Author of the publication

SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform.

, , , , , , and . TACAS, volume 9035 of Lecture Notes in Computer Science, page 225-230. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Evaluation of the Android Security Framework., , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 176-189. Springer, (2013)Abstraction-Driven SAT-based Analysis of Security Protocols., and . SAT, volume 2919 of Lecture Notes in Computer Science, page 257-271. Springer, (2003)On a Rewriting Approach to Satisfiability Procedures: Extension, Combination of Theories and an Experimental Appraisal., , , and . FroCoS, volume 3717 of Lecture Notes in Computer Science, page 65-80. Springer, (2005)Attribute based access control for APIs in spring security., , , and . SACMAT, page 85-88. ACM, (2014)Model checking authorization requirements in business processes., and . Comput. Secur., (2014)Preface., and . ARSPA@IJCAR, volume 125 of Electronic Notes in Theoretical Computer Science, page 1. Elsevier, (2004)Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries., , , , and . ITASEC, volume 2315 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Preface., , and . J. Autom. Reason., 45 (2): 89 (2010)Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps., , , , and . FMSE, page 1-10. ACM, (2008)Formal Modeling and Reasoning about the Android Security Framework., , and . TGC, volume 8191 of Lecture Notes in Computer Science, page 64-81. Springer, (2012)