Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 7 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
F. Dörre and Klebanov, V., Practical Detection of Entropy Loss in Pseudo-Random Number Generators, in Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), 2016.
F. Dörre and Klebanov, V., Pseudo-Random Number Generator Verification: A Case Study, in Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments (VSTTE), 2015.
Q. Huy Do, Bubel, R., and Hähnle, R., Exploit Generation for Information Flow Leaks in Object-Oriented Programs, in Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
Q. Huy Do, Bubel, R., and Hähnle, R., Automatic Detection and Demonstrator Generation for Information Flow Leaks in Object-Oriented Programs, Computers & Security, vol. 67, 2017.
H. Quoc Do, Kamburjan, E., and Wasser, N., Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
R. Dimitrova, Finkbeiner, B., and Rabe, M. N., Monitoring Temporal Information Flow, in Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012.
R. Dimitrova, Finkbeiner, B., Kovács, M., Rabe, M., and Seidl, H., Model Checking Information Flow in Reactive Systems, in Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2012), 2012.