I
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“Information Flow in Object-Oriented Software”, in
Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C.,
“Information Flow Control in WebKit's JavaScript Bytecode”, in
Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G.,
“On Improvements Of Low-Deterministic Security”, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P.,
“IccTA: Detecting Inter-Component Privacy Leaks in Android Apps”, in
Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P.,
“IccTA: Detecting Inter-Component Privacy Leaks in Android Apps”, in
Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P.,
“IccTA: Detecting Inter-Component Privacy Leaks in Android Apps”, in
Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
H
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M.,
“A Hybrid Approach for Proving Noninterference of Java Programs”, in
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M.,
“A Hybrid Approach for Proving Noninterference of Java Programs”, in
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C.,
“A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs”, in
Grande Region Security and Reliability Day 2013, 2013.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C.,
“A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs”, in
Grande Region Security and Reliability Day 2013, 2013.
F
K. Stenzel, Katkalov, K., Borek, M., and Reif, W.,
“Formalizing Information Flow Control in a Model-Driven Approach”, in
Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014), 2014.
S. Arzt, Rasthofer, S., Fritz, C., Bodden, E., Barte, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P.,
“FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps”, in
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
S. Arzt, Rasthofer, S., Fritz, C., Bodden, E., Barte, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P.,
“FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps”, in
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
E
Q. Huy Do, Bubel, R., and Hähnle, R.,
“Exploit Generation for Information Flow Leaks in Object-Oriented Programs”, in
Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
J. C. Blanchette, Böhme, S., Popescu, A., and Smallbone, N.,
“Encoding Monomorphic and Polymorphic Types”, in
Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), 2013.
J. C. Blanchette, Böhme, S., Popescu, A., and Smallbone, N.,
“Encoding Monomorphic and Polymorphic Types”, in
Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), 2013.
D
B. Beckert and Bruns, D.,
“Dynamic Logic with Trace Semantics”, in
Proceedings of the 24th International Conference on Automated Deduction (CADE-24), 2013.
B. Beckert and Bruns, D.,
“Dynamic Logic with Trace Semantics”, in
Proceedings of the 24th International Conference on Automated Deduction (CADE-24), 2013.
S. Rasthofer, Arzt, S., Lovat, E., and Bodden, E.,
“DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android”, in
Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014), 2014.
Pages