International Symposium on Automated Technology for Verification and Analysis

Delaune, Stephanie and Kremer, Steve and Ryan, Mark D. and Steel, Graham
(2011) Formal analysis of protocols based on TPM state registers.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Deshmukh, Jyotirmoy V. and Majumdar, Rupak and Prabhu, Vinayak S.
(2015) Quantifying Conformance Using the Skorokhod Metric.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV - Computer Aided Verification

Devriese, Dominique and Patrignani, Marco and Piessens, Frank
(2017) Parametricity Versus the Universal Type.
In: POPL.

Dimitrova, Rayna and Finkbeiner, Bernd
(2012) Counterexample-Guided Synthesis of Observation Predicates.
In: Proceedings of the 10th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'12).
Conference: None | Not Set

Dimitrova, Rayna and Finkbeiner, Bernd
(2013) Lossy Channel Games under Incomplete Information.
In: Proceedings 1st International Workshop on Strategic Reasoning (SR'13).
Conference: None | Not Set

Dimitrova, Rayna and Finkbeiner, Bernd and Kovács, Máté and Rabe, Markus N. and Seidl, Helmut
(2012) Model Checking Information Flow in Reactive Systems.
In: Proc. 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI).
Conference: None | Not Set

Dimitrova, Rayna and Finkbeiner, Bernd and Rabe, Markus N.
(2012) Monitoring Temporal Information Flow.
In: Proc. 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA).
Conference: None | Not Set

Dimitrova, Rayna and Fioriti, Luis María Ferrer and Hermanns, Holger and Majumdar, Rupak
(2016) Probabilistic CTL*: The Deductive Way.
In: Proc. 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 16).
Conference: TACAS - Tools and Algorithms for Construction and Analysis of Systems

Dimitrova, Rayna and Majumdar, Rupak
(2014) Deductive control synthesis for alternating-time logics.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2014).
Conference: EMSOFT - ACM Conference on Embedded Software

Dimitrova, Rayna and Majumdar, Rupak
(2015) Reachability Analysis of Reversal-bounded Automata on Series-Parallel Graphs.
In: Proceedings of 6th International Symposium on Games, Automata, Logics and Formal Verification (GandALF 2015).
Conference: None | Not Set

Doychev, Goran and Feld, Dominik and Köpf, Boris and Mauborgne, Laurent and Reineke, Jan
(2013) CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
In: Proceedings of the 22nd USENIX Security Symposium (USENIX '13).
Conference: USENIX-Security - Usenix Security Symposium

Doychev, Goran and Köpf, Boris and Mauborgne, Laurent and Reineke, Jan
(2015) CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
ACM Trans. Inf. Syst. Secur., 18 (1). 4:1-4:32.

Dupressoir, Francois and Gordon, Andrew D. and Jurjens, Jan and Naumann, David A.
(2011) Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Durand-Gasselin, Antoine and Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2015) Model Checking Parameterized Asynchronous Shared-Memory Systems.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV - Computer Aided Verification

E

Ehlers, Rüdiger and Finkbeiner, Bernd
(2012) Monitoring Realizability.
In: Proceedings of the Second International Conference on Runtime Verification (RV'11).
Conference: None | Not Set

Ehlers, Rüdiger and Finkbeiner, Bernd
(2011) Reactive Safety.
In: Proceedings of Second International Symposium on Games, Automata3Logics and Formal Verification (GandALF 2011).
Conference: None | Not Set

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2015) Achieving Optimal Utility for Distributed Differential Privacy Using SMPC.
In: UNSPECIFIED Cryptology and Information Security Series, 13 . IOS Press, 81 - 105.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
In: 30th Annual Computer Security Applications Conference (ACSAC).
Conference: ACSAC - Annual Computer Security Applications Conference

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract.
In: Workshop on Usable and Efficient Secure Multiparty Computation -- Satellite Event of ESORICS.
Conference: None | Not Set

Eigner, Fabienne and Maffei, Matteo
(2013) Differential Privacy by Typing in Security Protocols.
In: Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Elmasry, Amr and Mehlhorn, Kurt and Schmidt, Jens M.
(2012) An O(n+m) Certifying Triconnnectivity Algorithm for Hamiltonian Graphs.
Algorithmica, 62 (3-4). pp. 754-766.

Elmasry, Amr and Schmidt, Jens M. and Mehlhorn, Kurt
(2013) Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge.
Journal of Graph Theory, 72 (1). pp. 112-121.

Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016) T3: Comprehensive policy compliance in data retrieval systems.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016) Thoth: Comprehensive Policy Compliance in Data Retrieval Systems.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Esmaeilsabzali, Shahram and Majumdar, Rupak and Wies, Thomas and Zufferey, Damien
(2014) Dynamic package interfaces.
In: Proc. of the 17th International Conference on Fundamental Approaches to Software Engineering (FASE 2014).
Conference: None | Not Set

Esparza, Javier and Ganty, Pierre and Leroux, Jérôme and Majumdar, Rupak
(2016) Model Checking Population Protocols.
In: 36th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2016, December 13-15, 2016, Chennai, India.
Conference: None | Not Set

Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2013) Parameterized verification of asynchronous shared-memory systems.
In: Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013).
Conference: CAV - Computer Aided Verification

Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2012) A Perfect Model for Bounded Verification.
In: Proc. of the 27th Annual IEEE/ACM Symposium on Logic in Computer Science (LICS 2012).
Conference: LICS - IEEE Symposium on Logic in Computer Science

Esparza, Javier and Ledesma-Garza, Ruslán and Majumdar, Rupak and Meyer, Philipp J. and Niksic, Filip
(2014) An SMT-based Approach to Coverability Analysis.
In: Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV - Computer Aided Verification

F

Faymonville, Peter and Finkbeiner, Bernd and Peled, Doron
(2014) Monitoring Parametric Temporal Logic.
In: Proceedings of the 15th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'14).
Conference: None | Not Set

Faymonville, Peter and Finkbeiner, Bernd and Schirmer, Sebastian and Torfah, Hazem
(2016) A Stream-Based Specification Language for Network Monitoring.
In: Proceedings of the 16th International Conference on Runtime Verification (RV'2016).
Conference: None | Not Set

Finkbeiner, Bernd and Gieseking, Manuel and Olderog, Ernst-Rüdiger
(2015) Adam: Causality-Based Synthesis of Distributed Systems.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV - Computer Aided Verification

Finkbeiner, Bernd and Jacobs, Swen
(2012) Lazy Synthesis.
In: Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'12).
Conference: None | Not Set

Finkbeiner, Bernd and Kuhtz, Lars
(2011) Weak Kripke Structures and LTL.
In: Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11).
Conference: CONCUR - International Conference on Concurrency Theory

Finkbeiner, Bernd and Olderog, Ernst-Rüdiger
(2014) Petri Games: Synthesis of Distributed Systems with Causal Memory.
In: Proceedings of Fifth International Symposium on Games, Automata, Logics and Formal Verification (GandALF 2014).
Conference: None | Not Set

Finkbeiner, Bernd and Peter, Hans-Jörg
(2012) Template-Based Controller Synthesis for Timed Systems.
In: Proc. 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 12).
Conference: TACAS - Tools and Algorithms for Construction and Analysis of Systems

Finkbeiner, Bernd and Rabe, Markus N. and Sanchez, Cesar
(2015) Algorithms for Model Checking HyperLTL and HyperCTL ^*.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV - Computer Aided Verification

Finkbeiner, Bernd and Schewe, Sven
(2013) Bounded synthesis.
In: International Journal on Software Tools for Technology Transfer (STTT'13).
Conference: None | Not Set

Finkbeiner, Bernd and Seidl, Helmut and Kovács, Máté
(2013) Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties.
In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13).
Conference: CCS - ACM Conference on Computer and Communications Security

Finkbeiner, Bernd and Seidl, Helmut and Müller, Christian
(2016) Specifying and Verifying Secrecy in Workflows with Arbitrarily Many Agents.
In: Proc. of the 14th International Symposium on Automated Technology for Verification and Analysis (ATVA 2016).
Conference: ATVA - International Symposium on Automated Technology for Verification and Analysis

Finkbeiner, Bernd and Tentrup, Leander
(2014) Detecting Unrealizable Specifications of Distributed Systems.
In: Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14).
Conference: TACAS - Tools and Algorithms for Construction and Analysis of Systems

Finkbeiner, Bernd and Tentrup, Leander
(2014) Fast DQBF refutation.
In: Theory and Applications of Satisfiability Testing (SAT 2014).
Conference: SAT - International Conference on Theory and Applications of Satisfiability Testing

Finkbeiner, Bernd and Torfah, Hazem
(2014) Counting Models of Linear-Time Temporal Logic.
In: 8th International Conference on Language and Automata Theory and Applications (LATA 2014).
Conference: None | Not Set

Fischer, Jeffrey and Majumdar, Rupak and Esmaeilsabzali, Shahram
(2012) Engage: A Deployment Management System.
In: Proc. of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2012).
Conference: PLDI - ACM-SIGPLAN Conference on Programming Language Design and Implementation

Frau, Simone and Dashti, Mohammad Torabi
(2011) Integrated Specification and Verification of Security Protocols and Policies.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

G

Ganty, Pierre and Majumdar, Rupak
(2012) Algorithmic Verification of Asynchronous Programs.
ACM Transactions on Programming Languages and Systems, 34 (1). 6:1-6:48.

Garg, Deepak and Bolosteanu, Iulia
(2016) Asymmetric Secure Multi-execution with Declassification.
In: Proceedings of Principles of Security and Trust - 5th International Conference (POST '16).
Conference: None | Not Set

Garg, Deepak and Cheney, James and Perera, Roly
(2016) Causally Consistent Dynamic Slicing.
In: Proceedings of the 27th International Conference on Concurrency Theory (CONCUR '16).
Conference: CONCUR - International Conference on Concurrency Theory

Garg, Deepak and Genovese, Valerio and Negri, Sara
(2012) Countermodels from Sequent Calculi in Multi-Modal Logics.
In: Proc. of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS 2012).
Conference: LICS - IEEE Symposium on Logic in Computer Science

Garg, Deepak and Hriţcu, Cătălin and Patrignani, Marco and Stronati, Marco and Swasey, David
(2017) Robust Hyperproperty Preservation for Secure Compilation (Extended Abstract).
In: 1st Workshop on Principles of Secure Compilation.
Conference: None | Not Set

Garg, Deepak and Pfenning, Frank
(2012) Stateful authorization logic - Proof theory and a case study.
Journal of Computer Security, 20 (4). pp. 353-391.

Garg, Deepak and Rafnsson, Willard and Sabelfeld, Andrei
(2016) Progress-Sensitive Security for SPARK.
In: Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS '16).
Conference: None | Not Set

Garg, Deepak and Rezk, Tamara and Rajani, Vineet
(2016) On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.
In: Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Garg, Deepak and Çiçek, Ezgi and Acar, Umut A.
(2015) Refinement Types for Incremental Computational Complexity.
In: Proceedings of the 24th European Symposium on Programming (ESOP '15).
Conference: ESOP - European Symposium on Programming

Garg, Deepak and Çiçek, Ezgi and Paraskevopoulou, Zoe
(2016) A type theory for incremental computational complexity with control flow changes.
In: Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming (ICFP '16).
Conference: ICFP - International Conference on Functional Programming

Gavran, Ivan and Niksic, Filip and Kanade, Aditya and Majumdar, Rupak and Vafeiadis, Viktor
(2015) Rely/Guarantee Reasoning for Asynchronous Programs.
In: Proceedings of the 26th International Conference on Concurrency Theory (CONCUR '15).
Conference: CONCUR - International Conference on Concurrency Theory

Genovese, Valerio and Garg, Deepak and Rispoli, Daniele
(2012) Labeled Goal-Directed Search in Access Control Logic.
In: Proc. of the 8th International Workshop on Security and Trust Management (STM 2012).
Conference: None | Not Set

Genovese, Valerio and Garg, Deepak and Rispoli, Daniele
(2012) Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF '12).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Gerling, Sebastian
(2009) Acoustic Side-Channel Attacks on Printers.
Masters thesis, Saarland University.

Giechaskiel, Ilias and Cremers, Cas and Rasmussen, Kasper B.
(2018) When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Security & Privacy.

Giffhorn, Dennis and Hammer, Christian
(2007) An Evaluation of Precise Slicing Algorithms for Concurrent Programs.
In: SCAM'07: Seventh IEEE International Working Conference on Source Code Analysis and Manipulation.

Giffhorn, Dennis and Hammer, Christian
(2008) Precise Analysis of Java Programs using JOANA (Tool Demonstration).
In: Proc. 8th IEEE International Working Conference on Source Code Analysis and Manipulation.

Giffhorn, Dennis and Hammer, Christian
(2009) Precise Slicing of Concurrent Programs -- An Evaluation of Precise Slicing Algorithms for Concurrent Programs.
Journal of Automated Software Engineering, 16 (2). pp. 197-234.

Gligoric, Milos and Majumdar, Rupak
(2013) Model Checking Database Applications.
In: Proc. of the 20th International Symposium on Static Analysis (SAS 2013).
Conference: SAS - Static Analysis Symposium

Gligoric, Milos and Majumdar, Rupak and Sharma, Rohan and Eloussi, Lamyaa and Marinov, Darko
(2014) Regression Test Selection for Distributed Software Histories.
In: Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV - Computer Aided Verification

Gonthier, Georges and Ziliani, Beta and Nanevski, Aleksandar and Dreyer, Derek
(2013) How to make ad hoc proof automation less ad hoc.
J. Funct. Program., 23 (4). pp. 357-401.

Grishchenko, Ilya and Maffei, Matteo and Calzavara, Stefano
(2016) HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving.
In: Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro S&P '16).
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Grosse, Kathrin and Pfaff, David and Smith, Michael Thomas and Backes, Michael
(2017) How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models.
ArXiv e-prints.

Grosse, Kathrin and Smith, Michael Thomas and Backes, Michael
(2018) Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification.
ArXiv e-prints.
(Submitted)

Grund, Daniel and Reineke, Jan and Gebhard, Gernot
(2011) Branch target buffers: WCET analysis framework and timing predictability.
Journal of Systems Architecture - Embedded Systems Design, 57 (6). pp. 625-637.

Grund, Daniel and Reineke, Jan and Wilhelm, Reinhard
(2011) A Template for Predictability Definitions with Supporting Evidence.
In: Bringing Theory to Practice: Predictability and Performance in Embedded Systems, DATE Workshop PPES 2011, March 18, 2011, Grenoble, France..
Conference: None | Not Set

H

Hammer, Christian
(2010) Experiences with PDG-based IFC.
In: International Symposium on Engineering Secure Software and Systems (ESSoS'10).

Hammer, Christian
(2009) Information Flow Control for Java - A Comprehensive Approach based on Path Conditions in Dependence Graphs.
Doctoral thesis, Universit.

Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank
(2008) Dynamic detection of atomic-set-serializability violations.
In: ICSE '08: Proceedings of the 30th international conference on Software engineering.

Hammer, Christian and Grimme, Martin and Krinke, Jens
(2006) Dynamic path conditions in dependence graphs.
In: PEPM '06: Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation.

Hammer, Christian and Krinke, Jens and Nodes, Frank
(2006) Intransitive Noninterference in Dependence Graphs.
In: Proc. Second International Symposium on Leveraging Application of Formal Methods, Verification and Validation (ISoLA 2006).

Hammer, Christian and Krinke, Jens and Snelting, Gregor
(2006) Information Flow Control for Java Based on Path Conditions in Dependence Graphs.
In: Proc. IEEE International Symposium on Secure Software Engineering (ISSSE'06).

Hammer, Christian and Schaade, Rüdiger and Snelting, Gregor
(2008) Static path conditions for Java.
In: UNSPECIFIED.

Hammer, Christian and Snelting, Gregor
(2009) Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs.
International Journal of Information Security, 8 (6). pp. 399-422.

Hammer, Christian and Snelting, Gregor
(2008) Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs.
Technical Report. UNSPECIFIED.
(Unpublished)

Hammer, Christian and Snelting, Gregor
(2004) An improved slicer for Java.
In: PASTE '04: Proceedings of the 5th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering.

Hemed, Nir and Rinetzky, Noam and Vafeiadis, Viktor
(2015) Modular Verification of Concurrency-Aware Linearizability.
In: Distributed Computing - 29th International Symposium, DISC 2015, Tokyo, Japan, October 7-9, 2015, Proceedings.
Conference: DISC - International Symposium on Distributed Computing (was WDAG)

Henzinger, Thomas A and Jobstmann, Barbara and Wolf, Verena
(2011) Formalisms for Specifying Markovian Population Models.
International Journal of Foundations of Computer Science, 22 (4). pp. 823-841.

Herter, Jörg and Backes, Peter and Haupenthal, Florian and Reineke, Jan
(2011) CAMA: A Predictable Cache-Aware Memory Allocator.
In: 23rd Euromicro Conference on Real-Time Systems, ECRTS 2011, Porto, Portugal, 5-8 July, 2011.
Conference: ECRTS - Euromicro Conference on Real-Time Systems

Hoenicke, Jochen and Majumdar, Rupak and Podelski, Andreas
(2017) Thread modularity at many levels: a pearl in compositional verification.
In: Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17).
Conference: POPL - ACM-SIGACT Symposium on Principles of Programming Languages

Huang, Wen-Hung and Chen, Jian-Jia and Reineke, Jan
(2016) MIRROR: symmetric timing analysis for real-time tasks on multicore platforms with shared resources.
In: Proceedings of the 53rd Annual Design Automation Conference, DAC 2016, Austin, TX, USA, June 5-9, 2016.

Hüchting, Reiner and Majumdar, Rupak and Meyer, Roland
(2014) Bounds on mobility.
In: Proc. of the 25th International Conference on Concurrency Theory (CONCUR 2014).
Conference: CONCUR - International Conference on Concurrency Theory

Hüchting, Reiner and Majumdar, Rupak and Meyer, Roland
(2013) A Theory of Name Boundedness.
In: Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013).
Conference: CONCUR - International Conference on Concurrency Theory

J

Jacobs, Swen and Basset, Nicolas and Bloem, Roderick and Brenguier, Romain and Colange, Maximilien and Faymonville, Peter and Finkbeiner, Bernd and Khalimov, Ayrat and Klein, Felix and Michaud, Thibaud and Perez, Guillermo A. and Raskin, Jean-Francois and Sankur, Ocan and Tentrup, Leander
(2017) The 4th Reactive Synthesis Competition (SYNTCOMP 2017): Benchmarks, Participants & Results.
In: Proceedings Sixth Workshop on Synthesis, SYNT 2017, Heidelberg, Germany, 22nd July 2017..
Conference: None | Not Set

Jacobs, Swen and Bloem, Roderick
(2016) The Reactive Synthesis Competition: SYNTCOMP 2016 and Beyond.
In: Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016, Toronto, Canada, July 17-18, 2016..
Conference: None | Not Set

Jacobs, Swen and Bloem, Roderick and Brenguier, Romain and Ehlers, Rüdiger and Hell, Timotheus and Könighofer, Robert and Perez, Guillermo A. and Raskin, Jean-Francois and Ryzhyk, Leonid and Sankur, Ocan and Seidl, Martina and Tentrup, Leander and Walker, Adam
(2017) The first reactive synthesis competition (SYNTCOMP 2014).
STTT, 19 (3). pp. 367-390.

Jacobs, Swen and Bloem, Roderick and Brenguier, Romain and Khalimov, Ayrat and Klein, Felix and Könighofer, Robert and Kreber, Jens and Legg, Alexander and Narodytska, Nina and Perez, Guillermo A. and Raskin, Jean-Francois and Ryzhyk, Leonid and Sankur, Ocan and Seidl, Martina and Tentrup, Leander and Walker, Adam
(2016) The 3rd Reactive Synthesis Competition (SYNTCOMP 2016): Benchmarks, Participants & Results.
In: Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016, Toronto, Canada, July 17-18, 2016..
Conference: None | Not Set

Jacobs, Swen and Bloem, Roderick and Brenguier, Romain and Könighofer, Robert and Perez, Guillermo A. and Raskin, Jean-Francois and Ryzhyk, Leonid and Sankur, Ocan and Seidl, Martina and Tentrup, Leander and Walker, Adam
(2015) The Second Reactive Synthesis Competition (SYNTCOMP 2015).
In: Proceedings Fourth Workshop on Synthesis, SYNT 2015, San Francisco, CA, USA, 18th July 2015..
Conference: None | Not Set

Jacobs, Swen and Klein, Felix and Schirmer, Sebastian
(2016) A High-Level LTL Synthesis Format: TLSF v1.1.
In: Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016, Toronto, Canada, July 17-18, 2016..
Conference: None | Not Set

Jacobs, Swen and Sakr, Mouhammad
(2018) Analyzing Guarded Protocols: Better Cutoffs, More Systems, More Expressivity.
In: Verification, Model Checking, and Abstract Interpretation - 19th International Conference, VMCAI 2018, Proceedings.
Conference: None | Not Set

Jacobs, Swen and Sakr, Mouhammad
(2018) A Symbolic Algorithm for Lazy Synthesis of Eager Strategies.
In: International Symposium on Automated Technology for Verification and Analysis (ATVA), October 7-10, 2018, Los Angeles.
Conference: ATVA - International Symposium on Automated Technology for Verification and Analysis
(In Press)

Jacobs, Swen and Tentrup, Leander and Zimmermann, Martin
(2016) Distributed PROMPT-LTL Synthesis.
In: Proceedings of the Seventh International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2016, Catania, Italy, 14-16 September 2016..
Conference: None | Not Set

Jhala, Ranjit and Majumdar, Rupak and Rybalchenko, Andrey
(2011) HMC: Verifying Functional Programs Using Abstract Interpreters.
In: Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011).
Conference: CAV - Computer Aided Verification

Jose, Manu and Majumdar, Rupak
(2011) Bug-Assist: Assisting Fault Localization in ANSI-C Programs.
In: Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011).
Conference: CAV - Computer Aided Verification

Jose, Manu and Majumdar, Rupak
(2011) Cause Clue Clauses: Error Localization Using Maximum Satisfiability.
In: Proc. of the 32rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2011).
Conference: PLDI - ACM-SIGPLAN Conference on Programming Language Design and Implementation

Jung, Ralf and Swasey, David and Sieczkowski, Filip and Svendsen, Kasper and Turon, Aaron and Birkedal, Lars and Dreyer, Derek
(2015) Iris: Monoids and Invariants as an Orthogonal Basis for Concurrent Reasoning.
In: Proceedings of the 43nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'15).
Conference: POPL - ACM-SIGACT Symposium on Principles of Programming Languages

K

Kang, Jeehoon and Hur, Chung-Kil and Lahav, Ori and Vafeiadis, Viktor and Dreyer, Derek
(2017) A promising semantics for relaxed-memory concurrency.
In: Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17).
Conference: POPL - ACM-SIGACT Symposium on Principles of Programming Languages

Kang, Jeehoon and Hur, Chung-Kil and Mansky, William and Garbuzov, Dmitri and Zdancewic, Steve and Vafeiadis, Viktor
(2015) A formal C memory model supporting integer-pointer casts.
In: Proc. of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2016).
Conference: PLDI - ACM-SIGPLAN Conference on Programming Language Design and Implementation

Kang, Jeehoon and Kim, Yoonseung and Hur, Chung-Kil and Dreyer, Derek and Vafeiadis, Viktor
(2016) Lightweight verification of separate compilation.
In: Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'16).
Conference: POPL - ACM-SIGACT Symposium on Principles of Programming Languages

Katoen, Joost-Pieter and Klink, Daniel and Leucker, Martin and Wolf, Verena
(2012) Three-valued abstraction for probabilistic systems.
Journal of Logic and Algebraic Programming, 81 (4). pp. 356-389.

Kloos, Johannes and Majumdar, Rupak
(2013) Supervisor Synthesis for Controller Upgrades.
In: Proc. of the Conference on Design, Automation and Test in Europe (DATE 2013).
Conference: None | Not Set

Kloos, Johannes and Majumdar, Rupak and Niksic, Filip and Piskac, Ruzica
(2013) Incremental Inductive Coverability.
In: Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013).
Conference: CAV - Computer Aided Verification

Kloos, Johannes and Majumdar, Rupak and Vafeiadis, Viktor
(2015) Asynchronous Liquid Separation Types.
In: Proceedings of the 29th European Conference on Object-Oriented Programming (ECOOP'16).
Conference: ECOOP - European Conference on Object-Oriented Programming

Kovalev, Mikhail and Müller, Silvia M. and Paul, Wolfgang J.
(2014) A Pipelined Multi-core MIPS Machine -- Hardware Implementation and Correctness Proof.
UNSPECIFIED.

Kovács, Máté and Seidl, Helmut and Finkbeiner, Bernd
(2013) Relational abstract interpretation for the verification of 2-hypersafety properties.
In: Proc. of the 20th ACM Conference on Computer and Communication Security (CCS 2013).
Conference: CCS - ACM Conference on Computer and Communications Security

Kremer, Steve and Künnemann, Robert
(2016) Automated analysis of security protocols with global state.
Journal of Computer Security.

Krishnaswami, Neelakantan R. and Turon, Aaron and Dreyer, Derek and Garg, Deepak
(2012) Superficially substructural types.
In: ACM SIGPLAN International Conference on Functional Programming (ICFP 2012).
Conference: ICFP - International Conference on Functional Programming

Kuhtz, Lars and Finkbeiner, Bernd
(2012) Efficient Parallel Path Checking for Linear-Time Temporal Logic With Past and Bounds.
In: Logical Methods in Computer Science (LMCS'12).
Conference: None | Not Set

Kupriyanov, Andrey and Finkbeiner, Bernd
(2014) Causal Termination of Multi-threaded Programs.
In: Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV - Computer Aided Verification

Kupriyanov, Andrey and Finkbeiner, Bernd
(2013) Causality-Based Verification of Multi-threaded Programs.
In: Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013).
Conference: CONCUR - International Conference on Concurrency Theory

L

Lahav, Ori and Giannarakis, Nick and Vafeiadis, Viktor
(2016) Taming release-acquire consistency.
In: Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'16).
Conference: POPL - ACM-SIGACT Symposium on Principles of Programming Languages

Lapin, Maksim and Mikeev, Linar and Wolf, Verena
(2011) SHAVE: stochastic hybrid analysis of markov population models.
In: Proceedings of the 14th ACM International Conference on Hybrid Systems: Computation and Control, HSCC 2011, Chicago, IL, USA, April 12-14, 2011.
Conference: None | Not Set

Lee, Jonathan K. and Palsberg, Jens and Majumdar, Rupak and Hong, Hong
(2012) Efficient May Happen in Parallel Analysis for Async-finish Parallelism.
In: Proc. of the 19th International Symposium on Static Analysis (SAS 2012).
Conference: SAS - Static Analysis Symposium

Li, Cheng and Leitão, João and Clement, Allen and Preguiça, Nuno M. and Rodrigues, Rodrigo and Vafeiadis, Viktor
(2014) Automating the Choice of Consistency Levels in Replicated Systems.
In: 2014 USENIX Annual Technical Conference, USENIX ATC '14, Philadelphia, PA, USA, June 19-20, 2014..
Conference: None | Not Set

Long, Zhenyue and Calin, Georgel and Majumdar, Rupak and Meyer, Roland
(2012) Language-Theoretic Abstraction Refinement.
In: Proc. of the 15th International Conference on Fundamental Approaches to Software Engineering (FASE 2012).
Conference: None | Not Set

Lutz, Joachim
(2012) Model-based Monitoring for Sensitive SCADA Systems.
Bachelors thesis, Saarland University.

Lv, Mingsong and Guan, Nan and Reineke, Jan and Wilhelm, Reinhard and Yi, Wang
(2016) A Survey on Static Cache Analysis for Real-Time Systems.
LITES, 3 (1). 05:1-05:48.

M

Maffei, Matteo
(2016) Security & Privacy Column.
SIGLOG News.

Maffei, Matteo and Grimm, Niklas and Focardi, Riccardo and Calzavara, Stefano
(2016) Micro-Policies for Web Session Security.
In: Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Maffei, Matteo and Pecina, Kim and Reinert, Manuel
(2013) Security and Privacy by Declarative Design.
In: Proceedings of the IEEE 26th Computer Security Foundations Symposium (CSF '16).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Maiya, Pallavi and Gupta, Rahul and Kanade, Aditya and Majumdar, Rupak
(2016) Partial Order Reduction for Event-Driven Multi-threaded Programs.
In: Proc. 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 16).
Conference: TACAS - Tools and Algorithms for Construction and Analysis of Systems

Maiya, Pallavi and Kanade, Aditya and Majumdar, Rupak
(2014) Race Detection for Android Applications.
In: Proc. of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014).
Conference: PLDI - ACM-SIGPLAN Conference on Programming Language Design and Implementation

Majumdar, Rupak and Meyer, Roland and Wang, Zilong
(2013) Static Provenance Verification for Message Passing Programs.
In: Proc. of the 20th International Symposium on Static Analysis (SAS 2013).
Conference: SAS - Static Analysis Symposium

Majumdar, Rupak and Prabhu, Vinayak S.
(2015) Computing the Skorokhod distance between polygonal traces.
In: Proc. of the 18th International Conference on Hybrid Systems: Computation and Control (HSCC 2015).
Conference: None | Not Set

Majumdar, Rupak and Render, Elaine and Tabuada, Paulo
(2011) Robust Discrete Synthesis Against Unspecified Disturbances.
In: Proc. of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011).
Conference: None | Not Set

Majumdar, Rupak and Saha, Indranil and Shashidhar, K C and Wang, Zilong
(2012) CLSE: Closed-Loop Symbolic Execution.
In: Proc. of the 4th International Symposium on NASA Formal Methods (NFM 2012).
Conference: None | Not Set

Majumdar, Rupak and Saha, Indranil and Ueda, Koichi and Yazarel, Hakan
(2013) Compositional Equivalence Checking for Models and Code of Control Systems.
In: Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013).
Conference: CDC - IEEE Conference on Decision and Control

Majumdar, Rupak and Saha, Indranil and Zamani, Majid
(2011) Performance-aware Scheduler Synthesis for Control Systems.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2011).
Conference: EMSOFT - ACM Conference on Embedded Software

Majumdar, Rupak and Saha, Indranil and Zamani, Majid
(2012) Synthesis of minimal-error control software.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2012).
Conference: EMSOFT - ACM Conference on Embedded Software

Majumdar, Rupak and Tetali, Sai Deep and Wang, Zilong
(2014) Kuai: A model checker for software-defined networks.
In: Proc. of Formal Methods in Computer-Aided Design (FMCAD 2014).
Conference: None | Not Set

Majumdar, Rupak and Wang, Zilong
(2015) Bbs: A Phase-Bounded Model Checker for Asynchronous Programs.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV - Computer Aided Verification

Majumdar, Rupak and Wang, Zilong
(2013) Expand, Enlarge, and Check for Branching Vector Addition Systems.
In: Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013).
Conference: CONCUR - International Conference on Concurrency Theory

Majumdar, Rupak and Zamani, Majid
(2012) Approximately Bisimilar Symbolic Models for Digital Control Systems.
In: Proc. of the 24th International Conference on Computer Aided Verification (CAV 2012).
Conference: CAV - Computer Aided Verification

Maksoud, Mohamed Abdel and Reineke, Jan
(2012) An Empirical Evaluation of the Influence of the Load-Store Unit on WCET Analysis.
In: 12th International Workshop on Worst-Case Execution Time Analysis, WCET 2012, July 10, 2012, Pisa, Italy.
Conference: None | Not Set

Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo
(2017) SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS - Network and Distributed System Security Symposium

Mantel, Heiko and Sands, David and Sudbrock, Henning
(2011) Assumptions and Guarantees for Compositional Noninterference.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Mardziel, Piotr and Magill, Stephen and Hicks, Michael and Srivatsa, Mudhakar
(2011) Dynamic Enforcement of Knowledge-based Security Policies.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Marino, Daniel and Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank and Vitek, Jan
(2012) Detecting Deadlock in Programs with Data-Centric Synchronization.
Technical Report. UNSPECIFIED.
(Unpublished)

McConnell, Ross M and Mehlhorn, Kurt and Näher, Stefan and Schweitzer, Pascal
(2011) Survey: Certifying Algorithms.
Computer Science Review, 5 (2). pp. 119-161. ISSN 1574-0137

Mehta, Aastha and Elnikety, Eslam and Harvey, Katura and Garg, Deepak and Druschel, Peter
(2017) Qapla: Policy compliance for database-backed systems.
In: 26th USENIX Security Symposium (USENIX Security 17).
Conference: USENIX-Security - Usenix Security Symposium

Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Post, Ansley and Garg, Deepak and Elnikety, Eslam and Gehrke, Johannes and Druschel, Peter and Rodrigues, Rodrigo
(2015) Guardat: enforcing data policies at the storage layer.
In: Proceedings of the 10th European Conference on Computer Systems (EuroSys '15).
Conference: EuroSys - Eurosys Conference

Meiser, Sebastian
(2011) Computational Soundness of Passively Secure Encryption in Presence of Active Adversaries.
In: Seventh Workshop on Formal and Computational Cryptography (FCC 2011).

Mikeev, Linar and Neuhäußer, Martin R. and Spieler, David and Wolf, Verena
(2013) On-the-fly verification and optimization of DTA-properties for large Markov chains.
Formal Methods in System Design, 43 (2). pp. 313-337.

Mikeev, Linar and Sandmann, Werner and Wolf, Verena
(2011) Efficient calculation of rare event probabilities in Markovian queueing networks.
In: 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, VALUETOOLS '11, Paris, France, May 16-20, 2011.
Conference: None | Not Set

Moore, Scott and Chong, Stephen
(2011) Static analysis for efficient hybrid information-flow control.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2015) Privacy Preserving Payments in Credit Networks.
In: Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS '15).
Conference: NDSS - Network and Distributed System Security Symposium

N

Nanevski, Aleksandar and Banerjee, Anindya and Garg, Deepak
(2013) Dependent Type Theory for Verification of Information Flow and Access Control Policies.
ACM Transactions on Programming Languages and Systems, 35 (2).

Nanevski, Aleksandar and Banerjee, Anindya and Garg, Deepak
(2011) Verification of Information Flow and Access Control Policies with Dependent Types.
In: Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P '11).
Conference: S&P - IEEE Symposium on Security and Privacy

Neis, Georg and Hur, Chung-Kil and Kaiser, Jan-Oliver and McLaughlin, Craig and Dreyer, Derek and Vafeiadis, Viktor
(2015) Pilsner: a compositionally verified compiler for a higher-order imperative language.
In: Proceedings of the 20st ACM SIGPLAN International Conference on Functional Programming (ICFP '15).
Conference: ICFP - International Conference on Functional Programming

Ngo, Long and Boyd, Colin and Nieto, Juan Gonzalez
(2011) Automated proofs for Diffie-Hellman-based key exchanges.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Noschinski, Lars and Rizkallah, Christine and Mehlhorn, Kurt
(2014) Verification of Certifying Computations through AutoCorres and Simpl.
In: Proc. 6th NASA Formal Methods Symposium (NFM 2014).
Conference: None | Not Set

O

Oh, Se Eun and Chun, Ji Young and Jia, Limin and Garg, Deepak and Gunter, Carl A. and Datta, Anupam
(2014) Privacy-preserving audit for broker-based health information exchange.
In: Proceedings of the 4th ACM conference on Data and application security and privacy (CODASPY'14).
Conference: None | Not Set

P

Paul, Wolfgang J. and Baumann, Christoph and Lutsyk, P. and Schmaltz, Sabine and Oberhauser, J.
(2016) System Architecture as an Ordinary Engineering Discipline.
Springer.

Paul, Wolfgang J. and Schmaltz, Sabine and Shadrin, Andrey
(2012) Completing the Automated Verification of a Small Hypervisor - Assembler Code Verification.
In: Proc. 10th International Conference on Software Engineering and Formal Methods (SEFM 2012).
Conference: None | Not Set

Peter, Hans-Jörg and Finkbeiner, Bernd
(2012) The Complexity of Bounded Synthesis for Timed Control with Partial Observability.
In: Proceedings of the 10th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'12).
Conference: None | Not Set

Peter, Philip
(2012) Autonomous UAV.
Bachelors thesis, Saarland University.

R

Reineke, Jan and Doerfert, Johannes
(2014) Architecture-parametric timing analysis.
In: 20th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2014, Berlin, Germany, April 15-17, 2014.

Reineke, Jan and Liu, Isaac and Patel, Hiren D. and Kim, Sungjun and Lee, Edward A.
(2011) PRET DRAM controller: bank privatization for predictability and temporal isolation.
In: Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2011, part of ESWeek '11 Seventh Embedded Systems Week, Taipei, Taiwan, 9-14 October, 201.
Conference: None | Not Set

Reineke, Jan and Maksoud, Mohamed Abdel
(2014) A Compiler Optimization to Increase the Efficiency of WCET Analysis.
In: 22nd International Conference on Real-Time Networks and Systems, RTNS '14, Versaille, France, October 8-10, 2014.
Conference: None | Not Set

Reineke, Jan and Tripakis, Stavros
(2014) Basic Problems in Multi-View Modeling.
In: Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14).
Conference: TACAS - Tools and Algorithms for Construction and Analysis of Systems

Reischuk, Raphael M. and Backes, Michael and Gehrke, Johannes
(2012) SAFE Extensibility of Data-Driven Web Applications.
In: WWW~'12: Proceedings of the 21st International World Wide Web Conference.
Conference: WWW - International World Wide Web Conference

Rossberg, Andreas and Russo, Claudio V and Dreyer, Derek
(2014) F-ing modules.
J. Funct. Program., 24 (5). pp. 529-607.

Roy, Pritam and Tabuada, Paulo and Majumdar, Rupak
(2011) Pessoa 2.0: A Controller Synthesis Tool for Cyber-physical Systems.
In: Proc. of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011).
Conference: None | Not Set

S

Saha, Indranil and Baruah, Sanjoy and Majumdar, Rupak
(2015) Dynamic scheduling for networked control systems.
In: Proc. of the 18th International Conference on Hybrid Systems: Computation and Control (HSCC 2015).
Conference: None | Not Set

Saha, Indranil and Majumdar, Rupak
(2012) Trigger memoization in self-triggered control.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2012).
Conference: EMSOFT - ACM Conference on Embedded Software

Schmaltz, Sabine and Shadrin, Andrey
(2012) Integrated Semantics of Intermediate-Language C and Macro-Assembler for Pervasive Formal Verification of Operating Systems and Hypervisors from VerisoftXT.
In: Proc. 4th International Conference on Verified Software: Theories, Tools, and Experiments (VSTTE 2012).

Schmidt, Jens M
(2012) Certifying 3-Connectivity in Linear Time.
In: Proc. 39th International Colloquium on Automata, Languages and Programming (ICALP 2012).

Schneider, Sigurd and Smolka, Gert and Hack, Sebastian
(2015) A Linear First-Order Functional Intermediate Language for Verified Compilers.
In: Interactive Theorem Proving - 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings.
Conference: ITP - Conference on Interactive Theorem Proving (previously TPHOLs, changed in 2009)

Sevcík, Jaroslav and Vafeiadis, Viktor and Nardelli, Francesco Zappa and Jagannathan, Suresh and Sewell, Peter
(2013) CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency.
Journal of the ACM, 60 (3). p. 22.

Sevcík, Jaroslav and Vafeiadis, Viktor and Nardelli, Francesco Zappa and Jagannathan, Suresh and Sewell, Peter
(2011) Relaxed-memory concurrency and verified compilation.
In: Proceedings of the 38th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'11).
Conference: POPL - ACM-SIGACT Symposium on Principles of Programming Languages

Soudjani, Sadegh Esmaeil Zadeh and Majumdar, Rupak and Abate, Alessandro
(2016) Safety Verification of Continuous-Space Pure Jump Markov Processes.
In: Proc. 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 16).
Conference: TACAS - Tools and Algorithms for Construction and Analysis of Systems

Stuijk, Sander and Basten, Twan and Akesson, Benny and Geilen, Marc and Moreira, Orlando and Reineke, Jan
(2011) Designing next-generation real-time streaming systems.
In: Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2011, part of ESWeek '11 Seventh Embedded Systems Week, Taipei, Taiwan, 9-14 October, 201.
Conference: None | Not Set

Swasey, David and Garg, Deepak and Dreyer, Derek
(2017) Robust and compositional verification of object capability patterns.
OOPSLA, 1. 89:1–89:26.

T

Tabuada, Paulo and Balkan, Ayca and Caliskan, Sina Yamac and Shoukry, Yasser and Majumdar, Rupak
(2012) Input-Output stability for discrete systems.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2012).
Conference: EMSOFT - ACM Conference on Embedded Software

Tassarotti, Joseph and Dreyer, Derek and Vafeiadis, Viktor
(2015) Verifying read-copy-update in a logic for weak memory.
In: Proc. of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2015).
Conference: PLDI - ACM-SIGPLAN Conference on Programming Language Design and Implementation

Tetali, Sai Deep and Lesani, Mohsen and Majumdar, Rupak and Millstein, Todd
(2013) MrCrypt: Static Analysis for Secure Cloud Computations.
In: Proc. of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2013).
Conference: OOPSLA - ACM Conference on Object Oriented Programming Systems Languages and Applications

Thanh Nguyen, Binh and Sprenger, Christoph and Cremers, Cas
(2018) Abstractions for security protocol verification.
Journal of Computer Security.
(In Press)

Tombers, Stefan
(2011) Low-Cost Byzantine Fault Tolerant Replication for a Cloud Environment.
Bachelors thesis, Saarland University.

Turon, Aaron and Vafeiadis, Viktor and Dreyer, Derek
(2014) GPS: navigating weak memory with ghosts, protocols, and separation.
In: Proc. of the 2014 ACM SIGPLAN International Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2014).
Conference: OOPSLA - ACM Conference on Object Oriented Programming Systems Languages and Applications

V

Vahldiek, Anjo and Elnikety, Eslam and Post, Ansley and Druschel, Peter and Garg, Deepak and Gehrke, Johannes and Rodrigues, Rodrigo
(2012) Trusted Storage.
In: Presented at USENIX FAST'12 WiP.
Conference: FAST - Conference on File and Storage Technologies

Vahldiek-Oberwanger, Anjo and Bhattacharjee, Bobby and Garg, Deepak and Elnikety, Eslam and Druschel, Peter and Litton, James
(2016) Light-Weight Contexts: An OS Abstraction for Safety and Performance.
In: Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI '16).
Conference: OSDI - Usenix Symposium on Operating Systems Design and Implementation

Vaziri, Mandana and Tip, Frank and Dolby, Julian and Hammer, Christian and Vitek, Jan
(2010) A Type System for Data-Centric Synchronization.
In: ECOOP '10: Proceedings of the 24th European Conference on Object-Oriented Programming.

Verbeek, Freek and Havle, Oto and Schmaltz, Julien and Tverdyshev, Sergey and Blasum, Holger and Langenstein, Bruno and Stephan, Werner and Wolff, Burkhart and Nemouchi, Yakoub
(2015) Formal API Specification of the PikeOS Separation Kernel.
In: Proc. 7th NASA Formal Methods Symposium (NFM 2015).
Conference: None | Not Set

Verbeek, Freek and Tverdyshev, Sergey and Havle, Oto and Blasum, Holger and Langenstein, Bruno and Stephan, Werner and Nemouchi, Yakoub and Feliachi, Abderrahmane and Wolff, Burkhart and Schmaltz, Julien
(2014) Formal Specification of a Generic Separation Kernel.
Archive of Formal Proofs, 2014.

W

Wieder, Alexander and Brandenburg, Björn B.
(2013) Efficient partitioning of sporadic real-time tasks with shared resources and spin locks.
In: 8th IEEE International Symposium on Industrial Embedded Systems, SIES 2013, Porto, Portugal, June 19-21, 2013.
Conference: None | Not Set

Wieder, Alexander and Brandenburg, Björn B.
(2013) On Spin Locks in AUTOSAR: Blocking Analysis of FIFO, Unordered, and Priority-Ordered Spin Locks.
In: Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013.
Conference: RTSS - Real Time Systems Symposium

Z

Zamani, Majid and Esfahani, Peyman Mohajerin and Majumdar, Rupak and Abate, Alessandro and Lygeros, John
(2013) Bisimilar finite abstractions of stochastic control systems.
In: Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013).
Conference: CDC - IEEE Conference on Decision and Control

Zamani, Majid and Majumdar, Rupak
(2011) A Lyapunov approach in incremental stability.
In: 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011).
Conference: CDC - IEEE Conference on Decision and Control

Zengin, Mustafa and Vafeiadis, Viktor
(2013) A Programming Language Approach to Fault Tolerance for Fork-Join Parallelism.
In: Seventh International Symposium on Theoretical Aspects of Software Engineering, TASE 2013, 1-3 July 2013, Birmingham, UK.
Conference: None | Not Set

Ziliani, Beta and Dreyer, Derek and Krishnaswami, Neelakantan R. and Nanevski, Aleksandar and Vafeiadis, Viktor
(2015) Mtac: A monad for typed tactic programming in Coq.
J. Funct. Program., 25.

Ziliani, Beta and Dreyer, Derek and Krishnaswami, Neelakantan R. and Nanevski, Aleksandar and Vafeiadis, Viktor
(2013) Mtac: a monad for typed tactic programming in Coq.
In: Proc of the 18th ACM SIGPLAN International Conference on Functional Programming (ICFP '13).
Conference: ICFP - International Conference on Functional Programming

Ç

Çiçek, Ezgi and Barthe, Gilles and Gaboardi, Marco and Garg, Deepak and Hoffmann, Jan
(2017) Relational cost analysis.
In: Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17).
Conference: POPL - ACM-SIGACT Symposium on Principles of Programming Languages

This list was generated on Sun Nov 18 00:02:22 2018 CET.