Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 39 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
Conference Paper
V. Rajani, Garg, D., and Rezk, T., On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks, in Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
I. Bolosteanu and Garg, D., Asymmetric Secure Multi-execution with Declassification, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
T. Liu, Tyszberowicz, S., Herda, M., Beckert, B., Grahl, D., and Taghdiri, M., Computing Specification-Sensitive Abstractions for Program Verification, in Proceedings of the 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA), 2016.
T. Bauereiß, Gritti, A. Pesenti, Popescu, A., and Raimondi, F., CoSMed: A Confidentiality-Verified Social Media Platform, in Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP), 2016.
T. Bauereiß, Gritti, A. Pesenti, Popescu, A., and Raimondi, F., CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees, in Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P), 2017.
R. Küsters, Scapin, E., Truderung, T., and Graf, J., Extending and Applying a Framework for the Cryptographic Verification of Java Programs, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
R. Küsters, Truderung, T., and Graf, J., A Framework for the Cryptographic Verification of Java-like Programs, in Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012), 2012.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis, in Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014), 2014.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C., A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs, in Grande Region Security and Reliability Day 2013, 2013.
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G., On Improvements Of Low-Deterministic Security, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
V. Rajani, Bichhawat, A., Gark, D., and Hammer, C., Information Flow Control for Event Handling and the DOM in Web Browsers, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Information Flow Control in WebKit's JavaScript Bytecode, in Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
T. M. Gawlitza, Lammich, P., Müller-Olm, M., Seidl, H., and Wenner, A., Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation, in Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011), 2011.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P.  H., and Ulbrich, M., The KeY Platform for Verification and Analysis of Java Programs, in Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P.  H., and Ulbrich, M., The KeY Platform for Verification and Analysis of Java Programs, in Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
J. Graf, Hecker, M., Mohr, M., and Nordhoff, B., Lock-sensitive Interference Analysis for Java: Combining Program Dependence Graphs with Dynamic Pushdown Networks, in 1st International Workshop on Interference and Dependence (ID 2013), 2013.
B. Beckert, Bruns, D., and Grebing, S., Mind the Gap: Formal Verification and the Common Criteria, in Proceedings of the 6th International Verification Workshop (VERIFY 2010), 2012.
S. Greiner, Mohr, M., and Beckert, B., Modular Verification of Information-Flow Security in Component-Based Systems, in Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
C. Atkinson, Gerbig, R., and Kennel, B., On-the-Fly Emendation of Multi-level Models, in 8th European Conference on Modelling Foundations and Applications (ECMFA 2012), 2012.
W. Rafnsson, Sabelfeld, A., and Garg, D., Progress-Sensitive Security for SPARK, in Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
R. Gay, Mantel, H., and Sprick, B., Service Automata, in Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2012.
V. Cortier, Galindo, D., Küsters, R., Müller, J., and Truderung, T., SoK: Verifiability Notions for E-Voting Protocols, in Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016.
C. Atkinson, Gerbig, R., and Kennel, B., Symbiotic general-purpose and domain-specific languages, in Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), 2012.
C. Atkinson, Gerbig, R., and Tunjic, C., Towards Multi-level Aware Model Transformations, in 5th International Conference on Theory and Practice of Model Transformations (ICMT 2012), 2012.
J. Graf, Hecker, M., and Mohr, M., Using JOANA for Information Flow Control in Java Programs - A Practical Guide, in Proceedings of the 6th Working Conference on Programming Languages (ATPS 2013), 2013.

Pages