Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Harvester., , , and . Datenschutz und Datensicherheit, 40 (11): 718-722 (2016)IccTA: Detecting Inter-Component Privacy Leaks in Android Apps., , , , , , , , , and . ICSE (1), page 280-291. IEEE Computer Society, (2015)Aspect-Oriented Race Detection in Java., and . IEEE Trans. Software Eng., 36 (4): 509-527 (2010)ROPocop - Dynamic Mitigation of Code-Reuse Attacks., and . CoRR, (2015)Time for Addressing Software Security Issues: Prediction Models and Impacting Factors., , , , and . Data Science and Engineering, 2 (2): 107-124 (2017)Partially Evaluating Finite-State Runtime Monitors Ahead of Time., , and . ACM Trans. Program. Lang. Syst., 34 (2): 7:1-7:52 (2012)PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution., , , , , , and . STM, volume 9871 of Lecture Notes in Computer Science, page 212-228. Springer, (2016)MOPBox: A Library Approach to Runtime Verification - (Tool Demonstration).. RV, volume 7186 of Lecture Notes in Computer Science, page 365-369. Springer, (2011)jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications., , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 295-316. Springer, (2015)Architectural Runtime Verification., , and . ICSA Companion, page 77-84. IEEE, (2019)