Jan Tobias Mühlberg
According to our database1, Jan Tobias Mühlberg authored at least 22 papers between 2006 and 2020.
Legend:Book In proceedings Article PhD thesis Other
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version.
Reflections on Post-Meltdown Trusted Computing: A Case for Open Security Processors.
Generating Inductive Shape Predicates for Runtime Checking and Formal Verification.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Verification, 2018
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices.
ACM Trans. Priv. Secur., 2017
Authentic Execution of Distributed Event-Driven Applications with a Small TCB.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures.
Proceedings of the Information Security Theory and Practice, 2016
Security Guarantees for the Execution Infrastructure of Software Applications.
Proceedings of the IEEE Cybersecurity Development, 2016
POSTER: Identifying Dynamic Data Structures in Malware.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Towards availability and real-time guarantees for protected module architectures.
Proceedings of the Companion Proceedings of the 15th International Conference on Modularity, Málaga, Spain, March 14, 2016
Secure Resource Sharing for Embedded Protected Module Architectures.
Proceedings of the Information Security Theory and Practice, 2015
Learning Assertions to Verify Linked-List Programs.
Proceedings of the Software Engineering and Formal Methods - 13th International Conference, 2015
Lightweight and Flexible Trust Assessment Modules for the Internet of Things.
Proceedings of the Computer Security - ESORICS 2015, 2015
Symbolic object code analysis.
Software verification with VeriFast: Industrial case studies.
Sci. Comput. Program., 2014
Verifying compiled file system code.
Formal Asp. Comput., 2012
HyperForce: Hypervisor-enForced Execution of Security-Critical Code.
Proceedings of the Information Security and Privacy Research, 2012
Sound Formal Verification of Linux's USB BP Keyboard Driver.
Proceedings of the NASA Formal Methods, 2012
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Model checking pointer safety in compiled programs.
PhD thesis, 2009
Model-Checking the Linux Virtual File System.
Proceedings of the Verification, 2009
Blasting Linux Code.
Proceedings of the Formal Methods: Applications and Technology, 2006