Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
Author [ Title(Asc)] Type Year
Filters: Filter is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
E. Loval, Fromm, A., Mohr, M., and Pretschner, A., SHRIFT System-wide HybRid Information Flow Tracking, in Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
M. N. Rabe, Lammich, P., and Popescu, A., A shallow embedding of HyperCTL, Archive of Formal Proofs, 2014.
R. Gay, Mantel, H., and Sprick, B., Service Automata, in Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2012.
R. Küsters, Müller, J., Scapin, E., and Truderung, T., sElect: A Lightweight Verifiable Remote Voting System, in Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L., Security in Web-Based Workflows, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R., Security in E-Voting, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss and Hutter, D., Security (hyper-)properties in workflow systems: From specification to verification, in Electronic Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2014), 2014.
M. Ochoa, Security Guarantees and Evolution: From models to reality, in Electronic Proceedings of the 1st ESSoS Doctoral Symposium (ESSoS-DS 2012), 2012.
S. Pfeiffer, Unger, S., Timmermann, D., and Lehmann, A., Secure Information Flow Awareness for Smart Wireless eHealth Systems, in Proceedings of 9th International Multi-Conference on Systems, Signals and Devices (SSD 2012), 2012.
A. Lux, Mantel, H., and Perner, M., Scheduler-Independent Declassification, in Proceedings of the 11th International Conference on Mathematics of Program Construction (MPC 2012), 2012.
V. Klebanov, Manthey, N., and Muise, C., SAT-based Analysis and Quantification of Information Flow in Programs, in Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013), 2013.
R
M. Kovács and Seidl, H., Runtime Enforcement of Information Flow Security in Tree Manipulating Processes, in Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
S. Arzt and Bodden, E., Reviser: Efficiently Updating IDE-/IFDS-Based Data-Flow Analyses in Response to Incremental Program Changes, in Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), 2014.
A. Pretschner, Lovat, E., and Buechler, M., Representation-Independent Data Usage Control, in 6th International Workshop on Data Privacy Management (DPM 2011), 2011.
M. Kovács, Seidl, H., and Finkbeiner, B., Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties, in Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), 2013.
Q
E. Lovat, Oudinet, J., and Pretschner, A., On Quantitative Dynamic Data Flow Tracking, in Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014.
P
F. Dörre and Klebanov, V., Pseudo-Random Number Generator Verification: A Case Study, in Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments (VSTTE), 2015.
D. Wasserrab and Lohner, D., Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing, in 6th International Verification Workshop (VERIFY 2010), 2010.
A. Popescu, Hölzl, J., and Nipkow, T., Proving Concurrent Noninterference, in Proceedings of the 2nd International Conference on Certified Programs and Proofs (CPP 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A., Proving Coercion-Resistance of Scantegrity II, in Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010), 2010.
W. Rafnsson, Sabelfeld, A., and Garg, D., Progress-Sensitive Security for SPARK, in Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
A. Popescu and Hölzl, J., Probabilistic Noninterference, Archive of Formal Proofs, 2014.
V. Klebanov, Precise Quantitative Information Flow Analysis – A Symbolic Approach, Theoretical Computer Science, 2014.
F. Dörre and Klebanov, V., Practical Detection of Entropy Loss in Pseudo-Random Number Generators, in Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), 2016.
A. Popescu and Hölzl, J., Possibilistic Noninterference, Archive of Formal Proofs, 2012.

Pages