Institut für Softwaretechnik
FB 4: Informatik / Universität Koblenz
- 0261/287-2722
- 0261/287-2721
Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan
Extracting and verifying cryptographic models from C protocol code by symbolic executionYan Chen; George Danezis; Vitaly Shmatikov (Hrsg). Proceedings of the 18th ACM Conference on Computer and Communications Security CCS '11: October 17. - 21., 2011; Chicago, Illinois, USA. New York, NY: ACM Association for Computing Machinery 2011 S. 331 - 340
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.
Guiding a General-Purpose C Verifier to Prove Cryptographic ProtocolsSteve Kremer; Michael Backes; Steve Zdancewic; Jonathan Herzog (Hrsg). 24th IEEE Computer Security Foundations Symposium CSF 2011: 27-29 June, 2011; Cernay-la-Ville, France. Los Alamitos, CA: IEEE Computer Society 2011 S. 3 - 17
Jürjens, Jan; Marchal, Loïc; Ochoa, Martín et al.
Incremental Security Verification for Evolving UMLsec modelsRobert B. France; Jochen M. Kuester; Behzad Bordbar; Richard F. Paige (Hrsg). Modelling Foundations and Applications: 7th European Conference, ECMFA 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings. Berlin: Springer 2011 S. 52 - 68
Shaikh Sadi, Muhammad; Uddin, Md. Nazim; Khan, Md. Mizanur Rahman et al.
Mitigating Soft Error Risks through Protecting Critical Variables and BlocksSalah S. Al-Majeed;Chih-Lin Hu;Dhinaharan Nagamalai (Hrsg). Advances in Wireless, Mobile Networks and Applications: International Conferences, WiMoA 2011 and ICCSEA 2011, Dubai, United Arab Emirates, May 25-27, 2011. Proceedings. Berlin: Springer 2011 S. 137 - 145 (Communications in Computer and Information Science)
Fourneret, Elizabeta; Ochoa, Martin; Bouquet, Fabrice et al.
Model-Based Security Verification and Testing for Smart- cardsGünther Pernul; Juan-Carlos Trujillo Mondéjar; Edgar Weippl (Hrsg). Proceedings of the Sixth International Conference on Availability, Reliability and Security, ARES 2011: 22-26 August 2011; Vienna, Austria. Los Alamitos, CA: IEEE Computer Society 2011 S. 272 - 279
Jürjens, Jan; Ochoa, Martín; Schmidt, Holger et al.
Modelling Secure Systems Evolution: Abstract and Concrete Change SpecificationsMarco Bernardo; Valérie Issarny (Hrsg). Formal Methods for Eternal Networked Software Systems: 11th International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2011, Bertinoro, Italy, June 13-18, 2011. Advanced Lectures. Berlin: Springer 2011 S. 504 - 526
Massacci, Fabio; Bouquet, Fabrice; Fourneret, Elizabeta et al.
Orchestrating Security and System Engineering for Evolving SystemsWitold Abramowicz; Ignacio M. Llorente; Mike Surridge; Andrea Zisman; Julien Vayssière (Hrsg). Towards a Service-Based Internet: 4th European Conference, ServiceWave 2011, Poznan, Poland, October 26-28, 2011. Proceedings. Berlin: Springer 2011 S. 134 - 143
Taubenberger, Stefan; Jürjens, Jan; Yu, Yijun et al.
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing DomainJan Camenisch; Simone Fischer-Hübner; Yuko Murayama; Armand Portmann; Carlos Rieder (Hrsg). Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings. Berlin: Springer 2011 S. 259 - 270
Jürjens, Jan; Lee, Seok-Won; Monga, Mattia
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011: May 22, 2011; Waikiki, Honolulu, HI, USANew York, NY: ACM Association for Computing Machinery 2011