Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sven Lachmund
@article{DBLP:journals/jicts/Lachmund15, author = {Sven Lachmund}, title = {Standards Driven Security Assurance for Mobile Networks}, journal = {J. {ICT} Stand.}, volume = {3}, number = {2}, pages = {105--132}, year = {2015}, url = {https://doi.org/10.13052/jicts2245-800x.321}, doi = {10.13052/JICTS2245-800X.321}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jicts/Lachmund15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PhilippaertsYMPLW13, author = {Pieter Philippaerts and Yves Younan and Stijn Muylle and Frank Piessens and Sven Lachmund and Thomas Walter}, title = {{CPM:} Masking Code Pointers to Prevent Code Injection Attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {1}, pages = {1}, year = {2013}, url = {https://doi.org/10.1145/2487222.2487223}, doi = {10.1145/2487222.2487223}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/PhilippaertsYMPLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/YounanPPJLW11, author = {Yves Younan and Pieter Philippaerts and Frank Piessens and Wouter Joosen and Sven Lachmund and Thomas Walter}, title = {Filter-resistant code injection on {ARM}}, journal = {J. Comput. Virol.}, volume = {7}, number = {3}, pages = {173--188}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0146-0}, doi = {10.1007/S11416-010-0146-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/YounanPPJLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/PhilippaertsYMPLW11, author = {Pieter Philippaerts and Yves Younan and Stijn Muylle and Frank Piessens and Sven Lachmund and Thomas Walter}, editor = {Thorsten Holz and Herbert Bos}, title = {Code Pointer Masking: Hardening Applications against Code Injection Attacks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6739}, pages = {194--213}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22424-9\_12}, doi = {10.1007/978-3-642-22424-9\_12}, timestamp = {Wed, 25 Sep 2019 18:15:55 +0200}, biburl = {https://dblp.org/rec/conf/dimva/PhilippaertsYMPLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Lachmund2010, author = {Sven Lachmund}, title = {Auto-Generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition}, school = {Technical University Munich}, year = {2010}, url = {http://www.dr.hut-verlag.de/978-3-86853-664-5.html}, urn = {urn:nbn:de:101:1-201012149970}, isbn = {978-3-86853-664-5}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Lachmund2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/LachmundH10, author = {Sven Lachmund and Gregor Hengst}, title = {Auto-generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition}, journal = {Trans. Comput. Sci.}, volume = {11}, pages = {17--38}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17697-5\_2}, doi = {10.1007/978-3-642-17697-5\_2}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/LachmundH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Lachmund10, author = {Sven Lachmund}, editor = {Seok{-}Won Lee and Mattia Monga and Jan J{\"{u}}rjens}, title = {Auto-generating access control policies for applications by static analysis with user input recognition}, booktitle = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS} 2010, May 2, 2010, Cape Town, South Africa}, pages = {8--14}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809100.1809102}, doi = {10.1145/1809100.1809102}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/Lachmund10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/KoungaWL09, author = {Gina Kounga and Thomas Walter and Sven Lachmund}, title = {Proving Reliability of Anonymous Information in VANETs}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {58}, number = {6}, pages = {2977--2989}, year = {2009}, url = {https://doi.org/10.1109/TVT.2008.2010325}, doi = {10.1109/TVT.2008.2010325}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/KoungaWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZugenmaierLJ09, author = {Alf Zugenmaier and Sven Lachmund and Dileesh Jostin}, title = {Transparent Encryption for External Storage Media with Key Management Adapted to Mobile Use}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {333--339}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.38}, doi = {10.1109/ACSAC.2009.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZugenmaierLJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YounanPPJLW09, author = {Yves Younan and Pieter Philippaerts and Frank Piessens and Wouter Joosen and Sven Lachmund and Thomas Walter}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Filter-resistant code injection on {ARM}}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {11--20}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653665}, doi = {10.1145/1653662.1653665}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YounanPPJLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/StrackxYPPLW09, author = {Raoul Strackx and Yves Younan and Pieter Philippaerts and Frank Piessens and Sven Lachmund and Thomas Walter}, editor = {Evangelos P. Markatos and Manuel Costa}, title = {Breaking the memory secrecy assumption}, booktitle = {Proceedings of the Second European Workshop on System Security, {EUROSEC} 2009, Nuremburg, Germany, March 31, 2009}, pages = {1--8}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1519144.1519145}, doi = {10.1145/1519144.1519145}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/StrackxYPPLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2009secucode, editor = {Sven Lachmund and Christian Schaefer}, title = {Proceedings of the First {ACM} Workshop on Secure Execution of Untrusted Code, SecuCode '09, Chicago, Illinois, USA, November 9, 2009}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655077}, doi = {10.1145/1655077}, isbn = {978-1-60558-782-0}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2009secucode.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/LachmundWGBO06, author = {Sven Lachmund and Thomas Walter and Laurent Gomez and Laurent Bussard and Eddy Olk}, editor = {Hamid Ahmadi and Tom La Porta}, title = {Context-Aware Access Control; Making Access Control Decisions Based on Context Information}, booktitle = {3rd Annual International {ICST} Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, {MOBIQUITOUS} 2006, San Jose, California, USA, July 17-21, 2006}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/MOBIQ.2006.340450}, doi = {10.1109/MOBIQ.2006.340450}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/LachmundWGBO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/FransenLOB06, author = {Frank Fransen and Sven Lachmund and Eddy Olk and Laurent Bussard}, title = {An Infrastructure for Gaining Trust in Context Information}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--10}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359543}, doi = {10.1109/SECCOMW.2006.359543}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/FransenLOB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/BuchmannGL03, author = {Alexander Buchmann and Harald G{\"{o}}rl and Sven Lachmund}, editor = {Hamid R. Arabnia and Youngsong Mun}, title = {Placement of Cryptographic Mechanisms in Operating Systems}, booktitle = {Proceedings of the International Conference on Security and Management, {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2}, pages = {402--408}, publisher = {{CSREA} Press}, year = {2003}, timestamp = {Wed, 06 Dec 2006 10:55:26 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/BuchmannGL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.