Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 105 results:
Author Title Type [ Year(Asc)]
2014
Popescu, A. & Lammich, P. Bounded-Deducibility Security. Archive of Formal Proofs (2014).
Bauereiss, T. & Hutter, D. Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS. Proceedings of the 29th International Information Security and Privacy Conference (IFIP SEC 2014) (2014).
Kanav, S., Lammich, P. & Popescu, A. A Conference Management System with Verified Document Confidentiality. Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014) (2014).
Lovat, E. Cross-Layer Data-Centric Usage Control. Proceedings of the International Symposium on Engineering Secure Software and Systems - Doctoral Symposium (ESSoS 2014)) (2014).
Rasthofer, S., Arzt, S., Lovat, E. & Bodden, E. DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android. Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014) (2014).
Scheben, C. & Schmitt, P. H. Efficient Self-Composition for Weakest Precondition Calculi. Proceedings of the 19th International Symposium on Formal Methods (FM 2014) (2014).
Küsters, R., Scapin, E., Truderung, T. & Graf, J. Extending and Applying a Framework for the Cryptographic Verification of Java Programs. Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014) (Abadi, M. & Kremer, S.) (2014).
Arzt, S. et al. FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014) (2014).
Küsters, R., Truderung, T. & Vogt, A. Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking. Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P 2014) (2014).
Grewe, S., Mantel, H. & Schoepe, D. A Formalization of Assumptions and Guarantees for Compositional Noninterference. Archive of Formal Proofs (2014).
Grewe, S., Lux, A., Mantel, H. & Sauer, J. A Formalization of Declassification with WHAT-and-WHERE-Security. Archive of Formal Proofs (2014).
Grewe, S., Lux, A., Mantel, H. & Sauer, J. A Formalization of Strong Security. Archive of Formal Proofs (2014).
Stenzel, K., Katkalov, K., Borek, M. & Reif, W. Formalizing information flow control in a model-driven approach. Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014) (2014).
Bichhawat, A., Rajani, V., Garg, D. & Hammer, C. Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014) (2014).
Fennell, L. & Thiemann, P. Gradual Typing for Annotated Type Systems. Proceedings of the 23rd European Symposium on Programming (ESOP 2014) (2014).
Bruns, D., Mostowski, W. & Ulbrich, M. Implementation-level Verification of Algorithms with Keęrn-.1emY. Software Tools for Technology Transfer (2014).
Bichhawat, A., Rajani, V., Garg, D. & Hammer, C. Information Flow Control in WebKit's JavaScript Bytecode. Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014) (2014).
Seidl, H. & Kovács, M. Interprocedural Information Flow Analysis of XML Processors. Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014) (2014).
Rasthofer, S., Arzt, S. & Bodden, E. A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks. Proceedings of the Network and Distributed System Security Symposium (NDSS 2014) (2014).
Wüchner, T., Ochoa, M. & Pretschner, A. Malware Detection with Quantitative Data Flow Graphs. Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014) (2014).
Giffhorn, D. & Snelting, G. A New Algorithm for Low-Deterministic Security. International Journal on Information Security (2014).
Mantel, H., Perner, M. & Sauer, J. Noninterference under Weak Memory Models. Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014) (2014).
Bauereiss, T. & Hutter, D. Possibilistic information flow security of workflow management systems. Proceedings of the 1st International Workshop on Graphical Models for Security at ETAPS 2014 (GraMSec 2014) (2014).
Klebanov, V. Precise Quantitative Information Flow Analysis – A Symbolic Approach. Theoretical Computer Science (2014).
Popescu, A. & Hölzl, J. Probabilistic Noninterference. Archive of Formal Proofs (2014).

Pages