Follow
Christian Hammer
Christian Hammer
Professor of Computer Science at University of Passau
Verified email at uni-passau.de - Homepage
Title
Cited by
Cited by
Year
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
C Hammer, G Snelting
International Journal of Information Security 8 (6), 399-422, 2009
3082009
The eval that men do: A large-scale study of the use of eval in JavaScript applications
G Richards, C Hammer, B Burg, J Vitek
European Conference on Object-Oriented Programming, 52-78, 2011
2982011
Appguard–enforcing user requirements on android apps
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
Tools and Algorithms for the Construction and Analysis of Systems: 19th …, 2013
2292013
Boxify: Full-fledged app sandboxing for stock android
M Backes, S Bugiel, C Hammer, O Schranz, P von Styp-Rekowsky
24th USENIX Security Symposium (USENIX Security 15), 691-706, 2015
1812015
Dynamic path conditions in dependence graphs
C Hammer, M Grimme, J Krinke
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and …, 2006
1412006
Dynamic detection of atomic-set-serializability violations
C Hammer, J Dolby, M Vaziri, F Tip
Proceedings of the 30th international conference on Software engineering …, 2008
1232008
Information flow control in WebKit’s JavaScript bytecode
A Bichhawat, V Rajani, D Garg, C Hammer
Principles of Security and Trust: Third International Conference, POST 2014 …, 2014
1142014
Information flow analysis for javascript
S Just, A Cleary, B Shirley, C Hammer
Proceedings of the 1st ACM SIGPLAN international workshop on Programming …, 2011
822011
Appguard–fine-grained policy enforcement for untrusted android applications
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014
752014
An improved slicer for Java
C Hammer, G Snelting
Proceedings of the 5th ACM SIGPLAN-SIGSOFT workshop on Program analysis for …, 2004
702004
Appguard-real-time policy enforcement for third-party applications
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
662012
Checking probabilistic noninterference using JOANA
G Snelting, D Giffhorn, J Graf, C Hammer, M Hecker, M Mohr, ...
it-Information Technology 56 (6), 280-287, 2014
552014
A type system for data-centric synchronization
M Vaziri, F Tip, J Dolby, C Hammer, J Vitek
ECOOP 2010–Object-Oriented Programming: 24th European Conference, Maribor …, 2010
512010
Experiences with PDG-based IFC
C Hammer
Engineering Secure Software and Systems: Second International Symposium …, 2010
502010
A data-centric approach to synchronization
J Dolby, C Hammer, D Marino, F Tip, M Vaziri, J Vitek
ACM Transactions on Programming Languages and Systems (TOPLAS) 34 (1), 1-48, 2012
472012
Precise slicing of concurrent programs: An evaluation of static slicing algorithms for concurrent programs
D Giffhorn, C Hammer
Automated Software Engineering 16, 197-234, 2009
452009
R-droid: Leveraging android app analysis with static slice optimization
M Backes, S Bugiel, E Derr, S Gerling, C Hammer
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
442016
Information flow control for event handling and the DOM in web browsers
V Rajani, A Bichhawat, D Garg, C Hammer
2015 IEEE 28th Computer Security Foundations Symposium, 366-379, 2015
392015
Information flow control for Java: a comprehensive approach based on path conditions in dependence graphs
C Hammer
392009
Learning how to prevent return-oriented programming efficiently
D Pfaff, S Hack, C Hammer
Engineering Secure Software and Systems: 7th International Symposium, ESSoS …, 2015
362015
The system can't perform the operation now. Try again later.
Articles 1–20