Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
Author Title [ Type(Asc)] Year
Filters: Filter is   [Clear All Filters]
Conference Paper
R. Dimitrova, Finkbeiner, B., Kovács, M., Rabe, M., and Seidl, H., Model Checking Information Flow in Reactive Systems, in Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2012), 2012.
B. Beckert, Bruns, D., and Grebing, S., Mind the Gap: Formal Verification and the Common Criteria, in Proceedings of the 6th International Verification Workshop (VERIFY 2010), 2012.
J. C. Blanchette and Popescu, A., Mechanizing the Metatheory of Sledgehammer, in Proceedings of the 9th International Symposium on Frontiers of Combining Systems (FroCos 2013), 2013.
T. Wüchner, Ochoa, M., and Pretschner, A., Malware Detection with Quantitative Data Flow Graphs, in Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014), 2014.
J. Graf, Hecker, M., Mohr, M., and Nordhoff, B., Lock-sensitive Interference Analysis for Java: Combining Program Dependence Graphs with Dynamic Pushdown Networks, in 1st International Workshop on Interference and Dependence (ID 2013), 2013.
F. Hadasch, Mueller, B., and Maedche, A., Leaking Confidential Information by Non-Malicious User Behaviour in Enterprise Systems - Design of an Empirical Study, in Proceedings of the 6th Mediterranean Conference on Information Systems (MCIS 2011), 2011.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P.  H., and Ulbrich, M., The KeY Platform for Verification and Analysis of Java Programs, in Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
T. M. Gawlitza, Lammich, P., Müller-Olm, M., Seidl, H., and Wenner, A., Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation, in Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011), 2011.
A. Lochbihler, Java and the Java Memory Model – a Unified, Machine-Checked Formalisation, in Proceedings of the ACM SIGPLAN 7th Workshop on Programming Languages and Systems (PLAS 2012), 2012.
B. Nordhoff, Müller-Olm, M., and Lammich, P., Iterable Forward Reachability Analysis of Monitor-DPNs, in Proceedings of Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday (Festschrift for Dave Schmidt), 2013.
H. Seidl and Kovács, M., Interprocedural Information Flow Analysis of XML Processors, in Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014), 2014.
A. Lehmann and Fahland, D., Information Flow Security for Business Process Models - just one click away, in Proceedings of the 10th International Conference on Business Process Management - Demo Track (BPM 2012), 2012.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M., Information Flow in Object-Oriented Software, in Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Information Flow Control in WebKit's JavaScript Bytecode, in Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
V. Rajani, Bichhawat, A., Gark, D., and Hammer, C., Information Flow Control for Event Handling and the DOM in Web Browsers, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
M. Taghdiri, Snelting, G., and Sinz, C., Information Flow Analysis via Path Condition Refinement, in Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (FAST 2010), 2010.
J. Cúellar, Ochoa, M., and Rios, R., Indistinguishable regions in Geographic Location Privacy, in Proceedings of the 27th ACM Symposium on Applied Computing (SAC 2012), 2012.
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G., On Improvements Of Low-Deterministic Security, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P., IccTA: Detecting Inter-Component Privacy Leaks in Android Apps, in Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
A. Askarov, Chong, S., and Mantel, H., Hybrid Monitors for Concurrent Noninterference, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M., A Hybrid Approach for Proving Noninterference of Java Programs, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C., A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs, in Grande Region Security and Reliability Day 2013, 2013.
L. Fennell and Thiemann, P., Gradual Typing for Annotated Type Systems, in Proceedings of the 23rd European Symposium on Programming (ESOP 2014), 2014.
L. Fennell and Thiemann, P., Gradual Security Typing with References, in Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF 2013), 2013, pp. 224-239.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis, in Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014), 2014.

Pages