Author of the publication

Towards an automated generation of application confinement policies with binary analysis.

, , , and . ISNCC, page 1-6. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power And Fault Emulation for Software Verification and System Stability Testing in Safety Critical Environments., , , , , , , and . IEEE Trans. Industrial Informatics, 9 (2): 1199-1206 (2013)OASIS: An automotive analysis and safety engineering instrument., , , , , and . Rel. Eng. & Sys. Safety, (2013)A development methodology for variant-rich automotive software architectures., , , , and . Elektrotechnik und Informationstechnik, 128 (6): 222-227 (2011)Evaluation of diverse compiling for software-fault detection., , , , and . DATE, page 531-536. ACM, (2015)A Computer-Aided Approach to Preliminary Hazard Analysis for Automotive Embedded Systems., , , , , , , and . ECBS, page 169-178. IEEE Computer Society, (2011)Model-Driven Development of Recursive CORBA Component Assemblies., , , , , and . EUROMICRO, page 170-175. IEEE Computer Society, (2004)A Hardware/Software Cosimulation Environment for DSP Applications., , and . EUROMICRO, page 1492-1495. IEEE Computer Society, (1999)CDL: an extensible constraints framework for model-based development., and . IJMSO, 9 (3): 263-274 (2014)Towards Dependability Engineering of Cooperative Automotive Cyber-Physical Systems., , , , and . EuroSPI, volume 748 of Communications in Computer and Information Science, page 205-215. Springer, (2017)Supporting evolving security models for an agile security evaluation., , , , , and . ESPRE, page 31-36. IEEE Computer Society, (2014)