Publications
[Google scholar]
[DBLP]
Journal Articles
- The ins and outs of first-order runtime verification.
(Co-authors: Andreas Bauer, and Gil Vegliach)
Formal Methods in System Design, 46(3):286-316, 2015.
[pdf] [doi] [bibtex]
Conference Papers
- Monitoring Real Android Malware.
(Co-author: Andreas Bauer)
Proc. 6th International Conference on Runtime Verification (RV),
volume 9333 of LNCS, pp. 136-152. Springer, Sep. 2015.
[pdf] [MonitorMe] [DroidTracer] [slides] [bibtex] - From propositional to first-order monitoring.
(Co-authors: Andreas Bauer, and Gil Vegliach)
In Proc. 4th International Conference on Runtime Verification (RV),
volume 8174 of LNCS, pp. 59-75. Springer, Sep. 2013.
[pdf (with proofs)] [Ltlfo2mon (on github)] [slides] [bibtex] -
Runtime Verification meets Android Security.
(Co-authors: Andreas Bauer, and Gil Vegliach)
In Proc. 4th NASA Formal Methods Symposium (NFM),
volume 7226 of LNCS, pp. 174-180. Springer, Apr. 2012.
[pdf] [video] [bibtex] -
Supporting the Development and Documentation of ISO 27001
Information Security Management Systems through Security
Requirements Engineering Approaches.
(Co-authors: Kristian Beckers, Stephan Faßbender, Maritta Heisel, and Holger Schmidt)
In Proc. 4th International Symposium on Engineering Secure Software and Systems (ESSoS), volume 7159 of LNCS, pp. 14-21. Springer, Feb. 2012. [bibtex] -
A Pattern-Based Method for Identifying and Analyzing Laws.
(Co-authors: Kristian Beckers, Stephan Faßbender, and Holger Schmidt)
In Proc. 18th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ),
volume 7195 of LNCS, pp. 256-262. Springer, Mar. 2012. [bibtex] -
Pattern-Based Support for Context Establishment and Asset
Identification of the ISO 27000 in the Field of Cloud
Computing.
(Co-authors: Kristian Beckers, Holger Schmidt, and Stephan Faßbender)
In Proc. 6th International Conference on Availability, Reliability and Security (ARES),
pp. 327-333. IEEE, August 2011. [bibtex]