Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
Author Title [ Type(Desc)] Year
Filters: Filter is   [Clear All Filters]
Conference Paper
A. Bichhawat, Rajani, V., Jain, J., Garg, D., and Hammer, C., WebPol: Fine-grained Information Flow Policies for Web Browsers, in Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017.
Journal Article
Q. Huy Do, Bubel, R., and Hähnle, R., Automatic Detection and Demonstrator Generation for Information Flow Leaks in Object-Oriented Programs, Computers & Security, vol. 67, 2017.
A. Popescu and Lammich, P., Bounded-Deducibility Security, Archive of Formal Proofs, 2014.
G. Snelting, Giffhorn, D., Graf, J., Hammer, C., Hecker, M., Mohr, M., and Wasserrab, D., Checking Probabilistic Noninterference Using JOANA, it - Information Technology, 2014.
A. Popescu, Hölzl, J., and Nipkow, T., Formal Verification of Language-Based Concurrent Noninterference, J. Formalized Reasoning, vol. 6, pp. 1-30, 2013.
S. Grewe, Mantel, H., and Schoepe, D., A Formalization of Assumptions and Guarantees for Compositional Noninterference, Archive of Formal Proofs, 2014.
S. Grewe, Lux, A., Mantel, H., and Sauer, J., A Formalization of Declassification with WHAT-and-WHERE-Security, Archive of Formal Proofs, 2014.
S. Grewe, Lux, A., Mantel, H., and Sauer, J., A Formalization of Strong Security, Archive of Formal Proofs, 2014.
R. Küsters, Truderung, T., and Vogt, A., A Game-Based Definition of Coercion-Resistance and its Applications, Journal of Computer Security (special issue of selected CSF 2010 papers), vol. 20, 2012.
D. Bruns, Mostowski, W., and Ulbrich, M., Implementation-level Verification of Algorithms with Keęrn-.1emY, Software Tools for Technology Transfer, 2014.
S. Rasthofer, Arzt, S., and Bodden, E., A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks, Proceedings of the Network and Distributed System Security Symposium (NDSS 2014), 2014.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W., Model-Driven Development of Information Flow-Secure Systems with IFlow, ASE Science Journal, vol. 2, 2013.
D. Giffhorn and Snelting, G., A New Algorithm for Low-Deterministic Security, International Journal on Information Security, 2014.
A. Popescu and Hölzl, J., Possibilistic Noninterference, Archive of Formal Proofs, 2012.
V. Klebanov, Precise Quantitative Information Flow Analysis – A Symbolic Approach, Theoretical Computer Science, 2014.
A. Popescu and Hölzl, J., Probabilistic Noninterference, Archive of Formal Proofs, 2014.
M. N. Rabe, Lammich, P., and Popescu, A., A shallow embedding of HyperCTL, Archive of Formal Proofs, 2014.
V. Rajani, Bastys, I., Rafnsson, W., and Garg, D., Type Systems for Information Flow Control: The Question of Granularity, ACM SIGLOG News, vol. 4, no. 1, 2017.
G. Snelting, Understanding Probabilistic Software Leaks, Science of Computer Programming, 2015.

Pages