Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 107 results:
Author Title Type [ Year(Asc)]
Popescu, A. & Lammich, P. Bounded-Deducibility Security. Archive of Formal Proofs (2014).
Snelting, G. et al. Checking Probabilistic Noninterference Using JOANA. it - Information Technology (2014).
Bauereiss, T. & Hutter, D. Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS. Proceedings of the 29th International Information Security and Privacy Conference (IFIP SEC 2014) (2014).
Kanav, S., Lammich, P. & Popescu, A. A Conference Management System with Verified Document Confidentiality. Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014) (2014).
Lovat, E. Cross-Layer Data-Centric Usage Control. Proceedings of the International Symposium on Engineering Secure Software and Systems - Doctoral Symposium (ESSoS 2014)) (2014).
Rasthofer, S., Arzt, S., Lovat, E. & Bodden, E. DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android. Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014) (2014).
Scheben, C. & Schmitt, P. H. Efficient Self-Composition for Weakest Precondition Calculi. Proceedings of the 19th International Symposium on Formal Methods (FM 2014) (2014).
Küsters, R., Scapin, E., Truderung, T. & Graf, J. Extending and Applying a Framework for the Cryptographic Verification of Java Programs. Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014) (Abadi, M. & Kremer, S.) (2014).
Arzt, S. et al. FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014) (2014).
Küsters, R., Truderung, T. & Vogt, A. Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking. Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P 2014) (2014).
Grewe, S., Mantel, H. & Schoepe, D. A Formalization of Assumptions and Guarantees for Compositional Noninterference. Archive of Formal Proofs (2014).
Grewe, S., Lux, A., Mantel, H. & Sauer, J. A Formalization of Declassification with WHAT-and-WHERE-Security. Archive of Formal Proofs (2014).
Grewe, S., Lux, A., Mantel, H. & Sauer, J. A Formalization of Strong Security. Archive of Formal Proofs (2014).
Stenzel, K., Katkalov, K., Borek, M. & Reif, W. Formalizing information flow control in a model-driven approach. Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014) (2014).
Bichhawat, A., Rajani, V., Garg, D. & Hammer, C. Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014) (2014).
Fennell, L. & Thiemann, P. Gradual Typing for Annotated Type Systems. Proceedings of the 23rd European Symposium on Programming (ESOP 2014) (2014).
Bruns, D., Mostowski, W. & Ulbrich, M. Implementation-level Verification of Algorithms with Keęrn-.1emY. Software Tools for Technology Transfer (2014).
Bichhawat, A., Rajani, V., Garg, D. & Hammer, C. Information Flow Control in WebKit's JavaScript Bytecode. Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014) (2014).
Seidl, H. & Kovács, M. Interprocedural Information Flow Analysis of XML Processors. Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014) (2014).
Rasthofer, S., Arzt, S. & Bodden, E. A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks. Proceedings of the Network and Distributed System Security Symposium (NDSS 2014) (2014).
Wüchner, T., Ochoa, M. & Pretschner, A. Malware Detection with Quantitative Data Flow Graphs. Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014) (2014).
Giffhorn, D. & Snelting, G. A New Algorithm for Low-Deterministic Security. International Journal on Information Security (2014).
Mantel, H., Perner, M. & Sauer, J. Noninterference under Weak Memory Models. Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014) (2014).
Bauereiss, T. & Hutter, D. Possibilistic information flow security of workflow management systems. Proceedings of the 1st International Workshop on Graphical Models for Security at ETAPS 2014 (GraMSec 2014) (2014).