Follow
Christoph Baumann
Christoph Baumann
Senior Researcher, Ericsson Security Research Sweden
Verified email at ericsson.com
Title
Cited by
Cited by
Year
Cache storage channels: Alias-driven attacks and verified countermeasures
R Guanciale, H Nemati, C Baumann, M Dam
2016 IEEE Symposium on Security and Privacy (SP), 38-55, 2016
1172016
Proving memory separation in a microkernel by code level verification
C Baumann, T Bormer, H Blasum, S Tverdyshev
2011 14th IEEE International Symposium on Object/Component/Service-Oriented …, 2011
642011
Formal verification of a microkernel used in dependable software systems
C Baumann, B Beckert, H Blasum, T Bormer
Computer Safety, Reliability, and Security: 28th International Conference …, 2009
622009
Lessons learned from microkernel verification--specification is the new bottleneck
C Baumann, B Beckert, H Blasum, T Bormer
arXiv preprint arXiv:1211.6186, 2012
602012
Network policies in kubernetes: Performance evaluation and security analysis
G Budigiri, C Baumann, JT Mühlberg, E Truyen, W Joosen
2021 Joint European Conference on Networks and Communications & 6G Summit …, 2021
542021
Verifying the PikeOS microkernel: First results in the Verisoft XT Avionics project
C Baumann, T Bormer
Doctoral Symposium on Systems Software Verification (DS SSV’09) Real …, 2009
332009
Provably secure memory isolation for Linux on ARM
R Guanciale, H Nemati, M Dam, C Baumann
Journal of Computer Security 24 (6), 793-837, 2016
252016
Better avionics software reliability by code verification
C Baumann, B Beckert, H Blasum, T Bormer
Proceedings, embedded world Conference, Nuremberg, Germany, 2009
232009
Ingredients of operating system correctness
C Baumann, B Beckert, H Blasum, T Bormer
Embedded World Conference, Nuremberg, Germany, 2010
222010
A high assurance virtualization platform for ARMv8
C Baumann, M Näslund, C Gehrmann, O Schwarz, H Thorsen
2016 European Conference on Networks and Communications (EuCNC), 210-214, 2016
202016
System Architecture: An Ordinary Engineering Discipline
WJ Paul, C Baumann, P Lutsyk, S Schmaltz
Springer, 2016
13*2016
A Knowledge-in-the-loop approach to integrated safety&security for cooperative system-of-systems
DJ Chen, K Meinke, K Östberg, F Asplund, C Baumann
2015 IEEE Seventh International Conference on Intelligent Computing and …, 2015
132015
End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs
G Scopelliti, S Pouyanrad, J Noorman, F Alder, C Baumann, F Piessens, ...
ACM Transactions on Privacy and Security 26 (3), 1-46, 2023
122023
On compositional information flow aware refinement
C Baumann, M Dam, R Guanciale, H Nemati
2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021
112021
On the verification of system-level information flow properties for virtualized execution platforms
C Baumann, O Schwarz, M Dam
Journal of Cryptographic Engineering 9 (3), 243-261, 2019
82019
Compositional Verification of Security Properties for Embedded Execution Platforms
C Baumann, O Schwarz, M Dam
PROOFS 2017. 6th International Workshop on Security Proofs for Embedded …, 2017
72017
Ownership-based order reduction and simulation in shared-memory concurrent computer systems
C Baumann
Saarland University, 2014
62014
Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust
M Gülmez, T Nyman, C Baumann, JT Mühlberg
2023 IEEE Secure Development Conference (SecDev), 54-66, 2023
42023
Rewind & Discard: Improving software resilience using isolated domains
M Gülmez, T Nyman, C Baumann, JT Mühlberg
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023
42023
Verifying the PikeOS microkernel: An overview of the Verisoft XT avionics project
C Baumann, T Bormer
4th International Workshop on Systems Software Verification (SSV 2009 …, 2009
42009
The system can't perform the operation now. Try again later.
Articles 1–20