Christoph Baumann

Orcid: 0000-0001-7712-5379

According to our database1, Christoph Baumann authored at least 25 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Performance Analysis and Optimizations of ERO2.0 Fusion Code.
Proceedings of the Platform for Advanced Scientific Computing Conference, 2024

Efficient and Timely Revocation of V2X Credentials.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud Networks.
Proceedings of the 27th Conference on Innovation in Clouds, Internet and Networks, 2024

Understanding Trust Relationships in Cloud-Based Confidential Computing.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs.
ACM Trans. Priv. Secur., August, 2023

Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust.
Proceedings of the IEEE Secure Development Conference, 2023

Exploring the Environmental Benefits of In-Process Isolation for Software Resilience.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Rewind & Discard: Improving Software Resilience using Isolated Domains.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems.
Proceedings of the 16th IEEE International Conference on Cloud Computing, 2023

2022
Unlimited Lives: Secure In-Process Rollback with Isolated Domains.
CoRR, 2022

A Case Study in Information Flow Refinement for Low Level Systems.
Proceedings of the Logic of Software. A Tasting Menu of Formal Methods, 2022

2021
Network Policies in Kubernetes: Performance Evaluation and Security Analysis.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021

On Compositional Information Flow Aware Refinement.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2019
On the verification of system-level information flow properties for virtualized execution platforms.
J. Cryptogr. Eng., 2019

2018
Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

2017
Compositional Verification of Security Properties for Embedded Execution Platforms.
Proceedings of the PROOFS 2017, 2017

2016
Provably secure memory isolation for Linux on ARM.
J. Comput. Secur., 2016

Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

A high assurance virtualization platform for ARMv8.
Proceedings of the European Conference on Networks and Communications, 2016

System Architecture - An Ordinary Engineering Discipline
Springer, ISBN: 978-3-319-43065-2, 2016

2014
Ownership-based order reduction and simulation in shared-memory concurrent computer systems.
PhD thesis, 2014

Simulation of the System-Wide Impact of Power-to-Gas Energy Storages by Multi-stage Optimization.
Proceedings of the Operations Research Proceedings 2014, 2014

2012
Lessons Learned From Microkernel Verification -- Specification is the New Bottleneck
Proceedings of the Proceedings Seventh Conference on Systems Software Verification, 2012

2011
Proving Memory Separation in a Microkernel by Code Level Verification.
Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2011

2009
Formal Verification of a Microkernel Used in Dependable Software Systems.
Proceedings of the Computer Safety, 2009


  Loading...