Author of the publication

Agility maneuvers to mitigate inference attacks on sensed location data.

, , , and . MILCOM, page 259-264. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inevitable Failure: The Flawed Trust Assumption in the Cloud., , and . CCSW, page 141-150. ACM, (2014)PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems., , , , , , , , and . USENIX Security Symposium, page 2579-2596. USENIX Association, (2021)AuDroid: Preventing Attacks on Audio Channels in Mobile Devices., , , and . ACSAC, page 181-190. ACM, (2015)Pileus: protecting user resources from vulnerable cloud services., , , and . ACSAC, page 52-64. ACM, (2016)IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems., , and . ARES, page 45:1-45:6. ACM, (2019)On Risk in Access Control Enforcement., , , and . SACMAT, page 31-42. ACM, (2017)Agility maneuvers to mitigate inference attacks on sensed location data., , , and . MILCOM, page 259-264. IEEE, (2016)Adaptive data protection in distributed systems., , and . CODASPY, page 365-376. ACM, (2013)AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings., , , , and . USENIX Security Symposium, page 379-396. USENIX Association, (2017)EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs., , , , , and . USENIX Security Symposium, page 567-584. USENIX Association, (2019)