Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 28 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
Conference Paper
V. Rajani, Garg, D., and Rezk, T., On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks, in Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
V. Rajani, Garg, D., and Rezk, T., On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks, in Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
B. Finkbeiner, Rabe, M., and Sánchez, C., Algorithms for Model Checking HyperLTL and HyperCTL*, in Proceedings of the 27th International Conference on Computer Aided Verification (CAV), 2015.
T. Bauereiß, Gritti, A. Pesenti, Popescu, A., and Raimondi, F., CoSMed: A Confidentiality-Verified Social Media Platform, in Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP), 2016.
T. Bauereiß, Gritti, A. Pesenti, Popescu, A., and Raimondi, F., CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees, in Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P), 2017.
S. Rasthofer, Arzt, S., Lovat, E., and Bodden, E., DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android, in Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014), 2014.
K. Katkalov, Fischer, P., Stenzel, K., Moebius, N., and Reif, W., Evaluation of Jif and Joana as information flow analyzers in a model-driven approach, in Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012), 2012.
S. Arzt, Rasthofer, S., Fritz, C., Bodden, E., Barte, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P., FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, in Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
K. Stenzel, Katkalov, K., Borek, M., and Reif, W., Formalizing Information Flow Control in a Model-Driven Approach, in Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014), 2014.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis, in Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014), 2014.
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P., IccTA: Detecting Inter-Component Privacy Leaks in Android Apps, in Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
J. Cúellar, Ochoa, M., and Rios, R., Indistinguishable regions in Geographic Location Privacy, in Proceedings of the 27th ACM Symposium on Applied Computing (SAC 2012), 2012.
V. Rajani, Bichhawat, A., Gark, D., and Hammer, C., Information Flow Control for Event Handling and the DOM in Web Browsers, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Information Flow Control in WebKit's JavaScript Bytecode, in Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
R. Dimitrova, Finkbeiner, B., Kovács, M., Rabe, M., and Seidl, H., Model Checking Information Flow in Reactive Systems, in Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2012), 2012.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W., Model-Driven Development of Information Flow-Secure Systems with IFlow, in Proceedings of 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013), 2013.
R. Dimitrova, Finkbeiner, B., and Rabe, M. N., Monitoring Temporal Information Flow, in Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012.
W. Rafnsson, Sabelfeld, A., and Garg, D., Progress-Sensitive Security for SPARK, in Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
M. R. Clarkson, Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N., and Sánchez, C., Temporal Logics for Hyperproperties, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
A. Bichhawat, Rajani, V., Jain, J., Garg, D., and Hammer, C., WebPol: Fine-grained Information Flow Policies for Web Browsers, in Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017.

Pages