Personensuche
X
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
1
Chrowned by an Extension: Abusing the Chrome DevTools Proto..:
, In:
?
2023 7th Network Traffic Measurement and Analysis Conference (TMA) ,
2
Your Code is 0000: An Analysis of the Disposable Phone Numb..:
, In:
?
Proceedings of the 2023 ACM on Internet Measurement Conference ,
3
In the Room Where It Happens: Characterizing Local Communic..:
, In:
?
Proceedings of the 3rd International CoNEXT Student Workshop ,
4
Challenges in inferring privacy properties of smart devices..:
, In:
?
Computer Security – ESORICS 2021; Lecture Notes in Computer Science ,
5
PoW-How: An Enduring Timing Side-Channel to Evade Online Ma..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
6
Trouble Over-The-Air: An Analysis of FOTA Apps in the Andro..:
, In:
?
Proceedings of the ACM Internet Measurement Conference ,
7
The Lockdown Effect : Implications of the COVID-19 Pande..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
8
An Analysis of Pre-installed Android Software:
, In:
?
Proceedings of the ACM Internet Measurement Conference ,
9
Mis-shapes, Mistakes, Misfits : An Analysis of Domain Cl..:
, In:
?
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security ,
11
AndrEnsemble : Leveraging API Ensembles to Characterize ..:
, In:
?
Proceedings of the Internet Measurement Conference 2018 ,
12
Beyond Google Play : A Large-Scale Comparative Study of ..:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
13
TriFlow : Triaging Android Applications using Speculativ..:
, In:
?
Emerging Challenges for Security, Privacy and Trust; IFIP Advances in Information and Communication Technology ,
14
Steganalysis of Hydan:
, In:
?
Communications in Computer and Information Science; Modelling, Computation and Optimization in Information Systems and Management Sciences ,
15