Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 9 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
C. Scheben and Schmitt, P., Verification of Information Flow Properties of Java Programs without Approximations, in Proceedings of the Formal Verification of Object-Oriented Software (FoVeOOS 2011), 2012.
C. Scheben and Schmitt, P. H., Efficient Self-Composition for Weakest Precondition Calculi, in Proceedings of the 19th International Symposium on Formal Methods (FM 2014), 2014.
S. Schinzel, An Efficient Mitigation Method for Timing Side Channels on the Web, in Proceedings of the 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011), 2011.
I. Schmitt and Schinzel, S., WAFFle: Fingerprinting Filter Rules of Web Application Firewalls, in {6th USENIX Workshop on Offensive Technologies (WOOT 2012)}, 2012.
M. D. Schwarz, Seidl, H., Vojdani, V., Lammich, P., and Müller-Olm, M., Static Analysis of Interrupt-Driven Programs Synchronized via the Priority Ceiling Protocol, in Proceedings of the 38th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 2011), 2011.
H. Seidl and Kovács, M., Interprocedural Information Flow Analysis of XML Processors, in Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014), 2014.
G. Snelting, Giffhorn, D., Graf, J., Hammer, C., Hecker, M., Mohr, M., and Wasserrab, D., Checking Probabilistic Noninterference Using JOANA, it - Information Technology, 2014.
G. Snelting, Understanding Probabilistic Software Leaks, Science of Computer Programming, 2015.
K. Stenzel, Katkalov, K., Borek, M., and Reif, W., Formalizing Information Flow Control in a Model-Driven Approach, in Proceedings of the Information Communication Technology-EurAsia (ICT-EurAsia 2014), 2014.