Author of the publication

Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge.

, , , , and . USENIX Security Symposium, page 833-848. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services.. IEEE Trans. Mob. Comput., 11 (6): 983-994 (2012)Characterizing the Security of the SMS Ecosystem with Public Gateways., , , , , , and . ACM Trans. Priv. Secur., 22 (1): 2:1-2:31 (2019)Non-Invasive Methods for Host Certification., , , , and . SecureComm, page 1-10. IEEE, (2006)Mitigating attacks on open functionality in SMS-capable cellular networks., , , and . IEEE/ACM Trans. Netw., 17 (1): 40-53 (2009)FinTechSec: Addressing the Security Challenges of Digital Financial Services., , , and . IEEE Secur. Priv., 15 (5): 85-89 (2017)Secure attribute-based systems., , , and . CCS, page 99-112. ACM, (2006)ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 273-290. USENIX Association, (2018)Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems., , , , , , and . SP, page 712-729. IEEE, (2021)A Hybrid Approach to Secure Function Evaluation using SGX., , , , , , , and . AsiaCCS, page 100-113. ACM, (2019)On cellular botnets: measuring the impact of malicious devices on a cellular network core., , , , , , and . CCS, page 223-234. ACM, (2009)