Quoc Huy Do

Institute of Information Security


+49 711 685-60735

Universitaetsstrasse 38
70569 Stuttgart
Room: 2.460

  1. 2017

    1. Q. H. Do, R. Bubel, and R. Hähnle, “Inferring Secrets by Guided Experiments,” in Theoretical Aspects of Computing - ICTAC 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings, 2017, pp. 269–287.
    2. Q. H. Do, “Detection and Exploitation of Information Flow Leaks.” 2017.
    3. Q. H. Do, R. Bubel, and R. Hähnle, “Automatic detection and demonstrator generation for information flow leaks in object-oriented programs,” Computers & Security, vol. 67, pp. 335–349, 2017.
  2. 2016

    1. Q. H. Do, E. Kamburjan, and N. Wasser, “Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study,” in Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, 2016, pp. 97–115.
  3. 2015

    1. Q. H. Do, R. Bubel, and R. Hähnle, “Exploit Generation for Information Flow Leaks in Object-Oriented Programs,” in ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings, 2015, pp. 401--415.
  4. 2010

    1. Q. H. Do, “Using SMT solver and symbolic execution to generate test inputs for C programs.” 2010.
    2. Q. H. Do, A. H. Truong, and N. B. Nguyen, “Extending CREST with Multiple SMT Solvers and Real Arithmetic,” in 2010 Second International Conference on Knowledge and Systems Engineering, 2010, pp. 183–187.
  5. 2008

    1. V. H. Pham et al., “Some Approaches to Nom Optical Character Recognition,” VNU, Hanoi. J. of Science, Natural Sciences and Technology, vol. 24, pp. 90–99, 2008.

Are you a student and want to write a thesis / carry out a project at the SEC?

To the top of the page