Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
C. Mann and Starostin, A., A Framework for Static Detection of Privacy Leaks in Android Applications, in Proceedings of the 27th Symposium on Applied Computing (SAC 2012), 2012.
R. Küsters, Truderung, T., and Graf, J., A Framework for the Cryptographic Verification of Java-like Programs, in Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012), 2012.
O. Kunčar and Popescu, A., From Types to Sets by Local Type Definitions in Higher-Order Logic, in Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP), 2016.
F. Kelbert and Pretschner, A., A Fully Decentralized Data Usage Control Enforcement Infrastructure, in Proceedings of the 13th International Conference on Applied Cryptography and Network Security, 2015.
G
R. Küsters, Truderung, T., and Vogt, A., A Game-Based Definition of Coercion-Resistance and its Applications, Journal of Computer Security (special issue of selected CSF 2010 papers), vol. 20, 2012.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis, in Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014), 2014.
L. Fennell and Thiemann, P., Gradual Security Typing with References, in Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF 2013), 2013, pp. 224-239.
L. Fennell and Thiemann, P., Gradual Typing for Annotated Type Systems, in Proceedings of the 23rd European Symposium on Programming (ESOP 2014), 2014.
I
L. Li, Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., and McDaniel, P., IccTA: Detecting Inter-Component Privacy Leaks in Android Apps, in Proceedings of the 37th International Conference on Software Engineering (ICSE), 2015.
D. Bruns, Mostowski, W., and Ulbrich, M., Implementation-level Verification of Algorithms with Keęrn-.1emY, Software Tools for Technology Transfer, 2014.
J. Breitner, Graf, J., Hecker, M., Mohr, M., and Snelling, G., On Improvements Of Low-Deterministic Security, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
J. Cúellar, Ochoa, M., and Rios, R., Indistinguishable regions in Geographic Location Privacy, in Proceedings of the 27th ACM Symposium on Applied Computing (SAC 2012), 2012.
M. Taghdiri, Snelting, G., and Sinz, C., Information Flow Analysis via Path Condition Refinement, in Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (FAST 2010), 2010.
V. Rajani, Bichhawat, A., Gark, D., and Hammer, C., Information Flow Control for Event Handling and the DOM in Web Browsers, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
A. Bichhawat, Rajani, V., Garg, D., and Hammer, C., Information Flow Control in WebKit's JavaScript Bytecode, in Proceedings of the 3rd conference on Principles of Security and Trust (POST 2014), 2014.
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M., Information Flow in Object-Oriented Software, in Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
A. Lehmann and Fahland, D., Information Flow Security for Business Process Models - just one click away, in Proceedings of the 10th International Conference on Business Process Management - Demo Track (BPM 2012), 2012.
H. Seidl and Kovács, M., Interprocedural Information Flow Analysis of XML Processors, in Proceedings of the 8th International Conference on Language and Automata Theory and Applications (LATA 2014), 2014.
B. Nordhoff, Müller-Olm, M., and Lammich, P., Iterable Forward Reachability Analysis of Monitor-DPNs, in Proceedings of Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday (Festschrift for Dave Schmidt), 2013.
J
A. Lochbihler, Java and the Java Memory Model – a Unified, Machine-Checked Formalisation, in Proceedings of the ACM SIGPLAN 7th Workshop on Programming Languages and Systems (PLAS 2012), 2012.
T. M. Gawlitza, Lammich, P., Müller-Olm, M., Seidl, H., and Wenner, A., Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation, in Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011), 2011.

Pages