Author of the publication

Automatisierter Code-Audit - Sicherheitsanalyse von Source Code in Theorie und Praxis.

, and . Datenschutz und Datensicherheit, 31 (12): 888-893 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Testing: A Survey., , , , , and . Advances in Computers, (2016)Precise Client-side Protection against DOM-based Cross-Site Scripting., , , , and . USENIX Security Symposium, page 655-670. USENIX Association, (2014)PreparedJS: Secure Script-Templates for JavaScript.. DIMVA, volume 7967 of Lecture Notes in Computer Science, page 102-121. Springer, (2013)From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting., , , , and . ACM Conference on Computer and Communications Security, page 1419-1430. ACM, (2015)09141 Abstracts Collection - Web Application Security., , , and . Web Application Security, volume 09141 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices., , , , and . AsiaCCS, page 391-402. ACM, (2019)Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs., , , , and . ACM Conference on Computer and Communications Security, page 1757-1771. ACM, (2017)Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild., , , and . NDSS, The Internet Society, (2019)Session Hijacking Attacks.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Web Application Security (Dagstuhl Seminar 12401)., , , and . Dagstuhl Reports, 2 (10): 1-37 (2012)