Christian Hammer

Orcid: 0000-0001-5955-3732

Affiliations:
  • University of Passau, Germany
  • University of Potsdam, Germany (former)
  • Saarland University, Department of Computer Science, Germany (former)
  • Purdue University, Department of Computer Science, USA (former)
  • University of Karlsruhe, Department of Informatics, Germany (former)


According to our database1, Christian Hammer authored at least 53 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Unifying Pointer Analyses for Polyglot Inter-operations through Summary Specialization.
CoRR, 2023

Understanding the Impact of Fingerprinting in Android Hybrid Apps.
Proceedings of the 10th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2023

Demand-driven Information Flow Analysis of WebView in Android Hybrid Apps.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Evaluating the Hardware Performance Counters of an Xtensa Virtual Prototype.
Proceedings of the 26th International Symposium on Design and Diagnostics of Electronic Circuits and Systems, 2023

Detecting and Preventing ROP Attacks using Machine Learning on ARM.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

IDS-MA: Intrusion Detection System for IoT MQTT Attacks Using Centralized and Federated Learning.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView.
CoRR, 2022

Detecting return-oriented programming on firmware-only embedded devices using hardware performance counters.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
Permissive runtime information flow control in the presence of exceptions.
J. Comput. Secur., 2021

Effects of Program Representation on Pointer Analyses - An Empirical Study.
Proceedings of the Fundamental Approaches to Software Engineering, 2021

2020
A Large Scale Analysis of Android - Web Hybridization.
J. Syst. Softw., 2020

Revealing injection vulnerabilities by leveraging existing tests.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
PointEval: On the Impact of Pointer Analysis Frameworks.
CoRR, 2019

IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications.
Proceedings of the Security and Privacy in Communication Networks, 2019

LUDroid: A Large Scale Analysis of Android - Web Hybridization.
Proceedings of the 19th International Working Conference on Source Code Analysis and Manipulation, 2019

Static security evaluation of an industrial web application.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Secure multi-execution in Android.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

2018
A Formal Logic Framework for the Automation of the Right to Be Forgotten.
Proceedings of the Security and Privacy in Communication Networks, 2018

PIAnalyzer: A Precise Approach for PendingIntent Vulnerability Analysis.
Proceedings of the Computer Security, 2018

2017
ThiefTrap - An Anti-theft Framework for Android.
Proceedings of the Security and Privacy in Communication Networks, 2017

Idea: Optimized Automatic Sanitizer Placement.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

WebPol: Fine-Grained Information Flow Policies for Web Browsers.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Learning how to prevent return-oriented programming efficiently.
Proceedings of the Software Engineering 2016, 2016

Implementation-level analysis of the JavaScript helios voting client.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Boxify: Full-fledged App Sandboxing for Stock Android.
Proceedings of the 24th USENIX Security Symposium, 2015

Information Flow Control for Event Handling and the DOM in Web Browsers.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Checking probabilistic noninterference using JOANA.
it Inf. Technol., 2014

Flexible Access Control for JavaScript.
Proceedings of the Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar, 2014

Detecting Deadlock in Programs with Data-Centric Synchronization.
Proceedings of the Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar, 2014

Information Flow Control in WebKit's JavaScript Bytecode.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis.
Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, 2014

2013
AppGuard - Enforcing User Requirements on Android Apps.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013

Flexible access control for javascript.
Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications, 2013

Detecting deadlock in programs with data-centric synchronization.
Proceedings of the 35th International Conference on Software Engineering, 2013

Idea: Callee-Site Rewriting of Sealed System Libraries.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
A data-centric approach to synchronization.
ACM Trans. Program. Lang. Syst., 2012

2011
Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs.
Proceedings of the Runtime Verification - Second International Conference, 2011

The Eval That Men Do - A Large-Scale Study of the Use of Eval in JavaScript Applications.
Proceedings of the ECOOP 2011 - Object-Oriented Programming, 2011

2010
Experiences with PDG-Based IFC.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

A Type System for Data-Centric Synchronization.
Proceedings of the ECOOP 2010, 2010

2009
Information flow control for Java: a comprehensive approach based on path conditions in dependence graphs.
PhD thesis, 2009

Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs.
Int. J. Inf. Sec., 2009

Precise slicing of concurrent programs.
Autom. Softw. Eng., 2009

2008
Precise Analysis of Java Programs Using JOANA.
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008

Static path conditions for Java.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008

Dynamic detection of atomic-set-serializability violations.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

2007
An Evaluation of Slicing Algorithms for Concurrent Programs.
Proceedings of the Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30, 2007

2006
Dynamic path conditions in dependence graphs.
Proceedings of the 2006 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, 2006

Information Flow Control for Java Based on Path Conditions in Dependence Graphs.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

Intransitive Noninterference in Dependence Graphs.
Proceedings of the Leveraging Applications of Formal Methods, 2006

2004
An improved slicer for Java.
Proceedings of the 2004 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2004


  Loading...