Maass, 2016
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Wang et al. | Towards memory safe enclave programming with rust-sgx | |
| Ferreira et al. | Containing malicious package updates in npm with a lightweight permission system | |
| Geneiatakis et al. | A Permission verification approach for android mobile applications | |
| US7437718B2 (en) | Reviewing the security of trusted software components | |
| US12111957B2 (en) | Software provenance validation | |
| Maass | A Theory and Tools for Applying Sandboxes Effectively. | |
| Rizzo et al. | Babelview: Evaluating the impact of code injection attacks in mobile webviews | |
| Armando et al. | Securing the" bring your own device" paradigm | |
| Maass et al. | A systematic analysis of the science of sandboxing | |
| Austin et al. | Multiple facets for dynamic information flow with exceptions | |
| Bagheri et al. | Automated dynamic enforcement of synthesized security policies in android | |
| Coker et al. | Evaluating the flexibility of the Java sandbox | |
| US20240406213A1 (en) | Secure cross-tenant access | |
| Muralee et al. | {ARGUS}: A Framework for Staged Static Taint Analysis of {GitHub} Workflows and Actions | |
| Sharma et al. | SBOM. EXE: Countering dynamic code injection based on software bill of materials in Java | |
| Kerschbaumer et al. | Information flow tracking meets just-in-time compilation | |
| Holzinger et al. | Hardening java’s access control by abolishing implicit privilege elevation | |
| Pupo et al. | GUARDIA: specification and enforcement of javascript security policies without VM modifications | |
| Li | Boosting static security analysis of android apps through code instrumentation | |
| Goichon et al. | Static vulnerability detection in Java service-oriented components | |
| Kerschbaumer et al. | Hardening firefox against injection attacks | |
| Gudka et al. | Clean application compartmentalization with SOAAP (extended version) | |
| Chandramouli et al. | A Data Protection Approach for Cloud-Native Applications | |
| Chawla | Information flow control for serverless systems | |
| da Silva Santos | Understanding and Identifying Vulnerabilities Related to Architectural Security Tactics |