Author of the publication

SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform.

, , , , , , and . TACAS, volume 9035 of Lecture Notes in Computer Science, page 225-230. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Modeling and Reasoning about the Android Security Framework., , and . TGC, volume 8191 of Lecture Notes in Computer Science, page 64-81. Springer, (2012)Runtime monitoring for next generation Java ME platform., , , , and . Comput. Secur., 29 (1): 74-87 (2010)Modular plans for secure service composition., , and . J. Comput. Secur., 20 (1): 81-117 (2012)FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization., , , and . AsiaCCS, page 389-400. ACM, (2016)Strong Authentication for e-Banking: A Survey on European Regulations and Implementations., , and . SECRYPT, page 480-485. SciTePress, (2017)Metric-Aware Secure Service Orchestration, , and . ICE, volume 104 of EPTCS, page 32-46. (2012)PolEnA: Enforcing Fine-grained Permission Policies in Android., , and . SAFECOMP Workshops, volume 10489 of Lecture Notes in Computer Science, page 407-414. Springer, (2017)Modular Plans for Secure Service Composition., , and . ARSPA-WITS, volume 6186 of Lecture Notes in Computer Science, page 41-58. Springer, (2010)Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module., , , , , , , and . MIST@CCS, page 41-49. ACM, (2015)VeriOSS: Using the Blockchain to Foster Bug Bounty Programs., , and . Tokenomics, volume 82 of OASIcs, page 6:1-6:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)