Affiliation:
1. EC SPRIDE, Technische Universität, Darmstadt
2. University of Luxembourg
3. Pennsylvania State University
Funder
Bundesministerium für Bildung und Forschung
Deutsche Forschungsgemeinschaft
Google
Hessian LOEWE excellence initiative within CASED
Division of Computer and Network Systems
Reference41 articles.
1. Virus share aug 2013. http://virusshare.com/. Virus share aug 2013. http://virusshare.com/.
2. IBM Rational AppScan Apr. 2013. http://www-01.ibm.com/software/de/rational/appscan/. IBM Rational AppScan Apr. 2013. http://www-01.ibm.com/software/de/rational/appscan/.
3. Fortify 360 Source Code Analyzer (SCA) Apr. 2013. http://www8.hp.com/us/en/software-solutions/software.html?compURI=1214365#.UW6CVKuAtfQ. Fortify 360 Source Code Analyzer (SCA) Apr. 2013. http://www8.hp.com/us/en/software-solutions/software.html?compURI=1214365#.UW6CVKuAtfQ.
4. Automatically securing permission-based software by reducing the attack surface: an application to Android
5. Dexpler
Cited by
427 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automated Repair of Information Flow Security in Android Implicit Inter-App Communication;Lecture Notes in Computer Science;2024-09-11
2. DMMPP: Constructing Dummy Main Methods for Android Apps with Path-Sensitive Predicates;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
3. Characterizing and Detecting Program Representation Faults of Static Analysis Frameworks;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
4. Silent Taint-Style Vulnerability Fixes Identification;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
5. User-assisted code query customization and optimization;International Journal on Software Tools for Technology Transfer;2024-08-27