Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
Author Title Type [ Year(Asc)]
2013
P. Lammich, Müller-Olm, M., Seidl, H., and Wenner, A., Contextual Locking for Dynamic Pushdown Networks, in Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.
B. Beckert and Bruns, D., Dynamic Logic with Trace Semantics, in Proceedings of the 24th International Conference on Automated Deduction (CADE-24), 2013.
C. Hammer, Efficient Algorithms for Control Closures, in 1st International Workshop on Interference and Dependence (ID 2013), 2013.
M. Keil and Thiemann, P., Efficient Dynamic Access Analysis Using JavaScript Proxies, in Proceedings of the 9th Symposium on Dynamic Languages (DLS 2013), 2013.
J. C. Blanchette, Böhme, S., Popescu, A., and Smallbone, N., Encoding Monomorphic and Polymorphic Types, in Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), 2013.
A. Popescu, Hölzl, J., and Nipkow, T., Formal Verification of Language-Based Concurrent Noninterference, J. Formalized Reasoning, vol. 6, pp. 1-30, 2013.
A. Popescu, Hölzl, J., and Nipkow, T., Formalizing Probabilistic Noninterference, in Proceedings of the 3rd International Conference on Certified Programs and Proofs (CPP 2013), 2013.
L. Fennell and Thiemann, P., Gradual Security Typing with References, in Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF 2013), 2013, pp. 224-239.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C., A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs, in Grande Region Security and Reliability Day 2013, 2013.
B. Nordhoff, Müller-Olm, M., and Lammich, P., Iterable Forward Reachability Analysis of Monitor-DPNs, in Proceedings of Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday (Festschrift for Dave Schmidt), 2013.
J. Graf, Hecker, M., Mohr, M., and Nordhoff, B., Lock-sensitive Interference Analysis for Java: Combining Program Dependence Graphs with Dynamic Pushdown Networks, in 1st International Workshop on Interference and Dependence (ID 2013), 2013.
J. C. Blanchette and Popescu, A., Mechanizing the Metatheory of Sledgehammer, in Proceedings of the 9th International Symposium on Frontiers of Combining Systems (FroCos 2013), 2013.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W., Model-Driven Development of Information Flow-Secure Systems with IFlow, in Proceedings of 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013), 2013.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W., Model-Driven Development of Information Flow-Secure Systems with IFlow, ASE Science Journal, vol. 2, 2013.
A. Popescu, Hölzl, J., and Nipkow, T., Noninterfering Schedulers - When Possibilistic Noninterference Implies Probabilistic Noninterference, in Proceedings of the 5th Conference on Algebra and Coalgebra in Computer Science (CALCO 2013), 2013.
M. Kovács, Seidl, H., and Finkbeiner, B., Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties, in Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), 2013.
V. Klebanov, Manthey, N., and Muise, C., SAT-based Analysis and Quantification of Information Flow in Programs, in Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013), 2013.
M. Keil and Thiemann, P., Type-based Dependency Analysis for JavaScript, in Proceedings of the 8th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2013), 2013.
J. Graf, Hecker, M., and Mohr, M., Using JOANA for Information Flow Control in Java Programs - A Practical Guide, in Proceedings of the 6th Working Conference on Programming Languages (ATPS 2013), 2013.
2012
R. Accorsi and Lehmann, A., Automatic Information Flow Analysis of Business Process Models, in 10th International Conference on Business Process Management (BPM 2012), 2012.
B. Köpf, Mauborgne, L., and Ochoa, M., Automatic Quantification of Cache Side-Channels, in Proceedings of the 24th International Conference on Computer Aided Verification (CAV 2012), 2012.
L. Fennell and Thiemann, P., The Blame Theorem for a Linear Lambda Calculus with Type Dynamic, in Proceedings of the Symposium on Trends in Functional Programming (TFP 2012), 2012.
T. Jager, Schinzel, S., and Smorovksy, J., Bleichenbacher's Attack Strikes Again: Breaking PKCS\#1 v1.5 in XML Encryption, in Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A., Clash Attacks on the Verifiability of E-Voting Systems, in Proceedings of the 33rd IEEE Symposium on Security and Privacy (S{&}P 2012), 2012.
K. Katkalov, Fischer, P., Stenzel, K., Moebius, N., and Reif, W., Evaluation of Jif and Joana as information flow analyzers in a model-driven approach, in Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012), 2012.

Pages