Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
Author Title Type [ Year(Asc)]
Filters: Filter is   [Clear All Filters]
2017
Q. Huy Do, Bubel, R., and Hähnle, R., Automatic Detection and Demonstrator Generation for Information Flow Leaks in Object-Oriented Programs, Computers & Security, vol. 67, 2017.
O. Kunčar and Popescu, A., Comprehending Isabelle/HOL's Consistency, in Proceedings of the 26th European Symposium on Programming (ESOP), 2017.
T. Bauereiß, Gritti, A. Pesenti, Popescu, A., and Raimondi, F., CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees, in Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P), 2017.
B. Finkbeiner and Zimmermann, M., The First-Order Logic of Hyperproperties, in Proceedings of the 34th Symposium on Theoretical Aspects of Computer Science (STACS), 2017.
S. Greiner, Mohr, M., and Beckert, B., Modular Verification of Information-Flow Security in Component-Based Systems, in Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
B. Finkbeiner, Hahn, C., Stenger, M., and Tentrup, L., Monitoring Hyperproperties, in Proceedings of the 17th International Conference on Runtime Verification (RV), 2017.
X. Li, Mantel, H., and Tasch, M., Taming Message-passing Communication in Compositional Reasoning about Confidentiality, in Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), 2017.
V. Rajani, Bastys, I., Rafnsson, W., and Garg, D., Type Systems for Information Flow Control: The Question of Granularity, ACM SIGLOG News, vol. 4, no. 1, 2017.
B. Finkbeiner, Müller, C., Seidl, H., and Zalinescu, E., Verifying Security Policies in Multi-agent Workflows with Loops, in Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017.
A. Bichhawat, Rajani, V., Jain, J., Garg, D., and Hammer, C., WebPol: Fine-grained Information Flow Policies for Web Browsers, in Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017.
2016
V. Rajani, Garg, D., and Rezk, T., On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks, in Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
I. Bolosteanu and Garg, D., Asymmetric Secure Multi-execution with Declassification, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
D. Octeau, Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., and Le Traon, Y., Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis, in Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2016.
T. Liu, Tyszberowicz, S., Herda, M., Beckert, B., Grahl, D., and Taghdiri, M., Computing Specification-Sensitive Abstractions for Program Verification, in Proceedings of the 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA), 2016.
T. Bauereiß, Gritti, A. Pesenti, Popescu, A., and Raimondi, F., CoSMed: A Confidentiality-Verified Social Media Platform, in Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP), 2016.
O. Kunčar and Popescu, A., From Types to Sets by Local Type Definitions in Higher-Order Logic, in Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP), 2016.
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G., On Improvements Of Low-Deterministic Security, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
F. Dörre and Klebanov, V., Practical Detection of Entropy Loss in Pseudo-Random Number Generators, in Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), 2016.
W. Rafnsson, Sabelfeld, A., and Garg, D., Progress-Sensitive Security for SPARK, in Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
R. Küsters, Müller, J., Scapin, E., and Truderung, T., sElect: A Lightweight Verifiable Remote Voting System, in Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
V. Cortier, Galindo, D., Küsters, R., Müller, J., and Truderung, T., SoK: Verifiability Notions for E-Voting Protocols, in Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016.
V. Klebanov, Weigl, A., and Weisbarth, J., Sound Probabilistic #SAT with Projection, in Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL), 2016.
H. Quoc Do, Kamburjan, E., and Wasser, N., Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
2015
B. Finkbeiner, Rabe, M., and Sánchez, C., Algorithms for Model Checking HyperLTL and HyperCTL*, in Proceedings of the 27th International Conference on Computer Aided Verification (CAV), 2015.
O. Kunčar and Popescu, A., A Consistent Foundation for Isabelle/HOL, in Proceedings of the 6th International Conference on Interactive Theorem Proving (ITP), 2015.

Pages