Non-interference with what-declassification in component-based systems S Greiner, D Grahl 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 253-267, 2016 | 20 | 2016 |
Information flow analysis C Scheben, S Greiner Deductive Software Verification–The KeY Book: From Theory to Practice, 453-471, 2016 | 14 | 2016 |
Modular verification of information flow security in component-based systems S Greiner, M Mohr, B Beckert Software Engineering and Formal Methods: 15th International Conference, SEFM …, 2017 | 12 | 2017 |
Privacy-preserving surveillance: an interdisciplinary approach P Birnstill, S Bretthauer, S Greiner, E Krempel Int'l Data Priv. L. 5, 298, 2015 | 10 | 2015 |
Model-driven specification and analysis of confidentiality in component-based systems ME Kramer, M Hecker, S Greiner, K Bao, K Yurchenko | 9 | 2017 |
Privacy protection in an electronic chronicle system S Greiner, J Yang Proc. 34th Ann. IEEE Northeast Bioeng. Conf, 2008 | 9 | 2008 |
Rifl 1.1: A common specification language for information-flow requirements T Bauereiß, S Greiner, M Herda, M Kirsten, X Li, H Mantel, M Mohr, ... Technical Report TUD-CS-2017-0225, TU Darmstadt, 2017 | 6 | 2017 |
Privacy preserving surveillance and the tracking paradox S Greiner, P Birnstill, E Krempel, B Beckert, J Beyerer Proceedings, Future Security Conference, 15-19, 2013 | 6 | 2013 |
KeY quicktour for JML C Engel, A Roth, A Blome, R Bubel, S Greiner Universität Karlsruhe, 2006 | 5 | 2006 |
CoCoME with Securitys S Greiner, M Herda KIT, 2017 | 4 | 2017 |
Poster: Security in e-voting D Bruns, HQ Do, S Greiner, M Herda, M Mohr, E Scapin, T Truderung, ... 36th IEEE Symposium on Security and Privacy (S & P 2015), Poster Session, 2015 | 4 | 2015 |
A supplier’s perspective on threat analysis and risk assessment according to ISO/SAE 21434 S Greiner, M Massierer, C Loderhose, B Lutz, F Stumpf, F Wiemer 20th escar Europe-The World’s Leading Automotive Cyber Security Conference …, 2022 | 3 | 2022 |
Proving correctness and security of two-party computation implemented in Java in presence of a semi-honest sender F Böhl, S Greiner, P Scheidecker Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014 | 3 | 2014 |
Compositionality of component fault trees S Greiner, P Munk, A Nordmann International Symposium on Model-Based Safety and Assessment, 125-140, 2019 | 2 | 2019 |
A framework for non-interference in component-based systems S Greiner Dissertation, Karlsruhe, Karlsruher Institut für Technologie (KIT), 2018, 2018 | 2 | 2018 |
Feature-based software architecture analysis to identify safety and security interactions Priyadarshini, S Greiner, M Massierer 2023 IEEE 20th International Conference on Software Architecture (ICSA), 12-22, 2023 | 1 | 2023 |
A Method for Identifying Inconsistencies between Functional Safety and Cybersecurity of Autonomous Vehicles Priyadarshini, S Greiner, M Massierer 6th International Workshop on Critical Automotive Applications: Robustness …, 2021 | 1 | 2021 |
Modular verification of information flow security in component-based systems - proofs and proof of concept S Greiner, M Mohr, B Beckert KIT, 2017 | 1 | 2017 |
Non-interference with what-declassification in component-based systems D Grahl, S Greiner KIT, 2015 | 1 | 2015 |
Computer-implemented method and device for selecting a fuzzing method for testing a program code C Huth, A Sarkar, S Greiner US Patent 11,822,463, 2023 | | 2023 |