Folgen
Christian Hammer
Christian Hammer
Professor of Computer Science at University of Passau
Bestätigte E-Mail-Adresse bei uni-passau.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
C Hammer, G Snelting
International Journal of Information Security 8 (6), 399-422, 2009
2992009
The eval that men do: A large-scale study of the use of eval in javascript applications
G Richards, C Hammer, B Burg, J Vitek
ECOOP 2011–Object-Oriented Programming: 25th European Conference, Lancaster …, 2011
2902011
Appguard–enforcing user requirements on android apps
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
Tools and Algorithms for the Construction and Analysis of Systems: 19th …, 2013
2232013
Boxify: Full-fledged app sandboxing for stock android
M Backes, S Bugiel, C Hammer, O Schranz, P von Styp-Rekowsky
24th USENIX Security Symposium (USENIX Security 15), 691-706, 2015
1642015
Dynamic path conditions in dependence graphs
C Hammer, M Grimme, J Krinke
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and …, 2006
1362006
Dynamic path conditions in dependence graphs
C Hammer, M Grimme, J Krinke
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and …, 2006
1362006
Dynamic detection of atomic-set-serializability violations
C Hammer, J Dolby, M Vaziri, F Tip
Proceedings of the 30th international conference on Software engineering …, 2008
1212008
Information flow control in WebKit’s JavaScript bytecode
A Bichhawat, V Rajani, D Garg, C Hammer
Principles of Security and Trust: Third International Conference, POST 2014 …, 2014
1142014
Information flow analysis for javascript
S Just, A Cleary, B Shirley, C Hammer
Proceedings of the 1st ACM SIGPLAN international workshop on Programming …, 2011
842011
AppGuard–Fine-grained policy enforcement for untrusted Android applications
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014
762014
An improved slicer for Java
C Hammer, G Snelting
Proceedings of the 5th ACM SIGPLAN-SIGSOFT workshop on Program analysis for …, 2004
682004
Appguard-real-time policy enforcement for third-party applications
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
662012
Checking probabilistic noninterference using JOANA
G Snelting, D Giffhorn, J Graf, C Hammer, M Hecker, M Mohr, ...
it-Information Technology 56 (6), 280-287, 2014
532014
Experiences with PDG-based IFC
C Hammer
Engineering Secure Software and Systems: Second International Symposium …, 2010
492010
A type system for data-centric synchronization
M Vaziri, F Tip, J Dolby, C Hammer, J Vitek
ECOOP 2010–Object-Oriented Programming: 24th European Conference, Maribor …, 2010
492010
A data-centric approach to synchronization
J Dolby, C Hammer, D Marino, F Tip, M Vaziri, J Vitek
ACM Transactions on Programming Languages and Systems (TOPLAS) 34 (1), 1-48, 2012
462012
Precise slicing of concurrent programs: An evaluation of static slicing algorithms for concurrent programs
D Giffhorn, C Hammer
Automated Software Engineering 16, 197-234, 2009
462009
R-droid: Leveraging android app analysis with static slice optimization
M Backes, S Bugiel, E Derr, S Gerling, C Hammer
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
432016
Information flow control for event handling and the DOM in web browsers
V Rajani, A Bichhawat, D Garg, C Hammer
2015 IEEE 28th Computer Security Foundations Symposium, 366-379, 2015
402015
Information flow control for Java: a comprehensive approach based on path conditions in dependence graphs
C Hammer
392009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20