2014
T. Bauereiss and Hutter, D.,
“Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS”, in
Proceedings of the 29th International Information Security and Privacy Conference (IFIP SEC 2014), 2014.
S. Kanav, Lammich, P., and Popescu, A.,
“A Conference Management System with Verified Document Confidentiality”, in
Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014), 2014.
E. Lovat,
“Cross-Layer Data-Centric Usage Control”, in
Proceedings of the International Symposium on Engineering Secure Software and Systems - Doctoral Symposium (ESSoS 2014)), 2014.
F. Kelbert and Pretschner, A.,
“Decentralized Distributed Data Usage Control”, in
Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014.
S. Rasthofer, Arzt, S., Lovat, E., and Bodden, E.,
“DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android”, in
Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014), 2014.
C. Scheben and Schmitt, P. H.,
“Efficient Self-Composition for Weakest Precondition Calculi”, in
Proceedings of the 19th International Symposium on Formal Methods (FM 2014), 2014.
S. Arzt, Rasthofer, S., Fritz, C., Bodden, E., Barte, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P.,
“FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps”, in
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
K. Stenzel, Katkalov, K., Borek, M., and Reif, W.,
“Formalizing Information Flow Control in a Model-Driven Approach”, in
Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014), 2014.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C.,
“Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis”, in
Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014), 2014.
L. Fennell and Thiemann, P.,
“Gradual Typing for Annotated Type Systems”, in
Proceedings of the 23rd European Symposium on Programming (ESOP 2014), 2014.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C.,
“Information Flow Control in WebKit's JavaScript Bytecode”, in
Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“Information Flow in Object-Oriented Software”, in
Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
H. Seidl and Kovács, M.,
“Interprocedural Information Flow Analysis of XML Processors”, in
Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014), 2014.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P. H., and Ulbrich, M.,
“The KeY Platform for Verification and Analysis of Java Programs”, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
T. Wüchner, Ochoa, M., and Pretschner, A.,
“Malware Detection with Quantitative Data Flow Graphs”, in
Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014), 2014.
H. Mantel, Perner, M., and Sauer, J.,
“Noninterference under Weak Memory Models”, in
Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014), 2014.
T. Bauereiss and Hutter, D.,
“Possibilistic information flow security of workflow management systems”, in
Proceedings of the 1st International Workshop on Graphical Models for Security at ETAPS 2014 (GraMSec 2014), 2014.
Pages