Heiko Mantel

According to our database1, Heiko Mantel authored at least 75 papers between 1997 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
On the Meaning and Purpose of Attack Trees.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

From Attacker Models to Reliable Security.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
An Isabelle/HOL Formalization of the Modular Assembly Kit for Security Properties.
Archive of Formal Proofs, 2018

An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Decentralized Dynamic Security Enforcement for Mobile Applications with CliSeAuDroid.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

A Comparative Study Across Static and Dynamic Side-Channel Countermeasures.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

How Secure Is Green IT? The Case of Software-Based Energy Side Channels.
Proceedings of the Computer Security, 2018

2017
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
IACR Cryptology ePrint Archive, 2017

Towards Accelerated Usage Control Based on Access Correlations.
Proceedings of the Secure IT Systems, 2017

Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

A Systematic Study of Cache Side Channels Across AES Implementations.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

AVR Processors as a Platform for Language-Based Security.
Proceedings of the Computer Security - ESORICS 2017, 2017

Taming Message-Passing Communication in Compositional Reasoning About Confidentiality.
Proceedings of the Programming Languages and Systems - 15th Asian Symposium, 2017

2016
Scalable offline monitoring of temporal specifications.
Formal Methods in System Design, 2016

2015
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
IJSSE, 2015

Enforcing Usage Constraints on Credentials for Web Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2015

An Automatic Inference of Minimal Security Types.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Transforming Out Timing Leaks, More or Less.
Proceedings of the Computer Security - ESORICS 2015, 2015

Hybrid Monitors for Concurrent Noninterference.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Reliably secure software systems.
it - Information Technology, 2014

A Formalization of Assumptions and Guarantees for Compositional Noninterference.
Archive of Formal Proofs, 2014

A Formalization of Strong Security.
Archive of Formal Proofs, 2014

A Formalization of Declassification with WHAT-and-WHERE-Security.
Archive of Formal Proofs, 2014

Scalable Offline Monitoring.
Proceedings of the Runtime Verification - 5th International Conference, 2014

CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Noninterference under Weak Memory Models.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Cassandra: Towards a Certifying App Store for Android.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

2012
Scheduler-Independent Declassification.
Proceedings of the Mathematics of Program Construction - 11th International Conference, 2012

Types vs. PDGs in Information Flow Analysis.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2012

2011
Information Flow and Noninterference.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Service Automata.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

Assumptions and Guarantees for Compositional Noninterference.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2010
Flexible Scheduler-Independent Security.
Proceedings of the Computer Security, 2010

2009
Declassification with Explicit Reference Points.
Proceedings of the Computer Security, 2009

2008
Preface.
J. Autom. Reasoning, 2008

Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

Who Can Declassify?.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

2007
Security of multi-agent systems: A case study on comparison shopping.
J. Applied Logic, 2007

Transformational typing and unification for automatically correcting insecure programs.
Int. J. Inf. Sec., 2007

Controlling the What and Where of Declassification in Language-Based Security.
Proceedings of the Programming Languages and Systems, 2007

07091 Abstracts Collection - Mobility, Ubiquity and Security.
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007

07091 Executive Summary - Mobility, Ubiquity and Security.
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007

Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
Combining Different Proof Techniques for Verifying Information Flow Security.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2006

2005
Preface to the special issue of selected papers from FCS/VERIFY 2002.
Int. J. Inf. Sec., 2005

Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

The framework of selective interleaving functions and the modular assembly kit.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

Exploiting Generic Aspects of Security Models in Formal Developments.
Proceedings of the Mechanizing Mathematical Reasoning, 2005

2004
A Matrix Characterization for Multiplicative Exponential Linear Logic.
J. Autom. Reasoning, 2004

Controlled Declassification Based on Intransitive Noninterference.
Proceedings of the Programming Languages and Systems: Second Asian Symposium, 2004

2003
A uniform framework for the formal specification and verification of information flow security.
PhD thesis, 2003

Informationsflusskontrolle als Grundlage für die Sicherheit von Multi-Agenten-Systemen.
Praxis der Informationsverarbeitung und Kommunikation, 2003

A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
Journal of Computer Security, 2003

03411 Abstracts Collection - Language Based Security.
Proceedings of the Language-Based Security, 5.-10. October 2003, 2003

03411 Final Report - Language Based Security.
Proceedings of the Language-Based Security, 5.-10. October 2003, 2003

2002
On the Composition of Secure Systems.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Securing Communication in a Concurrent Language.
Proceedings of the Static Analysis, 9th International Symposium, 2002

2001
Preserving Information Flow Properties under Refinement.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Information Flow Control and Applications - Bridging a Gap.
Proceedings of the FME 2001: Formal Methods for Increasing Software Productivity, 2001

A Generic Approach to the Security of Multi-Threaded Programs.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
VSE: formal methods meet industrial needs.
STTT, 2000

A case study in the mechanical verification of fault tolerance.
J. Exp. Theor. Artif. Intell., 2000

A Case Study in the Mechanical Verification of Fault Tolerance.
Proceedings of the Thirteenth International Florida Artificial Intelligence Research Society Conference, 2000

Unwinding Possibilistic Security Properties.
Proceedings of the Computer Security, 2000

Possibilistic Definitions of Security - An Assembly Kit.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

1999
Towards an Evolutionary Formal Software-Development Using CASL.
Proceedings of the Recent Trends in Algebraic Development Techniques, 1999

linTAP: A Tableau Prover for Linear Logic.
Proceedings of the Automated Reasoning with Analytic Tableaux and Related Methods, 1999

System Description: inka 5.0 - A Logic Voyager.
Proceedings of the Automated Deduction, 1999

1998
Simultaneous Quantifier Elimination.
Proceedings of the KI-98: Advances in Artificial Intelligence, 1998

A Matrix Characterization for MELL.
Proceedings of the Logics in Artificial Intelligence, European Workshop, 1998

VSE: Controlling the Complexity in Formal Software Developments.
Proceedings of the Applied Formal Methods, 1998

1997
Connection-Based Proof Construction in Linear Logic.
Proceedings of the Automated Deduction, 1997


  Loading...