TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 5.

Glanz, Leonid and Amann, Sven and Eichberg, Michael and Reif, Michael and Mezini, Mira
Tichy, Matthias and Bodden, Eric and Kuhrmann, Marco and Wagner, Stefan and Steghöfer, Jan-Philipp (eds.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, Gesellschaft für Informatik, pp. 117-118, [Book Section]

Glanz, Leonid and Amann, Sven and Eichberg, Michael and Reif, Michael and Hermann, Ben and Lerch, Johannes and Mezini, Mira (2017):
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, Paderborn, Germany, In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ISBN 978-1-4503-5105-8,
DOI: 10.1145/3106237.3106305,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3106305],
[Conference or Workshop Item]

Eichberg, Michael and Hermann, Ben and Mezini, Mira and Glanz, Leonid (2015):
Hidden Truths in Dead Software Paths.
New York, NY, USA, ACM, In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, New York, NY, USA, In: ESEC/FSE 2015, ISBN 978-1-4503-3675-8,
[Online-Edition: http://doi.acm.org/10.1145/2786805.2786865],
[Conference or Workshop Item]

Glanz, Leonid and Schmidt, Sebastian and Wollny, Sebastian and Hermann, Ben (2015):
A Vulnerability's Lifetime: Enhancing Version Information in CVE Databases.
New York, NY, USA, ACM, In: Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business, New York, NY, USA, In: i-KNOW '15, ISBN 978-1-4503-3721-2,
[Online-Edition: http://doi.acm.org/10.1145/2809563.2809612],
[Conference or Workshop Item]

Glanz, Leonid and Schmidt, Sebastian and Wollny, Sebastian and Hermann, Ben (2015):
A vulnerability's lifetime: enhancing version information in CVE databases.
In: Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business, I-KNOW '15, Graz, Austria, October 21-23, 2015, DOI: 10.1145/2809563.2809612,
[Online-Edition: http://doi.acm.org/10.1145/2809563.2809612],
[Conference or Workshop Item]

This list was generated on Tue Jun 18 00:52:48 2019 CEST.