Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
A. Popescu and Hölzl, J., Probabilistic Noninterference, Archive of Formal Proofs, 2014.
W. Rafnsson, Sabelfeld, A., and Garg, D., Progress-Sensitive Security for SPARK, in Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
R. Küsters, Truderung, T., and Vogt, A., Proving Coercion-Resistance of Scantegrity II, in Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010), 2010.
A. Popescu, Hölzl, J., and Nipkow, T., Proving Concurrent Noninterference, in Proceedings of the 2nd International Conference on Certified Programs and Proofs (CPP 2012), 2012.
D. Wasserrab and Lohner, D., Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing, in 6th International Verification Workshop (VERIFY 2010), 2010.
F. Dörre and Klebanov, V., Pseudo-Random Number Generator Verification: A Case Study, in Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments (VSTTE), 2015.
Q
E. Lovat, Oudinet, J., and Pretschner, A., On Quantitative Dynamic Data Flow Tracking, in Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014.
R
M. Kovács, Seidl, H., and Finkbeiner, B., Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties, in Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), 2013.
A. Pretschner, Lovat, E., and Buechler, M., Representation-Independent Data Usage Control, in 6th International Workshop on Data Privacy Management (DPM 2011), 2011.
S. Arzt and Bodden, E., Reviser: Efficiently Updating IDE-/IFDS-Based Data-Flow Analyses in Response to Incremental Program Changes, in Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), 2014.
M. Kovács and Seidl, H., Runtime Enforcement of Information Flow Security in Tree Manipulating Processes, in Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
S
V. Klebanov, Manthey, N., and Muise, C., SAT-based Analysis and Quantification of Information Flow in Programs, in Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013), 2013.
A. Lux, Mantel, H., and Perner, M., Scheduler-Independent Declassification, in Proceedings of the 11th International Conference on Mathematics of Program Construction (MPC 2012), 2012.
S. Pfeiffer, Unger, S., Timmermann, D., and Lehmann, A., Secure Information Flow Awareness for Smart Wireless eHealth Systems, in Proceedings of 9th International Multi-Conference on Systems, Signals and Devices (SSD 2012), 2012.
M. Ochoa, Security Guarantees and Evolution: From models to reality, in Electronic Proceedings of the 1st ESSoS Doctoral Symposium (ESSoS-DS 2012), 2012.
T. Bauereiss and Hutter, D., Security (hyper-)properties in workflow systems: From specification to verification, in Electronic Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2014), 2014.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R., Security in E-Voting, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L., Security in Web-Based Workflows, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
R. Küsters, Müller, J., Scapin, E., and Truderung, T., sElect: A Lightweight Verifiable Remote Voting System, in Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
R. Gay, Mantel, H., and Sprick, B., Service Automata, in Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2012.
M. N. Rabe, Lammich, P., and Popescu, A., A shallow embedding of HyperCTL, Archive of Formal Proofs, 2014.
E. Loval, Fromm, A., Mohr, M., and Pretschner, A., SHRIFT System-wide HybRid Information Flow Tracking, in Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A., Software Security for Mobile Devices, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
V. Cortier, Galindo, D., Küsters, R., Müller, J., and Truderung, T., SoK: Verifiability Notions for E-Voting Protocols, in Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016.
M. Ochoa, Jürjens, J., and Warzecha, D., A Sound Decision Procedure for the Compositionality of Secrecy, in Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.

Pages