Items where Subject is "Cross Cutting Thrusts [OLD] > Software Security"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | B | D | E | F | G | H | K | L | M | N | O | R | S | T | V
Number of items at this level: 43.

A

Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2017) App Mining.
In: Lecture Notes in Informatics (LNI) - Proceedings. LNI, P-267 . GI.

B

Backes, Michael and Bugiel, Sven and Derr, Erik and Hammer, Christian
(2014) Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2012) AppGuard - Real-time Policy Enforcement for Third-Party Applications.
Technical Report. UNSPECIFIED.
(Unpublished)

Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2018) CONFLLVM: Compiler-Based Information Flow Control in Low-Level Code.
In: In Submission.
Conference: EuroS&P - IEEE European Symposium on Security and Privacy
(Submitted)

Bugiel, Sven
(2016) Establishing mandatory access control on Android OS.
Doctoral thesis, UNSPECIFIED.

D

Derr, Erik
(2014) Verifying the Internet Access of Android Applications.
Masters thesis, Saarland University.

Dolby, Julian and Hammer, Christian and Marino, Daniel and Tip, Frank and Vaziri, Mandana and Vitek, Jan
(2011) A data-centric approach to synchronization.
Technical Report. UNSPECIFIED.
(Unpublished)

E

Endner-Dühr, Frederic
(2014) Application-level Firewall in Stock Android.
Bachelors thesis, Saarland University.

F

Frey, Tobias
(2014) System Centric IPC Call Chains for Android.
Bachelors thesis, Saarland University.

G

Giffhorn, Dennis and Hammer, Christian
(2007) An Evaluation of Precise Slicing Algorithms for Concurrent Programs.
In: SCAM'07: Seventh IEEE International Working Conference on Source Code Analysis and Manipulation.

Giffhorn, Dennis and Hammer, Christian
(2008) Precise Analysis of Java Programs using JOANA (Tool Demonstration).
In: Proc. 8th IEEE International Working Conference on Source Code Analysis and Manipulation.

Giffhorn, Dennis and Hammer, Christian
(2009) Precise Slicing of Concurrent Programs -- An Evaluation of Precise Slicing Algorithms for Concurrent Programs.
Journal of Automated Software Engineering, 16 (2). pp. 197-234.

Grimm, Niklas
(2013) Lime: A Framework for Data Lineage in the Malicious Environment.
Bachelors thesis, Saarland University.

Grishchenko, Ilya
(2014) Static Analysis of Android Applications.
Masters thesis, Saarland University.

H

Hagestedt, Inken
(2016) Static Analysis of Non-interference for Android Apps.
Masters thesis, UNSPECIFIED.

Hammer, Christian
(2010) Experiences with PDG-based IFC.
In: International Symposium on Engineering Secure Software and Systems (ESSoS'10).

Hammer, Christian
(2009) Information Flow Control for Java - A Comprehensive Approach based on Path Conditions in Dependence Graphs.
Doctoral thesis, Universit.

Hammer, Christian
(2003) A Program Slicer for Java.
Masters thesis, Universit.

Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank
(2008) Dynamic detection of atomic-set-serializability violations.
In: ICSE '08: Proceedings of the 30th international conference on Software engineering.

Hammer, Christian and Grimme, Martin and Krinke, Jens
(2006) Dynamic path conditions in dependence graphs.
In: PEPM '06: Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation.

Hammer, Christian and Krinke, Jens and Nodes, Frank
(2006) Intransitive Noninterference in Dependence Graphs.
In: Proc. Second International Symposium on Leveraging Application of Formal Methods, Verification and Validation (ISoLA 2006).

Hammer, Christian and Krinke, Jens and Snelting, Gregor
(2006) Information Flow Control for Java Based on Path Conditions in Dependence Graphs.
In: Proc. IEEE International Symposium on Secure Software Engineering (ISSSE'06).

Hammer, Christian and Schaade, Rüdiger and Snelting, Gregor
(2008) Static path conditions for Java.
In: UNSPECIFIED.

Hammer, Christian and Snelting, Gregor
(2009) Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs.
International Journal of Information Security, 8 (6). pp. 399-422.

Hammer, Christian and Snelting, Gregor
(2008) Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs.
Technical Report. UNSPECIFIED.
(Unpublished)

Hammer, Christian and Snelting, Gregor
(2004) An improved slicer for Java.
In: PASTE '04: Proceedings of the 5th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering.

Hriţcu, Cătălin
(2011) Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis.
Doctoral thesis, Saarland University.

K

Knuth, Karsten
(2012) Security Analysis of Browser Extension Concepts.
Bachelors thesis, Saarland University.

Kuznetsov, Konstantin
(2015) Poster: Mining Apps for Abnormal Usage of Sensitive Data.
In: MSR Asia Summit 2015.
Conference: None | Not Set

L

Lutz, Joachim
(2012) Model-based Monitoring for Sensitive SCADA Systems.
Bachelors thesis, Saarland University.

M

Marino, Daniel and Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank and Vitek, Jan
(2012) Detecting Deadlock in Programs with Data-Centric Synchronization.
Technical Report. UNSPECIFIED.
(Unpublished)

N

Nürnberger, Stefan and Feller, Thomas and Huss, Sorin A
(2010) Ray - A Secure Microkernel Architecture.
In: Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010).
Conference: None | Not Set

O

Obser, Sven
(2012) User-controlled Internet Connections in Android.
Masters thesis, Saarland University.

R

Reinert, Manuel
(2012) A Framework for Security-Oriented Distributed Programming.
Masters thesis, Saarland University.

S

Schranz, Oliver
(2013) A Developer-Centric Approach to Dynamic Permission System.
Bachelors thesis, Saarland University.

Schranz, Oliver
(2015) Towards Compiler-Assisted Taint Tracking on the Android Runtime.
Masters thesis, Saarland University.

Schröder, Florian
(2013) Generic Access Control for Extensible Web Applications within the SAFE Activation.
Masters thesis, Saarland University.

Schwarz, Fabian Frank
(2015) Security Analysis of Mobile Banking Apps.
Bachelors thesis, Saarland University.

Schweig, Marc
(2014) Developing a RiskScore for Android Applications.
Bachelors thesis, Saarland University.

T

Teris, Liviu
(2012) Securing User-data in Android - A conceptual approach for consumer and enterprise usage.
Masters thesis, Saarland University.

Thiemert, Stefan and Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha
(2009) Security of Robust Audio Hashes.
In: First IEEE International Workshop on Information Forensics and Security (WIFS 2009).
Conference: None | Not Set

V

Vaziri, Mandana and Tip, Frank and Dolby, Julian and Hammer, Christian and Vitek, Jan
(2010) A Type System for Data-Centric Synchronization.
In: ECOOP '10: Proceedings of the 24th European Conference on Object-Oriented Programming.

This list was generated on Sun Nov 18 00:02:24 2018 CET.