Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Harvester., , , and . Datenschutz und Datensicherheit, 40 (11): 718-722 (2016)ROPocop - Dynamic Mitigation of Code-Reuse Attacks., and . CoRR, (2015)Partially Evaluating Finite-State Runtime Monitors Ahead of Time., , and . ACM Trans. Program. Lang. Syst., 34 (2): 7:1-7:52 (2012)PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution., , , , , , and . STM, volume 9871 of Lecture Notes in Computer Science, page 212-228. Springer, (2016)jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications., , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 295-316. Springer, (2015)MOPBox: A Library Approach to Runtime Verification - (Tool Demonstration).. RV, volume 7186 of Lecture Notes in Computer Science, page 365-369. Springer, (2011)Architectural Runtime Verification., , and . ICSA Companion, page 77-84. IEEE, (2019)Join point interfaces for modular reasoning in aspect-oriented programs., , and . SIGSOFT FSE, page 508-511. ACM, (2011)Inter-procedural data-flow analysis with IFDS/IDE and Soot.. SOAP@PLDI, page 3-8. ACM, (2012)Mining Apps for Abnormal Usage of Sensitive Data., , , , , , and . ICSE (1), page 426-436. IEEE Computer Society, (2015)