Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
Author Title Type [ Year(Asc)]
Filters: Filter is   [Clear All Filters]
2015
Q. Huy Do, Bubel, R., and Hähnle, R., Exploit Generation for Information Flow Leaks in Object-Oriented Programs, in Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
F. Kelbert and Pretschner, A., A Fully Decentralized Data Usage Control Enforcement Infrastructure, in Proceedings of the 13th International Conference on Applied Cryptography and Network Security, 2015.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M., A Hybrid Approach for Proving Noninterference of Java Programs, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
A. Askarov, Chong, S., and Mantel, H., Hybrid Monitors for Concurrent Noninterference, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P., IccTA: Detecting Inter-Component Privacy Leaks in Android Apps, in Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
V. Rajani, Bichhawat, A., Gark, D., and Hammer, C., Information Flow Control for Event Handling and the DOM in Web Browsers, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
F. Dörre and Klebanov, V., Pseudo-Random Number Generator Verification: A Case Study, in Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments (VSTTE), 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R., Security in E-Voting, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L., Security in Web-Based Workflows, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
E. Loval, Fromm, A., Mohr, M., and Pretschner, A., SHRIFT System-wide HybRid Information Flow Tracking, in Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A., Software Security for Mobile Devices, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
G. Snelting, Understanding Probabilistic Software Leaks, Science of Computer Programming, 2015.
H. Mantel, Müller-Olm, M., Perner, M., and Wenner, A., Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis, in Pre-Proceedings of the 25th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2015.
2014
A. Popescu and Lammich, P., Bounded-Deducibility Security, Archive of Formal Proofs, 2014.
G. Snelting, Giffhorn, D., Graf, J., Hammer, C., Hecker, M., Mohr, M., and Wasserrab, D., Checking Probabilistic Noninterference Using JOANA, it - Information Technology, 2014.
T. Bauereiss and Hutter, D., Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS, in Proceedings of the 29th International Information Security and Privacy Conference (IFIP SEC 2014), 2014.
S. Kanav, Lammich, P., and Popescu, A., A Conference Management System with Verified Document Confidentiality, in Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014), 2014.
E. Lovat, Cross-Layer Data-Centric Usage Control, in Proceedings of the International Symposium on Engineering Secure Software and Systems - Doctoral Symposium (ESSoS 2014)), 2014.
F. Kelbert and Pretschner, A., Decentralized Distributed Data Usage Control, in Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014.
S. Rasthofer, Arzt, S., Lovat, E., and Bodden, E., DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android, in Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014), 2014.
C. Scheben and Schmitt, P. H., Efficient Self-Composition for Weakest Precondition Calculi, in Proceedings of the 19th International Symposium on Formal Methods (FM 2014), 2014.
R. Küsters, Scapin, E., Truderung, T., and Graf, J., Extending and Applying a Framework for the Cryptographic Verification of Java Programs, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
S. Arzt, Rasthofer, S., Fritz, C., Bodden, E., Barte, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P., FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, in Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
R. Küsters, Truderung, T., and Vogt, A., Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking, in Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P 2014), 2014.
S. Grewe, Mantel, H., and Schoepe, D., A Formalization of Assumptions and Guarantees for Compositional Noninterference, Archive of Formal Proofs, 2014.

Pages