Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
F. Freiling and Schinzel, S., Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications, in Proceedings of the 26th International Information Security Conference (IFIP/SEC 2011), 2011.
G
T. M. Gawlitza, Lammich, P., Müller-Olm, M., Seidl, H., and Wenner, A., Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation, in Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011), 2011.
R. Gay, Mantel, H., and Sprick, B., Service Automata, in Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2012.
D. Giffhorn and Snelting, G., A New Algorithm for Low-Deterministic Security, International Journal on Information Security, 2014.
J. Graf, Hecker, M., and Mohr, M., Using JOANA for Information Flow Control in Java Programs - A Practical Guide, in Proceedings of the 6th Working Conference on Programming Languages (ATPS 2013), 2013.
J. Graf, Hecker, M., Mohr, M., and Nordhoff, B., Lock-sensitive Interference Analysis for Java: Combining Program Dependence Graphs with Dynamic Pushdown Networks, in 1st International Workshop on Interference and Dependence (ID 2013), 2013.
S. Greiner, Mohr, M., and Beckert, B., Modular Verification of Information-Flow Security in Component-Based Systems, in Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
S. Grewe, Lux, A., Mantel, H., and Sauer, J., A Formalization of Strong Security, Archive of Formal Proofs, 2014.
S. Grewe, Mantel, H., and Schoepe, D., A Formalization of Assumptions and Guarantees for Compositional Noninterference, Archive of Formal Proofs, 2014.
S. Grewe, Lux, A., Mantel, H., and Sauer, J., A Formalization of Declassification with WHAT-and-WHERE-Security, Archive of Formal Proofs, 2014.
H
F. Hadasch, Mueller, B., and Maedche, A., Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: A Qualitative Study, in Proceedings of the 20th European Conference on Information Systems (ECIS 2012), Barcelona, Spain, 2012.
F. Hadasch, Mueller, B., and Maedche, A., Leaking Confidential Information by Non-Malicious User Behaviour in Enterprise Systems - Design of an Empirical Study, in Proceedings of the 6th Mediterranean Conference on Information Systems (MCIS 2011), 2011.
C. Hammer, Experiences with PDG-based IFC, in Proceedings of the 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010), 2010.
C. Hammer, Efficient Algorithms for Control Closures, in 1st International Workshop on Interference and Dependence (ID 2013), 2013.
J
T. Jager, Schinzel, S., and Smorovksy, J., Bleichenbacher's Attack Strikes Again: Breaking PKCS\#1 v1.5 in XML Encryption, in Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS 2012), 2012.
K
S. Kanav, Lammich, P., and Popescu, A., A Conference Management System with Verified Document Confidentiality, in Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014), 2014.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W., Model-Driven Development of Information Flow-Secure Systems with IFlow, in Proceedings of 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013), 2013.
K. Katkalov, Fischer, P., Stenzel, K., Moebius, N., and Reif, W., Evaluation of Jif and Joana as information flow analyzers in a model-driven approach, in Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012), 2012.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W., Model-Driven Development of Information Flow-Secure Systems with IFlow, ASE Science Journal, vol. 2, 2013.
M. Keil and Thiemann, P., Type-based Dependency Analysis for JavaScript, in Proceedings of the 8th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2013), 2013.
M. Keil and Thiemann, P., Efficient Dynamic Access Analysis Using JavaScript Proxies, in Proceedings of the 9th Symposium on Dynamic Languages (DLS 2013), 2013.
F. Kelbert and Pretschner, A., Towards a Policy Enforcement Infrastructure for Distributed Usage Control, in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), 2012.
F. Kelbert and Pretschner, A., A Fully Decentralized Data Usage Control Enforcement Infrastructure, in Proceedings of the 13th International Conference on Applied Cryptography and Network Security, 2015.
F. Kelbert and Pretschner, A., Decentralized Distributed Data Usage Control, in Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014.
V. Klebanov, Weigl, A., and Weisbarth, J., Sound Probabilistic #SAT with Projection, in Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL), 2016.

Pages