Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

205 Publications


2016 | Journal Article | LibreCat-ID: 20718
Rasthofer, Siegfried, et al. “Harvester - Vollautomatische Extraktion von Laufzeitwerten Aus Obfuskierten Android-Applikationen.” Datenschutz Und Datensicherheit, 2016, pp. 718–22, doi:https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536.
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20719
Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–90, doi:http://doi.acm.org/10.1145/2976749.2978361.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20720
Follner, Andreas, et al. “PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution.” International Workshop on Security and Trust Management (STM), 2016, pp. 212–28.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20721
Nguyen Quang Do, Lisa, et al. “Toward an Automated Benchmark Management System.” Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 13–17.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20722
Arzt, Steven, et al. “Towards Cross-Platform Cross-Language Analysis with Soot.” Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 1–6.
LibreCat | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 20724
Follner, Andreas, and Eric Bodden. “ROPocop — Dynamic Mitigation of Code-Reuse Attacks.” Journal of Information Security and Applications , vol. 29, 2016, pp. 16–26, doi:http://dx.doi.org/10.1016/j.jisa.2016.01.002.
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20725
Follner, Andreas, et al. “Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality.” International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20726
Falzon, Kevin, and Eric Bodden. “Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.” Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings, edited by Frank Piessens and Luca Vigan’o, Springer Berlin Heidelberg, 2016, pp. 116–38, doi:10.1007/978-3-662-49635-0_7.
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20727
Rasthofer, Siegfried, et al. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” Network and Distributed System Security Symposium (NDSS), 2016.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20728
Nadi, Sarah, et al. “Jumping Through Hoops: Why Do Java Developers Struggle With Cryptography APIs?” International Conference for Software Engineering (ICSE), 2016, pp. 935–46.
LibreCat | Download (ext.)
 

Filters and Search Terms

department=76

Search

Filter Publications

Display / Sort

Citation Style: MLA

Export / Embed