Items where Subject is "Research Areas [OLD] > Security & Privacy Assessment and Protection"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: B | D | E | G | H | K | M | N | O | P | S | T | V | W
Number of items at this level: 44.

B

Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2012) Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification.
In: Eight Workshop on Formal and Computational Cryptography (FCC 2012).
Conference: None | Not Set
(Unpublished)

Backes, Michael and Bugiel, Sven and Derr, Erik and Hammer, Christian
(2014) Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Dürmuth, Markus and Gerling, Sebastian and Pinkal, Manfred and Sporleder, Caroline
(2010) Acoustic Side-Channel Attacks of Printers.
In: Proceedings of 19th USENIX Security Symposium.
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2012) AppGuard - Real-time Policy Enforcement for Third-Party Applications.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Hamerlik, Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009) Anonymity and Censorship Resistance in Unstructured Overlay Networks.
In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I.
Conference: None | Not Set

Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013) AnoA: A Framework for Analyzing Anonymous Communication Protocols.
In: 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Conference: None | Not Set

Balzer, Jan
(2011) Towards a Formal Sematics for G2C Summary.
Bachelors thesis, Saarland University.

Bauer, Markus
(2015) The MATOR Addon: Accessible Quantification of Tor Anonymity for the Tor Browser.
Bachelors thesis, Saarland University.

Berg, Matthias
(2013) Formal Verification of Cryptographic Security Proofs.
Doctoral thesis, Saarland University.

Bornträger, Holger
(2011) Automatic Verification of Equivalences of Cryptographic Games.
Masters thesis, Saarland University.

D

Dolby, Julian and Hammer, Christian and Marino, Daniel and Tip, Frank and Vaziri, Mandana and Vitek, Jan
(2011) A data-centric approach to synchronization.
Technical Report. UNSPECIFIED.
(Unpublished)

Doychev, Goran
(2012) Analysis and Mitigation of Information Leaks in Web Browsing Traffic.
Masters thesis, Saarland University.

E

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
UNSPECIFIED
.

Eigner, Fabienne and Maffei, Matteo
(2013) Differential Privacy by Typing in Security Protocols.
In: Proc. 1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013).
Conference: None | Not Set

G

Gerling, Sebastian
(2009) Acoustic Side-Channel Attacks on Printers.
Masters thesis, Saarland University.

Giffhorn, Dennis and Hammer, Christian
(2007) An Evaluation of Precise Slicing Algorithms for Concurrent Programs.
In: SCAM'07: Seventh IEEE International Working Conference on Source Code Analysis and Manipulation.

Giffhorn, Dennis and Hammer, Christian
(2008) Precise Analysis of Java Programs using JOANA (Tool Demonstration).
In: Proc. 8th IEEE International Working Conference on Source Code Analysis and Manipulation.

Giffhorn, Dennis and Hammer, Christian
(2009) Precise Slicing of Concurrent Programs -- An Evaluation of Precise Slicing Algorithms for Concurrent Programs.
Journal of Automated Software Engineering, 16 (2). pp. 197-234.

Grimm, Niklas
(2013) Lime: A Framework for Data Lineage in the Malicious Environment.
Bachelors thesis, Saarland University.

H

Hammer, Christian
(2010) Experiences with PDG-based IFC.
In: International Symposium on Engineering Secure Software and Systems (ESSoS'10).

Hammer, Christian
(2009) Information Flow Control for Java - A Comprehensive Approach based on Path Conditions in Dependence Graphs.
Doctoral thesis, Universit.

Hammer, Christian
(2003) A Program Slicer for Java.
Masters thesis, Universit.

Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank
(2008) Dynamic detection of atomic-set-serializability violations.
In: ICSE '08: Proceedings of the 30th international conference on Software engineering.

Hammer, Christian and Grimme, Martin and Krinke, Jens
(2006) Dynamic path conditions in dependence graphs.
In: PEPM '06: Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation.

Hammer, Christian and Krinke, Jens and Nodes, Frank
(2006) Intransitive Noninterference in Dependence Graphs.
In: Proc. Second International Symposium on Leveraging Application of Formal Methods, Verification and Validation (ISoLA 2006).

Hammer, Christian and Krinke, Jens and Snelting, Gregor
(2006) Information Flow Control for Java Based on Path Conditions in Dependence Graphs.
In: Proc. IEEE International Symposium on Secure Software Engineering (ISSSE'06).

Hammer, Christian and Schaade, Rüdiger and Snelting, Gregor
(2008) Static path conditions for Java.
In: UNSPECIFIED.

Hammer, Christian and Snelting, Gregor
(2009) Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs.
International Journal of Information Security, 8 (6). pp. 399-422.

Hammer, Christian and Snelting, Gregor
(2008) Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs.
Technical Report. UNSPECIFIED.
(Unpublished)

Hammer, Christian and Snelting, Gregor
(2004) An improved slicer for Java.
In: PASTE '04: Proceedings of the 5th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering.

K

Knuth, Karsten
(2012) Security Analysis of Browser Extension Concepts.
Bachelors thesis, Saarland University.

Koch, Simon
(2015) Correlating BGP and Traceroute Data.
Bachelors thesis, Saarland University.

M

Marino, Daniel and Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank and Vitek, Jan
(2012) Detecting Deadlock in Programs with Data-Centric Synchronization.
Technical Report. UNSPECIFIED.
(Unpublished)

Möllers, Frederik
(2012) An Analysis of Traceability of Electronic Identification Documents.
Masters thesis, Universität Paderborn.

N

Nürnberger, Stefan and Feller, Thomas and Huss, Sorin A
(2010) Ray - A Secure Microkernel Architecture.
In: Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010).
Conference: None | Not Set

O

Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael
(2018) The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
In: 39th IEEE Symposium on Security and Privacy (SP '18).
Conference: S&P - IEEE Symposium on Security and Privacy

P

Patel, Vikash
(2015) Argumentation Mining for the Sake of Privacy.
Masters thesis, Saarland University.

S

Salem, Ahmed
(2016) CRRP: A Cryptographic Protocol for Coercion-Resistant Rating Platforms.
Masters thesis, UNSPECIFIED.

Schwarz, Fabian Frank
(2015) Security Analysis of Mobile Banking Apps.
Bachelors thesis, Saarland University.

Schweig, Marc
(2014) Developing a RiskScore for Android Applications.
Bachelors thesis, Saarland University.

T

Thiemert, Stefan and Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha
(2009) Security of Robust Audio Hashes.
In: First IEEE International Workshop on Information Forensics and Security (WIFS 2009).
Conference: None | Not Set

V

Vaziri, Mandana and Tip, Frank and Dolby, Julian and Hammer, Christian and Vitek, Jan
(2010) A Type System for Data-Centric Synchronization.
In: ECOOP '10: Proceedings of the 24th European Conference on Object-Oriented Programming.

W

Wedeking, Lukas
(2016) Anonymity Guarantees for Tor Hidden Services.
Bachelors thesis, Saarland University.

This list was generated on Sun Nov 18 00:02:24 2018 CET.