Author of the publication

Schutzmaßnahmen gegen datenschutz- unfreundliche Smartphone-Apps.

, , , and . Datenschutz und Datensicherheit, 37 (11): 720-725 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Partially Evaluating Finite-State Runtime Monitors Ahead of Time., , and . ACM Trans. Program. Lang. Syst., 34 (2): 7:1-7:52 (2012)ROPocop - Dynamic Mitigation of Code-Reuse Attacks., and . CoRR, (2015)Aspect-Oriented Race Detection in Java., and . IEEE Trans. Software Eng., 36 (4): 509-527 (2010)IccTA: Detecting Inter-Component Privacy Leaks in Android Apps., , , , , , , , , and . ICSE (1), page 280-291. IEEE Computer Society, (2015)Harvester., , , and . Datenschutz und Datensicherheit, 40 (11): 718-722 (2016)Time for Addressing Software Security Issues: Prediction Models and Impacting Factors., , , , and . Data Science and Engineering, 2 (2): 107-124 (2017)PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution., , , , , , and . STM, volume 9871 of Lecture Notes in Computer Science, page 212-228. Springer, (2016)MOPBox: A Library Approach to Runtime Verification - (Tool Demonstration).. RV, volume 7186 of Lecture Notes in Computer Science, page 365-369. Springer, (2011)jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications., , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 295-316. Springer, (2015)TS4J: a fluent interface for defining and computing typestate analyses.. SOAP@PLDI, page 1:1-1:6. ACM, (2014)