| Appguard–enforcing user requirements on android apps M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky International Conference on TOOLS and Algorithms for the Construction and …, 2013 | 235 | 2013 |
| Boxify: Full-fledged app sandboxing for stock android M Backes, S Bugiel, C Hammer, O Schranz, P von Styp-Rekowsky 24th USENIX Security Symposium (USENIX Security 15), 691-706, 2015 | 192 | 2015 |
| Artist: The android runtime instrumentation and security toolkit M Backes, S Bugiel, O Schranz, P von Styp-Rekowsky, S Weisgerber 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 481-495, 2017 | 103 | 2017 |
| Android security framework: Extensible multi-layered access control on android M Backes, S Bugiel, S Gerling, P von Styp-Rekowsky Proceedings of the 30th annual computer security applications conference, 46-55, 2014 | 91 | 2014 |
| Appguard–fine-grained policy enforcement for untrusted android applications M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky International Workshop on Data Privacy Management, 213-231, 2013 | 75 | 2013 |
| Appguard-real-time policy enforcement for third-party applications M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky | 67 | 2012 |
| Mining sandboxes K Jamrozik, P von Styp-Rekowsky, A Zeller Proceedings of the 38th International Conference on Software Engineering, 37-48, 2016 | 64 | 2016 |
| Android security framework: Enabling generic and extensible access control on android M Backes, S Bugiel, S Gerling, P von Styp-Rekowsky arXiv preprint arXiv:1404.1395, 2014 | 26 | 2014 |
| Idea: Callee-site rewriting of sealed system libraries P von Styp-Rekowsky, S Gerling, M Backes, C Hammer International Symposium on Engineering Secure Software and Systems, 33-41, 2013 | 25 | 2013 |
| Albatross–an optimistic consensus algorithm P Berrang, P von Styp-Rekowsky, M Wissfeld, B França, R Trinkler 2019 crypto valley conference on blockchain technology (cvcbt), 39-42, 2019 | 22* | 2019 |
| A local cross-site scripting attack against android phones M Backes, S Gerling, P Styp-Rekowsky | 19 | 2011 |
| A novel attack against android phones M Backes, S Gerling, P von Styp-Rekowsky arXiv preprint arXiv:1106.4184, 2011 | 13 | 2011 |
| ArtHook: Callee-side method hook injection on the new Android runtime art M Wißfeld Saarland University, 2015 | 10 | 2015 |
| Seamless in-app ad blocking on stock android M Backes, S Bugiel, P von Styp-Rekowsky, M Wißfeld 2017 IEEE Security and Privacy Workshops (SPW), 163-168, 2017 | 8 | 2017 |
| POSTER: Towards compiler-assisted taint tracking on the Android runtime (ART) M Backes, O Schranz, P von Styp-Rekowsky Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 7 | 2015 |
| Towards time-adaptive feature design in music signal processing P von Styp-Rekowsky Master's Thesis, Saarland University, 2011 | 4 | 2011 |
| Android security framework M Backes, S Bugiel, S Gerling, P von Styp-Rekowsky Proceedings of the 30th Annual Computer Security Applications Conference, 2014 | 2 | 2014 |
| Boxify: Bringing Full-Fledged App Sandboxing to Stock Android M Backes, S Bugiel, O Schranz, P von Styp-Rekowsky login Usenix Mag. 41 (2), 2016 | 1 | 2016 |
| Retrofitting privacy controls to stock Android P von Styp-Rekowsky Saarländische Universitäts-und Landesbibliothek, 2019 | | 2019 |
| Cutting Memory Usage in Python C Curtsinger, ED Berger, P Gutmann, J Bent, B Settlemyer, G Grider, ... Systems Research, 2016 | | 2016 |