Author of the publication

Provenance-Based Security Audits and Its Application to COVID-19 Contact Tracing Apps.

, , , , , and . IPAW, volume 12839 of Lecture Notes in Computer Science, page 88-105. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-Domain Evaluation of a Deep Learning-Based Type Inference System., , , and . CoRR, (2022)U sing Clone Detection for Finding Signatures of Malware Families: A Case Study on FinSpy., , , and . ACSOS-C, page 269-274. IEEE, (2021)Provenance-Based Security Audits and Its Application to COVID-19 Contact Tracing Apps., , , , , and . IPAW, volume 12839 of Lecture Notes in Computer Science, page 88-105. Springer, (2021)Certified Information Flow Analysis of Service Implementations., and . SOCA, page 177-184. IEEE Computer Society, (2018)Benchmarking Open-Source Static Analyzers for Security Testing for C., , and . ISoLA (4), volume 12479 of Lecture Notes in Computer Science, page 182-198. Springer, (2020)Cross-Domain Evaluation of a Deep Learning-Based Type Inference System., , , and . MSR, page 158-169. IEEE, (2023)Experiments on Code Clone Detection and Machine Learning., , and . IWSC, page 46-52. IEEE, (2022)Scientific developers v/s static analysis tools: vision and position paper., , , , and . CHASE@ICSE, page 89-90. IEEE / ACM, (2019)Deep security analysis of program code., , and . Empir. Softw. Eng., 27 (1): 2 (2022)Towards Certified Data Flow Analysis of Business Processes.. ZEUS, volume 1826 of CEUR Workshop Proceedings, page 1-3. CEUR-WS.org, (2017)