Verified iptables Firewall Analysis C Diekmann, J Michaelis, M Haslbeck, G Carle IFIP Networking, 2016 | 37 | 2016 |
Verified iptables firewall analysis and verification C Diekmann, L Hupel, J Michaelis, M Haslbeck, G Carle Journal of automated reasoning 61, 191-242, 2018 | 27 | 2018 |
Agile network access control in the container age C Diekmann, J Naab, A Korsten, G Carle IEEE Transactions on Network and Service Management 16 (1), 41-55, 2018 | 26 | 2018 |
Adaptive load-aware sampling for network monitoring on multicore commodity hardware L Braun, C Diekmann, N Kammenhuber, G Carle 2013 IFIP Networking Conference, 1-9, 2013 | 15 | 2013 |
Semantics-preserving simplification of real-world firewall rule sets C Diekmann, L Hupel, G Carle FM 2015: Formal Methods: 20th International Symposium, Oslo, Norway, June 24 …, 2015 | 14 | 2015 |
Verifying security policies using host attributes C Diekmann, SA Posselt, H Niedermayer, H Kinkelin, O Hanka, G Carle Formal Techniques for Distributed Objects, Components, and Systems: 34th …, 2014 | 12 | 2014 |
Demonstrating topoS: theorem-prover-based synthesis of secure network configurations C Diekmann, A Korsten, G Carle 2015 11th International Conference on Network and Service Management (CNSM …, 2015 | 11 | 2015 |
Certifying Spoofing-Protection of Firewalls C Diekmann, L Schwaighofer, G Carle Network and Service Management (CNSM), 2015 11th International Conference on …, 2015 | 8 | 2015 |
Directed Security Policies: A Stateful Network Implementation C Diekmann, L Hupel, G Carle Proceedings Third International Workshop on Engineering Safety and Security …, 2014 | 8 | 2014 |
Routing J Michaelis, C Diekmann Archive of Formal Proofs, 2016 | 5 | 2016 |
Network security policy verification C Diekmann Archive of Formal Proofs. http://afp. sf. net/entries …, 2014 | 5 | 2014 |
Privacy Assessment Using Static Taint Analysis (Tool Paper) M Von Maltitz, C Diekmann, G Carle Formal Techniques for Distributed Objects, Components, and Systems: 37th …, 2017 | 4 | 2017 |
Iptables Semantics C Diekmann, L Hupel Archive of Formal Proofs, Sep, 2016 | 4 | 2016 |
IP Addresses C Diekmann, J Michaelis, L Hupel Archive of Formal Proofs, Jun, 2016 | 3 | 2016 |
Simple Firewall C Diekmann, J Michaelis, M Haslbeck Archive of Formal Proofs, Aug, 2016 | 3 | 2016 |
Provably secure networks: methodology and toolset for configuration management C Diekmann arXiv preprint arXiv:1708.08228, 2017 | 2 | 2017 |
Taint Analysis for System-Wide Privacy Audits: A Framework and Real-World Case Studies M von Maltitz, C Diekmann, G Carle arXiv preprint arXiv:1608.04671, 2016 | 2 | 2016 |
LOFT—Verified Migration of Linux Firewalls to SDN J Michaelis, C Diekmann Archive of Formal Proofs, 2016 | 2 | 2016 |
Naming network interfaces C Diekmann PoC|| GTFO: Pastor Laphroaig Races the Runtime Relinker and Other True Tales …, 2017 | 1 | 2017 |
Privacy Assessment of Software Architectures based on Static Taint Analysis M von Maltitz, C Diekmann, G Carle arXiv preprint arXiv:1608.04671, 2016 | 1 | 2016 |