Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 10 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is O  [Clear All Filters]
2016
D. Octeau, Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., and Le Traon, Y., Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis, in Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2016.
2014
S. Arzt, Rasthofer, S., Fritz, C., Bodden, E., Barte, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P., FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, in Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
T. Wüchner, Ochoa, M., and Pretschner, A., Malware Detection with Quantitative Data Flow Graphs, in Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014), 2014.
E. Lovat, Oudinet, J., and Pretschner, A., On Quantitative Dynamic Data Flow Tracking, in Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014.
2012
B. Köpf, Mauborgne, L., and Ochoa, M., Automatic Quantification of Cache Side-Channels, in Proceedings of the 24th International Conference on Computer Aided Verification (CAV 2012), 2012.
J. Cúellar, Ochoa, M., and Rios, R., Indistinguishable regions in Geographic Location Privacy, in Proceedings of the 27th ACM Symposium on Applied Computing (SAC 2012), 2012.
M. Ochoa, Jürjens, J., and Cúellar, J., Non-interference on UML State-charts, in Proceedings of the 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012), 2012.
M. Ochoa, Security Guarantees and Evolution: From models to reality, in Electronic Proceedings of the 1st ESSoS Doctoral Symposium (ESSoS-DS 2012), 2012.
M. Ochoa, Jürjens, J., and Warzecha, D., A Sound Decision Procedure for the Compositionality of Secrecy, in Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.