Search for persons
X
?
Proceedings of the ACM on Web Conference 2024 ,
1
GRASP: Hardening Serverless Applications through Graph Reac..:
, In:
?
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
2
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core N..:
, In:
?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy ,
3
Examining Cryptography and Randomness Failures in Open-Sour..:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
4
VFCFinder: Pairing Security Advisories and Patches:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
5
Finding Fixed Vulnerabilities with Off-the-Shelf Static Ana..:
, In:
?
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies ,
6
MSNetViews: Geographically Distributed Management of Enterp..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
7
It's like flossing your teeth: On the Importance and Challe..:
, In:
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
8
Removing the Reliance on Perimeters for Security using Netw..:
, In:
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
9
A Study of Application Sandbox Policies in Linux:
, In:
?
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
10
Reflections on a Decade of Mobile Security Research:
, In:
?
Proceedings of the 38th Annual Computer Security Applications Conference ,
11
Analysis of Payment Service Provider SDKs in Android:
, In:
?
Advances in Information Security; Cyber Deception ,
12
Optimizing Honey Traffic Using Game Theory and Adversarial ..:
, In:
?
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies ,
13
SCIFFS: Enabling Secure Third-Party Security Analytics usin..:
, In:
?
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy ,
14
Role-Based Deception in Enterprise Networks:
, In:
?
Proceedings of the 7th Symposium on Hot Topics in the Science of Security ,
15