Heiko Mantel

Orcid: 0000-0002-6586-5529

Affiliations:
  • Darmstadt University of Technology, Germany


According to our database1, Heiko Mantel authored at least 85 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation.
IACR Cryptol. ePrint Arch., 2024

Towards a More Sustainable Re-engineering of Heterogeneous Distributed Systems Using Cooperating Run-Time Monitors.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies, 2024

Automating Software Re-Engineering Introduction to the ISoLA 2024 Track.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies, 2024

2022
Improving Loop Parallelization by a Combination of Static and Dynamic Analyses in HLS.
ACM Trans. Reconfigurable Technol. Syst., 2022

Automating Software Re-engineering: Introduction to the ISoLA 2022 Track.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering, 2022

2021
Design-time performance modeling of compositional parallel programs.
Parallel Comput., 2021

Tool-Supported Mini-App Extraction to Facilitate Program Analysis and Parallelization.
Proceedings of the ICPP 2021: 50th International Conference on Parallel Processing, Lemont, IL, USA, August 9, 2021

Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
A Unifying Framework for Dynamic Monitoring and a Taxonomy of Optimizations.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles, 2020

Automating Software Re-engineering - Introduction to the ISoLA 2020 Track.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles, 2020

RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Designing Efficient Parallel Software via Compositional Performance Modeling.
Proceedings of the IEEE/ACM International Workshop on Programming and Performance Visualization Tools, 2019

On the Meaning and Purpose of Attack Trees.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

From Attacker Models to Reliable Security.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
An Isabelle/HOL Formalization of the Modular Assembly Kit for Security Properties.
Arch. Formal Proofs, 2018

An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Decentralized Dynamic Security Enforcement for Mobile Applications with CliSeAuDroid.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

A Comparative Study Across Static and Dynamic Side-Channel Countermeasures.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

How Secure Is Green IT? The Case of Software-Based Energy Side Channels.
Proceedings of the Computer Security, 2018

2017
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
IACR Cryptol. ePrint Arch., 2017

Towards Accelerated Usage Control Based on Access Correlations.
Proceedings of the Secure IT Systems, 2017

Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

A Systematic Study of Cache Side Channels Across AES Implementations.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

AVR Processors as a Platform for Language-Based Security.
Proceedings of the Computer Security - ESORICS 2017, 2017

Taming Message-Passing Communication in Compositional Reasoning About Confidentiality.
Proceedings of the Programming Languages and Systems - 15th Asian Symposium, 2017

2016
Scalable offline monitoring of temporal specifications.
Formal Methods Syst. Des., 2016

2015
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
Int. J. Secur. Softw. Eng., 2015

Enforcing Usage Constraints on Credentials for Web Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2015

An Automatic Inference of Minimal Security Types.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Transforming Out Timing Leaks, More or Less.
Proceedings of the Computer Security - ESORICS 2015, 2015

Hybrid Monitors for Concurrent Noninterference.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Reliably secure software systems.
it Inf. Technol., 2014

A Formalization of Assumptions and Guarantees for Compositional Noninterference.
Arch. Formal Proofs, 2014

A Formalization of Strong Security.
Arch. Formal Proofs, 2014

A Formalization of Declassification with WHAT-and-WHERE-Security.
Arch. Formal Proofs, 2014

Scalable Offline Monitoring.
Proceedings of the Runtime Verification - 5th International Conference, 2014

CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Noninterference under Weak Memory Models.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Cassandra: Towards a Certifying App Store for Android.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

2012
Scheduler-Independent Declassification.
Proceedings of the Mathematics of Program Construction - 11th International Conference, 2012

Types vs. PDGs in Information Flow Analysis.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2012

2011
Information Flow and Noninterference.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Service Automata.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

Assumptions and Guarantees for Compositional Noninterference.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2010
Flexible Scheduler-Independent Security.
Proceedings of the Computer Security, 2010

2009
Declassification with Explicit Reference Points.
Proceedings of the Computer Security, 2009

2008
Preface.
J. Autom. Reason., 2008

Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

Who Can Declassify?.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

2007
Security of multi-agent systems: A case study on comparison shopping.
J. Appl. Log., 2007

Transformational typing and unification for automatically correcting insecure programs.
Int. J. Inf. Sec., 2007

Controlling the What and Where of Declassification in Language-Based Security.
Proceedings of the Programming Languages and Systems, 2007

07091 Abstracts Collection - Mobility, Ubiquity and Security.
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007

07091 Executive Summary - Mobility, Ubiquity and Security.
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007

Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
Combining Different Proof Techniques for Verifying Information Flow Security.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2006

2005
Preface to the special issue of selected papers from FCS/VERIFY 2002.
Int. J. Inf. Sec., 2005

Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

The framework of selective interleaving functions and the modular assembly kit.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

Exploiting Generic Aspects of Security Models in Formal Developments.
Proceedings of the Mechanizing Mathematical Reasoning, 2005

2004
A Matrix Characterization for Multiplicative Exponential Linear Logic.
J. Autom. Reason., 2004

Controlled Declassification Based on Intransitive Noninterference.
Proceedings of the Programming Languages and Systems: Second Asian Symposium, 2004

2003
A uniform framework for the formal specification and verification of information flow security.
PhD thesis, 2003

Informationsflusskontrolle als Grundlage für die Sicherheit von Multi-Agenten-Systemen.
Prax. Inf.verarb. Kommun., 2003

A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
J. Comput. Secur., 2003

03411 Abstracts Collection - Language Based Security.
Proceedings of the Language-Based Security, 5.-10. October 2003, 2003

03411 Final Report - Language Based Security.
Proceedings of the Language-Based Security, 5.-10. October 2003, 2003

2002
On the Composition of Secure Systems.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Securing Communication in a Concurrent Language.
Proceedings of the Static Analysis, 9th International Symposium, 2002

2001
Preserving Information Flow Properties under Refinement.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Information Flow Control and Applications - Bridging a Gap.
Proceedings of the FME 2001: Formal Methods for Increasing Software Productivity, 2001

A Generic Approach to the Security of Multi-Threaded Programs.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
VSE: formal methods meet industrial needs.
Int. J. Softw. Tools Technol. Transf., 2000

A case study in the mechanical verification of fault tolerance.
J. Exp. Theor. Artif. Intell., 2000

Unwinding Possibilistic Security Properties.
Proceedings of the Computer Security, 2000

Possibilistic Definitions of Security - An Assembly Kit.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

1999
Towards an Evolutionary Formal Software-Development Using CASL.
Proceedings of the Recent Trends in Algebraic Development Techniques, 1999

linTAP: A Tableau Prover for Linear Logic.
Proceedings of the Automated Reasoning with Analytic Tableaux and Related Methods, 1999

System Description: inka 5.0 - A Logic Voyager.
Proceedings of the Automated Deduction, 1999

1998
Simultaneous Quantifier Elimination.
Proceedings of the KI-98: Advances in Artificial Intelligence, 1998

A Matrix Characterization for MELL.
Proceedings of the Logics in Artificial Intelligence, European Workshop, 1998

VSE: Controlling the Complexity in Formal Software Developments.
Proceedings of the Applied Formal Methods, 1998

1997
Connection-Based Proof Construction in Linear Logic.
Proceedings of the Automated Deduction, 1997


  Loading...