Skip to main content
About
Events
Research
Open Positions
Links
Contact
Publications
Projects
Project Clusters
Reference Scenarios
Tools
Search form
Search
Reliably Secure Software Systems (RS
3
) –
DFG Priority Programme 1496
Research
Publications
Best Paper Awards
Projects
Funded Projects
Associated Projects
Projects by Phases
Project Clusters
Projects
Reference Scenarios
Security in E-Voting
Security in Web-based Workflow Management Systems
Software Security for Mobile Devices
Projects
Tools
Search
Show only items where
Author
any
Abadi, Martín
Accorsi, R.
Ahrendt, Wolfgang
Arzt, S.
Arzt, Steven
Askarov, Aslan
Atkinson, C.
Barte, A.
Bartel, Alexandre
Bastys, Iulia
Bauereiß, Thomas
Bauereiss, T.
Bauereiss, Thomas
Beckert, Bernhard
Beckert, B.
Bichhawat, Abhishek
Bichhawat, A.
Bissyandé, Tegawendé F.
Blanchette, J. C.
Blasum, H.
Bodden, E.
Bodden, Eric
Böhme, S.
Bolosteanu, Iulia
Borek, M.
Breitner, Joachim
Bruns, Daniel
Bruns, D.
Bubel, Richard
Buechler, M.
Chong, Stephen
Clarkson, M. R.
Cortier, Véronique
Cúellar, J.
Dering, Matthew
Dimitrova, R.
Do, Quoc Huy
Do, Huy Quoc
Dörre, Felix
Ehlers, R.
Fahland, D.
Faymonville, Peter
Fennell, L.
Finkbeiner, B.
Finkbeiner, Bernd
Fischer, R.
Fischer, P.
Freiling, F.
Fritz, C.
Fromm, Alexander
Galindo, David
Garg, Deepak
Garg, D.
Gark, Deepak
Gawlitza, T. M.
Gay, Richard
Gay, R.
Gerbig, R.
Giffhorn, Dennis
Gladisch, Christoph
Graf, J.
Graf, Jürgen
Grahl, Daniel
Grebenshchikov, Sergey
Grebing, S.
Grebing, Sarah
Greiner, Simon
Grewe, S.
Gritti, Armando Pesenti
Hadasch, F.
Hahn, Christopher
Hähnle, Reiner
Hammer, C.
Hammer, Christian
Havle, O.
Hecker, M.
Hecker, Martin
Henschel, Martin
Herda, Mihai
Hölzl, J.
Hutter, D.
Hutter, Dieter
Jager, T.
Jain, Jinank
Jha, Somesh
Jürjens, J.
Kamburjan, Eduard
Kanav, S.
Katkalov, K.
Keil, M.
Kelbert, F.
Kelbert, Florian
Kennel, B.
Kirsten, Michael
Klebanov, Vladimir
Klebanov, V.
Klein, J.
Klein, Jacques
Koleini, M.
Köpf, B.
Kovács, M.
Kremer, Steve
Kuhn, J.-M.
Kumari, P.
Kunčar, Ondřej
Küsters, R.
Küsters, Ralf
Lammich, Peter
Lammich, P.
Langenstein, B.
Le Traon, Yves
Le Traon, Y.
Lehmann, A.
Li, Li
Li, Ximeng
Liu, Tianhai
Lochbihler, A.
Lohmann, N.
Lohner, D.
Lortz, Steffen
Loval, Enrico
Lovat, Enrico
Lovat, E.
Lux, A.
Maedche, A.
Mann, C.
Mantel, H.
Mantel, Heiko
Manthey, N.
Mauborgne, L.
McDaniel, P.
McDaniel, Patrick
Micinski, K. K.
Moebius, N.
Mohr, Martin
Mohr, M.
Mostowski, W.
Mostowski, Wojciech
Mueller, B.
Muise, C.
Müller, Christian
Müller, Johannes
Müller, S.
Müller-Olm, Markus
Müller-Olm, M.
Nemouchi, Y.
Nipkow, T.
Nordhoff, Benedikt
Nordhoff, B.
Ochoa, M.
Octeau, D.
Octeau, Damien
Oudinet, J.
Perner, M.
Perner, Matthias
Peschla, J.
Pfeiffer, S.
Popescu, Andrei
Popescu, A.
Pretschner, Alexander
Pretschner, A.
Rabe, M.
Rabe, M. N.
Rabe, Markus
Rafnsson, Willard
Raimondi, Franco
Rajani, V.
Rajani, Vineet
Rasthofer, Siegfried
Rasthofer, S.
Reif, W.
Rezk, Tamara
Rios, R.
Sabelfeld, Andrei
Sánchez, C.
Sánchez, César
Sands, D.
Sauer, J.
Scapin, E.
Scapin, Enrico
Scheben, Christoph
Scheben, C.
Schinzel, S.
Schmaltz, J.
Schmitt, I.
Schmitt, P.
Schmitt, Peter H.
Schmitt, Peter H.
Schmitt, P. H.
Schneider, David
Schoepe, D.
Schwarz, M. D.
Seidl, H.
Seidl, Helmut
Sinz, C.
Smallbone, N.
Smorovksy, J
Snelling, Gregor
Snelting, G.
Snelting, Gregor
Sprick, B.
Starostin, A.
Starostin, Artem
Stenger, Marvin
Stenzel, K.
Stephan, W.
Sudbrock, H.
Taghdiri, M.
Taghdiri, Mana
Tasch, Markus
Tentrup, Leander
Thiemann, P.
Timmermann, D.
Truderung, T.
Truderung, Tomasz
Tunjic, C.
Tverdyshew, S.
Tyszberowicz, Shmuel
Ulbrich, M.
Ulbrich, Mattias
Ulbrich, Matthias
Unger, S.
Verbeek, F.
Vogt, A.
Vojdani, V.
Wand, D.
Warzecha, D.
Wasser, Nathan
Wasserrab, D.
Wasserrab, Daniel
Weber, Alexandra
Weidenbach, C.
Weigl, Alexander
Weisbarth, Jörg
Wenner, Alexander
Wenner, A.
Wolf, K.
Wolf, B.
Wonnemann, C.
Wüchner, T.
Zalinescu, Eugen
Zimmermann, Martin
Type
any
Conference Paper
Journal Article
Miscellaneous
Term
any
Year
any
2017
2016
2015
2014
2013
2012
2011
2010
Keyword
any
conference
Export 47 results:
BibTex
Author
Title
[
Type
]
Year
Filters:
First Letter Of Last Name
is
M
[Clear All Filters]
Conference Paper
H. Mantel
,
Sands, D.
, and
Sudbrock, H.
,
“
Assumptions and Guarantees for Compositional Noninterference
”
, in
Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF 2011)
, 2011.
Google Scholar
BibTex
B. Köpf
,
Mauborgne, L.
, and
Ochoa, M.
,
“
Automatic Quantification of Cache Side-Channels
”
, in
Proceedings of the 24th International Conference on Computer Aided Verification (CAV 2012)
, 2012.
Google Scholar
BibTex
D. Octeau
,
Jha, S.
,
Dering, M.
,
McDaniel, P.
,
Bartel, A.
,
Li, L.
,
Klein, J.
, and
Le Traon, Y.
,
“
Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis
”
, in
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL)
, 2016.
Google Scholar
BibTex
T. Wüchner
,
Müller, S.
, and
Fischer, R.
,
“
Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control
”
, in
Proceedings of the 5th International Conference on Cloud Computing Technology and Science (CloudCom 2013)
, 2013.
Google Scholar
BibTex
P. Lammich
,
Müller-Olm, M.
,
Seidl, H.
, and
Wenner, A.
,
“
Contextual Locking for Dynamic Pushdown Networks
”
, in
Proceedings of the 20th International Symposium on Static Analysis (SAS 2013)
, 2013.
Google Scholar
BibTex
K. Katkalov
,
Fischer, P.
,
Stenzel, K.
,
Moebius, N.
, and
Reif, W.
,
“
Evaluation of Jif and Joana as information flow analyzers in a model-driven approach
”
, in
Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012)
, 2012.
Google Scholar
BibTex
F. Hadasch
,
Mueller, B.
, and
Maedche, A.
,
“
Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: A Qualitative Study
”
, in
Proceedings of the 20th European Conference on Information Systems (ECIS 2012)
, Barcelona, Spain, 2012.
Google Scholar
BibTex
F. Hadasch
,
Mueller, B.
, and
Maedche, A.
,
“
Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: A Qualitative Study
”
, in
Proceedings of the 20th European Conference on Information Systems (ECIS 2012)
, Barcelona, Spain, 2012.
Google Scholar
BibTex
S. Arzt
,
Rasthofer, S.
,
Fritz, C.
,
Bodden, E.
,
Barte, A.
,
Klein, J.
,
Le Traon, Y.
,
Octeau, D.
, and
McDaniel, P.
,
“
FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps
”
, in
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014)
, 2014.
Google Scholar
BibTex
C. Mann
and
Starostin, A.
,
“
A Framework for Static Detection of Privacy Leaks in Android Applications
”
, in
Proceedings of the 27th Symposium on Applied Computing (SAC 2012)
, 2012.
Google Scholar
BibTex
R. Küsters
,
Truderung, T.
,
Beckert, B.
,
Bruns, D.
,
Kirsten, M.
, and
Mohr, M.
,
“
A Hybrid Approach for Proving Noninterference of Java Programs
”
, in
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF)
, 2015.
Google Scholar
BibTex
A. Askarov
,
Chong, S.
, and
Mantel, H.
,
“
Hybrid Monitors for Concurrent Noninterference
”
, in
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF)
, 2015.
Google Scholar
BibTex
L. Li
,
Bartel, A.
,
Bissyandé, T. F.
,
Klein, J.
,
Le Traon, Y.
,
Arzt, S.
,
Rasthofer, S.
,
Bodden, E.
,
Octeau, D.
, and
McDaniel, P.
,
“
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps
”
, in
Proceedings of the 37th International Conference on Software Engineering (ICSE)
, 2015.
Google Scholar
BibTex
J. Breitner
,
Graf, J.
,
Hecker, M.
,
Mohr, M.
, and
Snelling, G.
,
“
On Improvements Of Low-Deterministic Security
”
, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST)
, 2016.
Google Scholar
BibTex
B. Nordhoff
,
Müller-Olm, M.
, and
Lammich, P.
,
“
Iterable Forward Reachability Analysis of Monitor-DPNs
”
, in
Proceedings of Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday (Festschrift for Dave Schmidt)
, 2013.
Google Scholar
BibTex
T. M. Gawlitza
,
Lammich, P.
,
Müller-Olm, M.
,
Seidl, H.
, and
Wenner, A.
,
“
Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation
”
, in
Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011)
, 2011.
Google Scholar
BibTex
W. Ahrendt
,
Beckert, B.
,
Bruns, D.
,
Bubel, R.
,
Gladisch, C.
,
Grebing, S.
,
Hähnle, R.
,
Henschel, M.
,
Herda, M.
,
Klebanov, V.
,
Mostowski, W.
,
Scheben, C.
,
Schmitt, P. H.
, and
Ulbrich, M.
,
“
The KeY Platform for Verification and Analysis of Java Programs
”
, in
Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments
, 2014.
Google Scholar
BibTex
F. Hadasch
,
Mueller, B.
, and
Maedche, A.
,
“
Leaking Confidential Information by Non-Malicious User Behaviour in Enterprise Systems - Design of an Empirical Study
”
, in
Proceedings of the 6th Mediterranean Conference on Information Systems (MCIS 2011)
, 2011.
Google Scholar
BibTex
F. Hadasch
,
Mueller, B.
, and
Maedche, A.
,
“
Leaking Confidential Information by Non-Malicious User Behaviour in Enterprise Systems - Design of an Empirical Study
”
, in
Proceedings of the 6th Mediterranean Conference on Information Systems (MCIS 2011)
, 2011.
Google Scholar
BibTex
J. Graf
,
Hecker, M.
,
Mohr, M.
, and
Nordhoff, B.
,
“
Lock-sensitive Interference Analysis for Java: Combining Program Dependence Graphs with Dynamic Pushdown Networks
”
, in
1st International Workshop on Interference and Dependence (ID 2013)
, 2013.
Google Scholar
BibTex
S. Greiner
,
Mohr, M.
, and
Beckert, B.
,
“
Modular Verification of Information-Flow Security in Component-Based Systems
”
, in
Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM)
, 2017.
Google Scholar
BibTex
H. Mantel
,
Perner, M.
, and
Sauer, J.
,
“
Noninterference under Weak Memory Models
”
, in
Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014)
, 2014.
Google Scholar
BibTex
V. Klebanov
,
Manthey, N.
, and
Muise, C.
,
“
SAT-based Analysis and Quantification of Information Flow in Programs
”
, in
Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013)
, 2013.
Google Scholar
BibTex
V. Klebanov
,
Manthey, N.
, and
Muise, C.
,
“
SAT-based Analysis and Quantification of Information Flow in Programs
”
, in
Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013)
, 2013.
Google Scholar
BibTex
A. Lux
,
Mantel, H.
, and
Perner, M.
,
“
Scheduler-Independent Declassification
”
, in
Proceedings of the 11th International Conference on Mathematics of Program Construction (MPC 2012)
, 2012.
Google Scholar
BibTex
Pages
1
2
next ›
last »