A Framework for Static Detection of Privacy Leaks in Android Applications C Mann, A Starostin 27th Annual ACM Symposium on Applied Computing, 1457-1462, 2012 | 161 | 2012 |
The Verisoft approach to systems verification E Alkassar, MA Hillebrand, D Leinenbach, NW Schirmer, A Starostin Verified Software: Theories, Tools, Experiments: Second International …, 2008 | 102 | 2008 |
Cassandra: Towards a Certifying App Store for Android S Lortz, H Mantel, A Starostin, T Bähr, D Schneider, A Weber 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices …, 2014 | 70 | 2014 |
Pervasive verification of an OS microkernel: Inline assembly, memory consumption, concurrent devices E Alkassar, WJ Paul, A Starostin, A Tsyban Verified Software: Theories, Tools, Experiments: Third International …, 2010 | 66 | 2010 |
Formal pervasive verification of a paging mechanism E Alkassar, N Schirmer, A Starostin Tools and Algorithms for the Construction and Analysis of Systems: 14th …, 2008 | 65 | 2008 |
Balancing the load: Leveraging a semantics stack for systems verification E Alkassar, MA Hillebrand, DC Leinenbach, NW Schirmer, A Starostin, ... Journal of Automated Reasoning 42 (2), 389-454, 2009 | 63 | 2009 |
Transforming Out Timing Leaks, More or Less H Mantel, A Starostin 20th European Symposium on Research in Computer Security (ESORICS 2015), 2015 | 52 | 2015 |
Correct microkernel primitives A Starostin, A Tsyban Electronic Notes in Theoretical Computer Science 217, 169-185, 2008 | 25 | 2008 |
A tool for static detection of timing channels in Java A Lux, A Starostin Journal of Cryptographic Engineering 1, 303-313, 2011 | 23 | 2011 |
Formal verification of a C-library for strings A Starostin Saarland University, Computer Science Department, 2006 | 18 | 2006 |
Formal verification of demand paging A Starostin Saarland University, Computer Science Department, 2010 | 12 | 2010 |
Verified process-context switch for C-programmed kernels A Starostin, A Tsyban Verified Software: Theories, Tools, Experiments: Second International …, 2008 | 12 | 2008 |
A Sound Information-Flow Analysis for Cassandra S Lortz, H Mantel, A Starostin, A Weber Tech. Rep. TUD-CS-2014-0064, TU Darmstadt, 2014 | 10 | 2014 |
Poster: Software Security for Mobile Devices S Arzt, A Bartel, R Gay, S Lortz, E Lovat, H Mantel, M Mohr, B Nordhoff, ... IEEE Symposium on Security & Privacy, 2015 | 5 | 2015 |
Side Channel Finder (Version 1.0) A Lux, H Mantel, M Perner, A Starostin Technical Report TUD-CS-2010-0155, TU Darmstadt, 2010 | 4 | 2010 |
An Automatic Inference of Minimal Security Types D Bollmann, S Lortz, H Mantel, A Starostin 11th International Conference on Information Systems Security (ICISS 2015), 2015 | 1 | 2015 |
Balancing the Load E Alkassar, MA Hillebrand, DC Leinenbach, NW Schirmer, A Starostin, ... Journal of Automated Reasoning,(), 0 | 1 | |
Certifying the Security of Android Applications with Cassandra S Lortz, H Mantel, D Schneider, A Starostin, T Bähr, A Weber IEEE Symposium on Security & Privacy, 2015 | | 2015 |
Cassandra: Towards a Certifying App Store S Lortz, H Mantel, A Starostin, T Bähr | | 2014 |
Addendum to the Article “Transforming Out Timing Leaks, More or Less”—Experimental Results H Mantel, A Starostin | | |