Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
[ Author(Desc)] Title Type Year
Filters: Filter is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A. Popescu, Hölzl, J., and Nipkow, T., Formal Verification of Language-Based Concurrent Noninterference, J. Formalized Reasoning, vol. 6, pp. 1-30, 2013.
A. Pretschner, Lovat, E., and Buechler, M., Representation-Independent Data Usage Control, in 6th International Workshop on Data Privacy Management (DPM 2011), 2011.
M. N. Rabe, Lammich, P., and Popescu, A., A shallow embedding of HyperCTL, Archive of Formal Proofs, 2014.
W. Rafnsson, Sabelfeld, A., and Garg, D., Progress-Sensitive Security for SPARK, in Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
V. Rajani, Bichhawat, A., Gark, D., and Hammer, C., Information Flow Control for Event Handling and the DOM in Web Browsers, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
V. Rajani, Bastys, I., Rafnsson, W., and Garg, D., Type Systems for Information Flow Control: The Question of Granularity, ACM SIGLOG News, vol. 4, no. 1, 2017.
V. Rajani, Garg, D., and Rezk, T., On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks, in Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
S. Rasthofer, Arzt, S., Lovat, E., and Bodden, E., DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android, in Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014), 2014.
S. Rasthofer, Arzt, S., and Bodden, E., A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks, Proceedings of the Network and Distributed System Security Symposium (NDSS 2014), 2014.
C. Scheben and Schmitt, P., Verification of Information Flow Properties of Java Programs without Approximations, in Proceedings of the Formal Verification of Object-Oriented Software (FoVeOOS 2011), 2012.
C. Scheben and Schmitt, P. H., Efficient Self-Composition for Weakest Precondition Calculi, in Proceedings of the 19th International Symposium on Formal Methods (FM 2014), 2014.
S. Schinzel, An Efficient Mitigation Method for Timing Side Channels on the Web, in Proceedings of the 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011), 2011.
I. Schmitt and Schinzel, S., WAFFle: Fingerprinting Filter Rules of Web Application Firewalls, in {6th USENIX Workshop on Offensive Technologies (WOOT 2012)}, 2012.
M. D. Schwarz, Seidl, H., Vojdani, V., Lammich, P., and Müller-Olm, M., Static Analysis of Interrupt-Driven Programs Synchronized via the Priority Ceiling Protocol, in Proceedings of the 38th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 2011), 2011.
H. Seidl and Kovács, M., Interprocedural Information Flow Analysis of XML Processors, in Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014), 2014.
G. Snelting, Understanding Probabilistic Software Leaks, Science of Computer Programming, 2015.
G. Snelting, Giffhorn, D., Graf, J., Hammer, C., Hecker, M., Mohr, M., and Wasserrab, D., Checking Probabilistic Noninterference Using JOANA, it - Information Technology, 2014.
K. Stenzel, Katkalov, K., Borek, M., and Reif, W., Formalizing Information Flow Control in a Model-Driven Approach, in Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014), 2014.
M. Taghdiri, Snelting, G., and Sinz, C., Information Flow Analysis via Path Condition Refinement, in Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (FAST 2010), 2010.
D. Wasserrab and Lohner, D., Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing, in 6th International Verification Workshop (VERIFY 2010), 2010.
T. Wüchner, Müller, S., and Fischer, R., Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control, in Proceedings of the 5th International Conference on Cloud Computing Technology and Science (CloudCom 2013), 2013.
T. Wüchner, Ochoa, M., and Pretschner, A., Malware Detection with Quantitative Data Flow Graphs, in Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014), 2014.