Follow
Juergen Graf
Title
Cited by
Cited by
Year
Using pointcut delta analysis to support evolution of aspect-oriented software
M Störzer, J Graf
21st IEEE International Conference on Software Maintenance (ICSM'05), 653-656, 2005
1422005
Using joana for information flow control in java programs-a practical guide
J Graf, M Hecker, M Mohr
Gesellschaft für Informatik eV, 2013
902013
A framework for the cryptographic verification of Java-like programs
R Küsters, T Truderung, J Graf
2012 IEEE 25th Computer Security Foundations Symposium, 198-212, 2012
652012
Checking probabilistic noninterference using JOANA
G Snelting, D Giffhorn, J Graf, C Hammer, M Hecker, M Mohr, ...
it-Information Technology 56 (6), 280-287, 2014
512014
Speeding up context-, object-and field-sensitive SDG generation
J Graf
2010 10th IEEE Working Conference on Source Code Analysis and Manipulation …, 2010
432010
JoDroid: Adding Android Support to a Static Information Flow Control Tool.
M Mohr, J Graf, M Hecker
Software Engineering (Workshops), 140-145, 2015
282015
Extending and Applying a Framework for the Cryptographic Verification of Java Programs
R Küsters, E Scapin, T Truderung, J Graf
Principles of Security and Trust, 220--239, 2014
242014
Information Flow Control with System Dependence Graphs - Improving Modularity, Scalability and Precision for Object Oriented Languages
J Graf
Karlsruher Institut für Technologie (KIT), 2016
16*2016
Checking applications using security APIs with JOANA
J Graf, M Hecker, M Mohr, G Snelting
8th International Workshop on Analysis of Security APIs, 2015
162015
On improvements of low-deterministic security
J Breitner, J Graf, M Hecker, M Mohr, G Snelting
Principles of Security and Trust: 5th International Conference, POST 2016 …, 2016
132016
Tool demonstration: JOANA
J Graf, M Hecker, M Mohr, G Snelting
Principles of Security and Trust: 5th International Conference, POST 2016 …, 2016
102016
Lock-sensitive interference analysis for java: Combining program dependence graphs with dynamic pushdown networks
J Graf, M Hecker, M Mohr, B Nordhoff
Technical report, January 2013. 1st International, 2013
102013
Low-Deterministic Security For Low-Nondeterministic Programs
S Bischof, J Breitner, J Graf, M Hecker, M Mohr, G Snelting
Journal of Computer Security 26 (3), 335-366, 2018
92018
A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs
R Küsters, T Truderung, B Beckert, D Bruns, J Graf, C Scheben
62013
Sicherheitsanalyse mit JOANA
J Graf, M Hecker, M Mohr, G Snelting
Gesellschaft für Informatik eV, 2016
42016
Checking probabilistic noninterference using JOANA
G Snelting, D Giffhorn, J Graf, C Hammer, M Hecker, M Mohr, ...
Information Technology, 2015
32015
Improving and evaluating the scalability of precise system dependence graphs for object-oriented languages
J Graf
Univ., Fak. für Informatik, 2009
32009
A Framework for the Cryptographic Verification of Java-like Programs Technical Report
R Küsters, T Truderung, J Graf
2012
The system can't perform the operation now. Try again later.
Articles 1–18