Skip to main content
About
Events
Research
Open Positions
Links
Contact
Publications
Projects
Project Clusters
Reference Scenarios
Tools
Search form
Search
Reliably Secure Software Systems (RS
3
) –
DFG Priority Programme 1496
Research
Publications
Best Paper Awards
Projects
Funded Projects
Associated Projects
Projects by Phases
Project Clusters
Projects
Reference Scenarios
Security in E-Voting
Security in Web-based Workflow Management Systems
Software Security for Mobile Devices
Projects
Tools
Search
Show only items where
Author
any
Abadi, Martín
Accorsi, R.
Ahrendt, Wolfgang
Arzt, S.
Arzt, Steven
Askarov, Aslan
Atkinson, C.
Barte, A.
Bartel, Alexandre
Bastys, Iulia
Bauereiß, Thomas
Bauereiss, T.
Bauereiss, Thomas
Beckert, B.
Beckert, Bernhard
Bichhawat, A.
Bichhawat, Abhishek
Bissyandé, Tegawendé F.
Blanchette, J. C.
Blasum, H.
Bodden, E.
Bodden, Eric
Böhme, S.
Bolosteanu, Iulia
Borek, M.
Breitner, Joachim
Bruns, D.
Bruns, Daniel
Bubel, Richard
Buechler, M.
Chong, Stephen
Clarkson, M. R.
Cortier, Véronique
Cúellar, J.
Dering, Matthew
Dimitrova, R.
Do, Huy Quoc
Do, Quoc Huy
Dörre, Felix
Ehlers, R.
Fahland, D.
Faymonville, Peter
Fennell, L.
Finkbeiner, B.
Finkbeiner, Bernd
Fischer, P.
Fischer, R.
Freiling, F.
Fritz, C.
Fromm, Alexander
Galindo, David
Garg, D.
Garg, Deepak
Gark, Deepak
Gawlitza, T. M.
Gay, R.
Gay, Richard
Gerbig, R.
Giffhorn, Dennis
Gladisch, Christoph
Graf, J.
Graf, Jürgen
Grahl, Daniel
Grebenshchikov, Sergey
Grebing, S.
Grebing, Sarah
Greiner, Simon
Grewe, S.
Gritti, Armando Pesenti
Hadasch, F.
Hahn, Christopher
Hähnle, Reiner
Hammer, C.
Hammer, Christian
Havle, O.
Hecker, M.
Hecker, Martin
Henschel, Martin
Herda, Mihai
Hölzl, J.
Hutter, D.
Hutter, Dieter
Jager, T.
Jain, Jinank
Jha, Somesh
Jürjens, J.
Kamburjan, Eduard
Kanav, S.
Katkalov, K.
Keil, M.
Kelbert, F.
Kelbert, Florian
Kennel, B.
Kirsten, Michael
Klebanov, V.
Klebanov, Vladimir
Klein, J.
Klein, Jacques
Koleini, M.
Köpf, B.
Kovács, M.
Kremer, Steve
Kuhn, J.-M.
Kumari, P.
Kunčar, Ondřej
Küsters, R.
Küsters, Ralf
Lammich, P.
Lammich, Peter
Langenstein, B.
Le Traon, Y.
Le Traon, Yves
Lehmann, A.
Li, Li
Li, Ximeng
Liu, Tianhai
Lochbihler, A.
Lohmann, N.
Lohner, D.
Lortz, Steffen
Loval, Enrico
Lovat, E.
Lovat, Enrico
Lux, A.
Maedche, A.
Mann, C.
Mantel, H.
Mantel, Heiko
Manthey, N.
Mauborgne, L.
McDaniel, P.
McDaniel, Patrick
Micinski, K. K.
Moebius, N.
Mohr, M.
Mohr, Martin
Mostowski, W.
Mostowski, Wojciech
Mueller, B.
Muise, C.
Müller, S.
Müller, Christian
Müller, Johannes
Müller-Olm, M.
Müller-Olm, Markus
Nemouchi, Y.
Nipkow, T.
Nordhoff, B.
Nordhoff, Benedikt
Ochoa, M.
Octeau, D.
Octeau, Damien
Oudinet, J.
Perner, M.
Perner, Matthias
Peschla, J.
Pfeiffer, S.
Popescu, A.
Popescu, Andrei
Pretschner, A.
Pretschner, Alexander
Rabe, M.
Rabe, M. N.
Rabe, Markus
Rafnsson, Willard
Raimondi, Franco
Rajani, V.
Rajani, Vineet
Rasthofer, S.
Rasthofer, Siegfried
Reif, W.
Rezk, Tamara
Rios, R.
Sabelfeld, Andrei
Sánchez, C.
Sánchez, César
Sands, D.
Sauer, J.
Scapin, E.
Scapin, Enrico
Scheben, C.
Scheben, Christoph
Schinzel, S.
Schmaltz, J.
Schmitt, P.
Schmitt, I.
Schmitt, P. H.
Schmitt, Peter H.
Schmitt, Peter H.
Schneider, David
Schoepe, D.
Schwarz, M. D.
Seidl, H.
Seidl, Helmut
Sinz, C.
Smallbone, N.
Smorovksy, J
Snelling, Gregor
Snelting, G.
Snelting, Gregor
Sprick, B.
Starostin, A.
Starostin, Artem
Stenger, Marvin
Stenzel, K.
Stephan, W.
Sudbrock, H.
Taghdiri, M.
Taghdiri, Mana
Tasch, Markus
Tentrup, Leander
Thiemann, P.
Timmermann, D.
Truderung, T.
Truderung, Tomasz
Tunjic, C.
Tverdyshew, S.
Tyszberowicz, Shmuel
Ulbrich, M.
Ulbrich, Matthias
Ulbrich, Mattias
Unger, S.
Verbeek, F.
Vogt, A.
Vojdani, V.
Wand, D.
Warzecha, D.
Wasser, Nathan
Wasserrab, D.
Wasserrab, Daniel
Weber, Alexandra
Weidenbach, C.
Weigl, Alexander
Weisbarth, Jörg
Wenner, A.
Wenner, Alexander
Wolf, K.
Wolf, B.
Wonnemann, C.
Wüchner, T.
Zalinescu, Eugen
Zimmermann, Martin
Type
any
Conference Paper
Journal Article
Miscellaneous
Term
any
Year
any
2017
2016
2015
2014
2013
2012
2011
2010
Keyword
any
conference
Export 147 results:
BibTeX
[
Author
]
Title
Type
Year
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
W
T. Wüchner
,
Ochoa, M.
, and
Pretschner, A.
,
“
Malware Detection with Quantitative Data Flow Graphs
”
, in
Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014)
, 2014.
Google Scholar
BibTeX
T. Wüchner
,
Müller, S.
, and
Fischer, R.
,
“
Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control
”
, in
Proceedings of the 5th International Conference on Cloud Computing Technology and Science (CloudCom 2013)
, 2013.
Google Scholar
BibTeX
D. Wasserrab
and
Lohner, D.
,
“
Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing
”
, in
6th International Verification Workshop (VERIFY 2010)
, 2010.
Google Scholar
BibTeX
T
M. Taghdiri
,
Snelting, G.
, and
Sinz, C.
,
“
Information Flow Analysis via Path Condition Refinement
”
, in
Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (FAST 2010)
, 2010.
Google Scholar
BibTeX
S
K. Stenzel
,
Katkalov, K.
,
Borek, M.
, and
Reif, W.
,
“
Formalizing Information Flow Control in a Model-Driven Approach
”
, in
Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014)
, 2014.
Google Scholar
BibTeX
G. Snelting
,
Giffhorn, D.
,
Graf, J.
,
Hammer, C.
,
Hecker, M.
,
Mohr, M.
, and
Wasserrab, D.
,
“
Checking Probabilistic Noninterference Using JOANA
”
,
it - Information Technology
, 2014.
Google Scholar
BibTeX
G. Snelting
,
“
Understanding Probabilistic Software Leaks
”
,
Science of Computer Programming
, 2015.
Google Scholar
BibTeX
H. Seidl
and
Kovács, M.
,
“
Interprocedural Information Flow Analysis of XML Processors
”
, in
Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014)
, 2014.
Google Scholar
BibTeX
M. D. Schwarz
,
Seidl, H.
,
Vojdani, V.
,
Lammich, P.
, and
Müller-Olm, M.
,
“
Static Analysis of Interrupt-Driven Programs Synchronized via the Priority Ceiling Protocol
”
, in
Proceedings of the 38th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 2011)
, 2011.
Google Scholar
BibTeX
I. Schmitt
and
Schinzel, S.
,
“
WAFFle: Fingerprinting Filter Rules of Web Application Firewalls
”
, in
{6th USENIX Workshop on Offensive Technologies (WOOT 2012)}
, 2012.
Google Scholar
BibTeX
S. Schinzel
,
“
An Efficient Mitigation Method for Timing Side Channels on the Web
”
, in
Proceedings of the 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011)
, 2011.
Google Scholar
BibTeX
C. Scheben
and
Schmitt, P. H.
,
“
Efficient Self-Composition for Weakest Precondition Calculi
”
, in
Proceedings of the 19th International Symposium on Formal Methods (FM 2014)
, 2014.
Google Scholar
BibTeX
C. Scheben
and
Schmitt, P.
,
“
Verification of Information Flow Properties of Java Programs without Approximations
”
, in
Proceedings of the Formal Verification of Object-Oriented Software (FoVeOOS 2011)
, 2012.
Google Scholar
BibTeX
R
S. Rasthofer
,
Arzt, S.
,
Lovat, E.
, and
Bodden, E.
,
“
DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android
”
, in
Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014)
, 2014.
Google Scholar
BibTeX
S. Rasthofer
,
Arzt, S.
, and
Bodden, E.
,
“
A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks
”
,
Proceedings of the Network and Distributed System Security Symposium (NDSS 2014)
, 2014.
Google Scholar
BibTeX
V. Rajani
,
Bastys, I.
,
Rafnsson, W.
, and
Garg, D.
,
“
Type Systems for Information Flow Control: The Question of Granularity
”
,
ACM SIGLOG News
, vol. 4, no. 1, 2017.
Google Scholar
BibTeX
V. Rajani
,
Bichhawat, A.
,
Gark, D.
, and
Hammer, C.
,
“
Information Flow Control for Event Handling and the DOM in Web Browsers
”
, in
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF)
, 2015.
Google Scholar
BibTeX
V. Rajani
,
Garg, D.
, and
Rezk, T.
,
“
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks
”
, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF)
, 2016.
Google Scholar
BibTeX
W. Rafnsson
,
Sabelfeld, A.
, and
Garg, D.
,
“
Progress-Sensitive Security for SPARK
”
, in
Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS)
, 2016.
Google Scholar
BibTeX
M. N. Rabe
,
Lammich, P.
, and
Popescu, A.
,
“
A shallow embedding of HyperCTL
”
,
Archive of Formal Proofs
, 2014.
Google Scholar
BibTeX
P
A. Pretschner
,
Lovat, E.
, and
Buechler, M.
,
“
Representation-Independent Data Usage Control
”
, in
6th International Workshop on Data Privacy Management (DPM 2011)
, 2011.
Google Scholar
BibTeX
A. Popescu
,
Hölzl, J.
, and
Nipkow, T.
,
“
Formal Verification of Language-Based Concurrent Noninterference
”
,
J. Formalized Reasoning
, vol. 6, pp. 1-30, 2013.
Google Scholar
BibTeX
A. Popescu
and
Lammich, P.
,
“
Bounded-Deducibility Security
”
,
Archive of Formal Proofs
, 2014.
Google Scholar
BibTeX
A. Popescu
and
Hölzl, J.
,
“
Possibilistic Noninterference
”
,
Archive of Formal Proofs
, 2012.
Google Scholar
BibTeX
A. Popescu
and
Hölzl, J.
,
“
Probabilistic Noninterference
”
,
Archive of Formal Proofs
, 2014.
Google Scholar
BibTeX
Pages
1
2
3
4
5
6
next ›
last »