default search action
Heiko Mantel
Person information
- affiliation: Darmstadt University of Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel, Hossein Yalame:
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation. IACR Cryptol. ePrint Arch. 2024: 533 (2024) - 2022
- [j18]Florian Dewald, Johanna Rohde, Christian Hochberger, Heiko Mantel:
Improving Loop Parallelization by a Combination of Static and Dynamic Analyses in HLS. ACM Trans. Reconfigurable Technol. Syst. 15(3): 31:1-31:31 (2022) - [c59]Serge Demeyer, Reiner Hähnle, Heiko Mantel:
Automating Software Re-engineering: Introduction to the ISoLA 2022 Track. ISoLA (2) 2022: 195-200 - 2021
- [j17]Fabian Czappa, Alexandru Calotoiu, Thomas Höhl, Heiko Mantel, Toni Nguyen, Felix Wolf:
Design-time performance modeling of compositional parallel programs. Parallel Comput. 108: 102839 (2021) - [c58]Alexandra Weber, Oleg Nikiforov, Alexander Sauer, Johannes Schickel, Gernot Alber, Heiko Mantel, Thomas Walther:
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography. ESORICS (2) 2021: 235-256 - [c57]Jan-Patrick Lehr, Christian H. Bischof, Florian Dewald, Heiko Mantel, Mohammad Norouzi, Felix Wolf:
Tool-Supported Mini-App Extraction to Facilitate Program Analysis and Parallelization. ICPP 2021: 35:1-35:10 - 2020
- [c56]Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert, Tim Weißmantel:
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation. CANS 2020: 505-525 - [c55]Serge Demeyer, Reiner Hähnle, Heiko Mantel:
Automating Software Re-engineering - Introduction to the ISoLA 2020 Track. ISoLA (2) 2020: 3-8 - [c54]Marie-Christine Jakobs, Heiko Mantel:
A Unifying Framework for Dynamic Monitoring and a Taxonomy of Optimizations. ISoLA (2) 2020: 72-92
2010 – 2019
- 2019
- [c53]Heiko Mantel:
From Attacker Models to Reliable Security. AsiaCCS 2019: 547-548 - [c52]Heiko Mantel, Christian W. Probst:
On the Meaning and Purpose of Attack Trees. CSF 2019: 184-199 - [c51]Alexandru Calotoiu, Thomas Höhl, Heiko Mantel, Toni Nguyen, Felix Wolf:
Designing Efficient Parallel Software via Compositional Performance Modeling. ProTools@SC 2019: 17-24 - 2018
- [j16]Oliver Bracevac, Richard Gay, Sylvia Grewe, Heiko Mantel, Henning Sudbrock, Markus Tasch:
An Isabelle/HOL Formalization of the Modular Assembly Kit for Security Properties. Arch. Formal Proofs 2018 (2018) - [c50]Heiko Mantel, Johannes Schickel, Alexandra Weber, Friedrich Weber:
How Secure Is Green IT? The Case of Software-Based Energy Side Channels. ESORICS (1) 2018: 218-239 - [c49]Tobias Hamann, Heiko Mantel:
Decentralized Dynamic Security Enforcement for Mobile Applications with CliSeAuDroid. FPS 2018: 29-45 - [c48]Yuri Gil Dantas, Tobias Hamann, Heiko Mantel:
A Comparative Study Across Static and Dynamic Side-Channel Countermeasures. FPS 2018: 173-189 - [c47]Tobias Hamann, Mihai Herda, Heiko Mantel, Martin Mohr, David Schneider, Markus Tasch:
A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode. NordSec 2018: 437-453 - [c46]Yuri Gil Dantas, Richard Gay, Tobias Hamann, Heiko Mantel, Johannes Schickel:
An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior. SEC 2018: 323-338 - 2017
- [c45]Ximeng Li, Heiko Mantel, Markus Tasch:
Taming Message-Passing Communication in Compositional Reasoning About Confidentiality. APLAS 2017: 45-66 - [c44]Florian Dewald, Heiko Mantel, Alexandra Weber:
AVR Processors as a Platform for Language-Based Security. ESORICS (1) 2017: 427-445 - [c43]Heiko Mantel, Alexandra Weber, Boris Köpf:
A Systematic Study of Cache Side Channels Across AES Implementations. ESSoS 2017: 213-230 - [c42]Richard Gay, Jinwei Hu, Heiko Mantel, Sogol Mazaheri:
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks. FPS 2017: 18-34 - [c41]Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber:
Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics. FPS 2017: 225-241 - [c40]Richard Gay, Jinwei Hu, Heiko Mantel, Johannes Schickel:
Towards Accelerated Usage Control Based on Access Correlations. NordSec 2017: 245-261 - [i5]Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber:
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics. IACR Cryptol. ePrint Arch. 2017: 951 (2017) - 2016
- [j15]David A. Basin, Germano Caronni, Sarah Ereth, Matús Harvan, Felix Klaedtke, Heiko Mantel:
Scalable offline monitoring of temporal specifications. Formal Methods Syst. Des. 49(1-2): 75-108 (2016) - 2015
- [j14]Richard Gay, Heiko Mantel, Henning Sudbrock:
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels. Int. J. Secur. Softw. Eng. 6(2): 1-22 (2015) - [c39]Aslan Askarov, Stephen Chong, Heiko Mantel:
Hybrid Monitors for Concurrent Noninterference. CSF 2015: 137-151 - [c38]Heiko Mantel, Artem Starostin:
Transforming Out Timing Leaks, More or Less. ESORICS (1) 2015: 447-467 - [c37]Dominik Bollmann, Steffen Lortz, Heiko Mantel, Artem Starostin:
An Automatic Inference of Minimal Security Types. ICISS 2015: 395-415 - [c36]Heiko Mantel, Markus Müller-Olm, Matthias Perner, Alexander Wenner:
Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis. LOPSTR 2015: 201-217 - [c35]Jinwei Hu, Heiko Mantel, Sebastian Ruhleder:
Enforcing Usage Constraints on Credentials for Web Applications. SEC 2015: 112-125 - 2014
- [j13]Sylvia Grewe, Alexander Lux, Heiko Mantel, Jens Sauer:
A Formalization of Declassification with WHAT-and-WHERE-Security. Arch. Formal Proofs 2014 (2014) - [j12]Sylvia Grewe, Alexander Lux, Heiko Mantel, Jens Sauer:
A Formalization of Strong Security. Arch. Formal Proofs 2014 (2014) - [j11]Sylvia Grewe, Heiko Mantel, Daniel Schoepe:
A Formalization of Assumptions and Guarantees for Compositional Noninterference. Arch. Formal Proofs 2014 (2014) - [j10]Heiko Mantel:
Reliably secure software systems. it Inf. Technol. 56(6): 265-266 (2014) - [c34]Steffen Lortz, Heiko Mantel, Artem Starostin, Timo Bähr, David Schneider, Alexandra Weber:
Cassandra: Towards a Certifying App Store for Android. SPSM@CCS 2014: 93-104 - [c33]Heiko Mantel, Matthias Perner, Jens Sauer:
Noninterference under Weak Memory Models. CSF 2014: 80-94 - [c32]Richard Gay, Jinwei Hu, Heiko Mantel:
CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement. ICISS 2014: 378-398 - [c31]David A. Basin, Germano Caronni, Sarah Ereth, Matús Harvan, Felix Klaedtke, Heiko Mantel:
Scalable Offline Monitoring. RV 2014: 31-47 - 2012
- [c30]Heiko Mantel, Henning Sudbrock:
Types vs. PDGs in Information Flow Analysis. LOPSTR 2012: 106-121 - [c29]Alexander Lux, Heiko Mantel, Matthias Perner:
Scheduler-Independent Declassification. MPC 2012: 25-47 - [e4]Markus Aderhold, Serge Autexier, Heiko Mantel:
6th International Verification Workshop, VERIFY-2010, Edinburgh, UK, July 20-21, 2010. EPiC Series in Computing 3, EasyChair 2012 [contents] - 2011
- [c28]Heiko Mantel, David Sands, Henning Sudbrock:
Assumptions and Guarantees for Compositional Noninterference. CSF 2011: 218-232 - [c27]Richard Gay, Heiko Mantel, Barbara Sprick:
Service Automata. Formal Aspects in Security and Trust 2011: 148-163 - [r1]Heiko Mantel:
Information Flow and Noninterference. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 605-607 - 2010
- [c26]Heiko Mantel, Henning Sudbrock:
Flexible Scheduler-Independent Security. ESORICS 2010: 116-133
2000 – 2009
- 2009
- [c25]Alexander Lux, Heiko Mantel:
Declassification with Explicit Reference Points. ESORICS 2009: 69-85 - 2008
- [j9]Serge Autexier, Heiko Mantel, Stephan Merz, Tobias Nipkow:
Preface. J. Autom. Reason. 41(3-4): 191-192 (2008) - [c24]Alexander Lux, Heiko Mantel:
Who Can Declassify?. Formal Aspects in Security and Trust 2008: 35-49 - [c23]Heiko Mantel, Henning Sudbrock:
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels. Formal Aspects in Security and Trust 2008: 67-81 - 2007
- [j8]Boris Köpf, Heiko Mantel:
Transformational typing and unification for automatically correcting insecure programs. Int. J. Inf. Sec. 6(2-3): 107-131 (2007) - [j7]Dieter Hutter, Heiko Mantel, Ina Schaefer, Axel Schairer:
Security of multi-agent systems: A case study on comparison shopping. J. Appl. Log. 5(2): 303-332 (2007) - [c22]Heiko Mantel, Henning Sudbrock:
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. CSF 2007: 326-340 - [c21]Heiko Mantel, Alexander Reinhard:
Controlling the What and Where of Declassification in Language-Based Security. ESOP 2007: 141-156 - [e3]Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel:
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-887-9 [contents] - [e2]Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers, Andrei Sabelfeld:
Mobility, Ubiquity and Security, 25.02. - 02.03.2007. Dagstuhl Seminar Proceedings 07091, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - [i4]Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers, Andrei Sabelfeld:
07091 Executive Summary - Mobility, Ubiquity and Security. Mobility, Ubiquity and Security 2007 - [i3]Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers, Andrei Sabelfeld:
07091 Abstracts Collection - Mobility, Ubiquity and Security. Mobility, Ubiquity and Security 2007 - 2006
- [c20]Heiko Mantel, Henning Sudbrock, Tina Kraußer:
Combining Different Proof Techniques for Verifying Information Flow Security. LOPSTR 2006: 94-110 - 2005
- [j6]Serge Autexier, Iliano Cervesato, Heiko Mantel:
Preface to the special issue of selected papers from FCS/VERIFY 2002. Int. J. Inf. Sec. 4(1-2): 1 (2005) - [c19]Heiko Mantel, Axel Schairer:
Exploiting Generic Aspects of Security Models in Formal Developments. Mechanizing Mathematical Reasoning 2005: 452-475 - [c18]Heiko Mantel:
The framework of selective interleaving functions and the modular assembly kit. FMSE 2005: 53-62 - [c17]Boris Köpf, Heiko Mantel:
Eliminating Implicit Information Leaks by Transformational Typing and Unification. Formal Aspects in Security and Trust 2005: 47-62 - [e1]Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld:
Language-Based Security, 5.-10. October 2003. Dagstuhl Seminar Proceedings 03411, IBFI, Schloss Dagstuhl, Germany 2005 [contents] - 2004
- [j5]Christoph Kreitz, Heiko Mantel:
A Matrix Characterization for Multiplicative Exponential Linear Logic. J. Autom. Reason. 32(2): 121-166 (2004) - [c16]Heiko Mantel, David Sands:
Controlled Declassification Based on Intransitive Noninterference. APLAS 2004: 129-145 - 2003
- [b1]Heiko Mantel:
A uniform framework for the formal specification and verification of information flow security. Saarland University, Saarbrücken, Germany, 2003, pp. 1-275 - [j4]Heiko Mantel, Andrei Sabelfeld:
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs. J. Comput. Secur. 11(4): 615-676 (2003) - [j3]Dieter Hutter, Heiko Mantel, Axel Schairer:
Informationsflusskontrolle als Grundlage für die Sicherheit von Multi-Agenten-Systemen. Prax. Inf.verarb. Kommun. 26(1): 39-47 (2003) - [i2]Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld:
03411 Final Report - Language Based Security. Language Based Security 2003 - [i1]Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld:
03411 Abstracts Collection - Language Based Security. Language Based Security 2003 - 2002
- [c15]Andrei Sabelfeld, Heiko Mantel:
Securing Communication in a Concurrent Language. SAS 2002: 376-394 - [c14]Heiko Mantel:
On the Composition of Secure Systems. S&P 2002: 88-101 - 2001
- [c13]Heiko Mantel, Andrei Sabelfeld:
A Generic Approach to the Security of Multi-Threaded Programs. CSFW 2001: 126-142 - [c12]Heiko Mantel:
Information Flow Control and Applications - Bridging a Gap. FME 2001: 153-172 - [c11]Heiko Mantel:
Preserving Information Flow Properties under Refinement. S&P 2001: 78-91 - 2000
- [j2]Heiko Mantel, Felix C. Gärtner:
A case study in the mechanical verification of fault tolerance. J. Exp. Theor. Artif. Intell. 12(4): 473-487 (2000) - [j1]Serge Autexier, Dieter Hutter, Bruno Langenstein, Heiko Mantel, Georg Rock, Axel Schairer, Werner Stephan, Roland Vogt, Andreas Wolpers:
VSE: formal methods meet industrial needs. Int. J. Softw. Tools Technol. Transf. 3(1): 66-77 (2000) - [c10]Heiko Mantel:
Possibilistic Definitions of Security - An Assembly Kit. CSFW 2000: 185-199 - [c9]Heiko Mantel:
Unwinding Possibilistic Security Properties. ESORICS 2000: 238-254 - [c8]Heiko Mantel, Felix C. Gärtner:
A Case Study in the Mechanical Verification of Fault Tolerance. FLAIRS 2000: 341-345
1990 – 1999
- 1999
- [c7]Serge Autexier, Dieter Hutter, Heiko Mantel, Axel Schairer:
System Description: inka 5.0 - A Logic Voyager. CADE 1999: 207-211 - [c6]Heiko Mantel, Jens Otten:
linTAP: A Tableau Prover for Linear Logic. TABLEAUX 1999: 217-231 - [c5]Serge Autexier, Dieter Hutter, Heiko Mantel, Axel Schairer:
Towards an Evolutionary Formal Software-Development Using CASL. WADT 1999: 73-88 - 1998
- [c4]Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel:
VSE: Controlling the Complexity in Formal Software Developments. FM-Trends 1998: 351-358 - [c3]Heiko Mantel, Christoph Kreitz:
A Matrix Characterization for MELL. JELIA 1998: 169-183 - [c2]Serge Autexier, Heiko Mantel, Werner Stephan:
Simultaneous Quantifier Elimination. KI 1998: 141-152 - 1997
- [c1]Christoph Kreitz, Heiko Mantel, Jens Otten, Stephan Schmitt:
Connection-Based Proof Construction in Linear Logic. CADE 1997: 207-221
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint