Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 39 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
R. Accorsi and Lehmann, A., Automatic Information Flow Analysis of Business Process Models, in 10th International Conference on Business Process Management (BPM 2012), 2012.
C
D. Octeau, Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., and Le Traon, Y., Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis, in Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2016.
D. Octeau, Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., and Le Traon, Y., Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis, in Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2016.
T. Liu, Tyszberowicz, S., Herda, M., Beckert, B., Grahl, D., and Taghdiri, M., Computing Specification-Sensitive Abstractions for Program Verification, in Proceedings of the 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA), 2016.
S. Kanav, Lammich, P., and Popescu, A., A Conference Management System with Verified Document Confidentiality, in Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014), 2014.
P. Lammich, Müller-Olm, M., Seidl, H., and Wenner, A., Contextual Locking for Dynamic Pushdown Networks, in Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.
E. Lovat, Cross-Layer Data-Centric Usage Control, in Proceedings of the International Symposium on Engineering Secure Software and Systems - Doctoral Symposium (ESSoS 2014)), 2014.
D
E. Lovat and Pretschner, A., Data-centric multi-layer usage control enforcement: a Social Network Example, in Proceedings of the 16th ACM symposium on Access control models and technologies (SACMAT 2011), 2011.
S. Rasthofer, Arzt, S., Lovat, E., and Bodden, E., DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android, in Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014), 2014.
I
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P., IccTA: Detecting Inter-Component Privacy Leaks in Android Apps, in Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P., IccTA: Detecting Inter-Component Privacy Leaks in Android Apps, in Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
A. Lehmann and Fahland, D., Information Flow Security for Business Process Models - just one click away, in Proceedings of the 10th International Conference on Business Process Management - Demo Track (BPM 2012), 2012.
B. Nordhoff, Müller-Olm, M., and Lammich, P., Iterable Forward Reachability Analysis of Monitor-DPNs, in Proceedings of Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday (Festschrift for Dave Schmidt), 2013.
J
A. Lochbihler, Java and the Java Memory Model – a Unified, Machine-Checked Formalisation, in Proceedings of the ACM SIGPLAN 7th Workshop on Programming Languages and Systems (PLAS 2012), 2012.
T. M. Gawlitza, Lammich, P., Müller-Olm, M., Seidl, H., and Wenner, A., Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation, in Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011), 2011.
M
A. Lehmann and Lohmann, N., Model support for confidential service-oriented business processes, in Proceedings of the 4th Central-European Workshop on Services and their Composition (ZEUS 2012), Bamberg, Germany, 2012.
A. Lehmann and Lohmann, N., Model support for confidential service-oriented business processes, in Proceedings of the 4th Central-European Workshop on Services and their Composition (ZEUS 2012), Bamberg, Germany, 2012.
A. Lehmann and Lohmann, N., Modeling wizard for confidential Business Processes, in 1st Joint International Workshop on Security in Business Processes (SBP), 2012.
A. Lehmann and Lohmann, N., Modeling wizard for confidential Business Processes, in 1st Joint International Workshop on Security in Business Processes (SBP), 2012.
Q
E. Lovat, Oudinet, J., and Pretschner, A., On Quantitative Dynamic Data Flow Tracking, in Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014.

Pages