default search action
Christian Hammer 0001
Person information
- affiliation: University of Passau, Germany
- affiliation (former): University of Potsdam, Germany
- affiliation (former): Saarland University, Department of Computer Science, Germany
- affiliation (former): Purdue University, Department of Computer Science, USA
- affiliation (former): University of Karlsruhe, Department of Informatics, Germany
Other persons with the same name
- Christian Hammer 0002 — University of Copenhagen, Department of Computer Science, Denmark
- Christian Hammer 0003 — Genentech Inc, San Francisco, CA, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Sirine Ilahi, Adebayo Omotosho, Christian Hammer:
Towards Anomaly Detection in Embedded Systems Application Using LLVM Passes. COMPSAC 2024: 2448-2453 - 2023
- [c44]Gebrehiwet B. Welearegai, Chenpo Hu, Christian Hammer:
Detecting and Preventing ROP Attacks using Machine Learning on ARM. COMPSAC 2023: 667-677 - [c43]Adebayo Omotosho, Yaman Qendah, Christian Hammer:
IDS-MA: Intrusion Detection System for IoT MQTT Attacks Using Centralized and Federated Learning. COMPSAC 2023: 678-688 - [c42]Adebayo Omotosho, Sirine IIahi, Ernesto Cristopher Villegas Castillo, Christian Hammer, Christian Sauer:
Evaluating the Hardware Performance Counters of an Xtensa Virtual Prototype. DDECS 2023: 1-6 - [c41]Abhishek Tiwari, Jyoti Prakash, Christian Hammer:
Demand-driven Information Flow Analysis of WebView in Android Hybrid Apps. ISSRE 2023: 415-426 - [c40]Abhishek Tiwari, Jyoti Prakash, Alimerdan Rahimov, Christian Hammer:
Understanding the Impact of Fingerprinting in Android Hybrid Apps. MOBILESoft 2023: 28-39 - [i8]Jyoti Prakash, Abhishek Tiwari, Christian Hammer:
Unifying Pointer Analyses for Polyglot Inter-operations through Summary Specialization. CoRR abs/2305.03916 (2023) - 2022
- [c39]Adebayo Omotosho, Gebrehiwet B. Welearegai, Christian Hammer:
Detecting return-oriented programming on firmware-only embedded devices using hardware performance counters. SAC 2022: 510-519 - [i7]Abhishek Tiwari, Jyoti Prakash, Alimerdan Rahimov, Christian Hammer:
Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView. CoRR abs/2208.01968 (2022) - 2021
- [j6]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Permissive runtime information flow control in the presence of exceptions. J. Comput. Secur. 29(4): 361-401 (2021) - [c38]Jyoti Prakash, Abhishek Tiwari, Christian Hammer:
Effects of Program Representation on Pointer Analyses - An Empirical Study. FASE 2021: 240-261 - 2020
- [j5]Abhishek Tiwari, Jyoti Prakash, Sascha Groß, Christian Hammer:
A Large Scale Analysis of Android - Web Hybridization. J. Syst. Softw. 170: 110775 (2020) - [c37]Katherine Hough, Gebrehiwet B. Welearegai, Christian Hammer, Jonathan Bell:
Revealing injection vulnerabilities by leveraging existing tests. ICSE 2020: 284-296 - [i6]Abhishek Tiwari, Jyoti Prakash, Sascha Groß, Christian Hammer:
A Large Scale Analysis of Android-Web Hybridization. CoRR abs/2008.01725 (2020)
2010 – 2019
- 2019
- [c36]Dhiman Chakraborty, Christian Hammer, Sven Bugiel:
Secure multi-execution in Android. SAC 2019: 1934-1943 - [c35]Gebrehiwet B. Welearegai, Max Schlüter, Christian Hammer:
Static security evaluation of an industrial web application. SAC 2019: 1952-1961 - [c34]Abhishek Tiwari, Jyoti Prakash, Sascha Groß, Christian Hammer:
LUDroid: A Large Scale Analysis of Android - Web Hybridization. SCAM 2019: 256-267 - [c33]Abhishek Tiwari, Sascha Groß, Christian Hammer:
IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications. SecureComm (2) 2019: 335-349 - [i5]Jyoti Prakash, Abhishek Tiwari, Christian Hammer:
PointEval: On the Impact of Pointer Analysis Frameworks. CoRR abs/1912.00429 (2019) - 2018
- [c32]Sascha Groß, Abhishek Tiwari, Christian Hammer:
PIAnalyzer: A Precise Approach for PendingIntent Vulnerability Analysis. ESORICS (2) 2018: 41-59 - [c31]Abhishek Tiwari, Fabian Bendun, Christian Hammer:
A Formal Logic Framework for the Automation of the Right to Be Forgotten. SecureComm (1) 2018: 95-111 - [i4]Abhishek Tiwari, Sascha Groß, Christian Hammer:
IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications. CoRR abs/1812.05380 (2018) - 2017
- [c30]Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg, Christian Hammer:
WebPol: Fine-Grained Information Flow Policies for Web Browsers. ESORICS (1) 2017: 242-259 - [c29]Gebrehiwet Biyane Welearegai, Christian Hammer:
Idea: Optimized Automatic Sanitizer Placement. ESSoS 2017: 87-96 - [c28]Sascha Groß, Abhishek Tiwari, Christian Hammer:
ThiefTrap - An Anti-theft Framework for Android. SecureComm 2017: 167-184 - [i3]Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg, Christian Hammer:
WebPol: Fine-grained Information Flow Policies for Web Browsers. CoRR abs/1706.06932 (2017) - 2016
- [c27]Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling, Christian Hammer:
R-Droid: Leveraging Android App Analysis with Static Slice Optimization. AsiaCCS 2016: 129-140 - [c26]Michael Backes, Christian Hammer, David Pfaff, Malte Skoruppa:
Implementation-level analysis of the JavaScript helios voting client. SAC 2016: 2071-2078 - [c25]David Pfaff, Sebastian Hack, Christian Hammer:
Learning how to prevent return-oriented programming efficiently. Software Engineering 2016: 43-44 - 2015
- [c24]Vineet Rajani, Abhishek Bichhawat, Deepak Garg, Christian Hammer:
Information Flow Control for Event Handling and the DOM in Web Browsers. CSF 2015: 366-379 - [c23]David Pfaff, Sebastian Hack, Christian Hammer:
Learning How to Prevent Return-Oriented Programming Efficiently. ESSoS 2015: 68-85 - [c22]Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, Philipp von Styp-Rekowsky:
Boxify: Full-fledged App Sandboxing for Stock Android. USENIX Security Symposium 2015: 691-706 - [i2]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. CoRR abs/1506.03950 (2015) - 2014
- [j4]Gregor Snelting, Dennis Giffhorn, Jürgen Graf, Christian Hammer, Martin Hecker, Martin Mohr, Daniel Wasserrab:
Checking probabilistic noninterference using JOANA. it Inf. Technol. 56(6): 280-287 (2014) - [c21]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. PLAS@ECOOP 2014: 15 - [c20]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Information Flow Control in WebKit's JavaScript Bytecode. POST 2014: 159-178 - [c19]Christian Hammer:
Detecting Deadlock in Programs with Data-Centric Synchronization. Software Engineering 2014: 43-44 - [c18]Christian Hammer:
Flexible Access Control for JavaScript. Software Engineering 2014: 79-80 - [i1]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Information Flow Control in WebKit's JavaScript Bytecode. CoRR abs/1401.4339 (2014) - 2013
- [c17]Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, Philipp von Styp-Rekowsky:
AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications. DPM/SETOP 2013: 213-231 - [c16]Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer:
Idea: Callee-Site Rewriting of Sealed System Libraries. ESSoS 2013: 33-41 - [c15]Daniel Marino, Christian Hammer, Julian Dolby, Mandana Vaziri, Frank Tip, Jan Vitek:
Detecting deadlock in programs with data-centric synchronization. ICSE 2013: 322-331 - [c14]Gregor Richards, Christian Hammer, Francesco Zappa Nardelli, Suresh Jagannathan, Jan Vitek:
Flexible access control for javascript. OOPSLA 2013: 305-322 - [c13]Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, Philipp von Styp-Rekowsky:
AppGuard - Enforcing User Requirements on Android Apps. TACAS 2013: 543-548 - 2012
- [j3]Julian Dolby, Christian Hammer, Daniel Marino, Frank Tip, Mandana Vaziri, Jan Vitek:
A data-centric approach to synchronization. ACM Trans. Program. Lang. Syst. 34(1): 4:1-4:48 (2012) - 2011
- [c12]Gregor Richards, Christian Hammer, Brian Burg, Jan Vitek:
The Eval That Men Do - A Large-Scale Study of the Use of Eval in JavaScript Applications. ECOOP 2011: 52-78 - [c11]William N. Sumner, Christian Hammer, Julian Dolby:
Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs. RV 2011: 161-176 - 2010
- [c10]Mandana Vaziri, Frank Tip, Julian Dolby, Christian Hammer, Jan Vitek:
A Type System for Data-Centric Synchronization. ECOOP 2010: 304-328 - [c9]Christian Hammer:
Experiences with PDG-Based IFC. ESSoS 2010: 44-60
2000 – 2009
- 2009
- [b1]Christian Hammer:
Information flow control for Java: a comprehensive approach based on path conditions in dependence graphs. Karlsruhe Institute of Technology, 2009, ISBN 978-3-86644-398-3, pp. 1-221 - [j2]Dennis Giffhorn, Christian Hammer:
Precise slicing of concurrent programs. Autom. Softw. Eng. 16(2): 197-234 (2009) - [j1]Christian Hammer, Gregor Snelting:
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. Int. J. Inf. Sec. 8(6): 399-422 (2009) - 2008
- [c8]Christian Hammer, Julian Dolby, Mandana Vaziri, Frank Tip:
Dynamic detection of atomic-set-serializability violations. ICSE 2008: 231-240 - [c7]Christian Hammer, Rüdiger Schaade, Gregor Snelting:
Static path conditions for Java. PLAS 2008: 57-66 - [c6]Dennis Giffhorn, Christian Hammer:
Precise Analysis of Java Programs Using JOANA. SCAM 2008: 267-268 - 2007
- [c5]Dennis Giffhorn, Christian Hammer:
An Evaluation of Slicing Algorithms for Concurrent Programs. SCAM 2007: 17-26 - 2006
- [c4]Christian Hammer, Jens Krinke, Frank Nodes:
Intransitive Noninterference in Dependence Graphs. ISoLA 2006: 119-128 - [c3]Christian Hammer, Jens Krinke, Gregor Snelting:
Information Flow Control for Java Based on Path Conditions in Dependence Graphs. ISSSE 2006 - [c2]Christian Hammer, Martin Grimme, Jens Krinke:
Dynamic path conditions in dependence graphs. PEPM 2006: 58-67 - 2004
- [c1]Christian Hammer, Gregor Snelting:
An improved slicer for Java. PASTE 2004: 17-22
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint