Disclaimer

CISPA is currently in the founding process to join the German Helmholtz Association as a new member. It is consequently undergoing significant organizational changes, which are not yet reflected on this webpage.

For further information on the above mentioned founding process, please refer to the official press release by the State Chancellery of Saarland.

Recent News on the Transformation Process

24.10.2017

The location of the first construction phase has been agreed upon. For further information, please refer to the official press release .

Publications

Publications


Year: 2017 (Total: 62)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#659 Identifying Personal DNA Methylation Profiles by Genotype Inference

Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P) , 2017

#658 Comparing the Usability of Cryptographic APIs

38th IEEE Symposium on Security and Privacy (S&P '17) , 2017

#657 Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security

38th IEEE Symposium on Security and Privacy (S&P '17) , 2017

ACM Conference on Computer and Communications Security [CCS]

#656 A Stitch in Time: Supporting Android Developers in Writing Secure Code

Proceedings of the 2017 ACM Conference on Computer and Communications Security , 2017

#655 Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android

Proceedings of the 24th ACM Conference on Computer and Communication Security , 2017

#654 textscDeemon: Detecting CSRF with Dynamic Analysis and Property Graphs

Proceedings of the 2017 ACM Conference on Computer and Communications Security , 2017

#653 The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android

24th ACM Conference on Computer and Communication Security (CCS'17) , 2017

#652 walk2friends: Inferring Social Links from Mobility Profiles.

Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications Security (CCS) , 2017

#651 Verifying Security Policies in Multi-agent Workflows with Loops

15th ACM Conference on Computer and Communications Security (CCS'17) , 2017

Usenix Security Symposium [Usenix]

#650 How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security

Proceedings of the 26th USENIX Security Symposium (USENIX Security '17) , 2017

#649 Qapla: Policy compliance for database-backed systems

26th USENIX Security Symposium (USENIX Security 17) , 2017

Network and Distributed System Security Symposium [NDSS]

#648 Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#647 Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#646 P2P Mixing and Unlinkable Bitcoin Transactions

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#645 SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#644 A Broad View of the Ecosystem of Socially Engineered Exploit Documents

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

IEEE European Symposium on Security and Privacy [Euro S&P]

#643 LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#642 ARTist: The Android Runtime Instrumentation and Security Toolkit

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#641 Efficient and Flexible Discovery of PHP Application Vulnerabilities

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#640 A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#639 FairTest: Discovering Unwarranted Associations in Data-Driven Applications

, 2017

IEEE Computer Security Foundations Symposium [CSF]

#638 Reconciling Privacy and Utility in Continuous-Time Diffusion Networks

Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17) , 2017

Others

#637 Semantic Annotation for Places in LBSN Using Graph Embedding

Proceedings of the 26th ACM International Conference on Information and Knowledge Management (CIKM'16) , 2017

#636 Die Blockchain im Spannungsfeld der Grundsätze der Datenschutzgrundverordnung

Tagungsband INFORMATIK 2017, Workshop Recht und Technik (to be published) , 2017

#635 Does #like4like Indeed Provoke More Likes?

Proceedings of the 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI'17) , 2017

#634 Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers

Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET '17) , 2017

#633 Security Developer Studies with GitHub Users: Exploring a Convenience Sample

13th Symposium on Usable Privacy and Security (SOUPS'17) , 2017

#632 Quantifying Location Sociality

Proceedings of the 28th ACM Conference on Hypertext and Social Media (HT'17) , 2017

#631 Tatobjekt und Vortaten der Datenhehlerei (§ 202 d StGB)

Neue Zeitschrift für Strafrecht (NStZ) (Journal) , 2017

#630 DeepCity: A Feature Learning Framework for Mining Location Check-ins

Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) , 2017

#629 How Internet Resources Might Be Helping You Develop Faster but Less Securely

IEEE Security & Privacy (Journal) , 2017

#628 Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals

Proc. of the 26rd International Conference on World Wide Web (WWW 2017) , 2017

#627 A promising semantics for relaxed-memory concurrency

Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17) , 2017

#626 Thread modularity at many levels: a pearl in compositional verification

Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17) , 2017

#625 Security Analysis of Cache Replacement Policies

Proceedings of the 6th International Conference on Principles of Security and Trust , 2017

#624 Training Fair Classifiers

AISTATS '17: 20th International Conference on Artificial Intelligence and Statistics (Journal) , 2017

#623 Uncovering the Spatiotemporal Patterns of Collective Social Activity

2017 SIAM International Conference on Data Mining , 2017

#622 Distilling Information Reliability and Source Trustworthiness from Digital Traces

26th International World Wide Web Conference (WWW'17) , 2017

#621 Fairness Beyond Disparate Treatment & Disparate Impact: Learning Classification without Disparate Mistreatment

26th International World Wide Web Conference (WWW'17) , 2017

#620 RedQueen: An Online Algorithm for Smart Broadcasting in Social Networks

WSDM '17: Proceedings of the 10th ACM International Conference on Web Search and Data Mining , 2017

#619 A privacy-preserving reputation system with user rewards

Journal of Network and Computer Applications (Journal) , 2017

#618 "My friend Cayla" - eine nach § 90 TKG verbotene Sendeanlage?

JurPC (Journal) , 2017

#617 Datenschutz für Minderjährige nach der Europäischen Datenschutz-Grundverordnung (DSGVO) vom 27. April 2016

Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

#616 Richterliche Unabhängigkeit und Bring Your Own Device (BYOD) – Weg in die Zukunft oder unvertretbares Sicherheitsrisiko?

Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

#615 Mit Schirm, Charme und Kamera – Verbotene Sendeanlagen i.S.d. § 90 TKG

Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

#614 Mail vom Rechtsanwalt? Herausforderungen sicherer Mandantenkommunikation

Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

#613 State Space Search Nogood Learning: Online Refinement of Critical-Path Dead-End Detectors in Planning

Artificial Intelligence (journal) (Journal) , 2017

#612 Relational cost analysis

Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17) , 2017

#611 A Domain Based Approach to Social Relation Recognition

IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , 2017

#610 STD2P: RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling

IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , 2017

#609 Exploiting saliency for object segmentation from image level labels

IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , 2017

#608 Wearables im Zugriff der Strafjustiz

Trends und Communities der Rechtsinformatik: Tagungsband des 20. Internationalen Rechtsinformatik Symposions IRIS 2017 / Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

#607 Datenschutz: Einführung in technischen Datenschutz, Datenschutzrecht und angewandte Kryptographie

, 2017

#606 Spionagegeräte im Kinderzimmer? – Zur Problematik des § 90 TKG bei Smart Toys

ZD - Zeitschrift für den Datenschutz (Journal) , 2017

#605 Strafbarkeit bei der digitalen Spurensuche – Eine rechtliche Bewertung von Honeypots

MultiMedia und Recht (Journal) , 2017

#604 Summarising Event Sequences using Serial Episodes and an Ontology

Proceedings of the 2016 Workshop on Interactions between Data Mining and Natural Language Processing (DMNLP 2016) , 2017

#603 On the (Statistical) Detection of Adversarial Examples

CoRR (Journal) , 2017

#602 Adversarial Examples for Malware Detection

Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017

#601 Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images

IEEE International Conference on Computer Vision (ICCV) , 2017

#600 Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training

IEEE International Conference on Computer Vision (ICCV) , 2017

#599 Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective

IEEE International Conference on Computer Vision (ICCV), 2017 , 2017

#598 Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling

Mutual Benefits of Cognitive and Computer Vision Workshop at International Conference on Computer Vision (ICCV-W) , 2017

Year: 2016 (Total: 145)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#597 SoK: Lessons Learned From Android Security Research For Appified Software Platforms

37th IEEE Symposium on Security and Privacy (S&P '16) , 2016

#596 You Get Where You're Looking For: The Impact Of Information Sources On Code Security

37th IEEE Symposium on Security and Privacy (S&P '16) , 2016

ACM Conference on Computer and Communications Security [CCS]

#595 Computational Soundness of Dalvik Bytecode

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16) , 2016

#594 Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ) , 2016

#593 Membership Privacy in MicroRNA-based Studies

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

#592 Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

#591 Reliable Third-Party Library Detection in Android and its Security Applications

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

Usenix Security Symposium [Usenix]

#590 An Empirical Study of Textual Key-Fingerprint Representations

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#589 Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#588 SGX-Enabled Oblivious Machine Learning

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#587 T3: Comprehensive policy compliance in data retrieval systems

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#586 Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#585 On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#584 What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#583 Thoth: Comprehensive Policy Compliance in Data Retrieval Systems

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

Network and Distributed System Security Symposium [NDSS]

#582 How to Make ASLR Win the Clone Wars: Runtime Re-Randomization

Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16) , 2016

International Cryptology Conference [Crypto]

#581 On Statistically Secure Obfuscation with Approximate Correctness

Proceedings of the 36th International Cryptology Conference (CRYPTO '16) , 2016

#580 Two Message Oblivious Evaluation of Cryptographic Functionalities

Proceedings of the 36th International Cryptology Conference (CRYPTO '16) , 2016

IEEE European Symposium on Security and Privacy [Euro S&P]

#579 HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving

Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro S&P '16) , 2016

IEEE Computer Security Foundations Symposium [CSF]

#578 On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.

Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16) , 2016

#577 Micro-Policies for Web Session Security

Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16) , 2016

Others

#576 Adversarial Perturbations Against Deep Neural Networks for Malware Classification

The Computing Research Repository (CoRR) (Journal) , 2016

#575 Simulating the Large-Scale Erosion of Genomic Privacy Over Time

Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16) , 2016

#574 Light-Weight Contexts: An OS Abstraction for Safety and Performance

Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI '16) , 2016

#573 Profile Linkability despite Anonymity in Social Media Systems

Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES) , 2016

#572 ESPRESSO: Explaining Relationships between Entity Sets

Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16) , 2016

#571 Software verstehen, zerstören, schützen mit automatischen Software-Modellen

46. Jahrestagung der Gesellschaft fuer Informatik (Informatik 2016) , 2016

#570 Ten Years of Knowledge Harvesting: Lessons and Challenges

IEEE Data Engineering Bulletin (Journal) , 2016

#569 On the Feasibility of TTL-based Filtering for DRDoS Mitigation

RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses , 2016

#568 A Survey on Routing in Anonymous Communication Protocols

The Computing Research Repository (CoRR) (Journal) , 2016

#567 Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität

juris – Die Monatszeitschrift (Journal) , 2016

#566 Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?

MultiMedia und Recht (Journal) , 2016

#565 Causally Consistent Dynamic Slicing

Proceedings of the 27th International Conference on Concurrency Theory (CONCUR '16) , 2016

#564 Automatisches Sicherheitstesten

Datenschutz und Datensicherheit (DuD) (Journal) , 2016

#563 Smart-Home-Systeme in Zeiten digitaler Kriminalität

Datenschutz und Datensicherheit – DuD (Journal) , 2016

#562 R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities

Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval (SIGIR '16) , 2016

#561 KOGNAC: Efficient Encoding of Large Knowledge Graphs

Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI 2016) , 2016

#560 Mining Apps for Anomalies

, 2016

#559 VatiCAN - Vetted, Authenticated CAN Bus

Conference on Cryptographic Hardware and Embedded Systems (CHES) (Journal) , 2016

#558 Kizzle: A Signature Compiler for Detecting Exploit Kits

The 46th Annual IEEE/IFIP Conference on Dependable Systems and Networks , 2016

#557 Privacy Capsules: Preventing Information Leaks by Mobile Apps

, 2016

#556 Demo: I-Pic: A Platform for Privacy-Compliant Image Capture

Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16) , 2016

#555 Mining Sandboxes

Proceedings of the 38th International Conference on Software Engineering , 2016

#554 Detecting Hardware-Assisted Virtualization

Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings , 2016

#553 J-NERD: Joint Named Entity Recognition and Disambiguation with Rich Linguistic Features

Transactions of the Association for Computational Linguistics (TACL) (Journal) , 2016

#552 Boxify: Bringing Full-Fledged App Sandboxing to Stock Android

USENIX ;login: (Journal) , 2016

#551 R-Droid: Leveraging Android App Analysis with Static Slice Optimization

Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , 2016

#550 RamCrypt: Kernel-based Address Space Encryption for User-mode Processes

ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS) , 2016

#549 DroidMate: a robust and extensible test generator for Android

Proceedings of the International Conference on Mobile Software Engineering and Systems (MOBILESoft '16) , 2016

#548 Anonymisierung, Pseudonymisierung und Transparenz für Big Data. Technische Herausforderungen und Regelung in der Datenschutz-Grundverordnung

Datenschutz und Datensicherheit (DuD) (Journal) , 2016

#547 Instant Espresso: Interactive Analysis of Relationships in Knowledge Graphs

Proceedings of the 25th International Conference on World Wide Web (WWW '16), Companion Volume (Journal) , 2016

#546 Progress-Sensitive Security for SPARK

Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS '16) , 2016

#545 Implementation-level Analysis of the JavaScript Helios Voting Client

Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016 , 2016

#544 The Impact of Tangled Code Changes on Defect Prediction Models

The Impact of Tangled Code Changes on Defect Prediction Models , 2016

#543 Asymmetric Secure Multi-execution with Declassification

Proceedings of Principles of Security and Trust - 5th International Conference (POST '16) , 2016

#542 Thread-level Speculation with Kernel Support

Proceedings of the 25th International Conference on Compiler Construction , 2016

#541 Nearly Optimal Verifiable Data Streaming

Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I , 2016

#540 Deducing User Presence from Inter-Message Intervals in Home Automation Systems

ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings , 2016

#539 Datenspeicherung in modernen Fahrzeugen – wem „gehören” die im Fahrzeug gespeicherten Daten?

juris – Die Monatszeitschrift (Journal) , 2016

#538 Attributbasierte Verschlüsselung für die Justiz

Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016 , 2016

#537 Datensicherheit (technisch-organisatorische Maßnahmen)

Cloud Computing: Rechtshandbuch , 2016

#536 Efficient smart metering based on homomorphic encryption

Computer Communications (Journal) , 2016

#535 Ersetzendes Scannen - Kernelement im Gesamtkonzept einer elektronischen Aktenführung?

Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016 , 2016

#534 Privacy Challenges in the Quantified Self Movement - An EU Perspective

Proceedings on Privacy Enhancing Technologies (Journal) , 2016

#533 sec-cs: Getting the Most out of Untrusted Cloud Storage

, 2016

#532 Uses and Abuses of Server-Side Requests

Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2016 , 2016

#531 Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys

Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I , 2016

#530 Anonymous RAM

21st European Symposium on Research in Computer Security (ESORICS) , 2016

#529 Post mortem auctoris? Software zur Unterstützung von Bibliotheken bei der Auffüllung ihrer Bestände

Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016 , 2016

#528 From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy

Foundations of Security Analysis and Design VIII: FOSAD 2014/2015/2016 Tutorial Lectures , 2016

#527 Delegatable Functional Signatures

Public-Key Cryptography - PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I , 2016

#526 A type theory for incremental computational complexity with control flow changes

Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming (ICFP '16) , 2016

#525 Security & Privacy Column

SIGLOG News (Journal) , 2016

#524 Estimating Diffusion Networks: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm

Journal of Machine Learning Research (JMLR) (Journal) , 2016

#523 Smart Mobility für das Saarland: Identifikation von Chancen und Handlungsempfehlungen für eine digital vernetzte Mobilität

, 2016

#522 Soziale Netzwerke im Fokus von Phishing-Angriffen - Eine Analyse aus technischer und rechtlicher Sicht -

JurPC (Journal) , 2016

#521 Pokémon GO – Technische Innovation und Strafrecht im Konflikt

Informatik Spektrum (Journal) , 2016

#520 Confidentiality and Authenticity for Distributed Version Control Systems — A Mercurial Extension

Proceedings of the 41st IEEE Conference on Local Computer Networks (LCN 2016) , 2016

#519 EU-Datenschutz nach „Safe Harbor“

Wirtschaftsführer für junge Juristen (Journal) , 2016

#518 EncFS goes Multi-User: Adding Access Control to an Encrypted File System

Proceedings of the 2nd IEEE Workshop on Security and Privacy in the Cloud (in conjunction with IEEE CNS 2016) , 2016

#517 Sicherheit in der Gebäudeautomation

xia - intelligente architektur (Journal) , 2016

#516 Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit

JurPC (Journal) , 2016

#515 Modellierung in Recht und Informatik

Festschrift für Maximilian Herberger , 2016

#514 Sicherheit der Kommunikation zwischen Rechtsanwalt und Mandant

Neue Juristische Wochenschrift (Journal) , 2016

#513 Hardware-Keylogger: Die Tastatur in der Hand des Feindes

Datenschutz und Datensicherheit - DuD (Journal) , 2016

#512 Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016

Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (Journal) , 2016

#511 Herausgabe der Personalakte eines Beamten an ein privates Unternehmen zum Zwecke der Aktendigitalisierung, Anmerkung zu OVG Schleswig, Beschl. v. 27.07.2016 – 2 MB 11/16

jurisPR-ITR (Journal) , 2016

#510 Lightweight verification of separate compilation

Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'16) , 2016

#509 Goal Probability Analysis in Probabilistic Planning: Exploring and Enhancing the State of the Art

J. Artif. Intell. Res. (JAIR) (Journal) , 2016

#508 Practical Undoability Checking via Contingent Planning

Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16) , 2016

#507 Revisiting Goal Probability Analysis in Probabilistic Planning

Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16) , 2016

#506 Partial Delete Relaxation, Unchained: On Intractable Red-Black Planning and Its Applications

Proceedings of the 9th Annual Symposium on Combinatorial Search (SOCS'16) , 2016

#505 Loss Functions for Top-k Error: Analysis and Insights

2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16) , 2016

#504 On the Wisdom of Experts vs. Crowds: Discovering Trustworthy Topical News in Microblogs

Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW'16) , 2016

#503 Distinguishing between Topical and Non-Topical Information Diffusion Mechanisms in Social Media

Proceedings of the 10th International Conference on Web and Social Media , 2016

#502 Message Impartiality in Social Media Discussions

Proceedings of the 10th International Conference on Web and Social Media , 2016

#501 Dissemination Biases of Social Media Channels: On the Topical Coverage of Socially Shared News

Proceedings of the 10th International Conference on Web and Social Media , 2016

#500 Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data

12th Symposium on Usable Privacy and Security (SOUPS'16) , 2016

#499 On the Efficiency of the Information Networks in Social Media

Proceedings of the 9th ACM International Conference on Web Search and Data Mining , 2016

#498 Strengthening Weak Identities Through Inter-Domain Trust Transfer

Proceedings of the 25th International Conference on World Wide Web (WWW'16) , 2016

#497 You are not your Developer, either: A Research Agenda for Usable Security and Privacy Research Beyond End Users

IEEE SecDev 2016 , 2016

#496 Faceless Person Recognition: Privacy Implications in Social Media

Computer Vision - ECCV 2016 - 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part III , 2016

#495 I-Pic: A Platform for Privacy-Compliant Image Capture

Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16) , 2016

#494 Specifying and Verifying Secrecy in Workflows with Arbitrarily Many Agents

Proc. of the 14th International Symposium on Automated Technology for Verification and Analysis (ATVA 2016) , 2016

#493 Runtime Verification for HyperLTL

Proceedings of the 16th International Conference on Runtime Verification (RV'2016) , 2016

#492 A Stream-Based Specification Language for Network Monitoring

Proceedings of the 16th International Conference on Runtime Verification (RV'2016) , 2016

#491 What You Really Need To Know About Your Neighbor

Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016 , 2016

#490 Operational Analytics Data Management Systems

PVLDB (Journal) , 2016

#489 An experimental evaluation and analysis of database cracking

VLDB J. (Journal) , 2016

#488 Recognizing Fine-Grained and Composite Activities Using Hand-Centric Features and Script Data

International Journal of Computer Vision (Journal) , 2016

#487 Learning Deep Representations of Fine-Grained Visual Descriptions

2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16) , 2016

#486 Understanding Same-Side Interactions with Wrist-Worn Devices

Proceedings of the 9th Nordic Conference on Human-Computer Interaction. Nordic Conference on Human-Computer Interaction (NordiCHI-16), October 23-27, Gothenburg, Sweden , 2016

#485 Establishing mandatory access control on Android OS

PhD Thesis , 2016

#484 Autonome Systeme

Datenschutz und Datensicherheit (Journal) , 2016

#483 POSTER: The ART of App Compartmentalization

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ) , 2016

#482 Symbolic Model Checking for Factored Probabilistic Models

Proc. of the 14th International Symposium on Automated Technology for Verification and Analysis (ATVA 2016) , 2016

#481 Model Checking Population Protocols

36th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2016, December 13-15, 2016, Chennai, India , 2016

#480 Hitting Families of Schedules for Asynchronous Programs

Proc. of the 28th International Conference on Computer Aided Verification (CAV 2016) , 2016

#479 Safety Verification of Continuous-Space Pure Jump Markov Processes

Proc. 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 16) , 2016

#478 Partial Order Reduction for Event-Driven Multi-threaded Programs

Proc. 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 16) , 2016

#477 Probabilistic CTL(^mbox*): The Deductive Way

Proc. 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 16) , 2016

#476 System Architecture as an Ordinary Engineering Discipline

, 2016

#475 A Survey on Static Cache Analysis for Real-Time Systems

LITES (Journal) , 2016

#474 MIRROR: symmetric timing analysis for real-time tasks on multicore platforms with shared resources

Proceedings of the 53rd Annual Design Automation Conference, DAC 2016, Austin, TX, USA, June 5-9, 2016 , 2016

#473 SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion

Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings , 2016

#472 Efficient Sanitizable Signatures Without Random Oracles

Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS'16) , 2016

#471 Learning and Forecasting Opinion Dynamics in Social Networks

NIPS '16: Advances in Neural Information Processing Systems , 2016

#470 Smart Broadcasting: Do you want to be seen?

Proc. of the 22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'16) , 2016

#469 Influence Estimation and Maximization in Continuous-Time Diffusion Networks

ACM Transactions on Information Systems (TOIS) (Journal) , 2016

#468 Recht und Technik: Datenschutz im Diskurs

Informatik 2016, 46. Jahrestagung der Gesellschaft für Informatik, 26.-30. September 2016, Klagenfurt, Österreich , 2016

#467 PostBits: using contextual locations for embedding cloud information in the home

Personal and Ubiquitous Computing (Journal) , 2016

#466 Taming release-acquire consistency

Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'16) , 2016

#465 Lightweight Real-Time Synchronization under P-EDF on Symmetric and Asymmetric Multiprocessors

28th Euromicro Conference on Real-Time Systems, ECRTS 2016, Toulouse, France, July 5-8, 2016 , 2016

#464 Multiprocessor Real-Time Scheduling with Hierarchical Processor Affinities

28th Euromicro Conference on Real-Time Systems, ECRTS 2016, Toulouse, France, July 5-8, 2016 , 2016

#463 PROSA: A Case for Readable Mechanized Schedulability Analysis

28th Euromicro Conference on Real-Time Systems, ECRTS 2016, Toulouse, France, July 5-8, 2016 , 2016

#462 Global Scheduling Not Required: Simple, Near-Optimal Multiprocessor Real-Time Scheduling with Semi-Partitioned Reservations

Proceedings of the IEEE 37th Real-Time Systems Symposium, RTSS 2016 , 2016

#461 A Blocking Bound for Nested FIFO Spin Locks

Proceedings of the IEEE 37th Real-Time Systems Symposium, RTSS 2016 , 2016

#460 Angreiferjagd im "Internet der Dinge"

Datenschutz und Datensicherheit (Journal) , 2016

#459 Exploratory Querying of Extended Knowledge Graphs

PVLDB (Journal) , 2016

#458 Commonsense in Parts: Mining Part-Whole Relations from the Web and Image Tags

Proc. of the 30th Conference of Artificial Intelligence (AAAI 2016) , 2016

#457 Making Sense of Entities and Quantities in Web Tables

Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16) , 2016

#456 Credibility Assessment of Textual Claims on the Web

Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16) , 2016

#455 YAGO: A Multilingual Knowledge Base from Wikipedia, Wordnet, and Geonames

Proc. 15th International Semantic Web Conference (ISWC 2016) , 2016

#454 Recognition of Ongoing Complex Activities by Sequence Prediction over a Hierarchical Label Space

IEEE Winter Conference on Applications of Computer Vision (WACV) , 2016

#453 Faceless Person Recognition; Privacy Implications in Social Media

European Conference on Computer Vision (ECCV) , 2016

Year: 2015 (Total: 105)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#452 Cross-Architecture Bug Search in Binary Executables

Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , 2015

#451 Privacy and Access Control for Outsourced Personal Records

Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , 2015

#450 ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data

Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , 2015

ACM Conference on Computer and Communications Security [CCS]

#449 Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits

Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS 2015) , 2015

#448 Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins

Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS '15) , 2015

#447 POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor

Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15) , 2015

#446 POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)

Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15) , 2015

#445 Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits

Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security , 2015

Usenix Security Symposium [Usenix]

#444 Boxify: Full-fledged App Sandboxing for Stock Android

Proceedings of the 24th USENIX Security Symposium (USENIX '15) , 2015

#443 In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services

Proceedings of the 24th USENIX Security Symposium (USENIX '15) , 2015

Network and Distributed System Security Symposium [NDSS]

#442 Privacy Preserving Payments in Credit Networks

Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS '15) , 2015

International Cryptology Conference [Crypto]

#441 Efficient Pseudorandom Functions via On-the-Fly Adaptation

Proceedings of the 35th International Cryptology Conference (CRYPTO '15) , 2015

IEEE Computer Security Foundations Symposium [CSF]

#440 Program Actions as Actual Causes: A Building Block for Accountability

Proceedings of the 28th Computer Security Foundations Symposium (CSF '15) , 2015

#439 Information Flow Control for Event Handling and the DOM in Web Browsers

Proceedings of the 28th Computer Security Foundations Symposium (CSF '15) , 2015

#438 A Logic of Programs with Interface-Confined Code

Proceedings of the 28th Computer Security Foundations Symposium (CSF '15) , 2015

#437 Symbolic Malleable Zero-knowledge Proofs

Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15) , 2015

Others

#436 Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks

Proceedings on Privacy Enhancing Technologies , 2015

#435 AmpPot: Monitoring and Defending Against Amplification DDoS Attacks

Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings , 2015

#434 Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems

ACM Computer Communication Review (Journal) , 2015

#433 Mining Android Apps for Anomalies

The Art and Science of Analyzing Software Data (Journal) , 2015

#432 Affine Refinement Types for Secure Distributed Programming

ACM Transactions on Programming Languages and Systems , 2015

#431 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

13th International Conference on Applied Cryptography and Network Security (ACNS) , 2015

#430 Foundations of Reconfigurable PUFs

Proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, New York, NY, USA, June 2-5, 2015 , 2015

#429 The elephant in the room: getting value from Big Data

Proceedings of the 18th International Workshop on Web and Databases (WebDB '15) , 2015

#428 Generalized Task Parallelism

ACM Transactions on Architecture and Code Optimization (TACO) (Journal) , 2015

#427 Knowledge Bases for Web Content Analytics

Proccedings of the 24th International Conference on World Wide Web (WWW '15), Companion Volume , 2015

#426 Mining Apps for Abnormal Usage of Sensitive Data

Proceedings of the 37th International Conference on Software Engineering , 2015

#425 Using Dynamic Symbolic Execution to Generate Inputs in Search-based GUI Testing

Proceedings of the Eighth International Workshop on Search-Based Software Testing , 2015

#424 Test Complement Exclusion: Guarantees from Dynamic Analysis

Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension , 2015

#423 Guardat: enforcing data policies at the storage layer

Proceedings of the 10th European Conference on Computer Systems (EuroSys '15) , 2015

#422 PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law

Proceedings of the 4th Conference on Principles of Security and Trust (POST) , 2015

#421 Refinement Types for Incremental Computational Complexity

Proceedings of the 24th European Symposium on Programming (ESOP '15) , 2015

#420 It's Not a Bug, It's a Feature: How Misclassification Impacts Bug Prediction

Software-Engineering & Management, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI) , 2015

#419 Learning How to Prevent Return-Oriented Programming Efficiently

Engineering Secure Software and Systems , 2015

#418 How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data

CoRR (Journal) , 2015

#417 Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext

ACM ASIACCS Security in Cloud Computing Workshop 2015 , 2015

#416 Data Lineage in Malicious Environments

IEEE Transactions on Dependable and Secure Computing (Journal) , 2015

#415 System M: A Program Logic for Code Sandboxing and Identification

The Computing Research Repository (CoRR) (Journal) , 2015

#414 Quantifying Information Flow in Cryptographic Systems

Mathematical Structures in Computer Science (Journal) , 2015

#413 Achieving Optimal Utility for Distributed Differential Privacy Using SMPC

Applications of Secure Multiparty Computation , 2015

#412 Schwacke-Liste und Fraunhofer-Tabelle in der Rechtsprechung der Berufungsgerichte

Zeitschrift für Schadensrecht (Journal) , 2015

#411 Ein Bild der Zukunft? – Selbstentwickelte Betriebssysteme für Prüfungen am Beispiel des Saarbrücker Prüfungsrechner-Toolkits "Challenge OS"

Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015 , 2015

#410 Ein Plädoyer für e-Klausuren im Jurastudium

JurPC (Journal) , 2015

#409 A Reputation System supporting Unlinkable, yet Authorized Expert Ratings

Proceedings of The 30th ACM/SIGAPP Symposium On Applied Computing , 2015

#408 Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades

Proceedings of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS) , 2015

#407 Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics

9th USENIX Workshop on Offensive Technologies (WOOT 15) , 2015

#406 Elektronischer Rechtsverkehr in Verfahren ohne Anwaltszwang - der Justizgewährungsanspruch des Bürgers als praktischer und theoretischer Störfaktor? - Anmerkungen insbesondere aus amtsrichterlicher Sicht

Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015 , 2015

#405 jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications

Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings , 2015

#404 Save Our Passwords

Proceedings of The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications , 2015

#403 Bargeld und andere Bezahlverfahren

Wirtschaftsdienst (Journal) , 2015

#402 E-Akte, elektronischer Rechtsverkehr und Barrierefreiheit

Neue Juristische Wochenschrift (Journal) , 2015

#401 Elektronische Akten: Anforderungen und technische Lösungsmöglichkeiten

Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015 , 2015

#400 Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources

Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15) , 2015

#399 Computational Soundness for Interactive Primitves

Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15) , 2015

#398 Hausautomationssysteme im Datenschutzrecht

Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015 , 2015

#397 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

CoRR (Journal) , 2015

#396 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

IACR Cryptology ePrint Archive (Journal) , 2015

#395 Type-Based Verification of Electronic Voting Protocols

Proceedings of the 4th International Conference on Principles of Security and Trust (POST) , 2015

#394 A generic and compositional framework for multicore response time analysis

Proceedings of the 23rd International Conference on Real Time Networks and Systems, RTNS 2015, Lille, France, November 4-6, 2015 , 2015

#393 Mtac: A monad for typed tactic programming in Coq

J. Funct. Program. (Journal) , 2015

#392 Pilsner: a compositionally verified compiler for a higher-order imperative language

Proceedings of the 20st ACM SIGPLAN International Conference on Functional Programming (ICFP '15) , 2015

#391 Verifying read-copy-update in a logic for weak memory

Proc. of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2015) , 2015

#390 Iris: Monoids and Invariants as an Orthogonal Basis for Concurrent Reasoning

Proceedings of the 43nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'15) , 2015

#389 Compositional Verification Methods for Next-Generation Concurrency (Dagstuhl Seminar 15191)

Dagstuhl Reports (Journal) , 2015

#388 Red-black planning: A new systematic approach to partial delete relaxation

Artif. Intell. (Journal) , 2015

#387 Simulated Penetration Testing: From "Dijkstra" to "Turing Test++"

Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2015) , 2015

#386 Red-Black Planning: A New Tractability Analysis and Heuristic Function

Proceedings of the 8th Annual Symposium on Combinatorial Search (SOCS'15) , 2015

#385 Efficient Output Kernel Learning for Multiple Tasks

Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada , 2015

#384 Classifier based graph construction for video segmentation

2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'15) , 2015

#383 A Linear First-Order Functional Intermediate Language for Verified Compilers

Interactive Theorem Proving - 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings , 2015

#382 Sampling Content from Online Social Networks: Comparing Random vs. Expert Sampling of the Twitter Stream

TWEB (Journal) , 2015

#381 Strength in Numbers: Robust Tamper Detection in Crowd Computations

Proceedings of the 2015 ACM on Conference on Online Social Networks, COSN 2015, Palo Alto, California, USA, November 2-3, 2015 , 2015

#380 The Many Shades of Anonymity: Characterizing Anonymous Social Media Content

Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015 , 2015

#379 Characterizing Information Diets of Social Media Users

Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015 , 2015

#378 The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks

Proc. of the 2015 Internet Measurement Conference (IMC'15) , 2015

#377 On the Reliability of Profile Matching Across Large Online Social Networks

Proc. of the 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'15) , 2015

#376 Microscopic Description and Prediction of Information Diffusion in Social Media: Quantifying the Impact of Topical Interests

Proc. of the 24th International Conference on World Wide Web (WWW 2015) , 2015

#375 Algorithms for Model Checking HyperLTL and HyperCTL ^*

Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015) , 2015

#374 Adam: Causality-Based Synthesis of Distributed Systems

Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015) , 2015

#373 A Seven-Dimensional Analysis of Hashing Methods and its Implications on Query Processing

PVLDB (Journal) , 2015

#372 Reachability Analysis of Reversal-bounded Automata on Series-Parallel Graphs

Proceedings of 6th International Symposium on Games, Automata, Logics and Formal Verification (GandALF 2015) , 2015

#371 Rely/Guarantee Reasoning for Asynchronous Programs

Proceedings of the 26th International Conference on Concurrency Theory (CONCUR '15) , 2015

#370 Quantifying Conformance Using the Skorokhod Metric

Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015) , 2015

#369 Model Checking Parameterized Asynchronous Shared-Memory Systems

Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015) , 2015

#368 Bbs: A Phase-Bounded Model Checker for Asynchronous Programs

Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015) , 2015

#367 Asynchronous Liquid Separation Types

Proceedings of the 29th European Conference on Object-Oriented Programming (ECOOP'16) , 2015

#366 Dynamic scheduling for networked control systems

Proc. of the 18th International Conference on Hybrid Systems: Computation and Control (HSCC 2015) , 2015

#365 Computing the Skorokhod distance between polygonal traces

Proc. of the 18th International Conference on Hybrid Systems: Computation and Control (HSCC 2015) , 2015

#364 Approximate Counting in SMT and Value Estimation for Probabilistic Programs

Proc. 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 15) , 2015

#363 CacheAudit: A Tool for the Static Analysis of Cache Side Channels

ACM Trans. Inf. Syst. Secur. (Journal) , 2015

#362 Reliable Recon in Adversarial Peer-to-Peer Botnets

Proc. of the 2015 Internet Measurement Conference (IMC'15) , 2015

#361 Going Wild: Large-Scale Classification of Open DNS Resolvers

Proc. of the 2015 Internet Measurement Conference (IMC'15) , 2015

#360 IoTPOT: Analysing the Rise of IoT Compromises

9th USENIX Workshop on Offensive Technologies (WOOT 15) , 2015

#359 Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism

Proc. of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS'15) , 2015

#358 Verifiably Encrypted Signatures: Security Revisited and a New Construction

Proc. of the 20th European Symposium on Research in Computer Security (ESORICS 2015) , 2015

#357 VeriStream - A Framework for Verifiable Data Streaming

Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers , 2015

#356 COEVOLVE: A Joint Point Process Model for Information Diffusion and Network Co-evolution

NIPS '15: Advances in Neural Information Processing Systems , 2015

#355 Quantifying Information Overload in Social Media and its Impact on Social Contagions

ICWSM '15: Proceedings of the 9th International AAAI Conference on Weblogs and Social Media , 2015

#354 Formal API Specification of the PikeOS Separation Kernel

Proc. 7th NASA Formal Methods Symposium (NFM 2015) , 2015

#353 Modular Verification of Concurrency-Aware Linearizability

Distributed Computing - 29th International Symposium, DISC 2015, Tokyo, Japan, October 7-9, 2015, Proceedings , 2015

#352 A formal C memory model supporting integer-pointer casts

Proc. of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2016) , 2015

#351 Global Real-Time Semaphore Protocols: A Survey, Unified Analysis, and Comparison

Proceedings of the IEEE 36th Real-Time Systems Symposium (RTSS'15) , 2015

#350 When Is CAN the Weakest Link? A Bound on Failures-in-Time in CAN-Based Real-Time Systems

Proceedings of the IEEE 36th Real-Time Systems Symposium (RTSS'15) , 2015

#349 iThreads: A Threading Library for Parallel Incremental Computation

Proc. of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '15) , 2015

#348 Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems

Proc. of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15) , 2015

Year: 2014 (Total: 145)

ACM Conference on Computer and Communications Security [CCS]

#347 (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection

Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14) , 2014

#346 DEMO: Enhancing Security and Privacy with Google Glass

Proceedings of the 21st ACM Conference on Computer and Communication Security (CCS '14) , 2014

#345 Poster: Quasi-ID: In fact, I am a human

Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14) , 2014

#344 You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code

Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14) , 2014

#343 Private-by-Design Advertising Meets the Real World

Proc. of the 20th ACM Conference on Computer and Communication Security (CCS 2014) , 2014

Usenix Security Symposium [Usenix]

#342 A Look at Targeted Attacks Through the Lense of an NGO

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

#341 Exit from Hell? Reducing the Impact of Amplification DDoS Attacks

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

#340 Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

#339 SDDR: Light-Weight, Secure Mobile Encounters

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

#338 Towards Detecting Anomalous User Behavior in Online Social Networks

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

Network and Distributed System Security Symposium [NDSS]

#337 Amplification Hell: Revisiting Network Protocols for DDoS Abuse

Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS '14) , 2014

International Cryptology Conference [Crypto]

#336 Feasibility and Infeasibility of Secure Computation with Malicious PUFs

Proceedings of the 34th International Cryptology Conference (Crypto '14) , 2014

IEEE Computer Security Foundations Symposium [CSF]

#335 TUC: Time-sensitive and Modular Analysis of Anonymous Communication

Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14) , 2014

#334 Temporal Mode-Checking for Runtime Monitoring of Privacy Policies

Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF '14) , 2014

Others

#333 Android Security Framework: Extensible Multi-Layered Access Control on Android

In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014

#332 Scippa: System-Centric IPC Provenance on Android

In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014

#331 XMLMate: Evolutionary XML Test Generation

Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering , 2014

#330 Probabilistic Prediction of Privacy Risks in User Search Histories

Proceedings of the First International Workshop on Privacy and Secuirty of Big Data (PSBD@CIKM '14) , 2014

#329 Lime: Data Lineage in the Malicious Environment

Proceedings of 10th International Workshopon Security and Trust Management (STM) , 2014

#328 Asynchronous MPC with a Strict Honest Majority Using Non-equivocation

ACM Symposium on Principles of Distributed Computing 2014 , 2014

#327 WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP

12th International Conference on Applied Cryptography and Network Security (ACNS 2014) , 2014

#326 BackRef: Accountability in Anonymous Communication Networks

Applied Cryptography and Network Security , 2014

#325 X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.

29th ACM Symposium on Applied Computing (SAC 2014) , 2014

#324 A Compiler Optimization to Increase the Efficiency of WCET Analysis

22nd International Conference on Real-Time Networks and Systems, RTNS '14, Versaille, France, October 8-10, 2014 , 2014

#323 Automating the Choice of Consistency Levels in Replicated Systems

2014 USENIX Annual Technical Conference, USENIX ATC '14, Philadelphia, PA, USA, June 19-20, 2014. , 2014

#322 An SMT-based Approach to Coverability Analysis

Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014) , 2014

#321 A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors

ACM Computing Surveys (Journal) , 2014

#320 Building timing predictable embedded systems

ACM Transactions on Embedded Computing Systems (Journal) , 2014

#319 Bridging the Gap Between Digital Cryptography and the Physical World

European Symposium on Research in Computer Security (ESORICS) , 2014

#318 Bounds on mobility

Proc. of the 25th International Conference on Concurrency Theory (CONCUR 2014) , 2014

#317 Blocking Optimality in Distributed Real-Time Locking Protocols

LITES (Journal) , 2014

#316 Beyond Access Control: Managing Online Privacy via Exposure

Proceedings of the Workshop on Useable Security (USEC'14) , 2014

#315 Basic Problems in Multi-View Modeling

Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14) , 2014

#314 Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity

Proceedings of the 3rd Conference on Principles of Security and Trust (POST) , 2014

#313 Dynamic package interfaces

Proc. of the 17th International Conference on Fundamental Approaches to Software Engineering (FASE 2014) , 2014

#312 Discovering Emerging Entities with Ambiguous Names

Proc. of the 23rd International Conference on World Wide Web (WWW 2014) , 2014

#311 Detection and Tracking of Occluded People

International Journal of Computer Vision (IJCV) (Journal) , 2014

#310 Deductive control synthesis for alternating-time logics

Proc. of the International Conference on Embedded Software (EMSOFT 2014) , 2014

#309 Formal Specification of a Generic Separation Kernel

Archive of Formal Proofs (Journal) , 2014

#308 Estimation of Human Body Shape and Posture Under Clothing

Computer Vision and Image Understanding (Journal) , 2014

#307 EnCore: Private, Context-based Communication for Mobile Social Apps

Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services , 2014

#306 Edit Distance for Timed Automata

Proc. of the 17th International Conference on Hybrid Systems: Computation and Control (HSCC 2014) , 2014

#305 Investigating the effectiveness of peephole interaction for smartwatches in a map navigation task

Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI) , 2014

#304 Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users

Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI) , 2014

#303 Interacting with 3D Content on Stereoscopic Displays

Proceedings of the International Symposium on Pervasive Displays (PerDis) , 2014

#302 Main Memory Adaptive Indexing for Multi-core Systems

Proceedings of the 10th International Workshop on Data Management on New Hardware (DaMoN) , 2014

#301 Kuai: A model checker for software-defined networks

Proc. of Formal Methods in Computer-Aided Design (FMCAD 2014) , 2014

#300 KnowLife: a Knowledge Graph for Health and Life Sciences

Proc. of the 30th IEEE International Conference on Data Engineering (ICDE'14) , 2014

#299 Privacy-preserving audit for broker-based health information exchange

Proceedings of the 4th ACM conference on Data and application security and privacy (CODASPY'14) , 2014

#298 People on Drugs: Credibility of User Statements in Health Communities.

Proc. of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'14) , 2014

#297 Paint it Black: Evaluating the Effectiveness of Malware Blacklists

Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses , 2014

#296 On Measuring the Impact of DDoS Botnets

Proceedings of the Seventh European Workshop on System Security (EuroSec '14) , 2014

#295 On Advanced Monitoring in Resilient and Unstructured P2P Botnets

Proceedings of the 2014 IEEE International Conference on Communications (ICC 2014) , 2014

#294 Race Detection for Android Applications

Proc. of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014) , 2014

#293 Reverse engineering of cache replacement policies in Intel microprocessors and their evaluation

2014 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2014, Monterey, CA, USA, March 23-25, 2014 , 2014

#292 Regression Test Selection for Distributed Software Histories

Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014) , 2014

#291 Synthesis of Geometry Proof Problems

Proc. of the 28th Conference of Artificial Intelligence (AAAI 2014) , 2014

#290 SurfacePhone: A Mobile Projection Device for Single- and Multiuser Everywhere Tabletop Interaction

Proceedings of the 32nd ACM CHI Conference on Human Factors in Computing Systems. ACM International Conference on Human Factors in Computing Systems (CHI-14), 32nd, April 26 - May 1, Toronto,, Ontario , 2014

#289 Scalable Multitask Representation Learning for Scene Classification

2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014 , 2014

#288 Understanding and Specifying Social Access Control Lists

Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS 2014) , 2014

#287 Unary Pushdown Automata and Straight-Line Programs

Proc. of the 41st International Colloquium on Automata, Languages and Programming (ICALP 2014) , 2014

#286 Ubic: Bridging the Gap between Digital Cryptography and the Physical World

Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I , 2014

#285 Temporal Mode-Checking for Runtime Monitoring of Privacy Policies

Proc. 26th International Conference on Computer Aided Verification (CAV 2014) , 2014

#284 Verification of Certifying Computations through AutoCorres and Simpl

Proc. 6th NASA Formal Methods Symposium (NFM 2014) , 2014

#283 (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens

Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings , 2014

#282 Differentially Private Data Aggregation with Optimal Utility

30th Annual Computer Security Applications Conference (ACSAC) , 2014

#281 Extrapolation and Prediction of User Behaviour from Wireless Home Automation Communication

7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2014) , 2014

#280 Schwacke-Liste und Fraunhofer-Tabelle in der Rechtsprechung der Berufungsgerichte

Zeitschrift für Schadensrecht (Journal) , 2014

#279 Blut und Boden: Die NS-Agrarideologie und die Extreme Rechte heute

Forum Recht (Journal) , 2014

#278 A Case Study of Research through the App Store: Leveraging the System UI as a Playing Field for Improving the Design of Smartphone Launchers

International Journal of Mobile Human Computer Interaction (IJMHCI) (Journal) , 2014

#277 A Pipelined Multi-core MIPS Machine -- Hardware Implementation and Correctness Proof

, 2014

#276 Analysis of the Current State in Website Certificate Validation

Security and Communication Networks (Journal) , 2014

#275 Automated Fixing of Programs with Contracts

IEEE Transactions on Software Engineering (Journal) , 2014

#274 Automatic Compositional Synthesis of Distributed Systems

Proceedings of the 19th International Symposium on Formal Methods (FM'14) , 2014

#273 Automatismen in einem verteilten System: Das Beispiel Bitcoin

Logiken strukturbildender Prozesse: Automatismen , 2014

#272 Bitcoin im deutschen Vollstreckungsrecht

Multimedia und Recht (Journal) , 2014

#271 Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-party Setting

Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing , 2014

#270 Causal Termination of Multi-threaded Programs

Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014) , 2014

#269 Checking App Behavior Against App Descriptions

Proc. of the 36th International Conference on Software Engineering (ICSE 2014) , 2014

#268 CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin

Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014) , 2014

#267 Counting Models of Linear-Time Temporal Logic

8th International Conference on Language and Automata Theory and Applications (LATA 2014) , 2014

#266 Cross-checking oracles from intrinsic software redundancy

36th International Conference on Software Engineering, ICSE '14, Hyderabad, India - May 31 - June 07, 2014 , 2014

#265 Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen

Tagungsband des 17. Internationalen Rechtsinformatik Symposions , 2014

#264 Declarative Design and Enforcement for Secure Cloud Applications

PhD Thesis , 2014

#263 Detecting Unrealizable Specifications of Distributed Systems

Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14) , 2014

#262 Establishing user trust in Automated Teller Machine Integrity

IET Information Security (Journal) , 2014

#261 Exception Handling for Dynamic Information Flow Control

Companion Proceedings of the 36th International Conference on Software Engineering (Student Research Competition) , 2014

#260 Extrinsic Influence Factors in Software Reliability: A Study of 200,000 Windows Machines

Companion Proceedings of the 36th International Conference on Software Engineering , 2014

#259 Fast DQBF refutation

Theory and Applications of Satisfiability Testing (SAT 2014) , 2014

#258 Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis

Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security , 2014

#257 Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks

Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ’14) , 2014

#256 Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services

International Journal On Advances in Intelligent Systems (Journal) , 2014

#255 JTACO: Test Execution for Faster Bounded Verification

Proc. of the 8th International Conference on Tests and Proofs (TAP 2014) , 2014

#254 Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching

Proceedings of The 4th International Workshop on Adaptive Services for the Future Internet , 2014

#253 Mining Bug Data: A Practitioner’s Guide

Recommendation Systems in Software Engineering , 2014

#252 Monitoring Parametric Temporal Logic

Proceedings of the 15th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'14) , 2014

#251 On Tight Security Proofs for Schnorr Signatures

Proc. of the 20th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014) , 2014

#250 Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles

Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (Journal) , 2014

#249 Petri Games: Synthesis of Distributed Systems with Causal Memory

Proceedings of Fifth International Symposium on Games, Automata, Logics and Formal Verification (GandALF 2014) , 2014

#248 PIDGIN: Privacy-preserving Interest and Content Sharing in Opportunistic Networks

Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security , 2014

#247 Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract

Workshop on Usable and Efficient Secure Multiparty Computation -- Satellite Event of ESORICS , 2014

#246 Privacy-Preserving Digital Rights Management based on Attribute-based Encryption

Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security , 2014

#245 Privacy-Preserving Multiparty Digital Rights Management

PhD Thesis , 2014

#244 Privacy-Preserving Reputation Management

Procceedings of the 29th Symposium On Applied Computing , 2014

#243 ProCrawl: Mining Test Models from Multi-user Web Applications

Proc. International Symposium on Software Testing and Analysis (ISSTA 2014) , 2014

#242 Reconstructing AES Key Schedules from Decayed Memory with FPGAs

Proceedings of the 22nd IEEE International Symposium on Field-Programmable Custom Computing Machines May 11-13, Boston, Massachusetts , 2014

#241 Information Flow Control in WebKit's JavaScript Bytecode

, 2014

#240 Search-based Security Testing of Web Applications

Proceedings of the 7th International Workshop on Search-Based Software Testing , 2014

#239 Security and Privacy Challenges in On-The-Fly Computing

Tagungsband der 4. Konferenz Software-Technologien und -Prozesse (STeP 2014) , 2014

#238 Temporal Logics for Hyperproperties

Proc. of the 3rd Conference on Principles of Security and Trust (POST 2014) , 2014

#237 Test Generation Across Multiple Layers

Proceedings of the 7th International Workshop on Search-Based Software Testing , 2014

#236 The German electronic identity card: Lessons learned

Advances in Electronic Government, Digital Divide, and Regional Development , 2014

#235 The Legal Classification of Identity-Based Signatures

Computer Law and Security Review (Journal) , 2014

#234 Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services

Proceedings of The Sixth International Conferences on Advanced Service Computing , 2014

#233 WebMate: Web Application Test Generation in the Real World

Proc. of the Seventh International IEEE Conference on Software Testing, Verification and Validation Workshops(ICSTW 2014) , 2014

#232 Zero-Communication Seed Establishment for Anti-Jamming Techniques

Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT) , 2014

#231 F-ing modules

J. Funct. Program. (Journal) , 2014

#230 GPS: navigating weak memory with ghosts, protocols, and separation

Proc. of the 2014 ACM SIGPLAN International Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2014) , 2014

#229 Optimizing Planning Domains by Automatic Action Schema Splitting

Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014) , 2014

#228 Improved Features for Runtime Prediction of Domain-Independent Planners

Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014) , 2014

#227 Learning Pruning Rules for Heuristic Search Planning

Proc. of the 21st European Conference on Artificial Intelligence (ECAI 2014) , 2014

#226 Learning using privileged information: SV M+ and weighted SVM

Neural Networks (Journal) , 2014

#225 Deep Twitter diving: exploring topical groups in microblogs at scale

Proc. of the Computer Supported Cooperative Work (CSCW '14) , 2014

#224 Quantifying Information Overload in Social Media and Its Impact on Social Contagions

Proceedings of the Eighth International Conference on Weblogs and Social Media, ICWSM 2014, Ann Arbor, Michigan, USA, June 1-4, 2014. , 2014

#223 Inferring user interests in the Twitter social network

Proc. of the 8th ACM Conference on Recommender Systems (RecSys '14) , 2014

#222 Architecture-parametric timing analysis

20th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2014, Berlin, Germany, April 15-17, 2014 , 2014

#221 Leveraging semantic signatures for bug search in binary programs

Proc. of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014

#220 On the (In)Security of Mobile Two-Factor Authentication

Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers , 2014

#219 Linux's Processor Affinity API, Refined: Shifting Real-Time Tasks Towards Higher Schedulability

Proceedings of the IEEE 35th Real-Time Systems Symposium (RTSS'14) , 2014

#218 On the Complexity of Worst-Case Blocking Analysis of Nested Critical Sections

Proceedings of the IEEE 35th Real-Time Systems Symposium (RTSS'14) , 2014

#217 A Synchronous IPC Protocol for Predictable Access to Shared Resources in Mixed-Criticality Systems

Proceedings of the IEEE 35th Real-Time Systems Symposium (RTSS'14) , 2014

#216 Fast on Average, Predictable in the Worst Case: Exploring Real-Time Futexes in LITMUSRT

Proceedings of the IEEE 35th Real-Time Systems Symposium (RTSS'14) , 2014

#215 SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration

Proc. of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI '14) , 2014

#214 The FMLP+: An Asymptotically Optimal Real-Time Locking Protocol for Suspension-Aware Analysis

26th Euromicro Conference on Real-Time Systems, ECRTS 2014, Madrid, Spain, July 8-11, 2014 , 2014

#213 Scaling global scheduling with message passing

20th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2014) , 2014

#212 Brave New World: Privacy Risks for Mobile Users

Mobile Computing and Communications Review (Journal) , 2014

#211 Brave new world: privacy risks for mobile users

Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September 11, 2014 , 2014

#210 Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations

Journal of Computer Security (Journal) , 2014

#209 Checking probabilistic noninterference using JOANA

it - Information Technology (Journal) , 2014

#208 Knowledge Bases in the Age of Big Data Analytics

PVLDB (Journal) , 2014

#207 AIDA-Social: Entity Linking on the Social Stream

Proc. of the 7th International Workshop on Exploiting Semantic Annotations in Information Retrieval (ESAIR 2014) , 2014

#206 A Fresh Look on Knowledge Bases: Distilling Named Events from News

Proc. of the 23rd ACM International Conference on Information and Knowledge Management (CIKM'14) , 2014

#205 AESTHETICS: Analytics with Strings, Things, and Cats

Proc. of the 23rd ACM International Conference on Information and Knowledge Management (CIKM'14) , 2014

#204 Werdy: Recognition and Disambiguation of Verbs and Verb Phrases with Syntactic and Semantic Pruning

Proc. of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP 2014) , 2014

#203 WebChild: harvesting and organizing commonsense knowledge from the web

Proc. of the 7th ACM International Conference on Web Search and Data Mining (WSDM'14) , 2014

Year: 2013 (Total: 85)

ACM Conference on Computer and Communications Security [CCS]

#202 Verifiable Delegation of Computation on Outsourced Data

Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11) , 2013

#201 Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties

Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13) , 2013

#200 Poster: Identity-Based Steganography and Its Applications to Censorship Resistance

Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS '13) , 2013

Usenix Security Symposium [Usenix]

#199 CacheAudit: A Tool for the Static Analysis of Cache Side Channels

Proceedings of the 22nd USENIX Security Symposium (USENIX '13) , 2013

Network and Distributed System Security Symposium [NDSS]

#198 Preventing Side-Channel Leaks in Web Traffic: A Formal Approach

Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13) , 2013

European Cryptology Conference [Eurocrypt]

#197 Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures

Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT '13) , 2013

IEEE Computer Security Foundations Symposium [CSF]

#196 AnoA: A Framework For Analyzing Anonymous Communication Protocols

Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13) , 2013

#195 Differential Privacy by Typing in Security Protocols

Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13) , 2013

#194 Security and Privacy by Declarative Design

Proceedings of the IEEE 26th Computer Security Foundations Symposium (CSF '16) , 2013

Others

#193 Using Mobile Device Communication to Strengthen e-Voting Protocols

Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society - WPES 2013 , 2013

#192 AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications

8th International Workshop on Data Privacy Management (DPM'13) , 2013

#191 Differentially Private Smart Metering with Battery Recharging

Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013) , 2013

#190 A Privacy-aware Shopping Scenario

Proceedings of the Companion Publication of the 2013 International Conference on Intelligent User Interfaces. International Conference on Intelligent User Interfaces (IUI-13), March 19-22, Santa Monic , 2013

#189 Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification

Principles of Security and Trust 2013 , 2013

#188 A Comparison of Knives for Bread Slicing

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2013

#187 A Fully Preemptive Multiprocessor Semaphore Protocol for Latency-Sensitive Real-Time Applications

25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013 , 2013

#186 A Framework for the Verification of Certifying Computations

Journal of Automated Reasoning (Journal) , 2013

#185 Asynchronous Computational VSS with Reduced Communication Complexity

Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013) , 2013

#184 Approximate Transient Analysis of Queuing Networks by Quasi Product Forms

Analytical and Stochastic Modelling Techniques and Applications - 20th International Conference, ASMTA 2013, Ghent, Belgium, July 8-10, 2013. Proceedings , 2013

#183 AppGuard - Enforcing User Requirements on Android Apps

19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , 2013

#182 An asymptotically optimal real-time locking protocol for clustered scheduling under suspension-aware analysis

SIGBED Review (Journal) , 2013

#181 Advances in Mobile Security

8th Future Security - Security Research Conference , 2013

#180 A Uniformization Theorem for Nested Word to Word Transductions

Proc. of the 18th International Conference on Implementation and Application of Automata (CIAA 2013) , 2013

#179 A Theory of Partitioned Global Address Spaces

Proc. of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2013) , 2013

#178 A Theory of Name Boundedness

Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013) , 2013

#177 A study on icon arrangement by smartphone users

Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI) , 2013

#176 A Programming Language Approach to Fault Tolerance for Fork-Join Parallelism

Seventh International Symposium on Theoretical Aspects of Software Engineering, TASE 2013, 1-3 July 2013, Birmingham, UK , 2013

#175 Bisimilar finite abstractions of stochastic control systems

Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013) , 2013

#174 Compositional Equivalence Checking for Models and Code of Control Systems

Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013) , 2013

#173 CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency

Journal of the ACM (Journal) , 2013

#172 Discovering semantic relations from the web and organizing them with PATTY

ACM SIGMOD Record (Journal) , 2013

#171 Detecting Deadlock in Programs with Data-Centric Synchronization

ICSE '13: Proceedings of the 35th International Conference on Software Engineering , 2013

#170 Dependent Type Theory for Verification of Information Flow and Access Control Policies

ACM Transactions on Programming Languages and Systems (Journal) , 2013

#169 Flexible Access Control for JavaScript

Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages and applications , 2013

#168 Fine-grained Semantic Typing of Emerging Entities

Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51) , 2013

#167 Expand, Enlarge, and Check for Branching Vector Addition Systems

Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013) , 2013

#166 Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge

Journal of Graph Theory (Journal) , 2013

#165 Entwicklung sicherer Software durch Security by Design

SIT-TR-2013-01 , 2013

#164 Efficient partitioning of sporadic real-time tasks with shared resources and spin locks

8th IEEE International Symposium on Industrial Embedded Systems, SIES 2013, Porto, Portugal, June 19-21, 2013 , 2013

#163 Efficient Algorithms for Control Closures

1st International Workshop on Interference and Dependence , 2013

#162 Incremental Inductive Coverability

Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013) , 2013

#161 Improved analysis and evaluation of real-time semaphore protocols for P-FP scheduling

19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013 , 2013

#160 HYENA-live: Fine-Grained Online Entity Type Classification from Natural-language Text

Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51) , 2013

#159 Gem-based Entity-Knowledge Maintenance

Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13) , 2013

#158 Multiprocessor Feasibility Analysis of Recurrent Task Systems with Specified Processor Affinities

Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013 , 2013

#157 MrCrypt: Static Analysis for Secure Cloud Computations

Proc. of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2013) , 2013

#156 Model Checking Database Applications

Proc. of the 20th International Symposium on Static Analysis (SAS 2013) , 2013

#155 Measurement-based modeling of the cache replacement policy

19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013 , 2013

#154 Logical Foundations of Secure Resource Management

Proc. of the 2nd Conference on Principles of Security and Trust (POST 2013) , 2013

#153 Learning People Detectors for Tracking in Crowded Scenes

IEEE International Conference on Computer Vision (ICCV) , 2013

#152 Privacy-Preserving Accountable Computation

Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS) , 2013

#151 Precise timing analysis for direct-mapped caches

The 50th Annual Design Automation Conference 2013, DAC '13, Austin, TX, USA, May 29 - June 07, 2013 , 2013

#150 Peer-assisted Content Distribution in Akamai Netsession

Proc. of the 2013 Internet Measurement Conference (IMC'13) , 2013

#149 Parameterized verification of asynchronous shared-memory systems

Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013) , 2013

#148 On-the-fly verification and optimization of DTA-properties for large Markov chains

Formal Methods in System Design (Journal) , 2013

#147 On Spin Locks in AUTOSAR: Blocking Analysis of FIFO, Unordered, and Priority-Ordered Spin Locks

Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013 , 2013

#146 On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream

Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13) , 2013

#145 Synthesis of fixed-point programs

Proc. of the International Conference on Embedded Software (EMSOFT 2013) , 2013

#144 Supervisor Synthesis for Controller Upgrades

Proc. of the Conference on Design, Automation and Test in Europe (DATE 2013) , 2013

#143 Strong Appearance and Expressive Spatial Models for Human Pose Estimation

IEEE International Conference on Computer Vision (ICCV) , 2013

#142 Static Provenance Verification for Message Passing Programs

Proc. of the 20th International Symposium on Static Analysis (SAS 2013) , 2013

#141 SplitX: high-performance private analytics

Proc. of the ACM SIGCOMM 2013 Conference , 2013

#140 Schedulability Analysis of the Linux Push and Pull Scheduler with Arbitrary Processor Affinities

25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013 , 2013

#139 Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations

Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo (Journal) , 2013

#138 Towards Practical Communication in Byzantine-Resistant DHTs

Networking, IEEE/ACM Transactions on (Journal) , 2013

#137 Towards Efficient Traffic-analysis Resistant Anonymity Networks

Proc. of the ACM SIGCOMM 2013 Conference , 2013

#136 The OMLP family of optimal multiprocessor real-time locking protocols

Design Automation for Embedded Systems (Journal) , 2013

#135 Where Next in Object Recognition and how much Supervision Do We Need?

Advanced Topics in Computer Vision , 2013

#134 What's in the apps for context?: extending a sensor for studying app usage to informing context-awareness

Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. International Conference on Ubiquitous Computing (Ubicomp-13), September 8-12, Zurich, Switzerland , 2013

#133 Callee-site Rewriting of Sealed System Libraries

International Symposium on Engineering Secure Software and Systems (ESSoS'13) , 2013

#132 Client-controlled Cryptography-as-a-Service in the Cloud

11th International Conference on Applied Cryptography and Network Security (ACNS'13) , 2013

#131 Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM

8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013) , 2013

#130 Constrained fractional set programs and their application in local clustering and community detection

Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 16-21 June 2013 , 2013

#129 Elephant, Do Not Forget Everything! Efficient Processing of Growing Datasets

Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD) , 2013

#128 Formal Verification of Cryptographic Security Proofs

PhD Thesis , 2013

#127 Mosquito: Another One Bites the Data Upload STream

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2013

#126 Sambamba: Runtime Adaptive Parallel Execution

Proceedings of the 3rd International Workshop on Adaptive Self-Tuning Computing Systems , 2013

#125 The Uncracked Pieces in Database Cracking

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2013

#124 Towards realistic team formation in social networks based on densest subgraphs

22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013 , 2013

#123 Towards Zero-Overhead Static and Adaptive Indexing in Hadoop

VLDB Journal (Journal) , 2013

#122 WWHow! Freeing Data Storage from Cages

Proceedings of the 6th Biennial Conference on Innovative Data Systems Research (CIDR) , 2013

#121 Identity-Based Steganography and Its Applications to Censorship Resistance

6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013) , 2013

#120 Idea: Callee-Site Rewriting of Sealed System Libraries

International Symposium on Engineering Secure Software and Systems (ESSoS'13) , 2013

#119 Mtac: a monad for typed tactic programming in Coq

Proc of the 18th ACM SIGPLAN International Conference on Functional Programming (ICFP '13) , 2013

#118 How to make ad hoc proof automation less ad hoc

J. Funct. Program. (Journal) , 2013

Year: 2012 (Total: 69)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#117 ObliviAd: Provably Secure and Practical Online Behavioral Advertising

Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012) , 2012

ACM Conference on Computer and Communications Security [CCS]

#116 Computational Soundness without Protocol Restrictions

Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12) , 2012

#115 Non-tracking Web Analytics

Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12) , 2012

Usenix Security Symposium [Usenix]

#114 Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services

Proceedings of the 21st Usenix Security Symposium (USENIX '12) , 2012

Network and Distributed System Security Symposium [NDSS]

#113 Automated Synthesis of Secure Distributed Applications

Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS '12) , 2012

#112 MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12) , 2012

IEEE Computer Security Foundations Symposium [CSF]

#111 Verified Security of Merkle-Damgård

Proceedings of the 25th IEEE Computer Security Foundations Symposium - CSF 2012 , 2012

#110 Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction

Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF '12) , 2012

#109 Provably Secure and Practical Onion Routing

Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF) , 2012

Others

#108 A comparative analysis of decentralized power grid stabilization strategies

Proceedings of the Winter Simulation Conference , 2012

#107 Ace: An Efficient Key-Exchange Protocol for Onion Routing

Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES) , 2012

#106 Brief announcement: distributed cryptography using trinc

ACM Symposium on Principles of Distributed Computing 2012 , 2012

#105 Dependability Results for Power Grids with Decentralized Stabilization Strategies

AVACS Technical Report (Journal) , 2012

#104 A dynamic program analysis to find floating-point accuracy problems

ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '12, Beijing, China - June 11 - 16, 2012 , 2012

#103 A data-centric approach to synchronization

ACM Trans. Program. Lang. Syst. (Journal) , 2012

#102 Automatically Generating Test Cases for Specification Mining

IEEE Transactions on Software Engineering (Journal) , 2012

#101 Articulated People Detection and Pose Estimation: Reshaping the Future

Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , 2012

#100 Approximately Bisimilar Symbolic Models for Digital Control Systems

Proc. of the 24th International Conference on Computer Aided Verification (CAV 2012) , 2012

#99 An O(n+m) Certifying Triconnnectivity Algorithm for Hamiltonian Graphs

Algorithmica (Journal) , 2012

#98 An Empirical Evaluation of the Influence of the Load-Store Unit on WCET Analysis

12th International Workshop on Worst-Case Execution Time Analysis, WCET 2012, July 10, 2012, Pisa, Italy , 2012

#97 Algorithmic Verification of Asynchronous Programs

ACM Transactions on Programming Languages and Systems (Journal) , 2012

#96 Adding query privacy to robust DHTs

Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012) , 2012

#95 Accountability and Trust in Cooperative Information Systems

Proc. of the 28th IEEE International Conference on Data Engineering (ICDE'12) , 2012

#94 A Weakly Supervised Model for Sentence-Level Semantic Orientation Analysis with Multiple Experts

Proc. of the Joint Conference on Empirical Methods for Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL'12) , 2012

#93 A Perfect Model for Bounded Verification

Proc. of the 27th Annual IEEE/ACM Symposium on Logic in Computer Science (LICS 2012) , 2012

#92 Big Data Methods for Computational Linguistics

IEEE Data Engineering Bulletin (Journal) , 2012

#91 Countermodels from Sequent Calculi in Multi-Modal Logics

Proc. of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS 2012) , 2012

#90 CLSE: Closed-Loop Symbolic Execution

Proc. of the 4th International Symposium on NASA Formal Methods (NFM 2012) , 2012

#89 Discovering and Exploring Relations on the Web

Proc. of the Very Large Database Endowment (PVLDB) (Journal) , 2012

#88 Diffusion-Based Image Compression in Steganography

Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012 , 2012

#87 Defending Against Large-scale Crawls in Online Social Networks

, 2012

#86 Exploring the design space of social network-based Sybil defense

Proc. of the 4th International Conference on Communication Systems and Networks (COMSNETS2012) , 2012

#85 Equivalence of Games with Probabilistic Uncertainty and Partial-Observation Games

Proc. of the 10th International Symposium on Automated Technology for Verification and Analysis (ATVA 2012) , 2012

#84 Engage: A Deployment Management System

Proc. of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2012) , 2012

#83 Efficient May Happen in Parallel Analysis for Async-finish Parallelism

Proc. of the 19th International Symposium on Static Analysis (SAS 2012) , 2012

#82 Input-Output stability for discrete systems

Proc. of the International Conference on Embedded Software (EMSOFT 2012) , 2012

#81 History-Free Sequential Aggregate Signatures

Proc. 8th International Conference on Security and Cryptography for Networks (SCN 2012) , 2012

#80 Harmony and dissonance: organizing the people's voices on political controversies

Proc. of the 5th ACM International Conference on Web Search and Data Mining (WSDM'12) , 2012

#79 Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE

Sicherheit 2012 -- Beiträge der 6-ten Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e. V. , 2012

#78 Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs

RV'11: Proc. 2nd International Conference on Runtime Verification , 2012

#77 LINDA: distributed web-of-data-scale entity matching

Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) , 2012

#76 Language-Theoretic Abstraction Refinement

Proc. of the 15th International Conference on Fundamental Approaches to Software Engineering (FASE 2012) , 2012

#75 Labeled Goal-Directed Search in Access Control Logic

Proc. of the 8th International Workshop on Security and Trust Management (STM 2012) , 2012

#74 KORE: keyphrase overlap relatedness for entity disambiguation

Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) , 2012

#73 Predicting emerging social conventions in online social networks

Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) , 2012

#72 PolariCQ: polarity classification of political quotations

Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) , 2012

#71 PATTY: A Taxonomy of Relational Patterns with Semantic Types

Proc. Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL 2012) , 2012

#70 OpinioNetIt: A Structured and Faceted Knowledge-base of Opinions

Proc. of the 12th IEEE International Conference on Data Mining (ICDM'12) , 2012

#69 On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols

Proc. 4th NASA Formal Methods Symposium (NFM 2012) , 2012

#68 On the (limited) power of non-equivocation

Proc. of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2012) , 2012

#67 Reliable Client Accounting for P2P-infrastructure Hybrids

Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012) , 2012

#66 Synthesis of minimal-error control software

Proc. of the International Conference on Embedded Software (EMSOFT 2012) , 2012

#65 Superficially substructural types

ACM SIGPLAN International Conference on Functional Programming (ICFP 2012) , 2012

#64 Stateful authorization logic - Proof theory and a case study

Journal of Computer Security (Journal) , 2012

#63 Scalable Testing of File System Checkers

Proc. of the 7th ACM European Conference on Computer Systems (EuroSys 2012) , 2012

#62 Sambamba: A Runtime System for Online Adaptive Parallelization

Proc. of the 21st International Conference Compiler Construction (CC 2012) , 2012

#61 SAFE Extensibility of Data-Driven Web Applications

WWW~'12: Proceedings of the 21st International World Wide Web Conference , 2012

#60 Understanding and combating link farming in the twitter social network

Proc. of the 21st International Conference on World Wide Web (WWW 2012) , 2012

#59 Trusted Storage

Presented at USENIX FAST'12 WiP , 2012

#58 Trigger memoization in self-triggered control

Proc. of the International Conference on Embedded Software (EMSOFT 2012) , 2012

#57 Towards Statistical Queries over Distributed Private User Data

Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012) , 2012

#56 Three-valued abstraction for probabilistic systems

Journal of Logic and Algebraic Programming (Journal) , 2012

#55 Affine Refinement Types for Authentication and Authorization

Proc. 6th International Symposium on Trustworthy Global Computing (TGC 2012) , 2012

#54 XIFER: A Software Diversity Tool Against Code-Reuse Attacks

4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3) , 2012

#53 Efficient Big Data Processing in Hadoop MapReduce

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2012

#52 Only Aggressive Elephants are Fast Elephants

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2012

#51 Rational Cryptography

PhD Thesis , 2012

#50 Bitcoin: Eine erste Einordnung

Datenschutz und Datensicherheit (Journal) , 2012

#49 Do not Snoop my Habits: Preserving Privacy in the Smart Grid

IEEE Communications Magazine, Special Issue on Communication Protocols and Algorithms for the Smart Grid (Journal) , 2012

Year: 2011 (Total: 48)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#48 Verification of Information Flow and Access Control Policies with Dependent Types

Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P '11) , 2011

#47 On Adversary Models and Compositional Security

IEEE Security & Privacy (Journal) , 2011

ACM Conference on Computer and Communications Security [CCS]

#46 AmazonIA: When Elasticity Snaps Back

Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) , 2011

#45 Auctions in do-not-track compliant internet advertising

Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) , 2011

#44 Policy auditing over incomplete logs: theory, implementation and applications

Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) , 2011

#43 Poster: Control-flow Integrity for Smartphones

18th ACM conference on Computer and communications security (ACM CCS 2012) , 2011

Network and Distributed System Security Symposium [NDSS]

#42 A Security API for Distributed Social Networks

Proceedings of the Network and Distributed System Security Symposium (NDSS '11) , 2011

IEEE Computer Security Foundations Symposium [CSF]

#41 Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols

Proceedings of the 24th IEEE Computer Security Foundations Symposium , 2011

Others

#40 Twin Clouds: An Architecture for Secure Cloud Computing

Workshop on Cryptography and Security in Clouds (CSC) , 2011

#39 Automatically Verifying Typing Constraints for a Data Processing Language

Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011) , 2011

#38 Analyzing facebook privacy settings: user expectations vs. reality

Proc. of the 11th ACM SIGCOMM Conference on Internet Measurement (IMC 2011) , 2011

#37 A Template for Predictability Definitions with Supporting Evidence

Bringing Theory to Practice: Predictability and Performance in Embedded Systems, DATE Workshop PPES 2011, March 18, 2011, Grenoble, France. , 2011

#36 A Lyapunov approach in incremental stability

50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011) , 2011

#35 A Local Cross-Site Scripting Attack against Android Phones

, 2011

#34 Bug-Assist: Assisting Fault Localization in ANSI-C Programs

Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011) , 2011

#33 Branch target buffers: WCET analysis framework and timing predictability

Journal of Systems Architecture - Embedded Systems Design (Journal) , 2011

#32 Cryptographically sound security proofs for basic and public-key Kerberos

International Journal of Information Security (Journal) , 2011

#31 Cause Clue Clauses: Error Localization Using Maximum Satisfiability

Proc. of the 32rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2011) , 2011

#30 CAMA: A Predictable Cache-Aware Memory Allocator

23rd Euromicro Conference on Real-Time Systems, ECRTS 2011, Porto, Portugal, 5-8 July, 2011 , 2011

#29 Designing next-generation real-time streaming systems

Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2011, part of ESWeek '11 Seventh Embedded Systems Week, Taipei, Taiwan, 9-14 October, 201 , 2011

#28 Formalisms for Specifying Markovian Population Models

International Journal of Foundations of Computer Science (Journal) , 2011

#27 Efficient calculation of rare event probabilities in Markovian queueing networks

5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, VALUETOOLS '11, Paris, France, May 16-20, 2011 , 2011

#26 HMC: Verifying Functional Programs Using Abstract Interpreters

Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011) , 2011

#25 G2C: Cryptographic Protocols from Goal-Driven Specifications

TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011 , 2011

#24 Minimum Attention Controller Synthesis for Omega-regular Objectives

Proceedings of the 9th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'11) , 2011

#23 Non-Uniform Distributions in Quantitative Information-Flow

Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) , 2011

#22 PRET DRAM controller: bank privatization for predictability and temporal isolation

Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2011, part of ESWeek '11 Seventh Embedded Systems Week, Taipei, Taiwan, 9-14 October, 201 , 2011

#21 Pessoa 2.0: A Controller Synthesis Tool for Cyber-physical Systems

Proc. of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011) , 2011

#20 Performance-aware Scheduler Synthesis for Control Systems

Proc. of the International Conference on Embedded Software (EMSOFT 2011) , 2011

#19 Robust Discrete Synthesis Against Unspecified Disturbances

Proc. of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011) , 2011

#18 Relaxed-memory concurrency and verified compilation

Proceedings of the 38th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'11) , 2011

#17 Survey: Certifying Algorithms

Computer Science Review (Journal) , 2011

#16 SHAVE: stochastic hybrid analysis of markov population models

Proceedings of the 14th ACM International Conference on Hybrid Systems: Computation and Control, HSCC 2011, Chicago, IL, USA, April 12-14, 2011 , 2011

#15 Securing social networks

Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011 , 2011

#14 Union and Intersection Types for Secure Protocol Implementations

Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers , 2011

#13 Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms

Proc. of the 7th International Conference Information Systems Security (ICISS 2011) , 2011

#12 Temporal isolation on multiprocessing architectures

Proceedings of the 48th Design Automation Conference, DAC 2011, San Diego, California, USA, June 5-10, 2011 , 2011

#11 Weakly Supervised Recognition of Daily Life Activities with Wearable Sensors

IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI) (Journal) , 2011

#10 Verification of Certifying Computations

Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011) , 2011

#9 Twin Clouds: Secure Cloud Computing with Low Latency

Communications and Multimedia Security Conference (CMS'11) , 2011

#8 CFI Goes Mobile: Control-Flow Integrity for Smartphones

International Workshop on Trustworthy Embedded Devices (TrustED) (Journal) , 2011

#7 RAFT at work: speeding-up mapreduce applications under task and node failures

Proceedings of the ACM SIGMOD International Conference on Management of data , 2011

#6 RAFTing MapReduce: Fast recovery on the RAFT

Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE) , 2011

#5 Relax and Let the Database Do the Partitioning Online

Enabling Real-Time Business Intelligence (BIRTE) , 2011

#4 Towards a One Size Fits All Database Architecture

Proceedings of the 4th Biennial Conference on Innovative Data Systems Research (CIDR) , 2011

#3 Trojan data layouts: right shoes for a running elephant

Proceedings of the 2nd ACM Symposium on Cloud Computing (SoCC) , 2011

#2 Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis

PhD Thesis , 2011

#1 Zum Stand der Technik in der WLAN-Sicherheit

Computer und Recht (Journal) , 2011