Search - IFIP Open Digital Library Access content directly

Filter your results

8 results
Structure: Internal structure identifier : 300723
publicationDateY_i : 2015
Image document

Learn to Spot Phishing URLs with the Android NoPhish App

Gamze Canova , Melanie Volkamer , Clemens Bergmann , Roland Borza , Benjamin Reinheimer , et al.
9th IFIP World Conference on Information Security Education (WISE), May 2015, Hamburg, Germany. pp.87-100, ⟨10.1007/978-3-319-18500-2_8⟩
Conference papers hal-01334293v1
Image document

How Current Android Malware Seeks to Evade Automated Code Analysis

Siegfried Rasthofer , Irfan Asrar , Stephan Huber , Eric Bodden
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers hal-01442542v1
Image document

In-Situ Occlusion Resolution for Hybrid Tabletop Environments

Jan Riemann , Mohammadreza Khalilbeigi , Max Mühlhäuser
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.278-295, ⟨10.1007/978-3-319-22698-9_18⟩
Conference papers hal-01609416v1
Image document

ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis

Li Li , Alexandre Bartel , Tegawendé F. Bissyandé , Jacques Klein , Yves Le Traon
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.513-527, ⟨10.1007/978-3-319-18467-8_34⟩
Conference papers hal-01345142v1
Image document

Exploit Generation for Information Flow Leaks in Object-Oriented Programs

Quoc Huy Do , Richard Bubel , Reiner Hähnle
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.401-415, ⟨10.1007/978-3-319-18467-8_27⟩
Conference papers hal-01345131v1
Image document

Evaluation of Dispatcher Requirements on Automated Customer Feedback in Public Transport

Cindy Mayas , Stephan Hörold , Anselmo Stelzer , Frank Englert , Heidi Krömker
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.537-541, ⟨10.1007/978-3-319-22723-8_56⟩
Conference papers hal-01610819v1
Image document

Type Reconstruction Algorithms for Deadlock-Free and Lock-Free Linear π-Calculi

Luca Padovani , Tzu-Chun Chen , Andrea Tosatto
17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.83-98, ⟨10.1007/978-3-319-19282-6_6⟩
Conference papers hal-01774941v1
Image document

Enforcing Usage Constraints on Credentials for Web Applications

Jinwei Hu , Heiko Mantel , Sebastian Ruhleder
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.112-125, ⟨10.1007/978-3-319-18467-8_8⟩
Conference papers hal-01345100v1