Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
R. Accorsi, Anwenden struktureller Nicht-Interferenz zur Sicherheitsanalyse von Workflow-Modellen, in Proceedings of INFORMATIK 2011 - Dependable Software for Critical Infrastructures (DSCI 2011), 2011.
R. Accorsi and Wonnemann, C., Strong non-leak guarantees for workflow models, in Proceedings of the 26th ACM Symposium on Applied Computing (SAC 2011), 2011.
R. Accorsi and Lehmann, A., Automatic Information Flow Analysis of Business Process Models, in 10th International Conference on Business Process Management (BPM 2012), 2012.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P.  H., and Ulbrich, M., The KeY Platform for Verification and Analysis of Java Programs, in Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A., Software Security for Mobile Devices, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
S. Arzt, Rasthofer, S., Fritz, C., Bodden, E., Barte, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P., FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, in Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
S. Arzt and Bodden, E., Reviser: Efficiently Updating IDE-/IFDS-Based Data-Flow Analyses in Response to Incremental Program Changes, in Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), 2014.
A. Askarov, Chong, S., and Mantel, H., Hybrid Monitors for Concurrent Noninterference, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
C. Atkinson, Gerbig, R., and Kennel, B., On-the-Fly Emendation of Multi-level Models, in 8th European Conference on Modelling Foundations and Applications (ECMFA 2012), 2012.
C. Atkinson, Gerbig, R., and Kennel, B., Symbiotic general-purpose and domain-specific languages, in Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), 2012.
C. Atkinson, Gerbig, R., and Tunjic, C., Towards Multi-level Aware Model Transformations, in 5th International Conference on Theory and Practice of Model Transformations (ICMT 2012), 2012.
B
T. Bauereiß, Gritti, A. Pesenti, Popescu, A., and Raimondi, F., CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees, in Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P), 2017.
T. Bauereiß, Gritti, A. Pesenti, Popescu, A., and Raimondi, F., CoSMed: A Confidentiality-Verified Social Media Platform, in Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP), 2016.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L., Security in Web-Based Workflows, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss and Hutter, D., Possibilistic information flow security of workflow management systems, in Proceedings of the 1st International Workshop on Graphical Models for Security at ETAPS 2014 (GraMSec 2014), 2014.
T. Bauereiss and Hutter, D., Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS, in Proceedings of the 29th International Information Security and Privacy Conference (IFIP SEC 2014), 2014.
T. Bauereiss and Hutter, D., Security (hyper-)properties in workflow systems: From specification to verification, in Electronic Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2014), 2014.
B. Beckert and Bruns, D., Dynamic Logic with Trace Semantics, in Proceedings of the 24th International Conference on Automated Deduction (CADE-24), 2013.
B. Beckert, Bruns, D., and Grebing, S., Mind the Gap: Formal Verification and the Common Criteria, in Proceedings of the 6th International Verification Workshop (VERIFY 2010), 2012.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M., Information Flow in Object-Oriented Software, in Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
B. Beckert and Bruns, D., Formal Semantics of Model Fields in Annotation-based Specifications, in {KI 2012}: Advances in Artificial Intelligence, 2012.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Information Flow Control in WebKit's JavaScript Bytecode, in Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis, in Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014), 2014.
A. Bichhawat, Rajani, V., Jain, J., Garg, D., and Hammer, C., WebPol: Fine-grained Information Flow Policies for Web Browsers, in Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017.
J. C. Blanchette, Böhme, S., Popescu, A., and Smallbone, N., Encoding Monomorphic and Polymorphic Types, in Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), 2013.

Pages