Search for persons
X
?
Proceedings of the ACM on Web Conference 2024 ,
1
GRASP: Hardening Serverless Applications through Graph Reac..:
, In:
?
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
3
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core N..:
, In:
?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy ,
4
Examining Cryptography and Randomness Failures in Open-Sour..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
5
It's like flossing your teeth: On the Importance and Challe..:
, In:
?
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies ,
6
MSNetViews: Geographically Distributed Management of Enterp..:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
7
Finding Fixed Vulnerabilities with Off-the-Shelf Static Ana..:
, In:
?
Advances in Information Security; Cyber Deception ,
10
Optimizing Honey Traffic Using Game Theory and Adversarial ..:
, In:
?
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
11
Reflections on a Decade of Mobile Security Research:
, In:
?
Proceedings of the 38th Annual Computer Security Applications Conference ,
12
Analysis of Payment Service Provider SDKs in Android:
, In:
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
13
Removing the Reliance on Perimeters for Security using Netw..:
, In:
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
14
A Study of Application Sandbox Policies in Linux:
, In:
?
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies ,
15