Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theoretical Aspects of Compositional Symbolic Execution., and . FASE, volume 6603 of Lecture Notes in Computer Science, page 247-261. Springer, (2011)Supporting Security Monitor-Aware Development., and . SESS@ICSE, page 2. IEEE Computer Society, (2007)State Coverage: Software Validation Metrics beyond Code Coverage., , , and . SOFSEM, volume 7147 of Lecture Notes in Computer Science, page 542-553. Springer, (2012)Policy ignorant caller-side inline reference monitoring., and . Int. J. Softw. Tools Technol. Transf., 17 (3): 291-303 (2015)State Coverage: An Empirical Analysis Based on a User Study., , and . SOFSEM, volume 7741 of Lecture Notes in Computer Science, page 469-480. Springer, (2013)Security enforcement aware software development., and . Inf. Softw. Technol., 51 (7): 1172-1185 (2009)A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language., and . FMOODS, volume 5051 of Lecture Notes in Computer Science, page 240-258. Springer, (2008)Test Input Generation for Programs with Pointers., , and . TACAS, volume 5505 of Lecture Notes in Computer Science, page 277-291. Springer, (2009)The S3MS.NET Run Time Monitor: Tool Demonstration., , , , , , and . BYTECODE@ETAPS, volume 253 of Electronic Notes in Theoretical Computer Science, page 153-159. Elsevier, (2009)A flexible security architecture to support third-party applications on mobile devices., , , , , , and . CSAW, page 19-28. ACM, (2007)