A
V. Rajani, Garg, D., and Rezk, T.,
“On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks”, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
V. Rajani, Garg, D., and Rezk, T.,
“On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks”, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
B. Finkbeiner, Rabe, M., and Sánchez, C.,
“Algorithms for Model Checking HyperLTL and HyperCTL*”, in
Proceedings of the 27th International Conference on Computer Aided Verification (CAV), 2015.
D
S. Rasthofer, Arzt, S., Lovat, E., and Bodden, E.,
“DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android”, in
Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014), 2014.
E
K. Katkalov, Fischer, P., Stenzel, K., Moebius, N., and Reif, W.,
“Evaluation of Jif and Joana as information flow analyzers in a model-driven approach”, in
Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012), 2012.
F
S. Arzt, Rasthofer, S., Fritz, C., Bodden, E., Barte, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P.,
“FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps”, in
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
K. Stenzel, Katkalov, K., Borek, M., and Reif, W.,
“Formalizing Information Flow Control in a Model-Driven Approach”, in
Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014), 2014.
I
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P.,
“IccTA: Detecting Inter-Component Privacy Leaks in Android Apps”, in
Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
J. Cúellar, Ochoa, M., and Rios, R.,
“Indistinguishable regions in Geographic Location Privacy”, in
Proceedings of the 27th ACM Symposium on Applied Computing (SAC 2012), 2012.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C.,
“Information Flow Control in WebKit's JavaScript Bytecode”, in
Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
M
R. Dimitrova, Finkbeiner, B., Kovács, M., Rabe, M., and Seidl, H.,
“Model Checking Information Flow in Reactive Systems”, in
Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2012), 2012.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W.,
“Model-Driven Development of Information Flow-Secure Systems with IFlow”, in
Proceedings of 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013), 2013.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W.,
“Model-Driven Development of Information Flow-Secure Systems with IFlow”,
ASE Science Journal, vol. 2, 2013.
R. Dimitrova, Finkbeiner, B., and Rabe, M. N.,
“Monitoring Temporal Information Flow”, in
Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012.
S
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A.,
“Software Security for Mobile Devices”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T
M. R. Clarkson, Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N., and Sánchez, C.,
“Temporal Logics for Hyperproperties”, in
Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
Pages