Juergen Graf
Title
Cited by
Cited by
Year
Using pointcut delta analysis to support evolution of aspect-oriented software
M Störzer, J Graf
21st IEEE International Conference on Software Maintenance (ICSM'05), 653-656, 2005
1422005
Using JOANA for Information Flow Control in Java Programs-A Practical Guide.
J Graf, M Hecker, M Mohr
Software Engineering (Workshops) 215, 123-138, 2013
752013
A framework for the cryptographic verification of Java-like programs
R Küsters, T Truderung, J Graf
2012 IEEE 25th Computer Security Foundations Symposium, 198-212, 2012
502012
Checking probabilistic noninterference using JOANA
G Snelting, D Giffhorn, J Graf, C Hammer, M Hecker, M Mohr, ...
it-Information Technology 56 (6), 280-287, 2014
332014
Speeding up context-, object-and field-sensitive SDG generation
J Graf
2010 10th IEEE Working Conference on Source Code Analysis and Manipulation …, 2010
332010
JoDroid: Adding Android Support to a Static Information Flow Control Tool.
M Mohr, J Graf, M Hecker
Software Engineering (Workshops), 140-145, 2015
242015
Extending and Applying a Framework for the Cryptographic Verification of Java Programs
R Küsters, E Scapin, T Truderung, J Graf
Principles of Security and Trust, 220--239, 2014
242014
On improvements of low-deterministic security
J Breitner, J Graf, M Hecker, M Mohr, G Snelting
International Conference on Principles of Security and Trust, 68-88, 2016
122016
Information Flow Control with System Dependence Graphs - Improving Modularity, Scalability and Precision for Object Oriented Languages
J Graf
Karlsruher Institut für Technologie (KIT), 2016
112016
Tool demonstration: JOANA
J Graf, M Hecker, M Mohr, G Snelting
International Conference on Principles of Security and Trust, 89-93, 2016
102016
Checking applications using security APIs with JOANA
J Graf, M Hecker, M Mohr, G Snelting
8th International Workshop on Analysis of Security APIs, 2015
92015
Lock-sensitive interference analysis for java: Combining program dependence graphs with dynamic pushdown networks
J Graf, M Hecker, M Mohr, B Nordhoff
Technical report, January 2013. 1st International, 2013
92013
Low-Deterministic Security For Low-Nondeterministic Programs
S Bischof, J Breitner, J Graf, M Hecker, M Mohr, G Snelting
Journal of Computer Security 26 (3), 335-366, 2018
82018
A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs
R Küsters, T Truderung, B Beckert, D Bruns, J Graf, C Scheben
62013
Improving and evaluating the scalability of precise system dependence graphs for object-oriented languages
J Graf
Univ., Fak. für Informatik, 2009
32009
Sicherheitsanalyse mit JOANA
J Graf, M Hecker, M Mohr, G Snelting
Sicherheit 2016-Sicherheit, Schutz und Zuverlässigkeit, 2016
22016
Checking probabilistic noninterference using JOANA
G Snelting, D Giffhorn, J Graf, C Hammer, M Hecker, M Mohr, ...
Information Technology, 2015
12015
A Framework for the Cryptographic Verification of Java-like Programs Technical Report
R Küsters, T Truderung, J Graf
2012
The system can't perform the operation now. Try again later.
Articles 1–18