Skip to main content
About
Events
Research
Open Positions
Links
Contact
Publications
Projects
Project Clusters
Reference Scenarios
Tools
Search form
Search
Reliably Secure Software Systems (RS
3
) –
DFG Priority Programme 1496
Research
Publications
Best Paper Awards
Projects
Funded Projects
Associated Projects
Projects by Phases
Project Clusters
Projects
Reference Scenarios
Security in E-Voting
Security in Web-based Workflow Management Systems
Software Security for Mobile Devices
Projects
Tools
Search
Show only items where
Author
any
Abadi, Martín
Accorsi, R.
Ahrendt, Wolfgang
Arzt, Steven
Arzt, S.
Askarov, Aslan
Atkinson, C.
Barte, A.
Bartel, Alexandre
Bastys, Iulia
Bauereiß, Thomas
Bauereiss, Thomas
Bauereiss, T.
Beckert, Bernhard
Beckert, B.
Bichhawat, A.
Bichhawat, Abhishek
Bissyandé, Tegawendé F.
Blanchette, J. C.
Blasum, H.
Bodden, Eric
Bodden, E.
Böhme, S.
Bolosteanu, Iulia
Borek, M.
Breitner, Joachim
Bruns, D.
Bruns, Daniel
Bubel, Richard
Buechler, M.
Chong, Stephen
Clarkson, M. R.
Cortier, Véronique
Cúellar, J.
Dering, Matthew
Dimitrova, R.
Do, Huy Quoc
Do, Quoc Huy
Dörre, Felix
Ehlers, R.
Fahland, D.
Faymonville, Peter
Fennell, L.
Finkbeiner, B.
Finkbeiner, Bernd
Fischer, P.
Fischer, R.
Freiling, F.
Fritz, C.
Fromm, Alexander
Galindo, David
Garg, D.
Garg, Deepak
Gark, Deepak
Gawlitza, T. M.
Gay, Richard
Gay, R.
Gerbig, R.
Giffhorn, Dennis
Gladisch, Christoph
Graf, Jürgen
Graf, J.
Grahl, Daniel
Grebenshchikov, Sergey
Grebing, S.
Grebing, Sarah
Greiner, Simon
Grewe, S.
Gritti, Armando Pesenti
Hadasch, F.
Hahn, Christopher
Hähnle, Reiner
Hammer, C.
Hammer, Christian
Havle, O.
Hecker, Martin
Hecker, M.
Henschel, Martin
Herda, Mihai
Hölzl, J.
Hutter, D.
Hutter, Dieter
Jager, T.
Jain, Jinank
Jha, Somesh
Jürjens, J.
Kamburjan, Eduard
Kanav, S.
Katkalov, K.
Keil, M.
Kelbert, F.
Kelbert, Florian
Kennel, B.
Kirsten, Michael
Klebanov, V.
Klebanov, Vladimir
Klein, J.
Klein, Jacques
Koleini, M.
Köpf, B.
Kovács, M.
Kremer, Steve
Kuhn, J.-M.
Kumari, P.
Kunčar, Ondřej
Küsters, Ralf
Küsters, R.
Lammich, P.
Lammich, Peter
Langenstein, B.
Le Traon, Y.
Le Traon, Yves
Lehmann, A.
Li, Ximeng
Li, Li
Liu, Tianhai
Lochbihler, A.
Lohmann, N.
Lohner, D.
Lortz, Steffen
Loval, Enrico
Lovat, E.
Lovat, Enrico
Lux, A.
Maedche, A.
Mann, C.
Mantel, Heiko
Mantel, H.
Manthey, N.
Mauborgne, L.
McDaniel, P.
McDaniel, Patrick
Micinski, K. K.
Moebius, N.
Mohr, M.
Mohr, Martin
Mostowski, W.
Mostowski, Wojciech
Mueller, B.
Muise, C.
Müller, Johannes
Müller, Christian
Müller, S.
Müller-Olm, M.
Müller-Olm, Markus
Nemouchi, Y.
Nipkow, T.
Nordhoff, Benedikt
Nordhoff, B.
Ochoa, M.
Octeau, D.
Octeau, Damien
Oudinet, J.
Perner, M.
Perner, Matthias
Peschla, J.
Pfeiffer, S.
Popescu, Andrei
Popescu, A.
Pretschner, Alexander
Pretschner, A.
Rabe, Markus
Rabe, M.
Rabe, M. N.
Rafnsson, Willard
Raimondi, Franco
Rajani, Vineet
Rajani, V.
Rasthofer, S.
Rasthofer, Siegfried
Reif, W.
Rezk, Tamara
Rios, R.
Sabelfeld, Andrei
Sánchez, C.
Sánchez, César
Sands, D.
Sauer, J.
Scapin, Enrico
Scapin, E.
Scheben, Christoph
Scheben, C.
Schinzel, S.
Schmaltz, J.
Schmitt, Peter H.
Schmitt, Peter H.
Schmitt, I.
Schmitt, P. H.
Schmitt, P.
Schneider, David
Schoepe, D.
Schwarz, M. D.
Seidl, H.
Seidl, Helmut
Sinz, C.
Smallbone, N.
Smorovksy, J
Snelling, Gregor
Snelting, Gregor
Snelting, G.
Sprick, B.
Starostin, Artem
Starostin, A.
Stenger, Marvin
Stenzel, K.
Stephan, W.
Sudbrock, H.
Taghdiri, Mana
Taghdiri, M.
Tasch, Markus
Tentrup, Leander
Thiemann, P.
Timmermann, D.
Truderung, T.
Truderung, Tomasz
Tunjic, C.
Tverdyshew, S.
Tyszberowicz, Shmuel
Ulbrich, M.
Ulbrich, Mattias
Ulbrich, Matthias
Unger, S.
Verbeek, F.
Vogt, A.
Vojdani, V.
Wand, D.
Warzecha, D.
Wasser, Nathan
Wasserrab, Daniel
Wasserrab, D.
Weber, Alexandra
Weidenbach, C.
Weigl, Alexander
Weisbarth, Jörg
Wenner, Alexander
Wenner, A.
Wolf, K.
Wolf, B.
Wonnemann, C.
Wüchner, T.
Zalinescu, Eugen
Zimmermann, Martin
Type
any
Conference Paper
Journal Article
Miscellaneous
Term
any
Year
any
2017
2016
2015
2014
2013
2012
2011
2010
Keyword
any
conference
Export 33 results:
BibTex
Author
Title
[
Type
]
Year
Filters:
First Letter Of Last Name
is
H
[Clear All Filters]
Miscellaneous
T. Bauereiss
,
Bichhawat, A.
,
Bolosteanu, I.
,
Faymonville, P.
,
Finkbeiner, B.
,
Garg, D.
,
Gay, R.
,
Grebenshchikov, S.
,
Hammer, C.
,
Hutter, D.
,
Kunčar, O.
,
Lammich, P.
,
Mantel, H.
,
Müller, C.
,
Popescu, A.
,
Rabe, M.
,
Rajani, V.
,
Seidl, H.
,
Tasch, M.
, and
Tentrup, L.
,
“
Security in Web-Based Workflows
”
,
Poster at the IEEE Symposium on Security and Privacy (S&P)
. 2015.
Google Scholar
BibTex
T. Bauereiss
,
Bichhawat, A.
,
Bolosteanu, I.
,
Faymonville, P.
,
Finkbeiner, B.
,
Garg, D.
,
Gay, R.
,
Grebenshchikov, S.
,
Hammer, C.
,
Hutter, D.
,
Kunčar, O.
,
Lammich, P.
,
Mantel, H.
,
Müller, C.
,
Popescu, A.
,
Rabe, M.
,
Rajani, V.
,
Seidl, H.
,
Tasch, M.
, and
Tentrup, L.
,
“
Security in Web-Based Workflows
”
,
Poster at the IEEE Symposium on Security and Privacy (S&P)
. 2015.
Google Scholar
BibTex
D. Bruns
,
Do, H. Quoc
,
Greiner, S.
,
Herda, M.
,
Mohr, M.
,
Scapin, E.
,
Truderung, T.
,
Beckert, B.
,
Küsters, R.
,
Mantel, H.
, and
Gay, R.
,
“
Security in E-Voting
”
,
Poster at the IEEE Symposium on Security and Privacy (S&P)
. 2015.
Google Scholar
BibTex
Journal Article
A. Popescu
and
Hölzl, J.
,
“
Probabilistic Noninterference
”
,
Archive of Formal Proofs
, 2014.
Google Scholar
BibTex
A. Popescu
and
Hölzl, J.
,
“
Possibilistic Noninterference
”
,
Archive of Formal Proofs
, 2012.
Google Scholar
BibTex
A. Popescu
,
Hölzl, J.
, and
Nipkow, T.
,
“
Formal Verification of Language-Based Concurrent Noninterference
”
,
J. Formalized Reasoning
, vol. 6, pp. 1-30, 2013.
Google Scholar
BibTex
G. Snelting
,
Giffhorn, D.
,
Graf, J.
,
Hammer, C.
,
Hecker, M.
,
Mohr, M.
, and
Wasserrab, D.
,
“
Checking Probabilistic Noninterference Using JOANA
”
,
it - Information Technology
, 2014.
Google Scholar
BibTex
G. Snelting
,
Giffhorn, D.
,
Graf, J.
,
Hammer, C.
,
Hecker, M.
,
Mohr, M.
, and
Wasserrab, D.
,
“
Checking Probabilistic Noninterference Using JOANA
”
,
it - Information Technology
, 2014.
Google Scholar
BibTex
Q. Huy Do
,
Bubel, R.
, and
Hähnle, R.
,
“
Automatic Detection and Demonstrator Generation for Information Flow Leaks in Object-Oriented Programs
”
,
Computers & Security
, vol. 67, 2017.
Google Scholar
BibTex
Conference Paper
A. Bichhawat
,
Rajani, V.
,
Jain, J.
,
Garg, D.
, and
Hammer, C.
,
“
WebPol: Fine-grained Information Flow Policies for Web Browsers
”
, in
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS)
, 2017.
Google Scholar
BibTex
J. Graf
,
Hecker, M.
, and
Mohr, M.
,
“
Using JOANA for Information Flow Control in Java Programs - A Practical Guide
”
, in
Proceedings of the 6th Working Conference on Programming Languages (ATPS 2013)
, 2013.
Google Scholar
BibTex
H. Blasum
,
Havle, O.
,
Langenstein, B.
,
Nemouchi, Y.
,
Schmaltz, J.
,
Stephan, W.
,
Tverdyshew, S.
,
Verbeek, F.
, and
Wolf, B.
,
“
Using Isabelle/HOL to Develop and Maintain Separation Invariants for an Operating System
”
, in
Isabelle 2014 workshop at FloC 2014
, 2014.
Google Scholar
BibTex
T. Bauereiss
and
Hutter, D.
,
“
Security (hyper-)properties in workflow systems: From specification to verification
”
, in
Electronic Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2014)
, 2014.
Google Scholar
BibTex
A. Popescu
,
Hölzl, J.
, and
Nipkow, T.
,
“
Proving Concurrent Noninterference
”
, in
Proceedings of the 2nd International Conference on Certified Programs and Proofs (CPP 2012)
, 2012.
Google Scholar
BibTex
T. Bauereiss
and
Hutter, D.
,
“
Possibilistic information flow security of workflow management systems
”
, in
Proceedings of the 1st International Workshop on Graphical Models for Security at ETAPS 2014 (GraMSec 2014)
, 2014.
Google Scholar
BibTex
A. Popescu
,
Hölzl, J.
, and
Nipkow, T.
,
“
Noninterfering Schedulers - When Possibilistic Noninterference Implies Probabilistic Noninterference
”
, in
Proceedings of the 5th Conference on Algebra and Coalgebra in Computer Science (CALCO 2013)
, 2013.
Google Scholar
BibTex
B. Finkbeiner
,
Hahn, C.
,
Stenger, M.
, and
Tentrup, L.
,
“
Monitoring Hyperproperties
”
, in
Proceedings of the 17th International Conference on Runtime Verification (RV)
, 2017.
Google Scholar
BibTex
J. Graf
,
Hecker, M.
,
Mohr, M.
, and
Nordhoff, B.
,
“
Lock-sensitive Interference Analysis for Java: Combining Program Dependence Graphs with Dynamic Pushdown Networks
”
, in
1st International Workshop on Interference and Dependence (ID 2013)
, 2013.
Google Scholar
BibTex
F. Hadasch
,
Mueller, B.
, and
Maedche, A.
,
“
Leaking Confidential Information by Non-Malicious User Behaviour in Enterprise Systems - Design of an Empirical Study
”
, in
Proceedings of the 6th Mediterranean Conference on Information Systems (MCIS 2011)
, 2011.
Google Scholar
BibTex
W. Ahrendt
,
Beckert, B.
,
Bruns, D.
,
Bubel, R.
,
Gladisch, C.
,
Grebing, S.
,
Hähnle, R.
,
Henschel, M.
,
Herda, M.
,
Klebanov, V.
,
Mostowski, W.
,
Scheben, C.
,
Schmitt, P. H.
, and
Ulbrich, M.
,
“
The KeY Platform for Verification and Analysis of Java Programs
”
, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments
, 2014.
Google Scholar
BibTex
W. Ahrendt
,
Beckert, B.
,
Bruns, D.
,
Bubel, R.
,
Gladisch, C.
,
Grebing, S.
,
Hähnle, R.
,
Henschel, M.
,
Herda, M.
,
Klebanov, V.
,
Mostowski, W.
,
Scheben, C.
,
Schmitt, P. H.
, and
Ulbrich, M.
,
“
The KeY Platform for Verification and Analysis of Java Programs
”
, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments
, 2014.
Google Scholar
BibTex
W. Ahrendt
,
Beckert, B.
,
Bruns, D.
,
Bubel, R.
,
Gladisch, C.
,
Grebing, S.
,
Hähnle, R.
,
Henschel, M.
,
Herda, M.
,
Klebanov, V.
,
Mostowski, W.
,
Scheben, C.
,
Schmitt, P. H.
, and
Ulbrich, M.
,
“
The KeY Platform for Verification and Analysis of Java Programs
”
, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments
, 2014.
Google Scholar
BibTex
A. Bichhawat
,
Rajani, V.
,
Garg, D.
, and
Hammer, C.
,
“
Information Flow Control in WebKit's JavaScript Bytecode
”
, in
Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014)
, 2014.
Google Scholar
BibTex
V. Rajani
,
Bichhawat, A.
,
Gark, D.
, and
Hammer, C.
,
“
Information Flow Control for Event Handling and the DOM in Web Browsers
”
, in
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF)
, 2015.
Google Scholar
BibTex
J. Breitner
,
Graf, J.
,
Hecker, M.
,
Mohr, M.
, and
Snelling, G.
,
“
On Improvements Of Low-Deterministic Security
”
, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST)
, 2016.
Google Scholar
BibTex
Pages
1
2
next ›
last »