Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
A. Bichhawat, Rajani, V., Jain, J., Garg, D., and Hammer, C., WebPol: Fine-grained Information Flow Policies for Web Browsers, in Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017.
I. Schmitt and Schinzel, S., WAFFle: Fingerprinting Filter Rules of Web Application Firewalls, in {6th USENIX Workshop on Offensive Technologies (WOOT 2012)}, 2012.
V
B. Finkbeiner, Müller, C., Seidl, H., and Zalinescu, E., Verifying Security Policies in Multi-agent Workflows with Loops, in Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017.
C. Scheben and Schmitt, P., Verification of Information Flow Properties of Java Programs without Approximations, in Proceedings of the Formal Verification of Object-Oriented Software (FoVeOOS 2011), 2012.
R. Küsters, Truderung, T., and Vogt, A., Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, in Proceedings of the 32nd IEEE Symposium on Security and Privacy (S{&}P 2011), 2011.
T
M. Keil and Thiemann, P., Type-based Dependency Analysis for JavaScript, in Proceedings of the 8th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2013), 2013.
V. Rajani, Bastys, I., Rafnsson, W., and Garg, D., Type Systems for Information Flow Control: The Question of Granularity, ACM SIGLOG News, vol. 4, no. 1, 2017.
C. Atkinson, Gerbig, R., and Tunjic, C., Towards Multi-level Aware Model Transformations, in 5th International Conference on Theory and Practice of Model Transformations (ICMT 2012), 2012.
H. Quoc Do, Kamburjan, E., and Wasser, N., Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
F. Kelbert and Pretschner, A., Towards a Policy Enforcement Infrastructure for Distributed Usage Control, in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), 2012.
M. R. Clarkson, Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N., and Sánchez, C., Temporal Logics for Hyperproperties, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
X. Li, Mantel, H., and Tasch, M., Taming Message-passing Communication in Compositional Reasoning about Confidentiality, in Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), 2017.
S
C. Atkinson, Gerbig, R., and Kennel, B., Symbiotic general-purpose and domain-specific languages, in Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), 2012.
A. Lehmann, Lohmann, N., and Wolf, K., Stubborn Sets for Simple Linear Time Properties, in Proceedings of 33rd International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency (PETRI NETS 2012), 2012.
E. Lovat and Kelbert, F., Structure Matters - A new Approach for Data flow Tracking, in Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2014), 2014.
R. Accorsi and Wonnemann, C., Strong non-leak guarantees for workflow models, in Proceedings of the 26th ACM Symposium on Applied Computing (SAC 2011), 2011.
M. D. Schwarz, Seidl, H., Vojdani, V., Lammich, P., and Müller-Olm, M., Static Analysis of Interrupt-Driven Programs Synchronized via the Priority Ceiling Protocol, in Proceedings of the 38th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 2011), 2011.
V. Klebanov, Weigl, A., and Weisbarth, J., Sound Probabilistic #SAT with Projection, in Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL), 2016.
M. Ochoa, Jürjens, J., and Warzecha, D., A Sound Decision Procedure for the Compositionality of Secrecy, in Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
V. Cortier, Galindo, D., Küsters, R., Müller, J., and Truderung, T., SoK: Verifiability Notions for E-Voting Protocols, in Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A., Software Security for Mobile Devices, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.

Pages