Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 11 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is I  [Clear All Filters]
2016
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G., On Improvements Of Low-Deterministic Security, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
2015
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P., IccTA: Detecting Inter-Component Privacy Leaks in Android Apps, in Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
V. Rajani, Bichhawat, A., Gark, D., and Hammer, C., Information Flow Control for Event Handling and the DOM in Web Browsers, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
2014
D. Bruns, Mostowski, W., and Ulbrich, M., Implementation-level Verification of Algorithms with Keęrn-.1emY, Software Tools for Technology Transfer, 2014.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Information Flow Control in WebKit's JavaScript Bytecode, in Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M., Information Flow in Object-Oriented Software, in Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
H. Seidl and Kovács, M., Interprocedural Information Flow Analysis of XML Processors, in Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014), 2014.
2013
B. Nordhoff, Müller-Olm, M., and Lammich, P., Iterable Forward Reachability Analysis of Monitor-DPNs, in Proceedings of Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday (Festschrift for Dave Schmidt), 2013.
2012
J. Cúellar, Ochoa, M., and Rios, R., Indistinguishable regions in Geographic Location Privacy, in Proceedings of the 27th ACM Symposium on Applied Computing (SAC 2012), 2012.
A. Lehmann and Fahland, D., Information Flow Security for Business Process Models - just one click away, in Proceedings of the 10th International Conference on Business Process Management - Demo Track (BPM 2012), 2012.
2010
M. Taghdiri, Snelting, G., and Sinz, C., Information Flow Analysis via Path Condition Refinement, in Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (FAST 2010), 2010.