2016
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G.,
“On Improvements Of Low-Deterministic Security”, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
2015
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P.,
“IccTA: Detecting Inter-Component Privacy Leaks in Android Apps”, in
Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
2014
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C.,
“Information Flow Control in WebKit's JavaScript Bytecode”, in
Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“Information Flow in Object-Oriented Software”, in
Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
H. Seidl and Kovács, M.,
“Interprocedural Information Flow Analysis of XML Processors”, in
Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014), 2014.
2012
J. Cúellar, Ochoa, M., and Rios, R.,
“Indistinguishable regions in Geographic Location Privacy”, in
Proceedings of the 27th ACM Symposium on Applied Computing (SAC 2012), 2012.
A. Lehmann and Fahland, D.,
“Information Flow Security for Business Process Models - just one click away”, in
Proceedings of the 10th International Conference on Business Process Management - Demo Track (BPM 2012), 2012.