
Christian Hammer 0001
Person information
- affiliation: University of Potsdam, Germany
- affiliation (former): Saarland University, Department of Computer Science, Germany
- affiliation (former): Purdue University, Department of Computer Science, USA
- affiliation (former): University of Karlsruhe, Department of Informatics, Germany
Other persons with the same name
- Christian Hammer 0002 — University of Copenhagen, Department of Computer Science, Denmark
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j5]Abhishek Tiwari, Jyoti Prakash
, Sascha Groß, Christian Hammer
:
A Large Scale Analysis of Android - Web Hybridization. J. Syst. Softw. 170: 110775 (2020) - [c36]Katherine Hough, Gebrehiwet B. Welearegai, Christian Hammer, Jonathan Bell:
Revealing injection vulnerabilities by leveraging existing tests. ICSE 2020: 284-296 - [i6]Abhishek Tiwari, Jyoti Prakash, Sascha Groß, Christian Hammer:
A Large Scale Analysis of Android-Web Hybridization. CoRR abs/2008.01725 (2020)
2010 – 2019
- 2019
- [c35]Dhiman Chakraborty, Christian Hammer
, Sven Bugiel:
Secure multi-execution in Android. SAC 2019: 1934-1943 - [c34]Gebrehiwet B. Welearegai, Max Schlueter, Christian Hammer
:
Static security evaluation of an industrial web application. SAC 2019: 1952-1961 - [c33]Abhishek Tiwari, Jyoti Prakash
, Sascha Groß, Christian Hammer
:
LUDroid: A Large Scale Analysis of Android - Web Hybridization. SCAM 2019: 256-267 - [c32]Abhishek Tiwari, Sascha Groß, Christian Hammer
:
IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications. SecureComm (2) 2019: 335-349 - [i5]Jyoti Prakash, Abhishek Tiwari, Christian Hammer:
PointEval: On the Impact of Pointer Analysis Frameworks. CoRR abs/1912.00429 (2019) - 2018
- [c31]Sascha Groß
, Abhishek Tiwari
, Christian Hammer
:
PIAnalyzer: A Precise Approach for PendingIntent Vulnerability Analysis. ESORICS (2) 2018: 41-59 - [c30]Abhishek Tiwari, Fabian Bendun, Christian Hammer
:
A Formal Logic Framework for the Automation of the Right to Be Forgotten. SecureComm (1) 2018: 95-111 - [i4]Abhishek Tiwari, Sascha Groß, Christian Hammer:
IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications. CoRR abs/1812.05380 (2018) - 2017
- [c29]Abhishek Bichhawat
, Vineet Rajani
, Jinank Jain, Deepak Garg
, Christian Hammer
:
WebPol: Fine-Grained Information Flow Policies for Web Browsers. ESORICS (1) 2017: 242-259 - [c28]Gebrehiwet Biyane Welearegai
, Christian Hammer
:
Idea: Optimized Automatic Sanitizer Placement. ESSoS 2017: 87-96 - [c27]Sascha Groß
, Abhishek Tiwari, Christian Hammer
:
ThiefTrap - An Anti-theft Framework for Android. SecureComm 2017: 167-184 - [i3]Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg, Christian Hammer:
WebPol: Fine-grained Information Flow Policies for Web Browsers. CoRR abs/1706.06932 (2017) - 2016
- [c26]Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling, Christian Hammer
:
R-Droid: Leveraging Android App Analysis with Static Slice Optimization. AsiaCCS 2016: 129-140 - [c25]Michael Backes, Christian Hammer
, David Pfaff, Malte Skoruppa:
Implementation-level analysis of the JavaScript helios voting client. SAC 2016: 2071-2078 - [c24]David Pfaff, Sebastian Hack, Christian Hammer:
Learning how to prevent return-oriented programming efficiently. Software Engineering 2016: 43-44 - 2015
- [c23]Vineet Rajani, Abhishek Bichhawat, Deepak Garg, Christian Hammer
:
Information Flow Control for Event Handling and the DOM in Web Browsers. CSF 2015: 366-379 - [c22]David Pfaff, Sebastian Hack, Christian Hammer
:
Learning How to Prevent Return-Oriented Programming Efficiently. ESSoS 2015: 68-85 - [c21]Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, Philipp von Styp-Rekowsky:
Boxify: Full-fledged App Sandboxing for Stock Android. USENIX Security Symposium 2015: 691-706 - [i2]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. CoRR abs/1506.03950 (2015) - 2014
- [j4]Gregor Snelting, Dennis Giffhorn, Jürgen Graf, Christian Hammer, Martin Hecker, Martin Mohr, Daniel Wasserrab:
Checking probabilistic noninterference using JOANA. it Inf. Technol. 56(6): 280-287 (2014) - [c20]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer
:
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. PLAS@ECOOP 2014: 15 - [c19]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer
:
Information Flow Control in WebKit's JavaScript Bytecode. POST 2014: 159-178 - [c18]Christian Hammer:
Detecting Deadlock in Programs with Data-Centric Synchronization. Software Engineering 2014: 43-44 - [c17]Christian Hammer:
Flexible Access Control for JavaScript. Software Engineering 2014: 79-80 - [i1]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Information Flow Control in WebKit's JavaScript Bytecode. CoRR abs/1401.4339 (2014) - 2013
- [c16]Michael Backes, Sebastian Gerling, Christian Hammer
, Matteo Maffei, Philipp von Styp-Rekowsky:
AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications. DPM/SETOP 2013: 213-231 - [c15]Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer
:
Idea: Callee-Site Rewriting of Sealed System Libraries. ESSoS 2013: 33-41 - [c14]Daniel Marino, Christian Hammer
, Julian Dolby, Mandana Vaziri, Frank Tip, Jan Vitek:
Detecting deadlock in programs with data-centric synchronization. ICSE 2013: 322-331 - [c13]Gregor Richards, Christian Hammer
, Francesco Zappa Nardelli, Suresh Jagannathan, Jan Vitek:
Flexible access control for javascript. OOPSLA 2013: 305-322 - [c12]Michael Backes, Sebastian Gerling, Christian Hammer
, Matteo Maffei, Philipp von Styp-Rekowsky:
AppGuard - Enforcing User Requirements on Android Apps. TACAS 2013: 543-548 - 2012
- [j3]Julian Dolby, Christian Hammer
, Daniel Marino, Frank Tip, Mandana Vaziri, Jan Vitek:
A data-centric approach to synchronization. ACM Trans. Program. Lang. Syst. 34(1): 4:1-4:48 (2012) - 2011
- [c11]Gregor Richards, Christian Hammer
, Brian Burg, Jan Vitek:
The Eval That Men Do - A Large-Scale Study of the Use of Eval in JavaScript Applications. ECOOP 2011: 52-78 - [c10]William N. Sumner
, Christian Hammer
, Julian Dolby:
Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs. RV 2011: 161-176 - 2010
- [c9]Mandana Vaziri, Frank Tip, Julian Dolby, Christian Hammer
, Jan Vitek:
A Type System for Data-Centric Synchronization. ECOOP 2010: 304-328 - [c8]Christian Hammer
:
Experiences with PDG-Based IFC. ESSoS 2010: 44-60
2000 – 2009
- 2009
- [b1]Christian Hammer:
Information flow control for Java: a comprehensive approach based on path conditions in dependence graphs. Karlsruhe Institute of Technology, 2009, ISBN 978-3-86644-398-3, pp. 1-221 - [j2]Dennis Giffhorn, Christian Hammer
:
Precise slicing of concurrent programs. Autom. Softw. Eng. 16(2): 197-234 (2009) - [j1]Christian Hammer
, Gregor Snelting:
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. Int. J. Inf. Sec. 8(6): 399-422 (2009) - 2008
- [c7]Christian Hammer
, Julian Dolby, Mandana Vaziri, Frank Tip:
Dynamic detection of atomic-set-serializability violations. ICSE 2008: 231-240 - [c6]Christian Hammer
, Rüdiger Schaade, Gregor Snelting:
Static path conditions for Java. PLAS 2008: 57-66 - [c5]Dennis Giffhorn, Christian Hammer
:
Precise Analysis of Java Programs Using JOANA. SCAM 2008: 267-268 - 2007
- [c4]Dennis Giffhorn, Christian Hammer
:
An Evaluation of Slicing Algorithms for Concurrent Programs. SCAM 2007: 17-26 - 2006
- [c3]Christian Hammer
, Jens Krinke, Frank Nodes:
Intransitive Noninterference in Dependence Graphs. ISoLA 2006: 119-128 - [c2]Christian Hammer
, Martin Grimme, Jens Krinke:
Dynamic path conditions in dependence graphs. PEPM 2006: 58-67 - 2004
- [c1]Christian Hammer
, Gregor Snelting:
An improved slicer for Java. PASTE 2004: 17-22
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-02 22:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint