Author of the publication

Schutzmaßnahmen gegen datenschutz- unfreundliche Smartphone-Apps.

, , , and . Datenschutz und Datensicherheit, 37 (11): 720-725 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Instrumenting Android and Java Applications as Easy as abc., , and . RV, volume 8174 of Lecture Notes in Computer Science, page 364-381. Springer, (2013)Schutzmaßnahmen gegen datenschutz- unfreundliche Smartphone-Apps., , , and . Datenschutz und Datensicherheit, 37 (11): 720-725 (2013)Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques., , , and . NDSS, The Internet Society, (2016)FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps., , , , , , , , and . PLDI, page 29. ACM, (2014)Challenges in Defining a Programming Language for Provably Correct Dynamic Analyses., , and . ISoLA (1), volume 7609 of Lecture Notes in Computer Science, page 4-18. Springer, (2012)A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks., , and . NDSS, The Internet Society, (2014)I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis., , , , , , , , and . CoRR, (2014)Investigating Users' Reaction to Fine-Grained Data Requests: A Market Experiment., , , , and . HICSS, page 3666-3675. IEEE Computer Society, (2016)IccTA: Detecting Inter-Component Privacy Leaks in Android Apps., , , , , , , , , and . ICSE (1), page 280-291. IEEE Computer Society, (2015)Harvester., , , and . Datenschutz und Datensicherheit, 40 (11): 718-722 (2016)