Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid taint analysis for Java EE., , , , and . SAC, page 1716-1725. ACM, (2020)The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications., , and . USENIX Security Symposium, page 5467-5484. USENIX Association, (2023)Pseudonyme Biometrik: Ein signatur-basierter Ansatz.. BIOSIG, volume P-31 of LNI, page 113-120. GI, (2003)Raccoon: automated verification of guarded race conditions in web applications., , , and . SAC, page 1678-1687. ACM, (2020)Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions., , , , and . EuroS&P, page 236-250. IEEE, (2022)Thieves in the Browser: Web-based Cryptojacking in the Wild., , , and . ARES, page 4:1-4:10. ACM, (2019)DOM-basiertes Cross-Site Scripting im Web: Reise in ein unerforschtes Land., , and . Sicherheit, volume P-228 of LNI, page 53-64. GI, (2014)Accept All Exploits: Exploring the Security Impact of Cookie Banners., , , , and . ACSAC, page 911-922. ACM, (2022)Web Application Security (Dagstuhl Seminar 18321)., , , and . Dagstuhl Reports, 8 (8): 1-17 (2018)Talking About My Generation: Targeted DOM-based XSS Exploit Generation using Dynamic Data Flow Analysis., , , and . EuroSec@EuroSys, page 27-33. ACM, (2021)