Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid taint analysis for Java EE., , , , and . SAC, page 1716-1725. ACM, (2020)The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications., , and . USENIX Security Symposium, page 5467-5484. USENIX Association, (2023)Pseudonyme Biometrik: Ein signatur-basierter Ansatz.. BIOSIG, volume P-31 of LNI, page 113-120. GI, (2003)Raccoon: automated verification of guarded race conditions in web applications., , , and . SAC, page 1678-1687. ACM, (2020)DOM-basiertes Cross-Site Scripting im Web: Reise in ein unerforschtes Land., , and . Sicherheit, volume P-228 of LNI, page 53-64. GI, (2014)Thieves in the Browser: Web-based Cryptojacking in the Wild., , , and . ARES, page 4:1-4:10. ACM, (2019)Accept All Exploits: Exploring the Security Impact of Cookie Banners., , , , and . ACSAC, page 911-922. ACM, (2022)Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions., , , , and . EuroS&P, page 236-250. IEEE, (2022)Web Application Security (Dagstuhl Seminar 18321)., , , and . Dagstuhl Reports, 8 (8): 1-17 (2018)Who's Hosting the Block Party? Studying Third-Party Blockage of CSP and SRI., , , and . NDSS, The Internet Society, (2021)