Using pointcut delta analysis to support evolution of aspect-oriented software M Störzer, J Graf 21st IEEE International Conference on Software Maintenance (ICSM'05), 653-656, 2005 | 142 | 2005 |
Using joana for information flow control in java programs-a practical guide J Graf, M Hecker, M Mohr Gesellschaft für Informatik eV, 2013 | 90 | 2013 |
A framework for the cryptographic verification of Java-like programs R Küsters, T Truderung, J Graf 2012 IEEE 25th Computer Security Foundations Symposium, 198-212, 2012 | 65 | 2012 |
Checking probabilistic noninterference using JOANA G Snelting, D Giffhorn, J Graf, C Hammer, M Hecker, M Mohr, ... it-Information Technology 56 (6), 280-287, 2014 | 51 | 2014 |
Speeding up context-, object-and field-sensitive SDG generation J Graf 2010 10th IEEE Working Conference on Source Code Analysis and Manipulation …, 2010 | 43 | 2010 |
JoDroid: Adding Android Support to a Static Information Flow Control Tool. M Mohr, J Graf, M Hecker Software Engineering (Workshops), 140-145, 2015 | 28 | 2015 |
Extending and Applying a Framework for the Cryptographic Verification of Java Programs R Küsters, E Scapin, T Truderung, J Graf Principles of Security and Trust, 220--239, 2014 | 24 | 2014 |
Information Flow Control with System Dependence Graphs - Improving Modularity, Scalability and Precision for Object Oriented Languages J Graf Karlsruher Institut für Technologie (KIT), 2016 | 16* | 2016 |
Checking applications using security APIs with JOANA J Graf, M Hecker, M Mohr, G Snelting 8th International Workshop on Analysis of Security APIs, 2015 | 16 | 2015 |
On improvements of low-deterministic security J Breitner, J Graf, M Hecker, M Mohr, G Snelting Principles of Security and Trust: 5th International Conference, POST 2016 …, 2016 | 13 | 2016 |
Tool demonstration: JOANA J Graf, M Hecker, M Mohr, G Snelting Principles of Security and Trust: 5th International Conference, POST 2016 …, 2016 | 10 | 2016 |
Lock-sensitive interference analysis for java: Combining program dependence graphs with dynamic pushdown networks J Graf, M Hecker, M Mohr, B Nordhoff Technical report, January 2013. 1st International, 2013 | 10 | 2013 |
Low-Deterministic Security For Low-Nondeterministic Programs S Bischof, J Breitner, J Graf, M Hecker, M Mohr, G Snelting Journal of Computer Security 26 (3), 335-366, 2018 | 9 | 2018 |
A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs R Küsters, T Truderung, B Beckert, D Bruns, J Graf, C Scheben | 6 | 2013 |
Sicherheitsanalyse mit JOANA J Graf, M Hecker, M Mohr, G Snelting Gesellschaft für Informatik eV, 2016 | 4 | 2016 |
Checking probabilistic noninterference using JOANA G Snelting, D Giffhorn, J Graf, C Hammer, M Hecker, M Mohr, ... Information Technology, 2015 | 3 | 2015 |
Improving and evaluating the scalability of precise system dependence graphs for object-oriented languages J Graf Univ., Fak. für Informatik, 2009 | 3 | 2009 |
A Framework for the Cryptographic Verification of Java-like Programs Technical Report R Küsters, T Truderung, J Graf | | 2012 |