Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
J. C. Blanchette, Böhme, S., Popescu, A., and Smallbone, N., Encoding Monomorphic and Polymorphic Types, in Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), 2013.
J. C. Blanchette, Popescu, A., Wand, D., and Weidenbach, C., More SPASS with Isabelle - Superposition with Hard Sorts and Configurable Simplification, in Proceedings of the 3rd Conference on Interactive Theorem Proving (ITP 2012), 2012.
H. Blasum, Havle, O., Langenstein, B., Nemouchi, Y., Schmaltz, J., Stephan, W., Tverdyshew, S., Verbeek, F., and Wolf, B., Using Isabelle/HOL to Develop and Maintain Separation Invariants for an Operating System, in Isabelle 2014 workshop at FloC 2014, 2014.
I. Bolosteanu and Garg, D., Asymmetric Secure Multi-execution with Declassification, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G., On Improvements Of Low-Deterministic Security, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
D. Bruns, Mostowski, W., and Ulbrich, M., Implementation-level Verification of Algorithms with Keęrn-.1emY, Software Tools for Technology Transfer, 2014.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R., Security in E-Voting, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
C
M. R. Clarkson, Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N., and Sánchez, C., Temporal Logics for Hyperproperties, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
V. Cortier, Galindo, D., Küsters, R., Müller, J., and Truderung, T., SoK: Verifiability Notions for E-Voting Protocols, in Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016.
J. Cúellar, Ochoa, M., and Rios, R., Indistinguishable regions in Geographic Location Privacy, in Proceedings of the 27th ACM Symposium on Applied Computing (SAC 2012), 2012.
D
R. Dimitrova, Finkbeiner, B., Kovács, M., Rabe, M., and Seidl, H., Model Checking Information Flow in Reactive Systems, in Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2012), 2012.
R. Dimitrova, Finkbeiner, B., and Rabe, M. N., Monitoring Temporal Information Flow, in Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012.
Q. Huy Do, Bubel, R., and Hähnle, R., Automatic Detection and Demonstrator Generation for Information Flow Leaks in Object-Oriented Programs, Computers & Security, vol. 67, 2017.
H. Quoc Do, Kamburjan, E., and Wasser, N., Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
Q. Huy Do, Bubel, R., and Hähnle, R., Exploit Generation for Information Flow Leaks in Object-Oriented Programs, in Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
F. Dörre and Klebanov, V., Practical Detection of Entropy Loss in Pseudo-Random Number Generators, in Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), 2016.
F. Dörre and Klebanov, V., Pseudo-Random Number Generator Verification: A Case Study, in Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments (VSTTE), 2015.
E
R. Ehlers and Finkbeiner, B., Monitoring Realizability, in Proceedings of the 2nd International Conference on Runtime Verification (RV 2011), 2012.
F
L. Fennell and Thiemann, P., Gradual Typing for Annotated Type Systems, in Proceedings of the 23rd European Symposium on Programming (ESOP 2014), 2014.
L. Fennell and Thiemann, P., Gradual Security Typing with References, in Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF 2013), 2013, pp. 224-239.
L. Fennell and Thiemann, P., The Blame Theorem for a Linear Lambda Calculus with Type Dynamic, in Proceedings of the Symposium on Trends in Functional Programming (TFP 2012), 2012.
B. Finkbeiner and Zimmermann, M., The First-Order Logic of Hyperproperties, in Proceedings of the 34th Symposium on Theoretical Aspects of Computer Science (STACS), 2017.
B. Finkbeiner, Müller, C., Seidl, H., and Zalinescu, E., Verifying Security Policies in Multi-agent Workflows with Loops, in Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017.
B. Finkbeiner, Hahn, C., Stenger, M., and Tentrup, L., Monitoring Hyperproperties, in Proceedings of the 17th International Conference on Runtime Verification (RV), 2017.
B. Finkbeiner, Rabe, M., and Sánchez, C., Algorithms for Model Checking HyperLTL and HyperCTL*, in Proceedings of the 27th International Conference on Computer Aided Verification (CAV), 2015.

Pages