Skip to main content
About
Events
Research
Open Positions
Links
Contact
Publications
Projects
Project Clusters
Reference Scenarios
Tools
Search form
Search
Reliably Secure Software Systems (RS
3
) –
DFG Priority Programme 1496
Research
Publications
Best Paper Awards
Projects
Funded Projects
Associated Projects
Projects by Phases
Project Clusters
Projects
Reference Scenarios
Security in E-Voting
Security in Web-based Workflow Management Systems
Software Security for Mobile Devices
Projects
Tools
Search
Show only items where
Author
any
Abadi, Martín
Accorsi, R.
Ahrendt, Wolfgang
Arzt, S.
Arzt, Steven
Askarov, Aslan
Atkinson, C.
Barte, A.
Bartel, Alexandre
Bastys, Iulia
Bauereiß, Thomas
Bauereiss, T.
Bauereiss, Thomas
Beckert, Bernhard
Beckert, B.
Bichhawat, A.
Bichhawat, Abhishek
Bissyandé, Tegawendé F.
Blanchette, J. C.
Blasum, H.
Bodden, E.
Bodden, Eric
Böhme, S.
Bolosteanu, Iulia
Borek, M.
Breitner, Joachim
Bruns, D.
Bruns, Daniel
Bubel, Richard
Buechler, M.
Chong, Stephen
Clarkson, M. R.
Cortier, Véronique
Cúellar, J.
Dering, Matthew
Dimitrova, R.
Do, Quoc Huy
Do, Huy Quoc
Dörre, Felix
Ehlers, R.
Fahland, D.
Faymonville, Peter
Fennell, L.
Finkbeiner, Bernd
Finkbeiner, B.
Fischer, R.
Fischer, P.
Freiling, F.
Fritz, C.
Fromm, Alexander
Galindo, David
Garg, D.
Garg, Deepak
Gark, Deepak
Gawlitza, T. M.
Gay, Richard
Gay, R.
Gerbig, R.
Giffhorn, Dennis
Gladisch, Christoph
Graf, J.
Graf, Jürgen
Grahl, Daniel
Grebenshchikov, Sergey
Grebing, S.
Grebing, Sarah
Greiner, Simon
Grewe, S.
Gritti, Armando Pesenti
Hadasch, F.
Hahn, Christopher
Hähnle, Reiner
Hammer, Christian
Hammer, C.
Havle, O.
Hecker, Martin
Hecker, M.
Henschel, Martin
Herda, Mihai
Hölzl, J.
Hutter, Dieter
Hutter, D.
Jager, T.
Jain, Jinank
Jha, Somesh
Jürjens, J.
Kamburjan, Eduard
Kanav, S.
Katkalov, K.
Keil, M.
Kelbert, F.
Kelbert, Florian
Kennel, B.
Kirsten, Michael
Klebanov, Vladimir
Klebanov, V.
Klein, J.
Klein, Jacques
Koleini, M.
Köpf, B.
Kovács, M.
Kremer, Steve
Kuhn, J.-M.
Kumari, P.
Kunčar, Ondřej
Küsters, R.
Küsters, Ralf
Lammich, Peter
Lammich, P.
Langenstein, B.
Le Traon, Yves
Le Traon, Y.
Lehmann, A.
Li, Ximeng
Li, Li
Liu, Tianhai
Lochbihler, A.
Lohmann, N.
Lohner, D.
Lortz, Steffen
Loval, Enrico
Lovat, E.
Lovat, Enrico
Lux, A.
Maedche, A.
Mann, C.
Mantel, Heiko
Mantel, H.
Manthey, N.
Mauborgne, L.
McDaniel, P.
McDaniel, Patrick
Micinski, K. K.
Moebius, N.
Mohr, Martin
Mohr, M.
Mostowski, W.
Mostowski, Wojciech
Mueller, B.
Muise, C.
Müller, Johannes
Müller, Christian
Müller, S.
Müller-Olm, Markus
Müller-Olm, M.
Nemouchi, Y.
Nipkow, T.
Nordhoff, Benedikt
Nordhoff, B.
Ochoa, M.
Octeau, D.
Octeau, Damien
Oudinet, J.
Perner, M.
Perner, Matthias
Peschla, J.
Pfeiffer, S.
Popescu, Andrei
Popescu, A.
Pretschner, Alexander
Pretschner, A.
Rabe, M.
Rabe, M. N.
Rabe, Markus
Rafnsson, Willard
Raimondi, Franco
Rajani, Vineet
Rajani, V.
Rasthofer, Siegfried
Rasthofer, S.
Reif, W.
Rezk, Tamara
Rios, R.
Sabelfeld, Andrei
Sánchez, C.
Sánchez, César
Sands, D.
Sauer, J.
Scapin, E.
Scapin, Enrico
Scheben, Christoph
Scheben, C.
Schinzel, S.
Schmaltz, J.
Schmitt, P.
Schmitt, Peter H.
Schmitt, Peter H.
Schmitt, I.
Schmitt, P. H.
Schneider, David
Schoepe, D.
Schwarz, M. D.
Seidl, Helmut
Seidl, H.
Sinz, C.
Smallbone, N.
Smorovksy, J
Snelling, Gregor
Snelting, G.
Snelting, Gregor
Sprick, B.
Starostin, Artem
Starostin, A.
Stenger, Marvin
Stenzel, K.
Stephan, W.
Sudbrock, H.
Taghdiri, M.
Taghdiri, Mana
Tasch, Markus
Tentrup, Leander
Thiemann, P.
Timmermann, D.
Truderung, Tomasz
Truderung, T.
Tunjic, C.
Tverdyshew, S.
Tyszberowicz, Shmuel
Ulbrich, M.
Ulbrich, Mattias
Ulbrich, Matthias
Unger, S.
Verbeek, F.
Vogt, A.
Vojdani, V.
Wand, D.
Warzecha, D.
Wasser, Nathan
Wasserrab, D.
Wasserrab, Daniel
Weber, Alexandra
Weidenbach, C.
Weigl, Alexander
Weisbarth, Jörg
Wenner, A.
Wenner, Alexander
Wolf, B.
Wolf, K.
Wonnemann, C.
Wüchner, T.
Zalinescu, Eugen
Zimmermann, Martin
Type
any
Conference Paper
Journal Article
Miscellaneous
Term
any
Year
any
2017
2016
2015
2014
2013
2012
2011
2010
Keyword
any
conference
Export 147 results:
BibTex
[
Author
]
Title
Type
Year
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
P
A. Popescu
and
Hölzl, J.
,
“
Probabilistic Noninterference
”
,
Archive of Formal Proofs
, 2014.
Google Scholar
BibTex
A. Popescu
and
Lammich, P.
,
“
Bounded-Deducibility Security
”
,
Archive of Formal Proofs
, 2014.
Google Scholar
BibTex
A. Popescu
,
Hölzl, J.
, and
Nipkow, T.
,
“
Formal Verification of Language-Based Concurrent Noninterference
”
,
J. Formalized Reasoning
, vol. 6, pp. 1-30, 2013.
Google Scholar
BibTex
S. Pfeiffer
,
Unger, S.
,
Timmermann, D.
, and
Lehmann, A.
,
“
Secure Information Flow Awareness for Smart Wireless eHealth Systems
”
, in
Proceedings of 9th International Multi-Conference on Systems, Signals and Devices (SSD 2012)
, 2012.
Google Scholar
BibTex
O
D. Octeau
,
Jha, S.
,
Dering, M.
,
McDaniel, P.
,
Bartel, A.
,
Li, L.
,
Klein, J.
, and
Le Traon, Y.
,
“
Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis
”
, in
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL)
, 2016.
Google Scholar
BibTex
M. Ochoa
,
Jürjens, J.
, and
Warzecha, D.
,
“
A Sound Decision Procedure for the Compositionality of Secrecy
”
, in
Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012)
, 2012.
Google Scholar
BibTex
M. Ochoa
,
“
Security Guarantees and Evolution: From models to reality
”
, in
Electronic Proceedings of the 1st ESSoS Doctoral Symposium (ESSoS-DS 2012)
, 2012.
Google Scholar
BibTex
M. Ochoa
,
Jürjens, J.
, and
Cúellar, J.
,
“
Non-interference on UML State-charts
”
, in
Proceedings of the 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012)
, 2012.
Google Scholar
BibTex
N
B. Nordhoff
,
Müller-Olm, M.
, and
Lammich, P.
,
“
Iterable Forward Reachability Analysis of Monitor-DPNs
”
, in
Proceedings of Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday (Festschrift for Dave Schmidt)
, 2013.
Google Scholar
BibTex
M
H. Mantel
,
Perner, M.
, and
Sauer, J.
,
“
Noninterference under Weak Memory Models
”
, in
Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014)
, 2014.
Google Scholar
BibTex
H. Mantel
,
Sands, D.
, and
Sudbrock, H.
,
“
Assumptions and Guarantees for Compositional Noninterference
”
, in
Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF 2011)
, 2011.
Google Scholar
BibTex
H. Mantel
,
Müller-Olm, M.
,
Perner, M.
, and
Wenner, A.
,
“
Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis
”
, in
Pre-Proceedings of the 25th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR)
, 2015.
Google Scholar
BibTex
C. Mann
and
Starostin, A.
,
“
A Framework for Static Detection of Privacy Leaks in Android Applications
”
, in
Proceedings of the 27th Symposium on Applied Computing (SAC 2012)
, 2012.
Google Scholar
BibTex
L
A. Lux
,
Mantel, H.
, and
Perner, M.
,
“
Scheduler-Independent Declassification
”
, in
Proceedings of the 11th International Conference on Mathematics of Program Construction (MPC 2012)
, 2012.
Google Scholar
BibTex
E. Lovat
,
“
Cross-Layer Data-Centric Usage Control
”
, in
Proceedings of the International Symposium on Engineering Secure Software and Systems - Doctoral Symposium (ESSoS 2014))
, 2014.
Google Scholar
BibTex
E. Lovat
and
Pretschner, A.
,
“
Data-centric multi-layer usage control enforcement: a Social Network Example
”
, in
Proceedings of the 16th ACM symposium on Access control models and technologies (SACMAT 2011)
, 2011.
Google Scholar
BibTex
E. Lovat
and
Kelbert, F.
,
“
Structure Matters - A new Approach for Data flow Tracking
”
, in
Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2014)
, 2014.
Google Scholar
BibTex
E. Lovat
,
Oudinet, J.
, and
Pretschner, A.
,
“
On Quantitative Dynamic Data Flow Tracking
”
, in
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014)
, 2014.
Google Scholar
BibTex
E. Loval
,
Fromm, A.
,
Mohr, M.
, and
Pretschner, A.
,
“
SHRIFT System-wide HybRid Information Flow Tracking
”
, in
Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC)
, 2015.
Google Scholar
BibTex
A. Lochbihler
,
“
Java and the Java Memory Model – a Unified, Machine-Checked Formalisation
”
, in
Proceedings of the ACM SIGPLAN 7th Workshop on Programming Languages and Systems (PLAS 2012)
, 2012.
Google Scholar
BibTex
T. Liu
,
Tyszberowicz, S.
,
Herda, M.
,
Beckert, B.
,
Grahl, D.
, and
Taghdiri, M.
,
“
Computing Specification-Sensitive Abstractions for Program Verification
”
, in
Proceedings of the 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA)
, 2016.
Google Scholar
BibTex
X. Li
,
Mantel, H.
, and
Tasch, M.
,
“
Taming Message-passing Communication in Compositional Reasoning about Confidentiality
”
, in
Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS)
, 2017.
Google Scholar
BibTex
L. Li
,
Bartel, A.
,
Bissyandé, T. F.
,
Klein, J.
,
Le Traon, Y.
,
Arzt, S.
,
Rasthofer, S.
,
Bodden, E.
,
Octeau, D.
, and
McDaniel, P.
,
“
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps
”
, in
Proceedings of the 37th International Conference on Software Engineering (ICSE)
, 2015.
Google Scholar
BibTex
A. Lehmann
and
Fahland, D.
,
“
Information Flow Security for Business Process Models - just one click away
”
, in
Proceedings of the 10th International Conference on Business Process Management - Demo Track (BPM 2012)
, 2012.
Google Scholar
BibTex
A. Lehmann
,
Lohmann, N.
, and
Wolf, K.
,
“
Stubborn Sets for Simple Linear Time Properties
”
, in
Proceedings of 33rd International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency (PETRI NETS 2012)
, 2012.
Google Scholar
BibTex
Pages
« first
‹ previous
1
2
3
4
5
6
next ›
last »