Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks., and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 23-43. Springer, (2008)WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction., , , and . ACM Conference on Computer and Communications Security, page 575-586. ACM, (2011)WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper)., , , , , and . ICISS, volume 6503 of Lecture Notes in Computer Science, page 3-26. Springer, (2010)NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications., , , , and . ACM Conference on Computer and Communications Security, page 607-618. ACM, (2010)Don't Repeat Yourself: Automatically Synthesizing Client-side Validation Code for Web Applications., , , , , and . WebApps, page 107-108. USENIX Association, (2012)WAVES: Automatic Synthesis of Client-Side Validation Code for Web Applications., , , , , and . CyberSecurity, page 46-53. IEEE Computer Society, (2012)SWIPE: eager erasure of sensitive data in large scale systems software., , , , and . CODASPY, page 295-306. ACM, (2012)TamperProof: a server-agnostic defense for parameter tampering attacks on web applications., , , , and . CODASPY, page 129-140. ACM, (2013)Automatically Preparing Safe SQL Queries., , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 272-288. Springer, (2010)Automated detection of parameter tampering opportunities and vulnerabilities in web applications., , , and . J. Comput. Secur., 22 (3): 415-465 (2014)