Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 5 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
Conference Paper
T. Jager, Schinzel, S., and Smorovksy, J., Bleichenbacher's Attack Strikes Again: Breaking PKCS\#1 v1.5 in XML Encryption, in Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS 2012), 2012.
D. Octeau, Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., and Le Traon, Y., Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis, in Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2016.
M. Ochoa, Jürjens, J., and Cúellar, J., Non-interference on UML State-charts, in Proceedings of the 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012), 2012.
M. Ochoa, Jürjens, J., and Warzecha, D., A Sound Decision Procedure for the Compositionality of Secrecy, in Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
A. Bichhawat, Rajani, V., Jain, J., Garg, D., and Hammer, C., WebPol: Fine-grained Information Flow Policies for Web Browsers, in Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017.