Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of the Mozilla Jetpack Extension Framework., , , and . ECOOP, volume 7313 of Lecture Notes in Computer Science, page 333-355. Springer, (2012)Hansel: diagnosing faults in openStack., , , , and . CoNEXT, page 23:1-23:13. ACM, (2015)CLOTHO: saving programs from malformed strings and incorrect string-handling., , , and . ESEC/SIGSOFT FSE, page 555-566. ACM, (2015)Towards a More Reliable and Available Docker-based Container Cloud., and . CoRR, (2017)Retargetting Legacy Browser Extensions to Modern Extension Frameworks., , and . ECOOP, volume 8586 of Lecture Notes in Computer Science, page 463-488. Springer, (2014)ZEUS: Analyzing Safety of Smart Contracts., , , and . NDSS, The Internet Society, (2018)SPHINX: Detecting Security Attacks in Software-Defined Networks., , , and . NDSS, The Internet Society, (2015)Efficient runtime-enforcement techniques for policy weaving., , , , and . SIGSOFT FSE, page 224-234. ACM, (2014)POLLUX: safely upgrading dependent application libraries., , , , , and . SIGSOFT FSE, page 290-300. ACM, (2016)Blockchain-based real-time cheat prevention and robustness for multi-player online games., , and . CoNEXT, page 178-190. ACM, (2018)