Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 50 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is K  [Clear All Filters]
2014
S. Arzt, Rasthofer, S., Fritz, C., Bodden, E., Barte, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P., FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, in Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
R. Küsters, Truderung, T., and Vogt, A., Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking, in Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P 2014), 2014.
K. Stenzel, Katkalov, K., Borek, M., and Reif, W., Formalizing Information Flow Control in a Model-Driven Approach, in Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014), 2014.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M., Information Flow in Object-Oriented Software, in Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
H. Seidl and Kovács, M., Interprocedural Information Flow Analysis of XML Processors, in Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014), 2014.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P.  H., and Ulbrich, M., The KeY Platform for Verification and Analysis of Java Programs, in Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
V. Klebanov, Precise Quantitative Information Flow Analysis – A Symbolic Approach, Theoretical Computer Science, 2014.
E. Lovat and Kelbert, F., Structure Matters - A new Approach for Data flow Tracking, in Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2014), 2014.
M. R. Clarkson, Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N., and Sánchez, C., Temporal Logics for Hyperproperties, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
2015
O. Kunčar and Popescu, A., A Consistent Foundation for Isabelle/HOL, in Proceedings of the 6th International Conference on Interactive Theorem Proving (ITP), 2015.
F. Kelbert and Pretschner, A., A Fully Decentralized Data Usage Control Enforcement Infrastructure, in Proceedings of the 13th International Conference on Applied Cryptography and Network Security, 2015.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M., A Hybrid Approach for Proving Noninterference of Java Programs, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M., A Hybrid Approach for Proving Noninterference of Java Programs, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P., IccTA: Detecting Inter-Component Privacy Leaks in Android Apps, in Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
F. Dörre and Klebanov, V., Pseudo-Random Number Generator Verification: A Case Study, in Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments (VSTTE), 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R., Security in E-Voting, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L., Security in Web-Based Workflows, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
2016
D. Octeau, Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., and Le Traon, Y., Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis, in Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2016.
O. Kunčar and Popescu, A., From Types to Sets by Local Type Definitions in Higher-Order Logic, in Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP), 2016.
F. Dörre and Klebanov, V., Practical Detection of Entropy Loss in Pseudo-Random Number Generators, in Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), 2016.
R. Küsters, Müller, J., Scapin, E., and Truderung, T., sElect: A Lightweight Verifiable Remote Voting System, in Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
V. Cortier, Galindo, D., Küsters, R., Müller, J., and Truderung, T., SoK: Verifiability Notions for E-Voting Protocols, in Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016.
V. Klebanov, Weigl, A., and Weisbarth, J., Sound Probabilistic #SAT with Projection, in Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL), 2016.
H. Quoc Do, Kamburjan, E., and Wasser, N., Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
2017
O. Kunčar and Popescu, A., Comprehending Isabelle/HOL's Consistency, in Proceedings of the 26th European Symposium on Programming (ESOP), 2017.

Pages