Skip to main content
About
Events
Research
Open Positions
Links
Contact
Publications
Projects
Project Clusters
Reference Scenarios
Tools
Search form
Search
Reliably Secure Software Systems (RS
3
) –
DFG Priority Programme 1496
Research
Publications
Best Paper Awards
Projects
Funded Projects
Associated Projects
Projects by Phases
Project Clusters
Projects
Reference Scenarios
Security in E-Voting
Security in Web-based Workflow Management Systems
Software Security for Mobile Devices
Projects
Tools
Search
Show only items where
Author
any
Abadi, Martín
Accorsi, R.
Ahrendt, Wolfgang
Arzt, S.
Arzt, Steven
Askarov, Aslan
Atkinson, C.
Barte, A.
Bartel, Alexandre
Bastys, Iulia
Bauereiß, Thomas
Bauereiss, T.
Bauereiss, Thomas
Beckert, B.
Beckert, Bernhard
Bichhawat, A.
Bichhawat, Abhishek
Bissyandé, Tegawendé F.
Blanchette, J. C.
Blasum, H.
Bodden, E.
Bodden, Eric
Böhme, S.
Bolosteanu, Iulia
Borek, M.
Breitner, Joachim
Bruns, D.
Bruns, Daniel
Bubel, Richard
Buechler, M.
Chong, Stephen
Clarkson, M. R.
Cortier, Véronique
Cúellar, J.
Dering, Matthew
Dimitrova, R.
Do, Huy Quoc
Do, Quoc Huy
Dörre, Felix
Ehlers, R.
Fahland, D.
Faymonville, Peter
Fennell, L.
Finkbeiner, B.
Finkbeiner, Bernd
Fischer, P.
Fischer, R.
Freiling, F.
Fritz, C.
Fromm, Alexander
Galindo, David
Garg, D.
Garg, Deepak
Gark, Deepak
Gawlitza, T. M.
Gay, R.
Gay, Richard
Gerbig, R.
Giffhorn, Dennis
Gladisch, Christoph
Graf, J.
Graf, Jürgen
Grahl, Daniel
Grebenshchikov, Sergey
Grebing, S.
Grebing, Sarah
Greiner, Simon
Grewe, S.
Gritti, Armando Pesenti
Hadasch, F.
Hahn, Christopher
Hähnle, Reiner
Hammer, C.
Hammer, Christian
Havle, O.
Hecker, M.
Hecker, Martin
Henschel, Martin
Herda, Mihai
Hölzl, J.
Hutter, D.
Hutter, Dieter
Jager, T.
Jain, Jinank
Jha, Somesh
Jürjens, J.
Kamburjan, Eduard
Kanav, S.
Katkalov, K.
Keil, M.
Kelbert, F.
Kelbert, Florian
Kennel, B.
Kirsten, Michael
Klebanov, V.
Klebanov, Vladimir
Klein, J.
Klein, Jacques
Koleini, M.
Köpf, B.
Kovács, M.
Kremer, Steve
Kuhn, J.-M.
Kumari, P.
Kunčar, Ondřej
Küsters, R.
Küsters, Ralf
Lammich, P.
Lammich, Peter
Langenstein, B.
Le Traon, Y.
Le Traon, Yves
Lehmann, A.
Li, Li
Li, Ximeng
Liu, Tianhai
Lochbihler, A.
Lohmann, N.
Lohner, D.
Lortz, Steffen
Loval, Enrico
Lovat, E.
Lovat, Enrico
Lux, A.
Maedche, A.
Mann, C.
Mantel, H.
Mantel, Heiko
Manthey, N.
Mauborgne, L.
McDaniel, P.
McDaniel, Patrick
Micinski, K. K.
Moebius, N.
Mohr, M.
Mohr, Martin
Mostowski, W.
Mostowski, Wojciech
Mueller, B.
Muise, C.
Müller, S.
Müller, Christian
Müller, Johannes
Müller-Olm, M.
Müller-Olm, Markus
Nemouchi, Y.
Nipkow, T.
Nordhoff, B.
Nordhoff, Benedikt
Ochoa, M.
Octeau, D.
Octeau, Damien
Oudinet, J.
Perner, M.
Perner, Matthias
Peschla, J.
Pfeiffer, S.
Popescu, A.
Popescu, Andrei
Pretschner, A.
Pretschner, Alexander
Rabe, M.
Rabe, M. N.
Rabe, Markus
Rafnsson, Willard
Raimondi, Franco
Rajani, V.
Rajani, Vineet
Rasthofer, S.
Rasthofer, Siegfried
Reif, W.
Rezk, Tamara
Rios, R.
Sabelfeld, Andrei
Sánchez, C.
Sánchez, César
Sands, D.
Sauer, J.
Scapin, E.
Scapin, Enrico
Scheben, C.
Scheben, Christoph
Schinzel, S.
Schmaltz, J.
Schmitt, P.
Schmitt, I.
Schmitt, P. H.
Schmitt, Peter H.
Schmitt, Peter H.
Schneider, David
Schoepe, D.
Schwarz, M. D.
Seidl, H.
Seidl, Helmut
Sinz, C.
Smallbone, N.
Smorovksy, J
Snelling, Gregor
Snelting, G.
Snelting, Gregor
Sprick, B.
Starostin, A.
Starostin, Artem
Stenger, Marvin
Stenzel, K.
Stephan, W.
Sudbrock, H.
Taghdiri, M.
Taghdiri, Mana
Tasch, Markus
Tentrup, Leander
Thiemann, P.
Timmermann, D.
Truderung, T.
Truderung, Tomasz
Tunjic, C.
Tverdyshew, S.
Tyszberowicz, Shmuel
Ulbrich, M.
Ulbrich, Matthias
Ulbrich, Mattias
Unger, S.
Verbeek, F.
Vogt, A.
Vojdani, V.
Wand, D.
Warzecha, D.
Wasser, Nathan
Wasserrab, D.
Wasserrab, Daniel
Weber, Alexandra
Weidenbach, C.
Weigl, Alexander
Weisbarth, Jörg
Wenner, A.
Wenner, Alexander
Wolf, K.
Wolf, B.
Wonnemann, C.
Wüchner, T.
Zalinescu, Eugen
Zimmermann, Martin
Type
any
Conference Paper
Journal Article
Miscellaneous
Term
any
Year
any
2017
2016
2015
2014
2013
2012
2011
2010
Keyword
any
conference
Export 147 results:
BibTeX
Author
Title
[
Type
]
Year
Filters:
Filter
is
[Clear All Filters]
Conference Paper
S. Rasthofer
,
Arzt, S.
,
Lovat, E.
, and
Bodden, E.
,
“
DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android
”
, in
Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014)
, 2014.
Google Scholar
BibTeX
B. Beckert
and
Bruns, D.
,
“
Dynamic Logic with Trace Semantics
”
, in
Proceedings of the 24th International Conference on Automated Deduction (CADE-24)
, 2013.
Google Scholar
BibTeX
C. Hammer
,
“
Efficient Algorithms for Control Closures
”
, in
1st International Workshop on Interference and Dependence (ID 2013)
, 2013.
Google Scholar
BibTeX
M. Keil
and
Thiemann, P.
,
“
Efficient Dynamic Access Analysis Using JavaScript Proxies
”
, in
Proceedings of the 9th Symposium on Dynamic Languages (DLS 2013)
, 2013.
Google Scholar
BibTeX
S. Schinzel
,
“
An Efficient Mitigation Method for Timing Side Channels on the Web
”
, in
Proceedings of the 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011)
, 2011.
Google Scholar
BibTeX
C. Scheben
and
Schmitt, P. H.
,
“
Efficient Self-Composition for Weakest Precondition Calculi
”
, in
Proceedings of the 19th International Symposium on Formal Methods (FM 2014)
, 2014.
Google Scholar
BibTeX
J. C. Blanchette
,
Böhme, S.
,
Popescu, A.
, and
Smallbone, N.
,
“
Encoding Monomorphic and Polymorphic Types
”
, in
Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013)
, 2013.
Google Scholar
BibTeX
K. Katkalov
,
Fischer, P.
,
Stenzel, K.
,
Moebius, N.
, and
Reif, W.
,
“
Evaluation of Jif and Joana as information flow analyzers in a model-driven approach
”
, in
Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012)
, 2012.
Google Scholar
BibTeX
C. Hammer
,
“
Experiences with PDG-based IFC
”
, in
Proceedings of the 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010)
, 2010.
Google Scholar
BibTeX
Q. Huy Do
,
Bubel, R.
, and
Hähnle, R.
,
“
Exploit Generation for Information Flow Leaks in Object-Oriented Programs
”
, in
Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC)
, 2015.
Google Scholar
BibTeX
F. Hadasch
,
Mueller, B.
, and
Maedche, A.
,
“
Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: A Qualitative Study
”
, in
Proceedings of the 20th European Conference on Information Systems (ECIS 2012)
, Barcelona, Spain, 2012.
Google Scholar
BibTeX
R. Küsters
,
Scapin, E.
,
Truderung, T.
, and
Graf, J.
,
“
Extending and Applying a Framework for the Cryptographic Verification of Java Programs
”
, in
Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014)
, 2014.
Google Scholar
BibTeX
B. Finkbeiner
and
Zimmermann, M.
,
“
The First-Order Logic of Hyperproperties
”
, in
Proceedings of the 34th Symposium on Theoretical Aspects of Computer Science (STACS)
, 2017.
Google Scholar
BibTeX
S. Arzt
,
Rasthofer, S.
,
Fritz, C.
,
Bodden, E.
,
Barte, A.
,
Klein, J.
,
Le Traon, Y.
,
Octeau, D.
, and
McDaniel, P.
,
“
FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps
”
, in
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014)
, 2014.
Google Scholar
BibTeX
R. Küsters
,
Truderung, T.
, and
Vogt, A.
,
“
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking
”
, in
Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P 2014)
, 2014.
Google Scholar
BibTeX
B. Beckert
and
Bruns, D.
,
“
Formal Semantics of Model Fields in Annotation-based Specifications
”
, in
{KI 2012}: Advances in Artificial Intelligence
, 2012.
Google Scholar
BibTeX
K. Stenzel
,
Katkalov, K.
,
Borek, M.
, and
Reif, W.
,
“
Formalizing Information Flow Control in a Model-Driven Approach
”
, in
Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014)
, 2014.
Google Scholar
BibTeX
A. Popescu
,
Hölzl, J.
, and
Nipkow, T.
,
“
Formalizing Probabilistic Noninterference
”
, in
Proceedings of the 3rd International Conference on Certified Programs and Proofs (CPP 2013)
, 2013.
Google Scholar
BibTeX
C. Mann
and
Starostin, A.
,
“
A Framework for Static Detection of Privacy Leaks in Android Applications
”
, in
Proceedings of the 27th Symposium on Applied Computing (SAC 2012)
, 2012.
Google Scholar
BibTeX
R. Küsters
,
Truderung, T.
, and
Graf, J.
,
“
A Framework for the Cryptographic Verification of Java-like Programs
”
, in
Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012)
, 2012.
Google Scholar
BibTeX
O. Kunčar
and
Popescu, A.
,
“
From Types to Sets by Local Type Definitions in Higher-Order Logic
”
, in
Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP)
, 2016.
Google Scholar
BibTeX
F. Kelbert
and
Pretschner, A.
,
“
A Fully Decentralized Data Usage Control Enforcement Infrastructure
”
, in
Proceedings of the 13th International Conference on Applied Cryptography and Network Security
, 2015.
Google Scholar
BibTeX
A. Bichhawat
,
Rajani, V.
,
Garg, D.
, and
Hammer, C.
,
“
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis
”
, in
Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014)
, 2014.
Google Scholar
BibTeX
L. Fennell
and
Thiemann, P.
,
“
Gradual Security Typing with References
”
, in
Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF 2013)
, 2013, pp. 224-239.
Google Scholar
BibTeX
L. Fennell
and
Thiemann, P.
,
“
Gradual Typing for Annotated Type Systems
”
, in
Proceedings of the 23rd European Symposium on Programming (ESOP 2014)
, 2014.
Google Scholar
BibTeX
Pages
« first
‹ previous
1
2
3
4
5
6
next ›
last »