Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 112 results:
Author Title Type [ Year(Asc)]
2014
A. Popescu and Lammich, P., Bounded-Deducibility Security, Archive of Formal Proofs, 2014.
G. Snelting, Giffhorn, D., Graf, J., Hammer, C., Hecker, M., Mohr, M., and Wasserrab, D., Checking Probabilistic Noninterference Using JOANA, it - Information Technology, 2014.
T. Bauereiss and Hutter, D., Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS, in Proceedings of the 29th International Information Security and Privacy Conference (IFIP SEC 2014), 2014.
S. Kanav, Lammich, P., and Popescu, A., A Conference Management System with Verified Document Confidentiality, in Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014), 2014.
E. Lovat, Cross-Layer Data-Centric Usage Control, in Proceedings of the International Symposium on Engineering Secure Software and Systems - Doctoral Symposium (ESSoS 2014)), 2014.
F. Kelbert and Pretschner, A., Decentralized Distributed Data Usage Control, in Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014.
S. Rasthofer, Arzt, S., Lovat, E., and Bodden, E., DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android, in Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014), 2014.
C. Scheben and Schmitt, P. H., Efficient Self-Composition for Weakest Precondition Calculi, in Proceedings of the 19th International Symposium on Formal Methods (FM 2014), 2014.
R. Küsters, Scapin, E., Truderung, T., and Graf, J., Extending and Applying a Framework for the Cryptographic Verification of Java Programs, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
S. Arzt, Rasthofer, S., Fritz, C., Bodden, E., Barte, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P., FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, in Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
R. Küsters, Truderung, T., and Vogt, A., Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking, in Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P 2014), 2014.
S. Grewe, Mantel, H., and Schoepe, D., A Formalization of Assumptions and Guarantees for Compositional Noninterference, Archive of Formal Proofs, 2014.
S. Grewe, Lux, A., Mantel, H., and Sauer, J., A Formalization of Declassification with WHAT-and-WHERE-Security, Archive of Formal Proofs, 2014.
S. Grewe, Lux, A., Mantel, H., and Sauer, J., A Formalization of Strong Security, Archive of Formal Proofs, 2014.
K. Stenzel, Katkalov, K., Borek, M., and Reif, W., Formalizing information flow control in a model-driven approach, in Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014), 2014.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis, in Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014), 2014.
L. Fennell and Thiemann, P., Gradual Typing for Annotated Type Systems, in Proceedings of the 23rd European Symposium on Programming (ESOP 2014), 2014.
D. Bruns, Mostowski, W., and Ulbrich, M., Implementation-level Verification of Algorithms with Keęrn-.1emY, Software Tools for Technology Transfer, 2014.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Information Flow Control in WebKit's JavaScript Bytecode, in Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
H. Seidl and Kovács, M., Interprocedural Information Flow Analysis of XML Processors, in Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014), 2014.

Pages