Publications

Publications


Year: 2017 (Total: 24)

Network and Distributed System Security Symposium [NDSS]

#497 Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#496 Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#495 P2P Mixing and Unlinkable Bitcoin Transactions

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#494 SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#493 A Broad View of the Ecosystem of Socially Engineered Exploit Documents

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

IEEE European Symposium on Security and Privacy [Euro S&P]

#492 LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#491 ARTist: The Android Runtime Instrumentation and Security Toolkit

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#490 Efficient and Flexible Discovery of PHP Application Vulnerabilities

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#489 A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

Others

#488 Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals

Proc. of the 26rd International Conference on World Wide Web (WWW 2017) , 2017

#487 A promising semantics for relaxed-memory concurrency

Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17), Paris, France, January 18-20, 2017 , 2017

#486 Thread modularity at many levels: a pearl in compositional verification

Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17), Paris, France, January 18-20, 2017 , 2017

#485 Security Analysis of Cache Replacement Policies

Proceedings of the 6th International Conference on Principles of Security and Trust , 2017

#484 Training Fair Classifiers

AISTATS '17: 20th International Conference on Artificial Intelligence and Statistics (Journal) , 2017

#483 Uncovering the Spatiotemporal Patterns of Collective Social Activity

2017 SIAM International Conference on Data Mining , 2017

#482 Distilling Information Reliability and Source Trustworthiness from Digital Traces

26th International World Wide Web Conference (WWW'17) , 2017

#481 Fairness Beyond Disparate Treatment & Disparate Impact: Learning Classification without Disparate Mistreatment

26th International World Wide Web Conference (WWW'17) , 2017

#480 RedQueen: An Online Algorithm for Smart Broadcasting in Social Networks

WSDM '17: Proceedings of the 10th ACM International Conference on Web Search and Data Mining , 2017

#479 A privacy-preserving reputation system with user rewards

Journal of Network and Computer Applications (Journal) , 2017

#478 "My friend Cayla" - eine nach § 90 TKG verbotene Sendeanlage?

JurPC (Journal) , 2017

#477 Datenschutz für Minderjährige nach der Europäischen Datenschutz-Grundverordnung (DSGVO) vom 27. April 2016

Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

#476 Richterliche Unabhängigkeit und Bring Your Own Device (BYOD) – Weg in die Zukunft oder unvertretbares Sicherheitsrisiko?

Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

#475 Mit Schirm, Charme und Kamera – Verbotene Sendeanlagen i.S.d. § 90 TKG

Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

#474 Mail vom Rechtsanwalt? Herausforderungen sicherer Mandantenkommunikation

Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

Year: 2016 (Total: 87)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#473 SoK: Lessons Learned From Android Security Research For Appified Software Platforms

37th IEEE Symposium on Security and Privacy (S&P '16) , 2016

#472 You Get Where You're Looking For: The Impact Of Information Sources On Code Security

37th IEEE Symposium on Security and Privacy (S&P '16) , 2016

ACM Conference on Computer and Communications Security [CCS]

#471 Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ) , 2016

#470 Computational Soundness of Dalvik Bytecode

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16) , 2016

#469 Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

#468 Membership Privacy in MicroRNA-based Studies

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

#467 Reliable Third-Party Library Detection in Android and its Security Applications

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

Usenix Security Symposium [Usenix]

#466 On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#465 Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#464 What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#463 An Empirical Study of Textual Key-Fingerprint Representations

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#462 Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#461 T3: Comprehensive policy compliance in data retrieval systems

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#460 SGX-Enabled Oblivious Machine Learning

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#459 Thoth: Comprehensive Policy Compliance in Data Retrieval Systems

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

Network and Distributed System Security Symposium [NDSS]

#458 How to Make ASLR Win the Clone Wars: Runtime Re-Randomization

Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16) , 2016

International Cryptology Conference [Crypto]

#457 Two Message Oblivious Evaluation of Cryptographic Functionalities

Proceedings of the 36th International Cryptology Conference (CRYPTO '16) , 2016

#456 On Statistically Secure Obfuscation with Approximate Correctness

Proceedings of the 36th International Cryptology Conference (CRYPTO '16) , 2016

IEEE European Symposium on Security and Privacy [Euro S&P]

#455 HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving

Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro S&P '16) , 2016

IEEE Computer Security Foundations Symposium [CSF]

#454 On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.

Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16) , 2016

#453 Micro-Policies for Web Session Security

Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16) , 2016

Others

#452 Adversarial Perturbations Against Deep Neural Networks for Malware Classification

The Computing Research Repository (CoRR) (Journal) , 2016

#451 Simulating the Large-Scale Erosion of Genomic Privacy Over Time

Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16) , 2016

#450 Light-Weight Contexts: An OS Abstraction for Safety and Performance

Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI '16) , 2016

#449 Profile Linkability despite Anonymity in Social Media Systems

Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES) , 2016

#448 ESPRESSO: Explaining Relationships between Entity Sets

Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16) , 2016

#447 Leading By (Insecure) Example: How Internet Resources Might be Helping You Develop Faster But Less Securely

IEEE Security & Privacy (Journal) , 2016

#446 Software verstehen, zerstören, schützen mit automatischen Software-Modellen

46. Jahrestagung der Gesellschaft fuer Informatik (Informatik 2016) , 2016

#445 Ten Years of Knowledge Harvesting: Lessons and Challenges

IEEE Data Engineering Bulletin (Journal) , 2016

#444 On the Feasibility of TTL-based Filtering for DRDoS Mitigation

RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses , 2016

#443 SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion

19th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID '16) , 2016

#442 A Survey on Routing in Anonymous Communication Protocols

The Computing Research Repository (CoRR) (Journal) , 2016

#441 Causally Consistent Dynamic Slicing

Proceedings of the 27th International Conference on Concurrency Theory (CONCUR '16) , 2016

#440 Automatisches Sicherheitstesten

Datenschutz und Datensicherheit (DuD) (Journal) , 2016

#439 Smart-Home-Systeme in Zeiten digitaler Kriminalität

Datenschutz und Datensicherheit – DuD (Journal) , 2016

#438 R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities

Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval (SIGIR '16) , 2016

#437 KOGNAC: Efficient Encoding of Large Knowledge Graphs

Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI 2016) , 2016

#436 Mining Apps for Anomalies

, 2016

#435 VatiCAN - Vetted, Authenticated CAN Bus

Conference on Cryptographic Hardware and Embedded Systems (CHES) (Journal) , 2016

#434 Kizzle: A Signature Compiler for Detecting Exploit Kits

The 46th Annual IEEE/IFIP Conference on Dependable Systems and Networks , 2016

#433 Privacy Capsules: Preventing Information Leaks by Mobile Apps

, 2016

#432 Demo: I-Pic: A Platform for Privacy-Compliant Image Capture

Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16) , 2016

#431 Mining Sandboxes

Proceedings of the 38th International Conference on Software Engineering , 2016

#430 Detecting Hardware-Assisted Virtualization

Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings , 2016

#429 J-NERD: Joint Named Entity Recognition and Disambiguation with Rich Linguistic Features

Transactions of the Association for Computational Linguistics (TACL) (Journal) , 2016

#428 Boxify: Bringing Full-Fledged App Sandboxing to Stock Android

USENIX ;login: (Journal) , 2016

#427 R-Droid: Leveraging Android App Analysis with Static Slice Optimization

Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , 2016

#426 RamCrypt: Kernel-based Address Space Encryption for User-mode Processes

ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS) , 2016

#425 DroidMate: a robust and extensible test generator for Android

Proceedings of the International Conference on Mobile Software Engineering and Systems (MOBILESoft '16) , 2016

#424 Instant Espresso: Interactive Analysis of Relationships in Knowledge Graphs

Proceedings of the 25th International Conference on World Wide Web (WWW '16), Companion Volume (Journal) , 2016

#423 Progress-Sensitive Security for SPARK

Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS '16) , 2016

#422 Implementation-level Analysis of the JavaScript Helios Voting Client

Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016 , 2016

#421 The Impact of Tangled Code Changes on Defect Prediction Models

The Impact of Tangled Code Changes on Defect Prediction Models , 2016

#420 Asymmetric Secure Multi-execution with Declassification

Proceedings of Principles of Security and Trust - 5th International Conference (POST '16) , 2016

#419 Thread-level Speculation with Kernel Support

Proceedings of the 25th International Conference on Compiler Construction , 2016

#418 Nearly Optimal Verifiable Data Streaming

Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I , 2016

#417 Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys

Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I , 2016

#416 Privacy Challenges in the Quantified Self Movement - An EU Perspective

Proceedings on Privacy Enhancing Technologies (Journal) , 2016

#415 Deducing User Presence from Inter-Message Intervals in Home Automation Systems

ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings , 2016

#414 Post mortem auctoris? Software zur Unterstützung von Bibliotheken bei der Auffüllung ihrer Bestände

Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016 , 2016

#413 Efficient smart metering based on homomorphic encryption

Computer Communications (Journal) , 2016

#412 Datenspeicherung in modernen Fahrzeugen – wem „gehören” die im Fahrzeug gespeicherten Daten?

juris – Die Monatszeitschrift (Journal) , 2016

#411 Datensicherheit (technisch-organisatorische Maßnahmen)

Cloud Computing: Rechtshandbuch , 2016

#410 Ersetzendes Scannen - Kernelement im Gesamtkonzept einer elektronischen Aktenführung?

Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016 , 2016

#409 Attributbasierte Verschlüsselung für die Justiz

Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016 , 2016

#408 sec-cs: Getting the Most out of Untrusted Cloud Storage

, 2016

#407 Uses and Abuses of Server-Side Requests

Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2016 , 2016

#406 Anonymous RAM

21st European Symposium on Research in Computer Security (ESORICS) , 2016

#405 From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy

Foundations of Security Analysis and Design VIII: FOSAD 2014/2015/2016 Tutorial Lectures , 2016

#404 Delegatable Functional Signatures

Public-Key Cryptography - PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I , 2016

#403 Security & Privacy Column

SIGLOG News (Journal) , 2016

#402 Estimating Diffusion Networks: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm

Journal of Machine Learning Research (JMLR) (Journal) , 2016

#401 Smart Mobility für das Saarland: Identifikation von Chancen und Handlungsempfehlungen für eine digital vernetzte Mobilität

, 2016

#400 Soziale Netzwerke im Fokus von Phishing-Angriffen - Eine Analyse aus technischer und rechtlicher Sicht -

JurPC (Journal) , 2016

#399 Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?

MultiMedia und Recht (Journal) , 2016

#398 Pokémon GO – Technische Innovation und Strafrecht im Konflikt

Informatik Spektrum (Journal) , 2016

#397 Confidentiality and Authenticity for Distributed Version Control Systems — A Mercurial Extension

Proceedings of the 41st IEEE Conference on Local Computer Networks (LCN 2016) , 2016

#396 EU-Datenschutz nach „Safe Harbor“

Wirtschaftsführer für junge Juristen (Journal) , 2016

#395 EncFS goes Multi-User: Adding Access Control to an Encrypted File System

Proceedings of the 2nd IEEE Workshop on Security and Privacy in the Cloud (in conjunction with IEEE CNS 2016) , 2016

#394 Sicherheit in der Gebäudeautomation

xia - intelligente architektur (Journal) , 2016

#393 Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit

JurPC (Journal) , 2016

#392 Modellierung in Recht und Informatik

Festschrift für Maximilian Herberger , 2016

#391 Sicherheit der Kommunikation zwischen Rechtsanwalt und Mandant

Neue Juristische Wochenschrift (Journal) , 2016

#390 Hardware-Keylogger: Die Tastatur in der Hand des Feindes

Datenschutz und Datensicherheit - DuD (Journal) , 2016

#389 Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016

Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (Journal) , 2016

#388 Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität

juris – Die Monatszeitschrift (Journal) , 2016

#387 Herausgabe der Personalakte eines Beamten an ein privates Unternehmen zum Zwecke der Aktendigitalisierung, Anmerkung zu OVG Schleswig, Beschl. v. 27.07.2016 – 2 MB 11/16

jurisPR-ITR (Journal) , 2016

Year: 2015 (Total: 58)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#386 Cross-Architecture Bug Search in Binary Executables

Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , 2015

#385 Privacy and Access Control for Outsourced Personal Records

Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , 2015

#384 ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data

Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , 2015

ACM Conference on Computer and Communications Security [CCS]

#383 Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits

Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS 2015) , 2015

#382 Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins

Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS '15) , 2015

#381 POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor

Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15) , 2015

#380 POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)

Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15) , 2015

#379 Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits

Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security , 2015

Usenix Security Symposium [Usenix]

#378 Boxify: Full-fledged App Sandboxing for Stock Android

Proceedings of the 24th USENIX Security Symposium (USENIX '15) , 2015

#377 In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services

Proceedings of the 24th USENIX Security Symposium (USENIX '15) , 2015

Network and Distributed System Security Symposium [NDSS]

#376 Privacy Preserving Payments in Credit Networks

Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS '15) , 2015

International Cryptology Conference [Crypto]

#375 Efficient Pseudorandom Functions via On-the-Fly Adaptation

Proceedings of the 35th International Cryptology Conference (CRYPTO '15) , 2015

IEEE Computer Security Foundations Symposium [CSF]

#374 Program Actions as Actual Causes: A Building Block for Accountability

Proceedings of the 28th Computer Security Foundations Symposium (CSF '15) , 2015

#373 Information Flow Control for Event Handling and the DOM in Web Browsers

Proceedings of the 28th Computer Security Foundations Symposium (CSF '15) , 2015

#372 A Logic of Programs with Interface-Confined Code

Proceedings of the 28th Computer Security Foundations Symposium (CSF '15) , 2015

#371 Symbolic Malleable Zero-knowledge Proofs

Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15) , 2015

Others

#370 Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks

Proceedings on Privacy Enhancing Technologies , 2015

#369 AmpPot: Monitoring and Defending Against Amplification DDoS Attacks

Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings , 2015

#368 Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems

ACM Computer Communication Review (Journal) , 2015

#367 Mining Android Apps for Anomalies

The Art and Science of Analyzing Software Data (Journal) , 2015

#366 Affine Refinement Types for Secure Distributed Programming

ACM Transactions on Programming Languages and Systems , 2015

#365 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

13th International Conference on Applied Cryptography and Network Security (ACNS) , 2015

#364 Foundations of Reconfigurable PUFs

Proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, New York, NY, USA, June 2-5, 2015 , 2015

#363 The elephant in the room: getting value from Big Data

Proceedings of the 18th International Workshop on Web and Databases (WebDB '15) , 2015

#362 Generalized Task Parallelism

ACM Transactions on Architecture and Code Optimization (TACO) (Journal) , 2015

#361 Knowledge Bases for Web Content Analytics

Proccedings of the 24th International Conference on World Wide Web (WWW '15), Companion Volume , 2015

#360 Mining Apps for Abnormal Usage of Sensitive Data

Proceedings of the 37th International Conference on Software Engineering , 2015

#359 Using Dynamic Symbolic Execution to Generate Inputs in Search-based GUI Testing

Proceedings of the Eighth International Workshop on Search-Based Software Testing , 2015

#358 Test Complement Exclusion: Guarantees from Dynamic Analysis

Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension , 2015

#357 Guardat: enforcing data policies at the storage layer

Proceedings of the 10th European Conference on Computer Systems (EuroSys '15) , 2015

#356 PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law

Proceedings of the 4th Conference on Principles of Security and Trust (POST) , 2015

#355 Refinement Types for Incremental Computational Complexity

Proceedings of the 24th European Symposium on Programming (ESOP '15) , 2015

#354 It's Not a Bug, It's a Feature: How Misclassification Impacts Bug Prediction

Software-Engineering & Management, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI) , 2015

#353 Learning How to Prevent Return-Oriented Programming Efficiently

Engineering Secure Software and Systems , 2015

#352 How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data

CoRR (Journal) , 2015

#351 Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext

ACM ASIACCS Security in Cloud Computing Workshop 2015 , 2015

#350 Data Lineage in Malicious Environments

IEEE Transactions on Dependable and Secure Computing (Journal) , 2015

#349 System M: A Program Logic for Code Sandboxing and Identification

The Computing Research Repository (CoRR) (Journal) , 2015

#348 Quantifying Information Flow in Cryptographic Systems

Mathematical Structures in Computer Science (Journal) , 2015

#347 Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades

Proceedings of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS) , 2015

#346 Achieving Optimal Utility for Distributed Differential Privacy Using SMPC

Applications of Secure Multiparty Computation , 2015

#345 Type-Based Verification of Electronic Voting Protocols

Proceedings of the 4th International Conference on Principles of Security and Trust (POST) , 2015

#344 Hausautomationssysteme im Datenschutzrecht

Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015 , 2015

#343 Save Our Passwords

Proceedings of The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications , 2015

#342 Schwacke-Liste und Fraunhofer-Tabelle in der Rechtsprechung der Berufungsgerichte

Zeitschrift für Schadensrecht (Journal) , 2015

#341 A Reputation System supporting Unlinkable, yet Authorized Expert Ratings

Proceedings of The 30th ACM/SIGAPP Symposium On Applied Computing , 2015

#340 Elektronischer Rechtsverkehr in Verfahren ohne Anwaltszwang - der Justizgewährungsanspruch des Bürgers als praktischer und theoretischer Störfaktor? - Anmerkungen insbesondere aus amtsrichterlicher Sicht

Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015 , 2015

#339 Elektronische Akten: Anforderungen und technische Lösungsmöglichkeiten

Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015 , 2015

#338 Ein Bild der Zukunft? – Selbstentwickelte Betriebssysteme für Prüfungen am Beispiel des Saarbrücker Prüfungsrechner-Toolkits "Challenge OS"

Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015 , 2015

#337 Bargeld und andere Bezahlverfahren

Wirtschaftsdienst (Journal) , 2015

#336 E-Akte, elektronischer Rechtsverkehr und Barrierefreiheit

Neue Juristische Wochenschrift (Journal) , 2015

#335 Ein Plädoyer für e-Klausuren im Jurastudium

JurPC (Journal) , 2015

#334 jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications

Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings , 2015

#333 Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics

9th USENIX Workshop on Offensive Technologies (WOOT 15) , 2015

#332 Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources

Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15) , 2015

#331 Computational Soundness for Interactive Primitves

Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15) , 2015

#330 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

CoRR (Journal) , 2015

#329 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

IACR Cryptology ePrint Archive (Journal) , 2015

Year: 2014 (Total: 116)

ACM Conference on Computer and Communications Security [CCS]

#328 Poster: Quasi-ID: In fact, I am a human

Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14) , 2014

#327 (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection

Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14) , 2014

#326 DEMO: Enhancing Security and Privacy with Google Glass

Proceedings of the 21st ACM Conference on Computer and Communication Security (CCS '14) , 2014

#325 You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code

Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14) , 2014

#324 Private-by-Design Advertising Meets the Real World

Proc. of the 20th ACM Conference on Computer and Communication Security (CCS 2014) , 2014

Usenix Security Symposium [Usenix]

#323 Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

#322 A Look at Targeted Attacks Through the Lense of an NGO

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

#321 SDDR: Light-Weight, Secure Mobile Encounters

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

#320 Exit from Hell? Reducing the Impact of Amplification DDoS Attacks

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

#319 Towards Detecting Anomalous User Behavior in Online Social Networks

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

International Cryptology Conference [Crypto]

#318 Feasibility and Infeasibility of Secure Computation with Malicious PUFs

Proceedings of the 34th International Cryptology Conference (Crypto '14) , 2014

IEEE Computer Security Foundations Symposium [CSF]

#317 TUC: Time-sensitive and Modular Analysis of Anonymous Communication

Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14) , 2014

#316 Temporal Mode-Checking for Runtime Monitoring of Privacy Policies

Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF '14) , 2014

Others

#315 Scippa: System-Centric IPC Provenance on Android

In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014

#314 Android Security Framework: Extensible Multi-Layered Access Control on Android

In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014

#313 XMLMate: Evolutionary XML Test Generation

Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering , 2014

#312 Probabilistic Prediction of Privacy Risks in User Search Histories

Proceedings of the First International Workshop on Privacy and Secuirty of Big Data (PSBD@CIKM '14) , 2014

#311 Lime: Data Lineage in the Malicious Environment

Proceedings of 10th International Workshopon Security and Trust Management (STM) , 2014

#310 Asynchronous MPC with a Strict Honest Majority Using Non-equivocation

ACM Symposium on Principles of Distributed Computing 2014 , 2014

#309 WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP

12th International Conference on Applied Cryptography and Network Security (ACNS 2014) , 2014

#308 BackRef: Accountability in Anonymous Communication Networks

Applied Cryptography and Network Security , 2014

#307 X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.

29th ACM Symposium on Applied Computing (SAC 2014) , 2014

#306 Information Flow Control in WebKit's JavaScript Bytecode

, 2014

#305 Exception Handling for Dynamic Information Flow Control

Companion Proceedings of the 36th International Conference on Software Engineering (Student Research Competition) , 2014

#304 Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis

Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security , 2014

#303 Differentially Private Data Aggregation with Optimal Utility

30th Annual Computer Security Applications Conference (ACSAC) , 2014

#302 Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-party Setting

Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing , 2014

#301 (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens

Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings , 2014

#300 Ubic: Bridging the Gap between Digital Cryptography and the Physical World

Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I , 2014

#299 Zero-Communication Seed Establishment for Anti-Jamming Techniques

Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT) , 2014

#298 Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity

Proceedings of the 3rd Conference on Principles of Security and Trust (POST) , 2014

#297 PIDGIN: Privacy-preserving Interest and Content Sharing in Opportunistic Networks

Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security , 2014

#296 Extrapolation and Prediction of User Behaviour from Wireless Home Automation Communication

7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2014) , 2014

#295 The German electronic identity card: Lessons learned

Advances in Electronic Government, Digital Divide, and Regional Development , 2014

#294 People on Drugs: Credibility of User Statements in Health Communities.

Proc. of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'14) , 2014

#293 On Tight Security Proofs for Schnorr Signatures

Proc. of the 20th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014) , 2014

#292 Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract

Workshop on Usable and Efficient Secure Multiparty Computation -- Satellite Event of ESORICS , 2014

#291 Privacy-preserving audit for broker-based health information exchange

Proceedings of the 4th ACM conference on Data and application security and privacy (CODASPY'14) , 2014

#290 Verification of Certifying Computations through AutoCorres and Simpl

Proc. 6th NASA Formal Methods Symposium (NFM 2014) , 2014

#289 KnowLife: a Knowledge Graph for Health and Life Sciences

Proc. of the 30th IEEE International Conference on Data Engineering (ICDE'14) , 2014

#288 Discovering Emerging Entities with Ambiguous Names

Proc. of the 23rd International Conference on World Wide Web (WWW 2014) , 2014

#287 Checking App Behavior Against App Descriptions

Proc. of the 36th International Conference on Software Engineering (ICSE 2014) , 2014

#286 EnCore: Private, Context-based Communication for Mobile Social Apps

Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services , 2014

#285 Beyond Access Control: Managing Online Privacy via Exposure

Proceedings of the Workshop on Useable Security (USEC'14) , 2014

#284 Temporal Mode-Checking for Runtime Monitoring of Privacy Policies

Proc. 26th International Conference on Computer Aided Verification (CAV 2014) , 2014

#283 On Advanced Monitoring in Resilient and Unstructured P2P Botnets

Proceedings of the 2014 IEEE International Conference on Communications (ICC 2014) , 2014

#282 Paint it Black: Evaluating the Effectiveness of Malware Blacklists

Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses , 2014

#281 Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks

Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ’14) , 2014

#280 Understanding and Specifying Social Access Control Lists

Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS 2014) , 2014

#279 Regression Test Selection for Distributed Software Histories

Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014) , 2014

#278 CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin

Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014) , 2014

#277 ProCrawl: Mining Test Models from Multi-user Web Applications

Proc. International Symposium on Software Testing and Analysis (ISSTA 2014) , 2014

#276 JTACO: Test Execution for Faster Bounded Verification

Proc. of the 8th International Conference on Tests and Proofs (TAP 2014) , 2014

#275 Automated Fixing of Programs with Contracts

IEEE Transactions on Software Engineering (Journal) , 2014

#274 Test Generation Across Multiple Layers

Proceedings of the 7th International Workshop on Search-Based Software Testing , 2014

#273 Search-based Security Testing of Web Applications

Proceedings of the 7th International Workshop on Search-Based Software Testing , 2014

#272 Extrinsic Influence Factors in Software Reliability: A Study of 200,000 Windows Machines

Companion Proceedings of the 36th International Conference on Software Engineering , 2014

#271 WebMate: Web Application Test Generation in the Real World

Proc. of the Seventh International IEEE Conference on Software Testing, Verification and Validation Workshops(ICSTW 2014) , 2014

#270 Mining Bug Data: A Practitioner’s Guide

Recommendation Systems in Software Engineering , 2014

#269 Formal Specification of a Generic Separation Kernel

Archive of Formal Proofs (Journal) , 2014

#268 Kuai: A model checker for software-defined networks

Proc. of Formal Methods in Computer-Aided Design (FMCAD 2014) , 2014

#267 Bounds on mobility

Proc. of the 25th International Conference on Concurrency Theory (CONCUR 2014) , 2014

#266 Race Detection for Android Applications

Proc. of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014) , 2014

#265 An SMT-based Approach to Coverability Analysis

Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014) , 2014

#264 Deductive control synthesis for alternating-time logics

Proc. of the International Conference on Embedded Software (EMSOFT 2014) , 2014

#263 Unary Pushdown Automata and Straight-Line Programs

Proc. of the 41st International Colloquium on Automata, Languages and Programming (ICALP 2014) , 2014

#262 Synthesis of Geometry Proof Problems

Proc. of the 28th Conference of Artificial Intelligence (AAAI 2014) , 2014

#261 Edit Distance for Timed Automata

Proc. of the 17th International Conference on Hybrid Systems: Computation and Control (HSCC 2014) , 2014

#260 Dynamic package interfaces

Proc. of the 17th International Conference on Fundamental Approaches to Software Engineering (FASE 2014) , 2014

#259 On Measuring the Impact of DDoS Botnets

Proceedings of the Seventh European Workshop on System Security (EuroSec '14) , 2014

#258 Monitoring Parametric Temporal Logic

Proceedings of the 15th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'14) , 2014

#257 Counting Models of Linear-Time Temporal Logic

8th International Conference on Language and Automata Theory and Applications (LATA 2014) , 2014

#256 Temporal Logics for Hyperproperties

Proc. of the 3rd Conference on Principles of Security and Trust (POST 2014) , 2014

#255 Detecting Unrealizable Specifications of Distributed Systems

Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14) , 2014

#254 Automatic Compositional Synthesis of Distributed Systems

Proceedings of the 19th International Symposium on Formal Methods (FM'14) , 2014

#253 Causal Termination of Multi-threaded Programs

Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014) , 2014

#252 Fast DQBF refutation

Theory and Applications of Satisfiability Testing (SAT 2014) , 2014

#251 Petri Games: Synthesis of Distributed Systems with Causal Memory

Proceedings of Fifth International Symposium on Games, Automata, Logics and Formal Verification (GandALF 2014) , 2014

#250 A Pipelined Multi-core MIPS Machine -- Hardware Implementation and Correctness Proof

, 2014

#249 Bridging the Gap Between Digital Cryptography and the Physical World

European Symposium on Research in Computer Security (ESORICS) , 2014

#248 Estimation of Human Body Shape and Posture Under Clothing

Computer Vision and Image Understanding (Journal) , 2014

#247 Detection and Tracking of Occluded People

International Journal of Computer Vision (IJCV) (Journal) , 2014

#246 A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors

ACM Computing Surveys (Journal) , 2014

#245 Interacting with 3D Content on Stereoscopic Displays

Proceedings of the International Symposium on Pervasive Displays (PerDis) , 2014

#244 Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users

Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI) , 2014

#243 SurfacePhone: A Mobile Projection Device for Single- and Multiuser Everywhere Tabletop Interaction

Proceedings of the 32nd ACM CHI Conference on Human Factors in Computing Systems. ACM International Conference on Human Factors in Computing Systems (CHI-14), 32nd, April 26 - May 1, Toronto,, Ontario , 2014

#242 Investigating the effectiveness of peephole interaction for smartwatches in a map navigation task

Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI) , 2014

#241 A Case Study of Research through the App Store: Leveraging the System UI as a Playing Field for Improving the Design of Smartphone Launchers

International Journal of Mobile Human Computer Interaction (IJMHCI) (Journal) , 2014

#240 Main Memory Adaptive Indexing for Multi-core Systems

Proceedings of the 10th International Workshop on Data Management on New Hardware (DaMoN) , 2014

#239 Scalable Multitask Representation Learning for Scene Classification

2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014 , 2014

#238 Blocking Optimality in Distributed Real-Time Locking Protocols

LITES (Journal) , 2014

#237 Automating the Choice of Consistency Levels in Replicated Systems

2014 USENIX Annual Technical Conference, USENIX ATC '14, Philadelphia, PA, USA, June 19-20, 2014. , 2014

#236 Building timing predictable embedded systems

ACM Transactions on Embedded Computing Systems (Journal) , 2014

#235 Reverse engineering of cache replacement policies in Intel microprocessors and their evaluation

2014 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2014, Monterey, CA, USA, March 23-25, 2014 , 2014

#234 A Compiler Optimization to Increase the Efficiency of WCET Analysis

22nd International Conference on Real-Time Networks and Systems, RTNS '14, Versaille, France, October 8-10, 2014 , 2014

#233 Basic Problems in Multi-View Modeling

Tools and Algorithms for the Construction and Analysis of Systems - 20th International Conference, TACAS 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS , 2014

#232 A Model-Based Certification Framework for the EnergyBus Standard

Formal Techniques for Distributed Objects, Components, and Systems - 34th IFIP WG 6.1 International Conference, FORTE 2014, Part of the 9th International Federated Conference on Distributed Computing , 2014

#231 Cross-checking oracles from intrinsic software redundancy

36th International Conference on Software Engineering, ICSE '14, Hyderabad, India - May 31 - June 07, 2014 , 2014

#230 Declarative Design and Enforcement for Secure Cloud Applications

, 2014

#229 Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services

Proceedings of The Sixth International Conferences on Advanced Service Computing , 2014

#228 Schwacke-Liste und Fraunhofer-Tabelle in der Rechtsprechung der Berufungsgerichte

Zeitschrift für Schadensrecht (Journal) , 2014

#227 Analysis of the Current State in Website Certificate Validation

Security and Communication Networks (Journal) , 2014

#226 Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services

International Journal On Advances in Intelligent Systems (Journal) , 2014

#225 Bitcoin im deutschen Vollstreckungsrecht

Multimedia und Recht (Journal) , 2014

#224 Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles

Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (Journal) , 2014

#223 Automatismen in einem verteilten System: Das Beispiel Bitcoin

Logiken strukturbildender Prozesse: Automatismen , 2014

#222 Privacy-Preserving Multiparty Digital Rights Management

, 2014

#221 Security and Privacy Challenges in On-The-Fly Computing

Tagungsband der 4. Konferenz Software-Technologien und -Prozesse (STeP 2014) , 2014

#220 Privacy-Preserving Reputation Management

Procceedings of the 29th Symposium On Applied Computing , 2014

#219 Privacy-Preserving Digital Rights Management based on Attribute-based Encryption

Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security , 2014

#218 Establishing user trust in Automated Teller Machine Integrity

IET Information Security (Journal) , 2014

#217 Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching

Proceedings of The 4th International Workshop on Adaptive Services for the Future Internet , 2014

#216 Reconstructing AES Key Schedules from Decayed Memory with FPGAs

Proceedings of the 22nd IEEE International Symposium on Field-Programmable Custom Computing Machines May 11-13, Boston, Massachusetts , 2014

#215 The Legal Classification of Identity-Based Signatures

Computer Law and Security Review (Journal) , 2014

#214 Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen

Tagungsband des 17. Internationalen Rechtsinformatik Symposions , 2014

#213 Blut und Boden: Die NS-Agrarideologie und die Extreme Rechte heute

Forum Recht (Journal) , 2014

Year: 2013 (Total: 87)

ACM Conference on Computer and Communications Security [CCS]

#212 Verifiable Delegation of Computation on Outsourced Data

Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11) , 2013

#211 Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties

Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13) , 2013

#210 Poster: Identity-Based Steganography and Its Applications to Censorship Resistance

Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS '13) , 2013

Usenix Security Symposium [Usenix]

#209 CacheAudit: A Tool for the Static Analysis of Cache Side Channels

Proceedings of the 22th USENIX Security Symposium (USENIX '13) , 2013

Network and Distributed System Security Symposium [NDSS]

#208 Preventing Side-Channel Leaks in Web Traffic: A Formal Approach

Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13) , 2013

European Cryptology Conference [Eurocrypt]

#207 Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures

Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT '13) , 2013

IEEE Computer Security Foundations Symposium [CSF]

#206 Security and Privacy by Declarative Design

Proceedings of the IEEE 26th Computer Security Foundations Symposium (CSF '16) , 2013

#205 AnoA: A Framework For Analyzing Anonymous Communication Protocols

Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13) , 2013

#204 Differential Privacy by Typing in Security Protocols

Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13) , 2013

Others

#203 Using Mobile Device Communication to Strengthen e-Voting Protocols

Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society - WPES 2013 , 2013

#202 AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications

8th International Workshop on Data Privacy Management (DPM'13) , 2013

#201 Differentially Private Smart Metering with Battery Recharging

Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013) , 2013

#200 A Privacy-aware Shopping Scenario

Proceedings of the Companion Publication of the 2013 International Conference on Intelligent User Interfaces. International Conference on Intelligent User Interfaces (IUI-13), March 19-22, Santa Monic , 2013

#199 Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification

Principles of Security and Trust 2013 , 2013

#198 Efficient Algorithms for Control Closures

1st International Workshop on Interference and Dependence , 2013

#197 Detecting Deadlock in Programs with Data-Centric Synchronization

ICSE '13: Proceedings of the 35th International Conference on Software Engineering , 2013

#196 AppGuard - Enforcing User Requirements on Android Apps

19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , 2013

#195 Entwicklung sicherer Software durch Security by Design

SIT-TR-2013-01 , 2013

#194 Flexible Access Control for JavaScript

Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages and applications , 2013

#193 Advances in Mobile Security

8th Future Security - Security Research Conference , 2013

#192 Callee-site Rewriting of Sealed System Libraries

International Symposium on Engineering Secure Software and Systems (ESSoS'13) , 2013

#191 Privacy-Preserving Accountable Computation

Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS) , 2013

#190 Client-controlled Cryptography-as-a-Service in the Cloud

11th International Conference on Applied Cryptography and Network Security (ACNS'13) , 2013

#189 Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM

8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013) , 2013

#188 Dependent Type Theory for Verification of Information Flow and Access Control Policies

ACM Transactions on Programming Languages and Systems (Journal) , 2013

#187 Asynchronous Computational VSS with Reduced Communication Complexity

Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013) , 2013

#186 Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations

Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo (Journal) , 2013

#185 Logical Foundations of Secure Resource Management

Proc. of the 2nd Conference on Principles of Security and Trust (POST 2013) , 2013

#184 Peer-assisted Content Distribution in Akamai Netsession

Proc. of the 2013 Internet Measurement Conference (IMC'13) , 2013

#183 Towards Efficient Traffic-analysis Resistant Anonymity Networks

Proc. of the ACM SIGCOMM 2013 Conference , 2013

#182 SplitX: high-performance private analytics

Proc. of the ACM SIGCOMM 2013 Conference , 2013

#181 A Framework for the Verification of Certifying Computations

Journal of Automated Reasoning (Journal) , 2013

#180 HYENA-live: Fine-Grained Online Entity Type Classification from Natural-language Text

Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51) , 2013

#179 Fine-grained Semantic Typing of Emerging Entities

Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51) , 2013

#178 Discovering semantic relations from the web and organizing them with PATTY

ACM SIGMOD Record (Journal) , 2013

#177 Gem-based Entity-Knowledge Maintenance

Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13) , 2013

#176 Identity-Based Steganography and Its Applications to Censorship Resistance

6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013) , 2013

#175 Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge

Journal of Graph Theory (Journal) , 2013

#174 Towards Practical Communication in Byzantine-Resistant DHTs

Networking, IEEE/ACM Transactions on (Journal) , 2013

#173 On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream

Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13) , 2013

#172 Model Checking Database Applications

Proc. of the 20th International Symposium on Static Analysis (SAS 2013) , 2013

#171 Incremental Inductive Coverability

Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013) , 2013

#170 Expand, Enlarge, and Check for Branching Vector Addition Systems

Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013) , 2013

#169 A Theory of Name Boundedness

Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013) , 2013

#168 Parameterized verification of asynchronous shared-memory systems

Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013) , 2013

#167 Static Provenance Verification for Message Passing Programs

Proc. of the 20th International Symposium on Static Analysis (SAS 2013) , 2013

#166 MrCrypt: Static Analysis for Secure Cloud Computations

Proc. of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2013) , 2013

#165 A Theory of Partitioned Global Address Spaces

Proc. of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2013) , 2013

#164 Bisimilar finite abstractions of stochastic control systems

Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013) , 2013

#163 Compositional Equivalence Checking for Models and Code of Control Systems

Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013) , 2013

#162 Synthesis of fixed-point programs

Proc. of the International Conference on Embedded Software (EMSOFT 2013) , 2013

#161 A Uniformization Theorem for Nested Word to Word Transductions

Proc. of the 18th International Conference on Implementation and Application of Automata (CIAA 2013) , 2013

#160 Supervisor Synthesis for Controller Upgrades

Proc. of the Conference on Design, Automation and Test in Europe (DATE 2013) , 2013

#159 Learning People Detectors for Tracking in Crowded Scenes

IEEE International Conference on Computer Vision (ICCV) , 2013

#158 Strong Appearance and Expressive Spatial Models for Human Pose Estimation

IEEE International Conference on Computer Vision (ICCV) , 2013

#157 Where Next in Object Recognition and how much Supervision Do We Need?

Advanced Topics in Computer Vision , 2013

#156 A study on icon arrangement by smartphone users

Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI) , 2013

#155 What's in the apps for context?: extending a sensor for studying app usage to informing context-awareness

Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. International Conference on Ubiquitous Computing (Ubicomp-13), September 8-12, Zurich, Switzerland , 2013

#154 The Uncracked Pieces in Database Cracking

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2013

#153 Towards Zero-Overhead Static and Adaptive Indexing in Hadoop

VLDB Journal (Journal) , 2013

#152 Mosquito: Another One Bites the Data Upload STream

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2013

#151 Elephant, Do Not Forget Everything! Efficient Processing of Growing Datasets

Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD) , 2013

#150 A Comparison of Knives for Bread Slicing

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2013

#149 WWHow! Freeing Data Storage from Cages

Proceedings of the 6th Biennial Conference on Innovative Data Systems Research (CIDR) , 2013

#148 On-the-fly verification and optimization of DTA-properties for large Markov chains

Formal Methods in System Design (Journal) , 2013

#147 Approximate Transient Analysis of Queuing Networks by Quasi Product Forms

Analytical and Stochastic Modelling Techniques and Applications - 20th International Conference, ASMTA 2013, Ghent, Belgium, July 8-10, 2013. Proceedings , 2013

#146 Towards realistic team formation in social networks based on densest subgraphs

22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013 , 2013

#145 Constrained fractional set programs and their application in local clustering and community detection

Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 16-21 June 2013 , 2013

#144 The OMLP family of optimal multiprocessor real-time locking protocols

Design Automation for Embedded Systems (Journal) , 2013

#143 An asymptotically optimal real-time locking protocol for clustered scheduling under suspension-aware analysis

SIGBED Review (Journal) , 2013

#142 Schedulability Analysis of the Linux Push and Pull Scheduler with Arbitrary Processor Affinities

25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013 , 2013

#141 A Fully Preemptive Multiprocessor Semaphore Protocol for Latency-Sensitive Real-Time Applications

25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013 , 2013

#140 Improved analysis and evaluation of real-time semaphore protocols for P-FP scheduling

19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013 , 2013

#139 On Spin Locks in AUTOSAR: Blocking Analysis of FIFO, Unordered, and Priority-Ordered Spin Locks

Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013 , 2013

#138 Multiprocessor Feasibility Analysis of Recurrent Task Systems with Specified Processor Affinities

Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013 , 2013

#137 Efficient partitioning of sporadic real-time tasks with shared resources and spin locks

8th IEEE International Symposium on Industrial Embedded Systems, SIES 2013, Porto, Portugal, June 19-21, 2013 , 2013

#136 CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency

Journal of the ACM (Journal) , 2013

#135 A Programming Language Approach to Fault Tolerance for Fork-Join Parallelism

Seventh International Symposium on Theoretical Aspects of Software Engineering, TASE 2013, 1-3 July 2013, Birmingham, UK , 2013

#134 Precise timing analysis for direct-mapped caches

The 50th Annual Design Automation Conference 2013, DAC '13, Austin, TX, USA, May 29 - June 07, 2013 , 2013

#133 Measurement-based modeling of the cache replacement policy

19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013 , 2013

#132 A compositional modelling and analysis framework for stochastic hybrid systems

Formal Methods in System Design (Journal) , 2013

#131 An Internet Inspired Approach to Power Grid Stability

it - Information Technology (Journal) , 2013

#130 Compositional Verification and Optimization of Interactive Markov Chains

CONCUR 2013 - Concurrency Theory - 24th International Conference, CONCUR 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings , 2013

#129 Modelling, Reduction and Analysis of Markov Automata

Quantitative Evaluation of Systems - 10th International Conference, QEST 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings , 2013

#128 Formal Verification of Cryptographic Security Proofs

, 2013

#127 Sambamba: Runtime Adaptive Parallel Execution

Proceedings of the 3rd International Workshop on Adaptive Self-Tuning Computing Systems , 2013

#126 Idea: Callee-Site Rewriting of Sealed System Libraries

International Symposium on Engineering Secure Software and Systems (ESSoS'13) , 2013

Year: 2012 (Total: 73)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#125 ObliviAd: Provably Secure and Practical Online Behavioral Advertising

Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012) , 2012

ACM Conference on Computer and Communications Security [CCS]

#124 Computational Soundness without Protocol Restrictions

Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12) , 2012

#123 Non-tracking Web Analytics

Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12) , 2012

Usenix Security Symposium [Usenix]

#122 Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services

Proceedings of the 21st Usenix Security Symposium (USENIX '12) , 2012

Network and Distributed System Security Symposium [NDSS]

#121 MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12) , 2012

#120 Automated Synthesis of Secure Distributed Applications

Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS '12) , 2012

IEEE Computer Security Foundations Symposium [CSF]

#119 Verified Security of Merkle-Damgård

Proceedings of the 25th IEEE Computer Security Foundations Symposium - CSF 2012 , 2012

#118 Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction

Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF '12) , 2012

#117 Provably Secure and Practical Onion Routing

Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF) , 2012

Others

#116 A comparative analysis of decentralized power grid stabilization strategies

Proceedings of the Winter Simulation Conference , 2012

#115 Ace: An Efficient Key-Exchange Protocol for Onion Routing

Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES) , 2012

#114 Brief announcement: distributed cryptography using trinc

ACM Symposium on Principles of Distributed Computing 2012 , 2012

#113 Dependability Results for Power Grids with Decentralized Stabilization Strategies

AVACS Technical Report (Journal) , 2012

#112 A data-centric approach to synchronization

ACM Trans. Program. Lang. Syst. (Journal) , 2012

#111 Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs

RV'11: Proc. 2nd International Conference on Runtime Verification , 2012

#110 XIFER: A Software Diversity Tool Against Code-Reuse Attacks

4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3) , 2012

#109 Accountability and Trust in Cooperative Information Systems

Proc. of the 28th IEEE International Conference on Data Engineering (ICDE'12) , 2012

#108 Towards Statistical Queries over Distributed Private User Data

Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012) , 2012

#107 On the (limited) power of non-equivocation

Proc. of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2012) , 2012

#106 SAFE Extensibility of Data-Driven Web Applications

WWW~'12: Proceedings of the 21st International World Wide Web Conference , 2012

#105 Affine Refinement Types for Authentication and Authorization

Proc. 6th International Symposium on Trustworthy Global Computing (TGC 2012) , 2012

#104 Defending Against Large-scale Crawls in Online Social Networks

, 2012

#103 Reliable Client Accounting for P2P-infrastructure Hybrids

Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012) , 2012

#102 Exploring the design space of social network-based Sybil defense

Proc. of the 4th International Conference on Communication Systems and Networks (COMSNETS2012) , 2012

#101 Big Data Methods for Computational Linguistics

IEEE Data Engineering Bulletin (Journal) , 2012

#100 OpinioNetIt: A Structured and Faceted Knowledge-base of Opinions

Proc. of the 12th IEEE International Conference on Data Mining (ICDM'12) , 2012

#99 Harmony and dissonance: organizing the people's voices on political controversies

Proc. of the 5th ACM International Conference on Web Search and Data Mining (WSDM'12) , 2012

#98 PolariCQ: polarity classification of political quotations

Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) , 2012

#97 A Weakly Supervised Model for Sentence-Level Semantic Orientation Analysis with Multiple Experts

Proc. of the Joint Conference on Empirical Methods for Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL'12) , 2012

#96 KORE: keyphrase overlap relatedness for entity disambiguation

Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) , 2012

#95 LINDA: distributed web-of-data-scale entity matching

Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) , 2012

#94 On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols

Proc. 4th NASA Formal Methods Symposium (NFM 2012) , 2012

#93 Adding query privacy to robust DHTs

Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012) , 2012

#92 Diffusion-Based Image Compression in Steganography

Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012 , 2012

#91 Trusted Storage

Presented at USENIX FAST'12 WiP , 2012

#90 An O(n+m) Certifying Triconnnectivity Algorithm for Hamiltonian Graphs

Algorithmica (Journal) , 2012

#89 Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE

Sicherheit 2012 -- Beiträge der 6-ten Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e. V. , 2012

#88 PATTY: A Taxonomy of Relational Patterns with Semantic Types

Proc. Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL 2012) , 2012

#87 Discovering and Exploring Relations on the Web

Proc. of the Very Large Database Endowment (PVLDB) (Journal) , 2012

#86 History-Free Sequential Aggregate Signatures

Proc. 8th International Conference on Security and Cryptography for Networks (SCN 2012) , 2012

#85 Automatically Generating Test Cases for Specification Mining

IEEE Transactions on Software Engineering (Journal) , 2012

#84 Sambamba: A Runtime System for Online Adaptive Parallelization

Proc. of the 21st International Conference Compiler Construction (CC 2012) , 2012

#83 Stateful authorization logic - Proof theory and a case study

Journal of Computer Security (Journal) , 2012

#82 Superficially substructural types

ACM SIGPLAN International Conference on Functional Programming (ICFP 2012) , 2012

#81 Labeled Goal-Directed Search in Access Control Logic

Proc. of the 8th International Workshop on Security and Trust Management (STM 2012) , 2012

#80 Countermodels from Sequent Calculi in Multi-Modal Logics

Proc. of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS 2012) , 2012

#79 Understanding and combating link farming in the twitter social network

Proc. of the 21st International Conference on World Wide Web (WWW 2012) , 2012

#78 Predicting emerging social conventions in online social networks

Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) , 2012

#77 Scalable Testing of File System Checkers

Proc. of the 7th ACM European Conference on Computer Systems (EuroSys 2012) , 2012

#76 Algorithmic Verification of Asynchronous Programs

ACM Transactions on Programming Languages and Systems (Journal) , 2012

#75 Approximately Bisimilar Symbolic Models for Digital Control Systems

Proc. of the 24th International Conference on Computer Aided Verification (CAV 2012) , 2012

#74 Language-Theoretic Abstraction Refinement

Proc. of the 15th International Conference on Fundamental Approaches to Software Engineering (FASE 2012) , 2012

#73 Input-Output stability for discrete systems

Proc. of the International Conference on Embedded Software (EMSOFT 2012) , 2012

#72 Synthesis of minimal-error control software

Proc. of the International Conference on Embedded Software (EMSOFT 2012) , 2012

#71 Trigger memoization in self-triggered control

Proc. of the International Conference on Embedded Software (EMSOFT 2012) , 2012

#70 Equivalence of Games with Probabilistic Uncertainty and Partial-Observation Games

Proc. of the 10th International Symposium on Automated Technology for Verification and Analysis (ATVA 2012) , 2012

#69 Efficient May Happen in Parallel Analysis for Async-finish Parallelism

Proc. of the 19th International Symposium on Static Analysis (SAS 2012) , 2012

#68 A Perfect Model for Bounded Verification

Proc. of the 27th Annual IEEE/ACM Symposium on Logic in Computer Science (LICS 2012) , 2012

#67 CLSE: Closed-Loop Symbolic Execution

Proc. of the 4th International Symposium on NASA Formal Methods (NFM 2012) , 2012

#66 Engage: A Deployment Management System

Proc. of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2012) , 2012

#65 Articulated People Detection and Pose Estimation: Reshaping the Future

Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , 2012

#64 Efficient Big Data Processing in Hadoop MapReduce

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2012

#63 Only Aggressive Elephants are Fast Elephants

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2012

#62 Three-valued abstraction for probabilistic systems

Journal of Logic and Algebraic Programming (Journal) , 2012

#61 An Empirical Evaluation of the Influence of the Load-Store Unit on WCET Analysis

12th International Workshop on Worst-Case Execution Time Analysis, WCET 2012, July 10, 2012, Pisa, Italy , 2012

#60 Model Checking Algorithms for Markov Automata

ECEASST (Journal) , 2012

#59 Variable Probabilistic Abstraction Refinement

Automated Technology for Verification and Analysis - 10th International Symposium, ATVA 2012, Thiruvananthapuram, India, October 3-6, 2012. Proceedings , 2012

#58 State-of-the-art tools and techniques for quantitative modeling and analysis of embedded systems

2012 Design, Automation & Test in Europe Conference & Exhibition, DATE 2012, Dresden, Germany, March 12-16, 2012 , 2012

#57 Modelling and Decentralised Runtime Control of Self-stabilising Power Micro Grids

Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change - 5th International Symposium, ISoLA 2012, Heraklion, Crete, Greece, October 15-18, 2012, Proc , 2012

#56 Simulation and Statistical Model Checking for Modestly Nondeterministic Models

Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance - 16th International GI/ITG Conference, MMB & DFT 2012, Kaiserslautern, Germany, March 19-21, 2012 , 2012

#55 Quantitative Models for a Not So Dumb Grid

Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS , 2012

#54 A dynamic program analysis to find floating-point accuracy problems

ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '12, Beijing, China - June 11 - 16, 2012 , 2012

#53 Rational Cryptography

, 2012

Year: 2011 (Total: 51)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#52 Verification of Information Flow and Access Control Policies with Dependent Types

Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P '11) , 2011

#51 On Adversary Models and Compositional Security

IEEE Security & Privacy (Journal) , 2011

ACM Conference on Computer and Communications Security [CCS]

#50 AmazonIA: When Elasticity Snaps Back

Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) , 2011

#49 Auctions in do-not-track compliant internet advertising

Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) , 2011

#48 Policy auditing over incomplete logs: theory, implementation and applications

Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) , 2011

#47 Poster: Control-flow Integrity for Smartphones

18th ACM conference on Computer and communications security (ACM CCS 2012) , 2011

Network and Distributed System Security Symposium [NDSS]

#46 A Security API for Distributed Social Networks

Proceedings of the Network and Distributed System Security Symposium (NDSS '11) , 2011

IEEE Computer Security Foundations Symposium [CSF]

#45 Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols

Proceedings of the 24th IEEE Computer Security Foundations Symposium , 2011

Others

#44 Twin Clouds: An Architecture for Secure Cloud Computing

Workshop on Cryptography and Security in Clouds (CSC) , 2011

#43 Non-Uniform Distributions in Quantitative Information-Flow

Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) , 2011

#42 A Local Cross-Site Scripting Attack against Android Phones

, 2011

#41 X-pire! - A digital expiration date for images in social networks

CoRR (Journal) , 2011

#40 Twin Clouds: Secure Cloud Computing with Low Latency

Communications and Multimedia Security Conference (CMS'11) , 2011

#39 CFI Goes Mobile: Control-Flow Integrity for Smartphones

International Workshop on Trustworthy Embedded Devices (TrustED) (Journal) , 2011

#38 G2C: Cryptographic Protocols from Goal-Driven Specifications

TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011 , 2011

#37 Automatically Verifying Typing Constraints for a Data Processing Language

Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011) , 2011

#36 Survey: Certifying Algorithms

Computer Science Review (Journal) , 2011

#35 Verification of Certifying Computations

Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011) , 2011

#34 Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms

Proc. of the 7th International Conference Information Systems Security (ICISS 2011) , 2011

#33 Analyzing facebook privacy settings: user expectations vs. reality

Proc. of the 11th ACM SIGCOMM Conference on Internet Measurement (IMC 2011) , 2011

#32 Robust Discrete Synthesis Against Unspecified Disturbances

Proc. of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011) , 2011

#31 Pessoa 2.0: A Controller Synthesis Tool for Cyber-physical Systems

Proc. of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011) , 2011

#30 Cause Clue Clauses: Error Localization Using Maximum Satisfiability

Proc. of the 32rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2011) , 2011

#29 Bug-Assist: Assisting Fault Localization in ANSI-C Programs

Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011) , 2011

#28 HMC: Verifying Functional Programs Using Abstract Interpreters

Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011) , 2011

#27 Minimum Attention Controller Synthesis for Omega-regular Objectives

Proceedings of the 9th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'11) , 2011

#26 Performance-aware Scheduler Synthesis for Control Systems

Proc. of the International Conference on Embedded Software (EMSOFT 2011) , 2011

#25 A Lyapunov approach in incremental stability

50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011) , 2011

#24 Cryptographically sound security proofs for basic and public-key Kerberos

International Journal of Information Security (Journal) , 2011

#23 Securing social networks

Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011 , 2011

#22 Union and Intersection Types for Secure Protocol Implementations

Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers , 2011

#21 Weakly Supervised Recognition of Daily Life Activities with Wearable Sensors

IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI) (Journal) , 2011

#20 Trojan data layouts: right shoes for a running elephant

Proceedings of the 2nd ACM Symposium on Cloud Computing (SoCC) , 2011

#19 Relax and Let the Database Do the Partitioning Online

Enabling Real-Time Business Intelligence (BIRTE) , 2011

#18 RAFT at work: speeding-up mapreduce applications under task and node failures

Proceedings of the ACM SIGMOD International Conference on Management of data , 2011

#17 Towards a One Size Fits All Database Architecture

Proceedings of the 4th Biennial Conference on Innovative Data Systems Research (CIDR) , 2011

#16 RAFTing MapReduce: Fast recovery on the RAFT

Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE) , 2011

#15 Formalisms for Specifying Markovian Population Models

International Journal of Foundations of Computer Science (Journal) , 2011

#14 SHAVE: stochastic hybrid analysis of markov population models

Proceedings of the 14th ACM International Conference on Hybrid Systems: Computation and Control, HSCC 2011, Chicago, IL, USA, April 12-14, 2011 , 2011

#13 Efficient calculation of rare event probabilities in Markovian queueing networks

5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, VALUETOOLS '11, Paris, France, May 16-20, 2011 , 2011

#12 Relaxed-memory concurrency and verified compilation

Proceedings of the 38th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2011, Austin, TX, USA, January 26-28, 2011 , 2011

#11 Branch target buffers: WCET analysis framework and timing predictability

Journal of Systems Architecture - Embedded Systems Design (Journal) , 2011

#10 PRET DRAM controller: bank privatization for predictability and temporal isolation

Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2011, part of ESWeek '11 Seventh Embedded Systems Week, Taipei, Taiwan, 9-14 October, 201 , 2011

#9 Designing next-generation real-time streaming systems

Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2011, part of ESWeek '11 Seventh Embedded Systems Week, Taipei, Taiwan, 9-14 October, 201 , 2011

#8 Temporal isolation on multiprocessing architectures

Proceedings of the 48th Design Automation Conference, DAC 2011, San Diego, California, USA, June 5-10, 2011 , 2011

#7 A Template for Predictability Definitions with Supporting Evidence

Bringing Theory to Practice: Predictability and Performance in Embedded Systems, DATE Workshop PPES 2011, March 18, 2011, Grenoble, France. , 2011

#6 CAMA: A Predictable Cache-Aware Memory Allocator

23rd Euromicro Conference on Real-Time Systems, ECRTS 2011, Porto, Portugal, 5-8 July, 2011 , 2011

#5 Measurability and safety verification for stochastic hybrid systems

Proceedings of the 14th ACM International Conference on Hybrid Systems: Computation and Control, HSCC 2011, Chicago, IL, USA, April 12-14, 2011 , 2011

#4 Formal Methods in Energy Informatics

Software Engineering and Formal Methods - 9th International Conference, SEFM 2011, Montevideo, Uruguay, November 14-18, 2011. Proceedings , 2011

#3 A verified wireless safety critical hard real-time design

12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM 2011, Lucca, Italy, 20-24 June, 2011 , 2011

#2 Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis

, 2011

Year: 1970 (Total: 1)

Others

#1 A type theory for incremental computational complexity with control flow changes

Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming (ICFP '16) , 1970