Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
Author Title [ Type(Desc)] Year
Conference Paper
S. Greiner, Mohr, M., and Beckert, B., Modular Verification of Information-Flow Security in Component-Based Systems, in Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
B. Finkbeiner, Hahn, C., Stenger, M., and Tentrup, L., Monitoring Hyperproperties, in Proceedings of the 17th International Conference on Runtime Verification (RV), 2017.
R. Ehlers and Finkbeiner, B., Monitoring Realizability, in Proceedings of the 2nd International Conference on Runtime Verification (RV 2011), 2012.
R. Dimitrova, Finkbeiner, B., and Rabe, M. N., Monitoring Temporal Information Flow, in Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012.
J. C. Blanchette, Popescu, A., Wand, D., and Weidenbach, C., More SPASS with Isabelle - Superposition with Hard Sorts and Configurable Simplification, in Proceedings of the 3rd Conference on Interactive Theorem Proving (ITP 2012), 2012.
M. Ochoa, Jürjens, J., and Cúellar, J., Non-interference on UML State-charts, in Proceedings of the 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012), 2012.
H. Mantel, Perner, M., and Sauer, J., Noninterference under Weak Memory Models, in Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014), 2014.
A. Popescu, Hölzl, J., and Nipkow, T., Noninterfering Schedulers - When Possibilistic Noninterference Implies Probabilistic Noninterference, in Proceedings of the 5th Conference on Algebra and Coalgebra in Computer Science (CALCO 2013), 2013.
C. Atkinson, Gerbig, R., and Kennel, B., On-the-Fly Emendation of Multi-level Models, in 8th European Conference on Modelling Foundations and Applications (ECMFA 2012), 2012.
T. Bauereiss and Hutter, D., Possibilistic information flow security of workflow management systems, in Proceedings of the 1st International Workshop on Graphical Models for Security at ETAPS 2014 (GraMSec 2014), 2014.
F. Dörre and Klebanov, V., Practical Detection of Entropy Loss in Pseudo-Random Number Generators, in Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), 2016.
W. Rafnsson, Sabelfeld, A., and Garg, D., Progress-Sensitive Security for SPARK, in Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
R. Küsters, Truderung, T., and Vogt, A., Proving Coercion-Resistance of Scantegrity II, in Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010), 2010.
A. Popescu, Hölzl, J., and Nipkow, T., Proving Concurrent Noninterference, in Proceedings of the 2nd International Conference on Certified Programs and Proofs (CPP 2012), 2012.
D. Wasserrab and Lohner, D., Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing, in 6th International Verification Workshop (VERIFY 2010), 2010.
F. Dörre and Klebanov, V., Pseudo-Random Number Generator Verification: A Case Study, in Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments (VSTTE), 2015.
E. Lovat, Oudinet, J., and Pretschner, A., On Quantitative Dynamic Data Flow Tracking, in Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014.
M. Kovács, Seidl, H., and Finkbeiner, B., Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties, in Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), 2013.
A. Pretschner, Lovat, E., and Buechler, M., Representation-Independent Data Usage Control, in 6th International Workshop on Data Privacy Management (DPM 2011), 2011.
S. Arzt and Bodden, E., Reviser: Efficiently Updating IDE-/IFDS-Based Data-Flow Analyses in Response to Incremental Program Changes, in Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), 2014.
M. Kovács and Seidl, H., Runtime Enforcement of Information Flow Security in Tree Manipulating Processes, in Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
V. Klebanov, Manthey, N., and Muise, C., SAT-based Analysis and Quantification of Information Flow in Programs, in Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013), 2013.
A. Lux, Mantel, H., and Perner, M., Scheduler-Independent Declassification, in Proceedings of the 11th International Conference on Mathematics of Program Construction (MPC 2012), 2012.
S. Pfeiffer, Unger, S., Timmermann, D., and Lehmann, A., Secure Information Flow Awareness for Smart Wireless eHealth Systems, in Proceedings of 9th International Multi-Conference on Systems, Signals and Devices (SSD 2012), 2012.
M. Ochoa, Security Guarantees and Evolution: From models to reality, in Electronic Proceedings of the 1st ESSoS Doctoral Symposium (ESSoS-DS 2012), 2012.

Pages