Folgen
Christian Hammer
Christian Hammer
Professor of Computer Science at University of Passau
Bestätigte E-Mail-Adresse bei uni-passau.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
C Hammer, G Snelting
International Journal of Information Security 8 (6), 399-422, 2009
2892009
The eval that men do: A large-scale study of the use of eval in javascript applications
G Richards, C Hammer, B Burg, J Vitek
ECOOP 2011–Object-Oriented Programming: 25th European Conference, Lancaster …, 2011
2802011
AppGuard-Enforcing User Requirements on Android Apps.
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
TACAS 13, 543-548, 2013
2142013
Boxify: Full-fledged app sandboxing for stock android
M Backes, S Bugiel, C Hammer, O Schranz, P von Styp-Rekowsky
24th {USENIX} Security Symposium ({USENIX} Security 15), 691-706, 2015
1572015
Dynamic path conditions in dependence graphs
C Hammer, M Grimme, J Krinke
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and …, 2006
1322006
Dynamic path conditions in dependence graphs
C Hammer, M Grimme, J Krinke
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and …, 2006
1322006
Dynamic detection of atomic-set-serializability violations
C Hammer, J Dolby, M Vaziri, F Tip
Proceedings of the 30th international conference on Software engineering …, 2008
1162008
Information flow control in WebKit’s JavaScript bytecode
A Bichhawat, V Rajani, D Garg, C Hammer
Principles of Security and Trust: Third International Conference, POST 2014 …, 2014
1072014
Information flow analysis for javascript
S Just, A Cleary, B Shirley, C Hammer
Proceedings of the 1st ACM SIGPLAN international workshop on Programming …, 2011
762011
AppGuard–Fine-grained policy enforcement for untrusted Android applications
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014
702014
Appguard-real-time policy enforcement for third-party applications
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
662012
An improved slicer for Java
C Hammer, G Snelting
Proceedings of the 5th ACM SIGPLAN-SIGSOFT workshop on Program analysis for …, 2004
642004
Experiences with PDG-based IFC
C Hammer
Engineering Secure Software and Systems: Second International Symposium …, 2010
472010
A type system for data-centric synchronization
M Vaziri, F Tip, J Dolby, C Hammer, J Vitek
ECOOP 2010–Object-Oriented Programming: 24th European Conference, Maribor …, 2010
462010
Checking probabilistic noninterference using JOANA
G Snelting, D Giffhorn, J Graf, C Hammer, M Hecker, M Mohr, ...
it-Information Technology 56 (6), 280-287, 2014
442014
Precise slicing of concurrent programs: An evaluation of static slicing algorithms for concurrent programs
D Giffhorn, C Hammer
Automated Software Engineering 16, 197-234, 2009
442009
A data-centric approach to synchronization
J Dolby, C Hammer, D Marino, F Tip, M Vaziri, J Vitek
ACM Transactions on Programming Languages and Systems (TOPLAS) 34 (1), 1-48, 2012
412012
R-droid: Leveraging android app analysis with static slice optimization
M Backes, S Bugiel, E Derr, S Gerling, C Hammer
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
402016
Information flow control for Java: a comprehensive approach based on path conditions in dependence graphs
C Hammer
392009
Intransitive noninterference in dependence graphs
C Hammer, J Krinke, F Nodes
Second International Symposium on Leveraging Applications of Formal Methods …, 2006
352006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20