Author of the publication

Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications.

, , , and . CCS, page 3576-3578. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications., , and . USENIX Security Symposium, page 5467-5484. USENIX Association, (2023)Raccoon: automated verification of guarded race conditions in web applications., , , and . SAC, page 1678-1687. ACM, (2020)Shooter Localization Based on TDOA and N-Shape Length Measurements of Distributed Microphones., , , and . FUSION, page 1-8. IEEE, (2021)FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities., , , , and . NDSS, The Internet Society, (2023)Using Algorithm Selection for Adaptive Vehicle Perception Aboard UAV., , and . AVSS, page 1-8. IEEE, (2019)Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications., , , and . CCS, page 3576-3578. ACM, (2023)Keeping Privacy Labels Honest., , , , and . Proc. Priv. Enhancing Technol., 2022 (4): 486-506 (2022)SSRF vs. Developers: A Study of SSRF-Defenses in PHP Applications., , , and . USENIX Security Symposium, USENIX Association, (2024)A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing., , , , and . Proc. Priv. Enhancing Technol., 2024 (3): 674-691 (2024)Manufacturing of polygon fiber reinforced plastic profiles by rotational molding and intrinsic hybridization., , and . Prod. Eng., 9 (3): 317-328 (2015)