Seuraa
Christian Hammer
Christian Hammer
Professor of Computer Science at University of Passau
Vahvistettu sähköpostiosoite verkkotunnuksessa uni-passau.de - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
C Hammer, G Snelting
International Journal of Information Security 8 (6), 399-422, 2009
3002009
The eval that men do: A large-scale study of the use of eval in JavaScript applications
G Richards, C Hammer, B Burg, J Vitek
European Conference on Object-Oriented Programming, 52-78, 2011
2902011
Appguard–enforcing user requirements on android apps
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
Tools and Algorithms for the Construction and Analysis of Systems: 19th …, 2013
2212013
Boxify: Full-fledged app sandboxing for stock android
M Backes, S Bugiel, C Hammer, O Schranz, P von Styp-Rekowsky
24th USENIX Security Symposium (USENIX Security 15), 691-706, 2015
1632015
Dynamic path conditions in dependence graphs
C Hammer, M Grimme, J Krinke
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and …, 2006
1362006
Dynamic path conditions in dependence graphs
C Hammer, M Grimme, J Krinke
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and …, 2006
1362006
Dynamic detection of atomic-set-serializability violations
C Hammer, J Dolby, M Vaziri, F Tip
Proceedings of the 30th international conference on Software engineering …, 2008
1202008
Information flow control in WebKit’s JavaScript bytecode
A Bichhawat, V Rajani, D Garg, C Hammer
Principles of Security and Trust: Third International Conference, POST 2014 …, 2014
1162014
Information flow analysis for javascript
S Just, A Cleary, B Shirley, C Hammer
Proceedings of the 1st ACM SIGPLAN international workshop on Programming …, 2011
812011
Appguard–fine-grained policy enforcement for untrusted android applications
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014
752014
An improved slicer for Java
C Hammer, G Snelting
Proceedings of the 5th ACM SIGPLAN-SIGSOFT workshop on Program analysis for …, 2004
692004
Appguard-real-time policy enforcement for third-party applications
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
672012
Checking probabilistic noninterference using JOANA
G Snelting, D Giffhorn, J Graf, C Hammer, M Hecker, M Mohr, ...
it-Information Technology 56 (6), 280-287, 2014
532014
Experiences with PDG-based IFC
C Hammer
Engineering Secure Software and Systems: Second International Symposium …, 2010
492010
A type system for data-centric synchronization
M Vaziri, F Tip, J Dolby, C Hammer, J Vitek
ECOOP 2010–Object-Oriented Programming: 24th European Conference, Maribor …, 2010
492010
A data-centric approach to synchronization
J Dolby, C Hammer, D Marino, F Tip, M Vaziri, J Vitek
ACM Transactions on Programming Languages and Systems (TOPLAS) 34 (1), 1-48, 2012
462012
Precise slicing of concurrent programs: An evaluation of static slicing algorithms for concurrent programs
D Giffhorn, C Hammer
Automated Software Engineering 16, 197-234, 2009
452009
R-droid: Leveraging android app analysis with static slice optimization
M Backes, S Bugiel, E Derr, S Gerling, C Hammer
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
432016
Information flow control for event handling and the DOM in web browsers
V Rajani, A Bichhawat, D Garg, C Hammer
2015 IEEE 28th Computer Security Foundations Symposium, 366-379, 2015
402015
Information flow control for Java: a comprehensive approach based on path conditions in dependence graphs
C Hammer
382009
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20