Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 50 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is K  [Clear All Filters]
2010
R. Küsters, Truderung, T., and Vogt, A., Proving Coercion-Resistance of Scantegrity II, in Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010), 2010.
2011
P. Kumari, Pretschner, A., Peschla, J., and Kuhn, J. - M., Distributed Data Usage Control for Web Applications: A Social Network Implementation, in Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011), 2011.
P. Kumari, Pretschner, A., Peschla, J., and Kuhn, J. - M., Distributed Data Usage Control for Web Applications: A Social Network Implementation, in Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011), 2011.
R. Küsters, Truderung, T., and Vogt, A., Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, in Proceedings of the 32nd IEEE Symposium on Security and Privacy (S{&}P 2011), 2011.
2012
B. Köpf, Mauborgne, L., and Ochoa, M., Automatic Quantification of Cache Side-Channels, in Proceedings of the 24th International Conference on Computer Aided Verification (CAV 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A., Clash Attacks on the Verifiability of E-Voting Systems, in Proceedings of the 33rd IEEE Symposium on Security and Privacy (S{&}P 2012), 2012.
K. Katkalov, Fischer, P., Stenzel, K., Moebius, N., and Reif, W., Evaluation of Jif and Joana as information flow analyzers in a model-driven approach, in Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012), 2012.
R. Küsters, Truderung, T., and Graf, J., A Framework for the Cryptographic Verification of Java-like Programs, in Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A., A Game-Based Definition of Coercion-Resistance and its Applications, Journal of Computer Security (special issue of selected CSF 2010 papers), vol. 20, 2012.
R. Dimitrova, Finkbeiner, B., Kovács, M., Rabe, M., and Seidl, H., Model Checking Information Flow in Reactive Systems, in Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2012), 2012.
C. Atkinson, Gerbig, R., and Kennel, B., On-the-Fly Emendation of Multi-level Models, in 8th European Conference on Modelling Foundations and Applications (ECMFA 2012), 2012.
M. Kovács and Seidl, H., Runtime Enforcement of Information Flow Security in Tree Manipulating Processes, in Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
C. Atkinson, Gerbig, R., and Kennel, B., Symbiotic general-purpose and domain-specific languages, in Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), 2012.
F. Kelbert and Pretschner, A., Towards a Policy Enforcement Infrastructure for Distributed Usage Control, in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), 2012.
2013
M. Keil and Thiemann, P., Efficient Dynamic Access Analysis Using JavaScript Proxies, in Proceedings of the 9th Symposium on Dynamic Languages (DLS 2013), 2013.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C., A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs, in Grande Region Security and Reliability Day 2013, 2013.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W., Model-Driven Development of Information Flow-Secure Systems with IFlow, in Proceedings of 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013), 2013.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W., Model-Driven Development of Information Flow-Secure Systems with IFlow, ASE Science Journal, vol. 2, 2013.
M. Kovács, Seidl, H., and Finkbeiner, B., Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties, in Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), 2013.
V. Klebanov, Manthey, N., and Muise, C., SAT-based Analysis and Quantification of Information Flow in Programs, in Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013), 2013.
M. Keil and Thiemann, P., Type-based Dependency Analysis for JavaScript, in Proceedings of the 8th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2013), 2013.
2014
S. Kanav, Lammich, P., and Popescu, A., A Conference Management System with Verified Document Confidentiality, in Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014), 2014.
F. Kelbert and Pretschner, A., Decentralized Distributed Data Usage Control, in Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014.
R. Küsters, Scapin, E., Truderung, T., and Graf, J., Extending and Applying a Framework for the Cryptographic Verification of Java Programs, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
R. Küsters, Scapin, E., Truderung, T., and Graf, J., Extending and Applying a Framework for the Cryptographic Verification of Java Programs, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.

Pages