uni-potsdam.de

You are using an old browser with security vulnerabilities and can not use the features of this website.

Here you will see how you can easily upgrade your browser.

Publications

In Conference Proceedings

2019

  • Tiwari, A.; Prakash, J.; Groß, S. and Hammer, C. LUDroid: A Large Scale Analysis of Android - Web Hybridization. In Proc. 19th International Working Conference on Source Code Analysis and Manipulation (SCAM 2019) pp. 256–267, IEEE, 2019 (publication pending).
  • Tiwari, A.; Groß, S. and Hammer, C. IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications. Accepted and presented at SecureComm 2019 (publication pending).
  • Chakraborty, D.; Hammer, C. and Bugiel, S. Secure Multi-execution in Android. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (Sec@SAC'19), pp. 1934–1943, ACM, 2019.
  • Welearegai, G.; Schlüter, M. and Hammer, C. Static Security Evaluation of an Industrial Web Application.  In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (Sec@SAC'19), pp. 1952–1961, ACM, 2019.

2018

2017

  • Bichhawat, A.; Rajani, V.; Jain, J.; Garg, D. and Hammer, C. WebPol: Fine-grained Information Flow Policies for Web Browsers. In ESORICS 2017, pp 242-259, Springer , LNCS 10492, 2017.
  • Welearegai, G. and Hammer, C. Optimized Automatic Sanitizer Placement.  In Engineering Secure Software and Systems, pages 87-96, Springer, LNCS 10379, 2017.

 

2016

 

2015

 

2014 

 

2013

 

2012

 

2011

 

2010

 

2008

 

2007

 

2006

 

2004

 

Journal Articles

2014

  • Snelting, G.; Giffhorn, D.; Graf, J.; Hammer, C.; Hecker, M.; Mohr, M. and Wasserrab, D. Checking Probabilistic Noninterference Using JOANA.  In it - Information Technology, 56 (6): 280-287, 2014. doi 

 

2012

  • Dolby, J.; Hammer, C.; Marino, D.; Tip, F.; Vaziri, M. and Vitek, J. A data-centric approach to synchronization.  In ACM Trans. Program. Lang. Syst., 34 (1): 4:1-4:48, 2012.

 

2009

  • Hammer, C. and Snelting, G. Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs.  In International Journal of Information Security, 8 (6): 399-422, 2009.
  • Giffhorn, D. and Hammer, C. Precise Slicing of Concurrent Programs -- An Evaluation of Precise Slicing Algorithms for Concurrent Programs.  In Journal of Automated Software Engineering, 16 (2): 197-234, 2009.

 

PhD Theses

2017

2009

 

Conference Proceedings

2012

  • Hammer, C.; Dolby, J. and Gowri, M., ed. Proceedings of the Workshop on JavaScript Tools.  ACM, 2012. www 

 

Technical Reports

2013 

  • Bodden, E.; Schneider, M.; Kreutzer, M.; Mezini, M.; Hammer, C.; Zeller, A.; Achenbach, D.; Huber, M. and Kraschewski, D. Entwicklung sicherer Software durch Security by Design.  In SIT-TR-2013-01, Fraunhofer SIT, 2013.
  • Backes, M.; Gerling, S.; Hammer, C.; Maffei, M. and Styp-Rekowsky, P. v. AppGuard -- Fine-grained Policy Enforcement for Untrusted Android Applications. Technical Report A/02/2013, Saarland University, Computer Science, 2013.

 

2012

  • Marino, D.; Hammer, C.; Dolby, J.; Vaziri, M.; Tip, F. and Vitek, J. Detecting Deadlock in Programs with Data-Centric Synchronization. Technical Report RC25300, IBM Research Report, 2012.
  • Backes, M.; Gerling, S.; Hammer, C.; Maffei, M. and Styp-Rekowsky, P. v. AppGuard - Real-time Policy Enforcement for Third-Party Applications. Technical Report A/02/2012, Saarland University, Computer Science, 2012.

 

2011

  • Dolby, J.; Hammer, C.; Marino, D.; Tip, F.; Vaziri, M. and Vitek, J. A data-centric approach to synchronization. Technical Report RC25106, IBM Research Report, 2011.

 

2008