Sven Lachmund

According to our database1, Sven Lachmund authored at least 13 papers between 2003 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Standards Driven Security Assurance for Mobile Networks.
J. ICT Stand., 2015

2013
CPM: Masking Code Pointers to Prevent Code Injection Attacks.
ACM Trans. Inf. Syst. Secur., 2013

2011
Filter-resistant code injection on ARM.
J. Comput. Virol., 2011

Code Pointer Masking: Hardening Applications against Code Injection Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

2010
Auto-Generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition.
PhD thesis, 2010

Auto-generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition.
Trans. Comput. Sci., 2010

Auto-generating access control policies for applications by static analysis with user input recognition.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2010

2009
Proving Reliability of Anonymous Information in VANETs.
IEEE Trans. Veh. Technol., 2009

Breaking the memory secrecy assumption.
Proceedings of the Second European Workshop on System Security, 2009

Transparent Encryption for External Storage Media with Key Management Adapted to Mobile Use.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2006
An Infrastructure for Gaining Trust in Context Information.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Context-Aware Access Control; Making Access Control Decisions Based on Context Information.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

2003
Placement of Cryptographic Mechanisms in Operating Systems.
Proceedings of the International Conference on Security and Management, 2003


  Loading...