Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 7 results:
Author Title Type [ Year(Asc)]
Filters: Author is Martin Mohr  [Clear All Filters]
S. Greiner, Mohr, M., and Beckert, B., Modular Verification of Information-Flow Security in Component-Based Systems, in Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G., On Improvements Of Low-Deterministic Security, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M., A Hybrid Approach for Proving Noninterference of Java Programs, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R., Security in E-Voting, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
E. Loval, Fromm, A., Mohr, M., and Pretschner, A., SHRIFT System-wide HybRid Information Flow Tracking, in Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A., Software Security for Mobile Devices, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.