Author of the publication

Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems.

, , and . Proc. ACM Program. Lang., 3 (POPL): 48:1-48:29 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time for Addressing Software Security Issues: Prediction Models and Impacting Factors., , , , and . Data Science and Engineering, 2 (2): 107-124 (2017)IccTA: Detecting Inter-Component Privacy Leaks in Android Apps., , , , , , , , , and . ICSE (1), page 280-291. IEEE Computer Society, (2015)Harvester., , , and . Datenschutz und Datensicherheit, 40 (11): 718-722 (2016)PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution., , , , , , and . STM, volume 9871 of Lecture Notes in Computer Science, page 212-228. Springer, (2016)MOPBox: A Library Approach to Runtime Verification - (Tool Demonstration).. RV, volume 7186 of Lecture Notes in Computer Science, page 365-369. Springer, (2011)jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications., , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 295-316. Springer, (2015)Architectural Runtime Verification., , and . ICSA Companion, page 77-84. IEEE, (2019)Aspect-Oriented Race Detection in Java., and . IEEE Trans. Software Eng., 36 (4): 509-527 (2010)ROPocop - Dynamic Mitigation of Code-Reuse Attacks., and . CoRR, (2015)Partially Evaluating Finite-State Runtime Monitors Ahead of Time., , and . ACM Trans. Program. Lang. Syst., 34 (2): 7:1-7:52 (2012)