Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 15 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is A  [Clear All Filters]
2014
S. Rasthofer, Arzt, S., Lovat, E., and Bodden, E., DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android, in Proceedings of the 9th International IEEE Conference on Availability, Reliability and Security (ARES 2014), 2014.
R. Küsters, Scapin, E., Truderung, T., and Graf, J., Extending and Applying a Framework for the Cryptographic Verification of Java Programs, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
S. Arzt, Rasthofer, S., Fritz, C., Bodden, E., Barte, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P., FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, in Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014), 2014.
W. Ahrendt, Beckert, B., Bruns, D., Bubel, R., Gladisch, C., Grebing, S., Hähnle, R., Henschel, M., Herda, M., Klebanov, V., Mostowski, W., Scheben, C., Schmitt, P.  H., and Ulbrich, M., The KeY Platform for Verification and Analysis of Java Programs, in Proceedings of the 6th Working Conference on Verified Software: Theories, Tools, and Experiments, 2014.
S. Rasthofer, Arzt, S., and Bodden, E., A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks, Proceedings of the Network and Distributed System Security Symposium (NDSS 2014), 2014.
S. Arzt and Bodden, E., Reviser: Efficiently Updating IDE-/IFDS-Based Data-Flow Analyses in Response to Incremental Program Changes, in Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), 2014.
2012
R. Accorsi and Lehmann, A., Automatic Information Flow Analysis of Business Process Models, in 10th International Conference on Business Process Management (BPM 2012), 2012.
C. Atkinson, Gerbig, R., and Kennel, B., On-the-Fly Emendation of Multi-level Models, in 8th European Conference on Modelling Foundations and Applications (ECMFA 2012), 2012.
C. Atkinson, Gerbig, R., and Kennel, B., Symbiotic general-purpose and domain-specific languages, in Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), 2012.
C. Atkinson, Gerbig, R., and Tunjic, C., Towards Multi-level Aware Model Transformations, in 5th International Conference on Theory and Practice of Model Transformations (ICMT 2012), 2012.
2011
R. Accorsi, Anwenden struktureller Nicht-Interferenz zur Sicherheitsanalyse von Workflow-Modellen, in Proceedings of INFORMATIK 2011 - Dependable Software for Critical Infrastructures (DSCI 2011), 2011.
R. Accorsi and Wonnemann, C., Strong non-leak guarantees for workflow models, in Proceedings of the 26th ACM Symposium on Applied Computing (SAC 2011), 2011.