Skip to main content

Showing 1–10 of 10 results for author: Hammer, C

.
  1. arXiv:2305.03916  [pdf, other

    cs.SE cs.PL

    Unifying Pointer Analyses for Polyglot Inter-operations through Summary Specialization

    Authors: Jyoti Prakash, Abhishek Tiwari, Christian Hammer

    Abstract: Modular analysis of polyglot applications is challenging because heap object flows across language boundaries must be resolved. The state-of-the-art analyses for polyglot applications have two fundamental limitations. First, they assume explicit boundaries between the host and the guest language to determine inter-language dataflows. Second, they rely on specific analyses of the host and guest lan… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

  2. arXiv:2302.07882  [pdf, other

    astro-ph.CO astro-ph.GA astro-ph.HE

    The role of baryons in self-interacting dark matter mergers

    Authors: Moritz S. Fischer, Nils-Henrik Durke, Katharina Hollingshausen, Claudius Hammer, Marcus Brüggen, Klaus Dolag

    Abstract: Mergers of galaxy clusters are promising probes of dark matter (DM) physics. For example, an offset between the DM component and the galaxy distribution can constrain DM self-interactions. We investigate the role of the intracluster medium (ICM) and its influence on DM-galaxy offsets in self-interacting dark matter models. To this end, we employ Smoothed Particle Hydrodynamics + N-body simulations… ▽ More

    Submitted 4 July, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: 15 pages, 10 figures + appendices, accepted for publication in MNRAS

  3. arXiv:2208.01968  [pdf, other

    cs.CR cs.SE

    Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView

    Authors: Abhishek Tiwari, Jyoti Prakash, Alimerdan Rahimov, Christian Hammer

    Abstract: Numerous studies demonstrated that browser fingerprinting is detrimental to users' security and privacy. However, little is known about the effects of browser fingerprinting on Android hybrid apps -- where a stripped-down Chromium browser is integrated into an app. These apps expand the attack surface by employing two-way communication between native apps and the web. This paper studies the impact… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

  4. arXiv:2008.01725  [pdf, other

    cs.CR cs.PL cs.SE

    A Large Scale Analysis of Android-Web Hybridization

    Authors: Abhishek Tiwari, Jyoti Prakash, Sascha Gross, Christian Hammer

    Abstract: Many Android applications embed webpages via WebView components and execute JavaScript code within Android. Hybrid applications leverage dedicated APIs to load a resource and render it in a WebView. Furthermore, Android objects can be shared with the JavaScript world. However, bridging the interfaces of the Android and JavaScript world might also incur severe security threats: Potentially untruste… ▽ More

    Submitted 4 August, 2020; v1 submitted 4 August, 2020; originally announced August 2020.

  5. arXiv:1912.00429  [pdf, other

    cs.SE cs.PL

    PointEval: On the Impact of Pointer Analysis Frameworks

    Authors: Jyoti Prakash, Abhishek Tiwari, Christian Hammer

    Abstract: Pointer analysis is a foundational analysis leveraged by various static analyses. Therefore, it gathered wide attention in research for decades. Some pointer analysis frameworks are based on succinct declarative specifications. However, these tools are heterogeneous in terms of the underlying intermediate representation (IR), heap abstraction, and programming methodology. This situation complicate… ▽ More

    Submitted 1 December, 2019; originally announced December 2019.

  6. arXiv:1812.05380  [pdf, other

    cs.SE cs.CR cs.PL

    IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications

    Authors: Abhishek Tiwari, Sascha Groß, Christian Hammer

    Abstract: Android apps cooperate through message passing via intents. However, when apps do not have identical sets of privileges inter-app communication (IAC) can accidentally or maliciously be misused, e.g., to leak sensitive information contrary to users expectations. Recent research considered static program analysis to detect dangerous data leaks due to inter-component communication (ICC) or IAC, but s… ▽ More

    Submitted 13 December, 2018; originally announced December 2018.

  7. WebPol: Fine-grained Information Flow Policies for Web Browsers

    Authors: Abhishek Bichhawat, Vineet Rajani, **ank Jain, Deepak Garg, Christian Hammer

    Abstract: In the standard web browser programming model, third-party scripts included in an application execute with the same privilege as the application's own code. This leaves the application's confidential data vulnerable to theft and leakage by malicious code and inadvertent bugs in the third-party scripts. Security mechanisms in modern browsers (the same-origin policy, cross-origin resource sharing an… ▽ More

    Submitted 26 June, 2017; v1 submitted 21 June, 2017; originally announced June 2017.

    Comments: ESORICS '17

  8. Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis

    Authors: Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer

    Abstract: Preventing implicit information flows by dynamic program analysis requires coarse approximations that result in false positives, because a dynamic monitor sees only the executed trace of the program. One widely deployed method is the no-sensitive-upgrade check, which terminates a program whenever a variable's taint is upgraded (made more sensitive) due to a control dependence on tainted data. Alth… ▽ More

    Submitted 16 June, 2015; v1 submitted 12 June, 2015; originally announced June 2015.

  9. arXiv:1401.4339  [pdf, other

    cs.CR cs.PL

    Information Flow Control in WebKit's JavaScript Bytecode

    Authors: Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer

    Abstract: Websites today routinely combine JavaScript from multiple sources, both trusted and untrusted. Hence, JavaScript security is of paramount importance. A specific interesting problem is information flow control (IFC) for JavaScript. In this paper, we develop, formalize and implement a dynamic IFC mechanism for the JavaScript engine of a production Web browser (specifically, Safari's WebKit engine).… ▽ More

    Submitted 21 January, 2014; v1 submitted 17 January, 2014; originally announced January 2014.

  10. arXiv:0704.2358  [pdf, ps, other

    cond-mat.supr-con cond-mat.mes-hall

    Density of states and supercurrent in diffusive SNS junctions: role of nonideal interfaces and spin-flip scattering

    Authors: J. C. Hammer, J. C. Cuevas, F. S. Bergeret, W. Belzig

    Abstract: We present a theoretical study of the density of states and supercurrent in diffusive superconductor-normal metal-superconductor (SNS) junctions. In particular, we study the influence on these two equilibrium properties of both an arbitrary transparency of the SN interfaces and the presence of spin-flip scattering in the normal wire. We show that the minigap that is present in the spectrum of th… ▽ More

    Submitted 18 April, 2007; originally announced April 2007.

    Comments: 12 pages, 13 figures

    Journal ref: Phys. Rev. B 76, 064514 (2007).