Christian Hammer
Christian Hammer
Professor of Computer Science at University of Potsdam
Verified email at cs.uni-potsdam.de - Homepage
Title
Cited by
Cited by
Year
The eval that men do
G Richards, C Hammer, B Burg, J Vitek
European Conference on Object-Oriented Programming, 52-78, 2011
2292011
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
C Hammer, G Snelting
International Journal of Information Security 8 (6), 399-422, 2009
2292009
Appguard–enforcing user requirements on android apps
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
International Conference on TOOLS and Algorithms for the Construction and …, 2013
1692013
Dynamic path conditions in dependence graphs
C Hammer, M Grimme, J Krinke
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and …, 2006
1192006
Dynamic path conditions in dependence graphs
C Hammer, M Grimme, J Krinke
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and …, 2006
1192006
Boxify: Full-fledged app sandboxing for stock android
M Backes, S Bugiel, C Hammer, O Schranz, P von Styp-Rekowsky
24th {USENIX} Security Symposium ({USENIX} Security 15), 691-706, 2015
1072015
Dynamic detection of atomic-set-serializability violations
C Hammer, J Dolby, M Vaziri, F Tip
Proceedings of the 30th international conference on Software engineering …, 2008
972008
Information flow control in WebKit’s JavaScript bytecode
A Bichhawat, V Rajani, D Garg, C Hammer
International Conference on Principles of Security and Trust, 159-178, 2014
812014
Information flow analysis for javascript
S Just, A Cleary, B Shirley, C Hammer
Proceedings of the 1st ACM SIGPLAN international workshop on Programming …, 2011
592011
An improved slicer for Java
C Hammer, G Snelting
Proceedings of the 5th ACM SIGPLAN-SIGSOFT workshop on Program analysis for …, 2004
582004
AppGuard–fine-grained policy enforcement for untrusted Android applications
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
Data Privacy Management and Autonomous Spontaneous Security, 213-231, 2013
572013
Appguard-real-time policy enforcement for third-party applications
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
572012
Information flow control for Java: a comprehensive approach based on path conditions in dependence graphs
C Hammer
442009
A type system for data-centric synchronization
M Vaziri, F Tip, J Dolby, C Hammer, J Vitek
European Conference on Object-Oriented Programming, 304-328, 2010
412010
Experiences with PDG-based IFC
C Hammer
International Symposium on Engineering Secure Software and Systems, 44-60, 2010
392010
Precise slicing of concurrent programs
D Giffhorn, C Hammer
Automated Software Engineering 16 (2), 197, 2009
362009
A data-centric approach to synchronization
J Dolby, C Hammer, D Marino, F Tip, M Vaziri, J Vitek
ACM Transactions on Programming Languages and Systems (TOPLAS) 34 (1), 1-48, 2012
312012
Generalizing permissive-upgrade in dynamic information flow analysis
A Bichhawat, V Rajani, D Garg, C Hammer
Proceedings of the Ninth Workshop on Programming Languages and Analysis for …, 2014
302014
Intransitive noninterference in dependence graphs
C Hammer, J Krinke, F Nodes
Second International Symposium on Leveraging Applications of Formal Methods …, 2006
292006
Intransitive noninterference in dependence graphs
C Hammer, J Krinke, F Nodes
Second International Symposium on Leveraging Applications of Formal Methods …, 2006
292006
The system can't perform the operation now. Try again later.
Articles 1–20