Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
Author [ Title(Desc)] Type Year
Filters: Filter is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F. Kelbert and Pretschner, A., Decentralized Distributed Data Usage Control, in Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014.
F. Freiling and Schinzel, S., Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications, in Proceedings of the 26th International Information Security Conference (IFIP/SEC 2011), 2011.
P. Kumari, Pretschner, A., Peschla, J., and Kuhn, J. - M., Distributed Data Usage Control for Web Applications: A Social Network Implementation, in Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011), 2011.
S. Rasthofer, Arzt, S., Lovat, E., and Bodden, E., DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android, in Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014), 2014.
B. Beckert and Bruns, D., Dynamic Logic with Trace Semantics, in Proceedings of the 24th International Conference on Automated Deduction (CADE-24), 2013.
C. Hammer, Efficient Algorithms for Control Closures, in 1st International Workshop on Interference and Dependence (ID 2013), 2013.
M. Keil and Thiemann, P., Efficient Dynamic Access Analysis Using JavaScript Proxies, in Proceedings of the 9th Symposium on Dynamic Languages (DLS 2013), 2013.
S. Schinzel, An Efficient Mitigation Method for Timing Side Channels on the Web, in Proceedings of the 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011), 2011.
C. Scheben and Schmitt, P. H., Efficient Self-Composition for Weakest Precondition Calculi, in Proceedings of the 19th International Symposium on Formal Methods (FM 2014), 2014.
J. C. Blanchette, Böhme, S., Popescu, A., and Smallbone, N., Encoding Monomorphic and Polymorphic Types, in Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), 2013.
K. Katkalov, Fischer, P., Stenzel, K., Moebius, N., and Reif, W., Evaluation of Jif and Joana as information flow analyzers in a model-driven approach, in Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012), 2012.
C. Hammer, Experiences with PDG-based IFC, in Proceedings of the 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010), 2010.
Q. Huy Do, Bubel, R., and Hähnle, R., Exploit Generation for Information Flow Leaks in Object-Oriented Programs, in Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
F. Hadasch, Mueller, B., and Maedche, A., Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: A Qualitative Study, in Proceedings of the 20th European Conference on Information Systems (ECIS 2012), Barcelona, Spain, 2012.
R. Küsters, Scapin, E., Truderung, T., and Graf, J., Extending and Applying a Framework for the Cryptographic Verification of Java Programs, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
B. Finkbeiner and Zimmermann, M., The First-Order Logic of Hyperproperties, in Proceedings of the 34th Symposium on Theoretical Aspects of Computer Science (STACS), 2017.
S. Arzt, Rasthofer, S., Fritz, C., Bodden, E., Barte, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P., FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, in Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
R. Küsters, Truderung, T., and Vogt, A., Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking, in Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P 2014), 2014.
B. Beckert and Bruns, D., Formal Semantics of Model Fields in Annotation-based Specifications, in {KI 2012}: Advances in Artificial Intelligence, 2012.
A. Popescu, Hölzl, J., and Nipkow, T., Formal Verification of Language-Based Concurrent Noninterference, J. Formalized Reasoning, vol. 6, pp. 1-30, 2013.
S. Grewe, Mantel, H., and Schoepe, D., A Formalization of Assumptions and Guarantees for Compositional Noninterference, Archive of Formal Proofs, 2014.
S. Grewe, Lux, A., Mantel, H., and Sauer, J., A Formalization of Declassification with WHAT-and-WHERE-Security, Archive of Formal Proofs, 2014.
S. Grewe, Lux, A., Mantel, H., and Sauer, J., A Formalization of Strong Security, Archive of Formal Proofs, 2014.
K. Stenzel, Katkalov, K., Borek, M., and Reif, W., Formalizing Information Flow Control in a Model-Driven Approach, in Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014), 2014.
A. Popescu, Hölzl, J., and Nipkow, T., Formalizing Probabilistic Noninterference, in Proceedings of the 3rd International Conference on Certified Programs and Proofs (CPP 2013), 2013.