BibTeX records: Sven Lachmund

download as .bib file

@article{DBLP:journals/jicts/Lachmund15,
  author       = {Sven Lachmund},
  title        = {Standards Driven Security Assurance for Mobile Networks},
  journal      = {J. {ICT} Stand.},
  volume       = {3},
  number       = {2},
  pages        = {105--132},
  year         = {2015},
  url          = {https://doi.org/10.13052/jicts2245-800x.321},
  doi          = {10.13052/JICTS2245-800X.321},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jicts/Lachmund15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PhilippaertsYMPLW13,
  author       = {Pieter Philippaerts and
                  Yves Younan and
                  Stijn Muylle and
                  Frank Piessens and
                  Sven Lachmund and
                  Thomas Walter},
  title        = {{CPM:} Masking Code Pointers to Prevent Code Injection Attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {1},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487222.2487223},
  doi          = {10.1145/2487222.2487223},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/PhilippaertsYMPLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/YounanPPJLW11,
  author       = {Yves Younan and
                  Pieter Philippaerts and
                  Frank Piessens and
                  Wouter Joosen and
                  Sven Lachmund and
                  Thomas Walter},
  title        = {Filter-resistant code injection on {ARM}},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {3},
  pages        = {173--188},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0146-0},
  doi          = {10.1007/S11416-010-0146-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/YounanPPJLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/PhilippaertsYMPLW11,
  author       = {Pieter Philippaerts and
                  Yves Younan and
                  Stijn Muylle and
                  Frank Piessens and
                  Sven Lachmund and
                  Thomas Walter},
  editor       = {Thorsten Holz and
                  Herbert Bos},
  title        = {Code Pointer Masking: Hardening Applications against Code Injection
                  Attacks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
                  July 7-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6739},
  pages        = {194--213},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22424-9\_12},
  doi          = {10.1007/978-3-642-22424-9\_12},
  timestamp    = {Wed, 25 Sep 2019 18:15:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/PhilippaertsYMPLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Lachmund2010,
  author       = {Sven Lachmund},
  title        = {Auto-Generation of Least Privileges Access Control Policies for Applications
                  Supported by User Input Recognition},
  school       = {Technical University Munich},
  year         = {2010},
  url          = {http://www.dr.hut-verlag.de/978-3-86853-664-5.html},
  urn          = {urn:nbn:de:101:1-201012149970},
  isbn         = {978-3-86853-664-5},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Lachmund2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/LachmundH10,
  author       = {Sven Lachmund and
                  Gregor Hengst},
  title        = {Auto-generation of Least Privileges Access Control Policies for Applications
                  Supported by User Input Recognition},
  journal      = {Trans. Comput. Sci.},
  volume       = {11},
  pages        = {17--38},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17697-5\_2},
  doi          = {10.1007/978-3-642-17697-5\_2},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/LachmundH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Lachmund10,
  author       = {Sven Lachmund},
  editor       = {Seok{-}Won Lee and
                  Mattia Monga and
                  Jan J{\"{u}}rjens},
  title        = {Auto-generating access control policies for applications by static
                  analysis with user input recognition},
  booktitle    = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS}
                  2010, May 2, 2010, Cape Town, South Africa},
  pages        = {8--14},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809100.1809102},
  doi          = {10.1145/1809100.1809102},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/Lachmund10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/KoungaWL09,
  author       = {Gina Kounga and
                  Thomas Walter and
                  Sven Lachmund},
  title        = {Proving Reliability of Anonymous Information in VANETs},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {58},
  number       = {6},
  pages        = {2977--2989},
  year         = {2009},
  url          = {https://doi.org/10.1109/TVT.2008.2010325},
  doi          = {10.1109/TVT.2008.2010325},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/KoungaWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZugenmaierLJ09,
  author       = {Alf Zugenmaier and
                  Sven Lachmund and
                  Dileesh Jostin},
  title        = {Transparent Encryption for External Storage Media with Key Management
                  Adapted to Mobile Use},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {333--339},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.38},
  doi          = {10.1109/ACSAC.2009.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZugenmaierLJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YounanPPJLW09,
  author       = {Yves Younan and
                  Pieter Philippaerts and
                  Frank Piessens and
                  Wouter Joosen and
                  Sven Lachmund and
                  Thomas Walter},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Filter-resistant code injection on {ARM}},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653665},
  doi          = {10.1145/1653662.1653665},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YounanPPJLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/StrackxYPPLW09,
  author       = {Raoul Strackx and
                  Yves Younan and
                  Pieter Philippaerts and
                  Frank Piessens and
                  Sven Lachmund and
                  Thomas Walter},
  editor       = {Evangelos P. Markatos and
                  Manuel Costa},
  title        = {Breaking the memory secrecy assumption},
  booktitle    = {Proceedings of the Second European Workshop on System Security, {EUROSEC}
                  2009, Nuremburg, Germany, March 31, 2009},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1519144.1519145},
  doi          = {10.1145/1519144.1519145},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/StrackxYPPLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009secucode,
  editor       = {Sven Lachmund and
                  Christian Schaefer},
  title        = {Proceedings of the First {ACM} Workshop on Secure Execution of Untrusted
                  Code, SecuCode '09, Chicago, Illinois, USA, November 9, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655077},
  doi          = {10.1145/1655077},
  isbn         = {978-1-60558-782-0},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2009secucode.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/LachmundWGBO06,
  author       = {Sven Lachmund and
                  Thomas Walter and
                  Laurent Gomez and
                  Laurent Bussard and
                  Eddy Olk},
  editor       = {Hamid Ahmadi and
                  Tom La Porta},
  title        = {Context-Aware Access Control; Making Access Control Decisions Based
                  on Context Information},
  booktitle    = {3rd Annual International {ICST} Conference on Mobile and Ubiquitous
                  Systems: Computing, Networking and Services, {MOBIQUITOUS} 2006, San
                  Jose, California, USA, July 17-21, 2006},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/MOBIQ.2006.340450},
  doi          = {10.1109/MOBIQ.2006.340450},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/LachmundWGBO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/FransenLOB06,
  author       = {Frank Fransen and
                  Sven Lachmund and
                  Eddy Olk and
                  Laurent Bussard},
  title        = {An Infrastructure for Gaining Trust in Context Information},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359543},
  doi          = {10.1109/SECCOMW.2006.359543},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/FransenLOB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/BuchmannGL03,
  author       = {Alexander Buchmann and
                  Harald G{\"{o}}rl and
                  Sven Lachmund},
  editor       = {Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {Placement of Cryptographic Mechanisms in Operating Systems},
  booktitle    = {Proceedings of the International Conference on Security and Management,
                  {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2},
  pages        = {402--408},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/BuchmannGL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics