R
W. Rafnsson, Sabelfeld, A., and Garg, D.,
“Progress-Sensitive Security for SPARK”, in
Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
V. Rajani, Garg, D., and Rezk, T.,
“On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks”, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
V. Rajani, Bastys, I., Rafnsson, W., and Garg, D.,
“Type Systems for Information Flow Control: The Question of Granularity”,
ACM SIGLOG News, vol. 4, no. 1, 2017.
S. Rasthofer, Arzt, S., Lovat, E., and Bodden, E.,
“DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android”, in
Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014), 2014.
S
C. Scheben and Schmitt, P. H.,
“Efficient Self-Composition for Weakest Precondition Calculi”, in
Proceedings of the 19th International Symposium on Formal Methods (FM 2014), 2014.
S. Schinzel,
“An Efficient Mitigation Method for Timing Side Channels on the Web”, in
Proceedings of the 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011), 2011.
M. D. Schwarz, Seidl, H., Vojdani, V., Lammich, P., and Müller-Olm, M.,
“Static Analysis of Interrupt-Driven Programs Synchronized via the Priority Ceiling Protocol”, in
Proceedings of the 38th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 2011), 2011.
H. Seidl and Kovács, M.,
“Interprocedural Information Flow Analysis of XML Processors”, in
Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014), 2014.
G. Snelting, Giffhorn, D., Graf, J., Hammer, C., Hecker, M., Mohr, M., and Wasserrab, D.,
“Checking Probabilistic Noninterference Using JOANA”,
it - Information Technology, 2014.
K. Stenzel, Katkalov, K., Borek, M., and Reif, W.,
“Formalizing Information Flow Control in a Model-Driven Approach”, in
Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014), 2014.
W
T. Wüchner, Müller, S., and Fischer, R.,
“Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control”, in
Proceedings of the 5th International Conference on Cloud Computing Technology and Science (CloudCom 2013), 2013.
T. Wüchner, Ochoa, M., and Pretschner, A.,
“Malware Detection with Quantitative Data Flow Graphs”, in
Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014), 2014.
Pages