Jan Tobias Mühlberg

According to our database1, Jan Tobias Mühlberg authored at least 22 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version.
CoRR, 2020

2018
Reflections on Post-Meltdown Trusted Computing: A Case for Open Security Processors.
;login:, 2018

Generating Inductive Shape Predicates for Runtime Checking and Formal Verification.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Verification, 2018

2017
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices.
ACM Trans. Priv. Secur., 2017

Authentic Execution of Distributed Event-Driven Applications with a Small TCB.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures.
Proceedings of the Information Security Theory and Practice, 2016

Security Guarantees for the Execution Infrastructure of Software Applications.
Proceedings of the IEEE Cybersecurity Development, 2016

POSTER: Identifying Dynamic Data Structures in Malware.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Towards availability and real-time guarantees for protected module architectures.
Proceedings of the Companion Proceedings of the 15th International Conference on Modularity, Málaga, Spain, March 14, 2016

2015
Secure Resource Sharing for Embedded Protected Module Architectures.
Proceedings of the Information Security Theory and Practice, 2015

Learning Assertions to Verify Linked-List Programs.
Proceedings of the Software Engineering and Formal Methods - 13th International Conference, 2015

Lightweight and Flexible Trust Assessment Modules for the Internet of Things.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Symbolic object code analysis.
STTT, 2014

Software verification with VeriFast: Industrial case studies.
Sci. Comput. Program., 2014

2012
Verifying compiled file system code.
Formal Asp. Comput., 2012

HyperForce: Hypervisor-enForced Execution of Security-Critical Code.
Proceedings of the Information Security and Privacy Research, 2012

Sound Formal Verification of Linux's USB BP Keyboard Driver.
Proceedings of the NASA Formal Methods, 2012

2011
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

2009
Model checking pointer safety in compiled programs.
PhD thesis, 2009

Model-Checking the Linux Virtual File System.
Proceedings of the Verification, 2009

2006
Blasting Linux Code.
Proceedings of the Formal Methods: Applications and Technology, 2006


  Loading...