default search action
Christoph Baumann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Gianluca Scopelliti, Christoph Baumann, Jan Tobias Mühlberg:
Understanding Trust Relationships in Cloud-Based Confidential Computing. EuroS&P Workshops 2024: 169-176 - [c18]José Santos, Eddy Truyen, Christoph Baumann, Filip De Turck, Gerald Budigiri, Wouter Joosen:
Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud Networks. ICIN 2024: 222-227 - [c17]Gianluca Scopelliti, Christoph Baumann, Fritz Alder, Eddy Truyen, Jan Tobias Mühlberg:
Efficient and Timely Revocation of V2X Credentials. NDSS 2024 - [c16]Marta Garcia-Gasulla, Joan Vinyals-Ylla-Catala, Juri Romazanov, Christoph Baumann, Dmitry Matveev:
Performance Analysis and Optimizations of ERO2.0 Fusion Code. PASC 2024: 18:1-18:11 - 2023
- [j3]Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg:
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs. ACM Trans. Priv. Secur. 26(3): 39:1-39:46 (2023) - [c15]Gerald Budigiri, Christoph Baumann, Eddy Truyen, Jan Tobias Mühlberg, Wouter Joosen:
Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems. CLOUD 2023: 249-261 - [c14]Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Exploring the Environmental Benefits of In-Process Isolation for Software Resilience. DSN-S 2023: 203-205 - [c13]Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Rewind & Discard: Improving Software Resilience using Isolated Domains. DSN 2023: 402-416 - [c12]Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust. SecDev 2023: 54-66 - [i4]Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Exploring the Environmental Benefits of In-Process Isolation for Software Resilience. CoRR abs/2306.02131 (2023) - [i3]Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust. CoRR abs/2306.08127 (2023) - 2022
- [c11]Roberto Guanciale, Christoph Baumann, Pablo Buiras, Mads Dam, Hamed Nemati:
A Case Study in Information Flow Refinement for Low Level Systems. The Logic of Software. A Tasting Menu of Formal Methods 2022: 54-79 - [i2]Merve Turhan, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Unlimited Lives: Secure In-Process Rollback with Isolated Domains. CoRR abs/2205.03205 (2022) - [i1]Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg:
End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs. CoRR abs/2206.01041 (2022) - 2021
- [c10]Christoph Baumann, Mads Dam, Roberto Guanciale, Hamed Nemati:
On Compositional Information Flow Aware Refinement. CSF 2021: 1-16 - [c9]Gerald Budigiri, Christoph Baumann, Jan Tobias Mühlberg, Eddy Truyen, Wouter Joosen:
Network Policies in Kubernetes: Performance Evaluation and Security Analysis. EuCNC/6G Summit 2021: 407-412
2010 – 2019
- 2019
- [j2]Christoph Baumann, Oliver Schwarz, Mads Dam:
On the verification of system-level information flow properties for virtualized execution platforms. J. Cryptogr. Eng. 9(3): 243-261 (2019) - 2018
- [c8]Hamed Nemati, Christoph Baumann, Roberto Guanciale, Mads Dam:
Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels. POST 2018: 109-133 - 2017
- [c7]Christoph Baumann, Oliver Schwarz, Mads Dam:
Compositional Verification of Security Properties for Embedded Execution Platforms. PROOFS 2017: 1-16 - 2016
- [b2]Wolfgang J. Paul, Christoph Baumann, Petro Lutsyk, Sabine Schmaltz:
System Architecture - An Ordinary Engineering Discipline. Springer 2016, ISBN 978-3-319-43064-5, pp. 1-512 - [j1]Roberto Guanciale, Hamed Nemati, Mads Dam, Christoph Baumann:
Provably secure memory isolation for Linux on ARM. J. Comput. Secur. 24(6): 793-837 (2016) - [c6]Christoph Baumann, Mats Näslund, Christian Gehrmann, Oliver Schwarz, Hans Thorsen:
A high assurance virtualization platform for ARMv8. EuCNC 2016: 210-214 - [c5]Roberto Guanciale, Hamed Nemati, Christoph Baumann, Mads Dam:
Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures. IEEE Symposium on Security and Privacy 2016: 38-55 - 2014
- [b1]Christoph Baumann:
Ownership-based order reduction and simulation in shared-memory concurrent computer systems. Saarland University, 2014 - [c4]Christoph Baumann, Julia Schleibach, Albert Moser:
Simulation of the System-Wide Impact of Power-to-Gas Energy Storages by Multi-stage Optimization. OR 2014: 25-30 - 2012
- [c3]Christoph Baumann, Bernhard Beckert, Holger Blasum, Thorsten Bormer:
Lessons Learned From Microkernel Verification -- Specification is the New Bottleneck. SSV 2012: 18-32 - 2011
- [c2]Christoph Baumann, Thorsten Bormer, Holger Blasum, Sergey Tverdyshev:
Proving Memory Separation in a Microkernel by Code Level Verification. ISORC Workshops 2011: 25-32
2000 – 2009
- 2009
- [c1]Christoph Baumann, Bernhard Beckert, Holger Blasum, Thorsten Bormer:
Formal Verification of a Microkernel Used in Dependable Software Systems. SAFECOMP 2009: 187-200
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint